"type_bundle" "id_bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605" "spec_version_2.1" "objects_0_type_x-mitre-collection" "objects_0_id_x-mitre-collection--dac0d2d7-8653-445c-9bff-82f934c1e858" "objects_0_spec_version_2.1" "objects_0_x_mitre_attack_spec_version_2.1.0" "objects_0_name_Mobile ATT&CK" "objects_0_x_mitre_version_14.1" "objects_0_description_ATT&CK for Mobile is a matrix of adversary behavior against mobile devices (smartphones and tablets running the Android or iOS/iPadOS operating systems). ATT&CK for Mobile builds upon NIST's Mobile Threat Catalogue and also contains a separate matrix of network-based effects, which are techniques that an adversary can employ without access to the mobile device itself." "objects_0_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_0_created_2018-01-17T12:56:55.080Z" "objects_0_modified_2023-11-14T14:00:00.188Z" "objects_0_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_0_x_mitre_contents_0_object_ref_attack-pattern--00290ac5-551e-44aa-bbd8-c4b913488a6d" "objects_0_x_mitre_contents_0_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_1_object_ref_attack-pattern--039bc59c-ecc7-4997-b2b4-4ab728bd91aa" "objects_0_x_mitre_contents_1_object_modified_2022-03-30T19:14:20.369Z" "objects_0_x_mitre_contents_2_object_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_0_x_mitre_contents_2_object_modified_2023-03-15T16:39:32.207Z" "objects_0_x_mitre_contents_3_object_ref_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_0_x_mitre_contents_3_object_modified_2023-03-15T16:23:59.281Z" "objects_0_x_mitre_contents_4_object_ref_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_0_x_mitre_contents_4_object_modified_2023-09-25T19:53:07.406Z" "objects_0_x_mitre_contents_5_object_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_0_x_mitre_contents_5_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_6_object_ref_attack-pattern--0c71033e-401e-4b97-9309-7a7c95e43a5d" "objects_0_x_mitre_contents_6_object_modified_2022-04-06T15:54:11.189Z" "objects_0_x_mitre_contents_7_object_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_0_x_mitre_contents_7_object_modified_2023-03-20T18:43:03.218Z" "objects_0_x_mitre_contents_8_object_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_0_x_mitre_contents_8_object_modified_2023-03-20T18:42:18.121Z" "objects_0_x_mitre_contents_9_object_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_0_x_mitre_contents_9_object_modified_2023-03-20T18:52:29.947Z" "objects_0_x_mitre_contents_10_object_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_0_x_mitre_contents_10_object_modified_2023-08-15T15:06:03.427Z" "objects_0_x_mitre_contents_11_object_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_0_x_mitre_contents_11_object_modified_2023-09-08T18:15:15.902Z" "objects_0_x_mitre_contents_12_object_ref_attack-pattern--11bd699b-f2c2-4e48-bf46-fb3f8acd9799" "objects_0_x_mitre_contents_12_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_13_object_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_0_x_mitre_contents_13_object_modified_2023-03-20T18:56:20.270Z" "objects_0_x_mitre_contents_14_object_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_0_x_mitre_contents_14_object_modified_2022-04-05T20:16:21.324Z" "objects_0_x_mitre_contents_15_object_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_0_x_mitre_contents_15_object_modified_2023-03-20T18:55:03.477Z" "objects_0_x_mitre_contents_16_object_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_0_x_mitre_contents_16_object_modified_2023-03-20T18:55:23.702Z" "objects_0_x_mitre_contents_17_object_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_0_x_mitre_contents_17_object_modified_2023-03-16T18:32:30.150Z" "objects_0_x_mitre_contents_18_object_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_0_x_mitre_contents_18_object_modified_2023-03-20T18:55:33.642Z" "objects_0_x_mitre_contents_19_object_ref_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_0_x_mitre_contents_19_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_20_object_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_0_x_mitre_contents_20_object_modified_2023-03-20T18:57:40.571Z" "objects_0_x_mitre_contents_21_object_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_0_x_mitre_contents_21_object_modified_2023-03-20T18:59:55.849Z" "objects_0_x_mitre_contents_22_object_ref_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_0_x_mitre_contents_22_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_23_object_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_0_x_mitre_contents_23_object_modified_2023-03-20T18:51:07.651Z" "objects_0_x_mitre_contents_24_object_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_0_x_mitre_contents_24_object_modified_2022-04-06T13:07:45.661Z" "objects_0_x_mitre_contents_25_object_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_0_x_mitre_contents_25_object_modified_2023-03-20T18:53:52.292Z" "objects_0_x_mitre_contents_26_object_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_0_x_mitre_contents_26_object_modified_2022-04-11T20:05:56.069Z" "objects_0_x_mitre_contents_27_object_ref_attack-pattern--27d18e87-8f32-4be1-b456-39b90454360f" "objects_0_x_mitre_contents_27_object_modified_2023-03-20T18:37:57.884Z" "objects_0_x_mitre_contents_28_object_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_0_x_mitre_contents_28_object_modified_2022-04-01T15:02:43.470Z" "objects_0_x_mitre_contents_29_object_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_0_x_mitre_contents_29_object_modified_2023-09-28T15:36:11.282Z" "objects_0_x_mitre_contents_30_object_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_0_x_mitre_contents_30_object_modified_2022-04-06T15:37:34.463Z" "objects_0_x_mitre_contents_31_object_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_0_x_mitre_contents_31_object_modified_2023-08-07T22:15:34.693Z" "objects_0_x_mitre_contents_32_object_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_0_x_mitre_contents_32_object_modified_2023-03-20T18:40:12.912Z" "objects_0_x_mitre_contents_33_object_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_0_x_mitre_contents_33_object_modified_2023-08-14T16:21:05.728Z" "objects_0_x_mitre_contents_34_object_ref_attack-pattern--2ccc3d39-9598-4d32-9657-42e1c7095d26" "objects_0_x_mitre_contents_34_object_modified_2023-08-14T16:19:34.225Z" "objects_0_x_mitre_contents_35_object_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_0_x_mitre_contents_35_object_modified_2022-04-06T15:42:13.444Z" "objects_0_x_mitre_contents_36_object_ref_attack-pattern--2de38279-043e-47e8-aaad-1b07af6d0790" "objects_0_x_mitre_contents_36_object_modified_2022-04-11T19:12:38.451Z" "objects_0_x_mitre_contents_37_object_ref_attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d" "objects_0_x_mitre_contents_37_object_modified_2022-04-11T20:06:56.032Z" "objects_0_x_mitre_contents_38_object_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_0_x_mitre_contents_38_object_modified_2023-08-14T16:41:52.000Z" "objects_0_x_mitre_contents_39_object_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_0_x_mitre_contents_39_object_modified_2023-09-08T19:20:13.836Z" "objects_0_x_mitre_contents_40_object_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_0_x_mitre_contents_40_object_modified_2023-08-10T21:57:52.009Z" "objects_0_x_mitre_contents_41_object_ref_attack-pattern--37047267-3e56-453c-833e-d92b68118120" "objects_0_x_mitre_contents_41_object_modified_2023-08-14T16:40:40.166Z" "objects_0_x_mitre_contents_42_object_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_0_x_mitre_contents_42_object_modified_2023-03-16T18:27:42.752Z" "objects_0_x_mitre_contents_43_object_ref_attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad" "objects_0_x_mitre_contents_43_object_modified_2022-04-06T15:40:47.556Z" "objects_0_x_mitre_contents_44_object_ref_attack-pattern--393e8c12-a416-4575-ba90-19cc85656796" "objects_0_x_mitre_contents_44_object_modified_2022-04-05T20:17:46.147Z" "objects_0_x_mitre_contents_45_object_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_0_x_mitre_contents_45_object_modified_2023-03-15T16:26:05.050Z" "objects_0_x_mitre_contents_46_object_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_0_x_mitre_contents_46_object_modified_2022-04-15T17:52:24.123Z" "objects_0_x_mitre_contents_47_object_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_0_x_mitre_contents_47_object_modified_2022-04-05T19:52:32.190Z" "objects_0_x_mitre_contents_48_object_ref_attack-pattern--3e091a89-a493-4a6c-8e88-d57be19bb98d" "objects_0_x_mitre_contents_48_object_modified_2023-08-14T16:39:22.707Z" "objects_0_x_mitre_contents_49_object_ref_attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09" "objects_0_x_mitre_contents_49_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_50_object_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_0_x_mitre_contents_50_object_modified_2023-03-16T18:26:46.043Z" "objects_0_x_mitre_contents_51_object_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_0_x_mitre_contents_51_object_modified_2023-03-20T18:44:26.317Z" "objects_0_x_mitre_contents_52_object_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_0_x_mitre_contents_52_object_modified_2023-03-20T18:55:51.676Z" "objects_0_x_mitre_contents_53_object_ref_attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce" "objects_0_x_mitre_contents_53_object_modified_2022-04-01T13:19:41.180Z" "objects_0_x_mitre_contents_54_object_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_0_x_mitre_contents_54_object_modified_2023-03-20T15:20:11.752Z" "objects_0_x_mitre_contents_55_object_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_0_x_mitre_contents_55_object_modified_2023-03-20T18:54:40.501Z" "objects_0_x_mitre_contents_56_object_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_0_x_mitre_contents_56_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_57_object_ref_attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5" "objects_0_x_mitre_contents_57_object_modified_2022-04-05T19:54:12.657Z" "objects_0_x_mitre_contents_58_object_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_0_x_mitre_contents_58_object_modified_2022-04-08T15:46:24.495Z" "objects_0_x_mitre_contents_59_object_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_0_x_mitre_contents_59_object_modified_2022-04-06T15:41:16.863Z" "objects_0_x_mitre_contents_60_object_ref_attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067" "objects_0_x_mitre_contents_60_object_modified_2022-04-06T15:54:28.187Z" "objects_0_x_mitre_contents_61_object_ref_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_0_x_mitre_contents_61_object_modified_2023-09-28T17:02:58.893Z" "objects_0_x_mitre_contents_62_object_ref_attack-pattern--5ca3c7ec-55b2-4587-9376-cf6c96f8047a" "objects_0_x_mitre_contents_62_object_modified_2023-03-20T18:57:14.285Z" "objects_0_x_mitre_contents_63_object_ref_attack-pattern--60623164-ccd8-4508-a141-b5a34820b3de" "objects_0_x_mitre_contents_63_object_modified_2022-04-05T20:03:46.788Z" "objects_0_x_mitre_contents_64_object_ref_attack-pattern--62adb627-f647-498e-b4cc-41499361bacb" "objects_0_x_mitre_contents_64_object_modified_2022-04-01T12:50:48.453Z" "objects_0_x_mitre_contents_65_object_ref_attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3" "objects_0_x_mitre_contents_65_object_modified_2022-04-06T15:51:11.938Z" "objects_0_x_mitre_contents_66_object_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_0_x_mitre_contents_66_object_modified_2023-03-20T18:54:25.564Z" "objects_0_x_mitre_contents_67_object_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_0_x_mitre_contents_67_object_modified_2023-08-07T17:13:04.396Z" "objects_0_x_mitre_contents_68_object_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_0_x_mitre_contents_68_object_modified_2023-03-16T13:31:29.924Z" "objects_0_x_mitre_contents_69_object_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_0_x_mitre_contents_69_object_modified_2023-03-20T18:59:46.686Z" "objects_0_x_mitre_contents_70_object_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_0_x_mitre_contents_70_object_modified_2023-08-07T22:48:30.418Z" "objects_0_x_mitre_contents_71_object_ref_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_0_x_mitre_contents_71_object_modified_2022-04-19T20:03:51.831Z" "objects_0_x_mitre_contents_72_object_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_0_x_mitre_contents_72_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_73_object_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_0_x_mitre_contents_73_object_modified_2023-08-08T16:23:41.271Z" "objects_0_x_mitre_contents_74_object_ref_attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a" "objects_0_x_mitre_contents_74_object_modified_2022-04-05T19:40:25.068Z" "objects_0_x_mitre_contents_75_object_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_0_x_mitre_contents_75_object_modified_2023-03-20T18:51:04.432Z" "objects_0_x_mitre_contents_76_object_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_0_x_mitre_contents_76_object_modified_2023-03-20T18:53:16.029Z" "objects_0_x_mitre_contents_77_object_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_0_x_mitre_contents_77_object_modified_2023-03-20T18:57:43.022Z" "objects_0_x_mitre_contents_78_object_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_0_x_mitre_contents_78_object_modified_2023-03-20T18:44:26.748Z" "objects_0_x_mitre_contents_79_object_ref_attack-pattern--76c12fc8-a4eb-45d6-a3b7-e371a7248f69" "objects_0_x_mitre_contents_79_object_modified_2022-04-06T13:57:24.726Z" "objects_0_x_mitre_contents_80_object_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_0_x_mitre_contents_80_object_modified_2022-04-01T15:17:21.508Z" "objects_0_x_mitre_contents_81_object_ref_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_0_x_mitre_contents_81_object_modified_2023-03-20T15:28:54.940Z" "objects_0_x_mitre_contents_82_object_ref_attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b" "objects_0_x_mitre_contents_82_object_modified_2022-03-30T17:54:56.590Z" "objects_0_x_mitre_contents_83_object_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_0_x_mitre_contents_83_object_modified_2023-03-20T18:43:49.443Z" "objects_0_x_mitre_contents_84_object_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_0_x_mitre_contents_84_object_modified_2023-03-20T18:52:52.097Z" "objects_0_x_mitre_contents_85_object_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_0_x_mitre_contents_85_object_modified_2022-04-01T13:14:43.174Z" "objects_0_x_mitre_contents_86_object_ref_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_0_x_mitre_contents_86_object_modified_2022-03-30T20:43:31.244Z" "objects_0_x_mitre_contents_87_object_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_0_x_mitre_contents_87_object_modified_2022-04-01T16:52:36.965Z" "objects_0_x_mitre_contents_88_object_ref_attack-pattern--831e3269-da49-48ac-94dc-948008e8fd16" "objects_0_x_mitre_contents_88_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_89_object_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_0_x_mitre_contents_89_object_modified_2023-03-20T18:45:39.362Z" "objects_0_x_mitre_contents_90_object_ref_attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6" "objects_0_x_mitre_contents_90_object_modified_2022-04-06T15:46:29.338Z" "objects_0_x_mitre_contents_91_object_ref_attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05" "objects_0_x_mitre_contents_91_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_92_object_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_0_x_mitre_contents_92_object_modified_2022-03-30T19:34:09.371Z" "objects_0_x_mitre_contents_93_object_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_0_x_mitre_contents_93_object_modified_2022-03-30T19:50:37.727Z" "objects_0_x_mitre_contents_94_object_ref_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_0_x_mitre_contents_94_object_modified_2022-04-06T13:57:38.841Z" "objects_0_x_mitre_contents_95_object_ref_attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e" "objects_0_x_mitre_contents_95_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_96_object_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_0_x_mitre_contents_96_object_modified_2023-08-14T16:34:55.968Z" "objects_0_x_mitre_contents_97_object_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_0_x_mitre_contents_97_object_modified_2023-09-08T19:21:40.736Z" "objects_0_x_mitre_contents_98_object_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_0_x_mitre_contents_98_object_modified_2023-03-20T15:32:37.109Z" "objects_0_x_mitre_contents_99_object_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_0_x_mitre_contents_99_object_modified_2023-08-14T16:33:56.861Z" "objects_0_x_mitre_contents_100_object_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_0_x_mitre_contents_100_object_modified_2023-03-20T18:50:21.363Z" "objects_0_x_mitre_contents_101_object_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_0_x_mitre_contents_101_object_modified_2023-03-20T15:56:34.537Z" "objects_0_x_mitre_contents_102_object_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_0_x_mitre_contents_102_object_modified_2022-04-01T18:49:51.039Z" "objects_0_x_mitre_contents_103_object_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_0_x_mitre_contents_103_object_modified_2023-03-20T18:58:20.113Z" "objects_0_x_mitre_contents_104_object_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_0_x_mitre_contents_104_object_modified_2023-09-27T21:09:27.288Z" "objects_0_x_mitre_contents_105_object_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_0_x_mitre_contents_105_object_modified_2022-04-06T15:39:14.695Z" "objects_0_x_mitre_contents_106_object_ref_attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881" "objects_0_x_mitre_contents_106_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_107_object_ref_attack-pattern--a5de0540-73e7-4c67-96da-4143afedc7ed" "objects_0_x_mitre_contents_107_object_modified_2022-04-06T15:52:41.578Z" "objects_0_x_mitre_contents_108_object_ref_attack-pattern--a64a820a-cb21-471f-920c-506a2ff04fa5" "objects_0_x_mitre_contents_108_object_modified_2022-04-06T15:53:54.872Z" "objects_0_x_mitre_contents_109_object_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_0_x_mitre_contents_109_object_modified_2023-03-20T18:44:36.145Z" "objects_0_x_mitre_contents_110_object_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_0_x_mitre_contents_110_object_modified_2023-03-20T18:57:17.144Z" "objects_0_x_mitre_contents_111_object_ref_attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9" "objects_0_x_mitre_contents_111_object_modified_2023-03-20T18:18:29.556Z" "objects_0_x_mitre_contents_112_object_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_0_x_mitre_contents_112_object_modified_2022-04-06T15:45:52.558Z" "objects_0_x_mitre_contents_113_object_ref_attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431" "objects_0_x_mitre_contents_113_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_114_object_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_0_x_mitre_contents_114_object_modified_2023-03-16T18:28:28.234Z" "objects_0_x_mitre_contents_115_object_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_0_x_mitre_contents_115_object_modified_2023-03-20T18:52:24.758Z" "objects_0_x_mitre_contents_116_object_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_0_x_mitre_contents_116_object_modified_2023-03-20T18:39:10.201Z" "objects_0_x_mitre_contents_117_object_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_0_x_mitre_contents_117_object_modified_2023-03-20T18:48:39.936Z" "objects_0_x_mitre_contents_118_object_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_0_x_mitre_contents_118_object_modified_2023-03-20T18:58:57.001Z" "objects_0_x_mitre_contents_119_object_ref_attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6" "objects_0_x_mitre_contents_119_object_modified_2022-04-08T16:29:55.321Z" "objects_0_x_mitre_contents_120_object_ref_attack-pattern--b3c2e5de-0941-4b57-ba61-af029eb5517a" "objects_0_x_mitre_contents_120_object_modified_2022-04-18T19:46:02.529Z" "objects_0_x_mitre_contents_121_object_ref_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_0_x_mitre_contents_121_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_122_object_ref_attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff" "objects_0_x_mitre_contents_122_object_modified_2023-03-20T18:55:54.442Z" "objects_0_x_mitre_contents_123_object_ref_attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc" "objects_0_x_mitre_contents_123_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_124_object_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_0_x_mitre_contents_124_object_modified_2022-04-05T20:14:17.310Z" "objects_0_x_mitre_contents_125_object_ref_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_0_x_mitre_contents_125_object_modified_2022-03-30T14:43:46.019Z" "objects_0_x_mitre_contents_126_object_ref_attack-pattern--c08366bb-8d11-4921-853f-f0a3b6a2a1da" "objects_0_x_mitre_contents_126_object_modified_2023-03-20T15:21:12.603Z" "objects_0_x_mitre_contents_127_object_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_0_x_mitre_contents_127_object_modified_2023-03-16T18:33:20.042Z" "objects_0_x_mitre_contents_128_object_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_0_x_mitre_contents_128_object_modified_2022-03-30T15:18:21.242Z" "objects_0_x_mitre_contents_129_object_ref_attack-pattern--c548d8c4-a0a3-4a24-bb79-2a84abbc7b36" "objects_0_x_mitre_contents_129_object_modified_2023-03-20T15:55:32.497Z" "objects_0_x_mitre_contents_130_object_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_0_x_mitre_contents_130_object_modified_2023-03-20T18:58:33.873Z" "objects_0_x_mitre_contents_131_object_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_0_x_mitre_contents_131_object_modified_2023-08-14T16:31:37.317Z" "objects_0_x_mitre_contents_132_object_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_0_x_mitre_contents_132_object_modified_2023-09-08T19:20:51.220Z" "objects_0_x_mitre_contents_133_object_ref_attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f" "objects_0_x_mitre_contents_133_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_134_object_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_0_x_mitre_contents_134_object_modified_2023-09-08T19:19:37.927Z" "objects_0_x_mitre_contents_135_object_ref_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_0_x_mitre_contents_135_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_136_object_ref_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_0_x_mitre_contents_136_object_modified_2022-03-30T18:18:15.903Z" "objects_0_x_mitre_contents_137_object_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_0_x_mitre_contents_137_object_modified_2023-03-20T18:53:35.087Z" "objects_0_x_mitre_contents_138_object_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_0_x_mitre_contents_138_object_modified_2023-08-09T14:38:34.859Z" "objects_0_x_mitre_contents_139_object_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_0_x_mitre_contents_139_object_modified_2023-08-08T22:50:32.775Z" "objects_0_x_mitre_contents_140_object_ref_attack-pattern--d2e112dc-f6d4-488d-b8df-ecbfb57a0a2d" "objects_0_x_mitre_contents_140_object_modified_2023-03-20T18:51:23.109Z" "objects_0_x_mitre_contents_141_object_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_0_x_mitre_contents_141_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_142_object_ref_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_0_x_mitre_contents_142_object_modified_2023-03-20T18:43:46.177Z" "objects_0_x_mitre_contents_143_object_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_0_x_mitre_contents_143_object_modified_2023-03-20T18:50:32.697Z" "objects_0_x_mitre_contents_144_object_ref_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_0_x_mitre_contents_144_object_modified_2022-04-06T15:44:48.421Z" "objects_0_x_mitre_contents_145_object_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_0_x_mitre_contents_145_object_modified_2023-03-20T18:38:27.848Z" "objects_0_x_mitre_contents_146_object_ref_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_0_x_mitre_contents_146_object_modified_2023-08-14T16:35:55.739Z" "objects_0_x_mitre_contents_147_object_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_0_x_mitre_contents_147_object_modified_2022-04-06T15:41:33.827Z" "objects_0_x_mitre_contents_148_object_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_0_x_mitre_contents_148_object_modified_2023-03-20T15:55:09.397Z" "objects_0_x_mitre_contents_149_object_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_0_x_mitre_contents_149_object_modified_2023-09-28T15:38:41.106Z" "objects_0_x_mitre_contents_150_object_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_0_x_mitre_contents_150_object_modified_2022-03-31T16:31:12.821Z" "objects_0_x_mitre_contents_151_object_ref_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_0_x_mitre_contents_151_object_modified_2023-09-29T19:45:39.608Z" "objects_0_x_mitre_contents_152_object_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_0_x_mitre_contents_152_object_modified_2023-10-16T16:23:05.146Z" "objects_0_x_mitre_contents_153_object_ref_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_0_x_mitre_contents_153_object_modified_2022-03-30T14:00:45.099Z" "objects_0_x_mitre_contents_154_object_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_0_x_mitre_contents_154_object_modified_2023-03-20T15:40:11.937Z" "objects_0_x_mitre_contents_155_object_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_0_x_mitre_contents_155_object_modified_2022-04-01T16:53:27.576Z" "objects_0_x_mitre_contents_156_object_ref_attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2" "objects_0_x_mitre_contents_156_object_modified_2023-03-15T16:34:51.917Z" "objects_0_x_mitre_contents_157_object_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_0_x_mitre_contents_157_object_modified_2022-04-11T19:21:34.776Z" "objects_0_x_mitre_contents_158_object_ref_attack-pattern--e30cc912-7ea1-4683-9219-543b86cbdec9" "objects_0_x_mitre_contents_158_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_159_object_ref_attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb" "objects_0_x_mitre_contents_159_object_modified_2022-04-06T13:41:17.512Z" "objects_0_x_mitre_contents_160_object_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_0_x_mitre_contents_160_object_modified_2022-04-01T15:01:02.140Z" "objects_0_x_mitre_contents_161_object_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_0_x_mitre_contents_161_object_modified_2023-03-20T18:58:14.240Z" "objects_0_x_mitre_contents_162_object_ref_attack-pattern--e4c347e9-fb91-4bc5-83b8-391e389131e2" "objects_0_x_mitre_contents_162_object_modified_2022-03-31T16:33:55.068Z" "objects_0_x_mitre_contents_163_object_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_0_x_mitre_contents_163_object_modified_2022-04-01T13:27:29.880Z" "objects_0_x_mitre_contents_164_object_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_0_x_mitre_contents_164_object_modified_2023-03-20T18:41:56.376Z" "objects_0_x_mitre_contents_165_object_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_0_x_mitre_contents_165_object_modified_2023-03-20T18:53:59.025Z" "objects_0_x_mitre_contents_166_object_ref_attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84" "objects_0_x_mitre_contents_166_object_modified_2022-04-05T20:11:35.852Z" "objects_0_x_mitre_contents_167_object_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_0_x_mitre_contents_167_object_modified_2022-04-06T15:41:57.666Z" "objects_0_x_mitre_contents_168_object_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_0_x_mitre_contents_168_object_modified_2023-03-20T18:51:29.931Z" "objects_0_x_mitre_contents_169_object_ref_attack-pattern--f1c3d071-0c24-483d-aca0-e8b8496ce468" "objects_0_x_mitre_contents_169_object_modified_2022-04-06T15:48:41.647Z" "objects_0_x_mitre_contents_170_object_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_0_x_mitre_contents_170_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_171_object_ref_attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34" "objects_0_x_mitre_contents_171_object_modified_2022-04-06T15:50:42.480Z" "objects_0_x_mitre_contents_172_object_ref_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_0_x_mitre_contents_172_object_modified_2023-09-08T18:14:46.081Z" "objects_0_x_mitre_contents_173_object_ref_attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf" "objects_0_x_mitre_contents_173_object_modified_2022-04-06T13:57:49.177Z" "objects_0_x_mitre_contents_174_object_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_0_x_mitre_contents_174_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_175_object_ref_attack-pattern--fa801609-ca8e-415e-815e-65f3826ff4df" "objects_0_x_mitre_contents_175_object_modified_2022-04-21T17:30:16.229Z" "objects_0_x_mitre_contents_176_object_ref_attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d" "objects_0_x_mitre_contents_176_object_modified_2022-04-06T15:53:27.032Z" "objects_0_x_mitre_contents_177_object_ref_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_0_x_mitre_contents_177_object_modified_2023-03-20T18:59:57.485Z" "objects_0_x_mitre_contents_178_object_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_0_x_mitre_contents_178_object_modified_2023-03-16T18:37:55.822Z" "objects_0_x_mitre_contents_179_object_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_0_x_mitre_contents_179_object_modified_2023-08-14T16:19:54.832Z" "objects_0_x_mitre_contents_180_object_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_0_x_mitre_contents_180_object_modified_2023-08-07T17:12:07.620Z" "objects_0_x_mitre_contents_181_object_ref_attack-pattern--fd658820-cbba-4c95-8ac9-0fac6b1099e2" "objects_0_x_mitre_contents_181_object_modified_2022-03-30T20:07:33.279Z" "objects_0_x_mitre_contents_182_object_ref_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_0_x_mitre_contents_182_object_modified_2022-11-08T14:00:00.188Z" "objects_0_x_mitre_contents_183_object_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_0_x_mitre_contents_183_object_modified_2019-07-19T17:44:53.176Z" "objects_0_x_mitre_contents_184_object_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_0_x_mitre_contents_184_object_modified_2022-04-06T14:47:46.019Z" "objects_0_x_mitre_contents_185_object_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_0_x_mitre_contents_185_object_modified_2023-09-27T20:18:19.004Z" "objects_0_x_mitre_contents_186_object_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_0_x_mitre_contents_186_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_187_object_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_0_x_mitre_contents_187_object_modified_2019-10-18T15:51:48.318Z" "objects_0_x_mitre_contents_188_object_ref_course-of-action--78671282-26aa-486c-a7a5-5921e1616b58" "objects_0_x_mitre_contents_188_object_modified_2023-09-21T19:36:08.280Z" "objects_0_x_mitre_contents_189_object_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_0_x_mitre_contents_189_object_modified_2019-07-19T17:44:53.176Z" "objects_0_x_mitre_contents_190_object_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_0_x_mitre_contents_190_object_modified_2019-07-19T17:44:53.176Z" "objects_0_x_mitre_contents_191_object_ref_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_0_x_mitre_contents_191_object_modified_2019-07-19T17:44:53.176Z" "objects_0_x_mitre_contents_192_object_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_0_x_mitre_contents_192_object_modified_2019-10-18T14:56:15.631Z" "objects_0_x_mitre_contents_193_object_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_0_x_mitre_contents_193_object_modified_2019-07-19T17:44:53.176Z" "objects_0_x_mitre_contents_194_object_ref_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_0_x_mitre_contents_194_object_modified_2023-08-15T15:06:03.428Z" "objects_0_x_mitre_contents_195_object_ref_course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9" "objects_0_x_mitre_contents_195_object_modified_2022-04-06T14:47:19.714Z" "objects_0_x_mitre_contents_196_object_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_0_x_mitre_contents_196_object_modified_2019-10-18T14:52:53.019Z" "objects_0_x_mitre_contents_197_object_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_0_x_mitre_contents_197_object_modified_2017-06-01T00:00:00.000Z" "objects_0_x_mitre_contents_198_object_ref_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_0_x_mitre_contents_198_object_modified_2020-03-26T20:58:44.722Z" "objects_0_x_mitre_contents_199_object_ref_intrusion-set--381fcf73-60f6-4ab2-9991-6af3cbc35192" "objects_0_x_mitre_contents_199_object_modified_2023-10-06T14:13:06.011Z" "objects_0_x_mitre_contents_200_object_ref_intrusion-set--6eded342-33e5-4451-b6b2-e1c62863129f" "objects_0_x_mitre_contents_200_object_modified_2023-09-22T20:43:16.504Z" "objects_0_x_mitre_contents_201_object_ref_intrusion-set--7251b44b-6072-476c-b8d9-a6e32c355b28" "objects_0_x_mitre_contents_201_object_modified_2023-09-26T14:34:08.342Z" "objects_0_x_mitre_contents_202_object_ref_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_0_x_mitre_contents_202_object_modified_2022-10-25T14:00:00.188Z" "objects_0_x_mitre_contents_203_object_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_0_x_mitre_contents_203_object_modified_2022-10-25T14:00:00.188Z" "objects_0_x_mitre_contents_204_object_ref_intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c" "objects_0_x_mitre_contents_204_object_modified_2023-03-26T17:51:20.401Z" "objects_0_x_mitre_contents_205_object_ref_intrusion-set--cc613a49-9bfa-4e22-98d1-15ffbb03f034" "objects_0_x_mitre_contents_205_object_modified_2022-10-17T19:51:56.531Z" "objects_0_x_mitre_contents_206_object_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_0_x_mitre_contents_206_object_modified_2021-09-20T13:54:19.819Z" "objects_0_x_mitre_contents_207_object_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_0_x_mitre_contents_207_object_modified_2020-09-11T15:43:49.079Z" "objects_0_x_mitre_contents_208_object_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_0_x_mitre_contents_208_object_modified_2022-05-20T17:13:16.506Z" "objects_0_x_mitre_contents_209_object_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_0_x_mitre_contents_209_object_modified_2020-09-11T15:53:38.216Z" "objects_0_x_mitre_contents_210_object_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_0_x_mitre_contents_210_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_211_object_ref_malware--08784a9d-09e9-4dce-a839-9612398214e8" "objects_0_x_mitre_contents_211_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_212_object_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_0_x_mitre_contents_212_object_modified_2021-03-25T16:20:28.165Z" "objects_0_x_mitre_contents_213_object_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_0_x_mitre_contents_213_object_modified_2023-04-21T18:53:30.817Z" "objects_0_x_mitre_contents_214_object_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_0_x_mitre_contents_214_object_modified_2023-10-07T21:29:43.845Z" "objects_0_x_mitre_contents_215_object_ref_malware--172444ab-97fc-4d94-b142-179452bfb760" "objects_0_x_mitre_contents_215_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_216_object_ref_malware--2074b2ad-612e-4758-adce-7901c1b49bbc" "objects_0_x_mitre_contents_216_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_217_object_ref_malware--20d56cd6-8dff-4871-9889-d32d254816de" "objects_0_x_mitre_contents_217_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_218_object_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_0_x_mitre_contents_218_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_219_object_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_0_x_mitre_contents_219_object_modified_2020-09-11T15:57:37.561Z" "objects_0_x_mitre_contents_220_object_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_0_x_mitre_contents_220_object_modified_2020-06-24T18:24:35.433Z" "objects_0_x_mitre_contents_221_object_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_0_x_mitre_contents_221_object_modified_2020-01-22T22:17:23.015Z" "objects_0_x_mitre_contents_222_object_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_0_x_mitre_contents_222_object_modified_2020-08-11T14:23:15.002Z" "objects_0_x_mitre_contents_223_object_ref_malware--23040c15-e7d8-47b5-8c16-8fd3e0e297fe" "objects_0_x_mitre_contents_223_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_224_object_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_0_x_mitre_contents_224_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_225_object_ref_malware--28e39395-91e7-4f02-b694-5e079c964da9" "objects_0_x_mitre_contents_225_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_226_object_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_0_x_mitre_contents_226_object_modified_2021-12-07T14:46:08.852Z" "objects_0_x_mitre_contents_227_object_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_0_x_mitre_contents_227_object_modified_2023-04-13T22:33:55.061Z" "objects_0_x_mitre_contents_228_object_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_0_x_mitre_contents_228_object_modified_2023-09-26T13:30:33.039Z" "objects_0_x_mitre_contents_229_object_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_0_x_mitre_contents_229_object_modified_2019-10-14T17:15:52.191Z" "objects_0_x_mitre_contents_230_object_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_0_x_mitre_contents_230_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_231_object_ref_malware--326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb" "objects_0_x_mitre_contents_231_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_232_object_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_0_x_mitre_contents_232_object_modified_2021-04-19T17:11:50.159Z" "objects_0_x_mitre_contents_233_object_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_0_x_mitre_contents_233_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_234_object_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_0_x_mitre_contents_234_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_235_object_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_0_x_mitre_contents_235_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_236_object_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_0_x_mitre_contents_236_object_modified_2020-09-11T15:45:38.235Z" "objects_0_x_mitre_contents_237_object_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_0_x_mitre_contents_237_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_238_object_ref_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_0_x_mitre_contents_238_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_239_object_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_0_x_mitre_contents_239_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_240_object_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_0_x_mitre_contents_240_object_modified_2021-04-19T17:05:42.253Z" "objects_0_x_mitre_contents_241_object_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_0_x_mitre_contents_241_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_242_object_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_0_x_mitre_contents_242_object_modified_2023-10-11T14:36:39.396Z" "objects_0_x_mitre_contents_243_object_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_0_x_mitre_contents_243_object_modified_2023-04-13T22:32:16.509Z" "objects_0_x_mitre_contents_244_object_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_0_x_mitre_contents_244_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_245_object_ref_malware--507fe748-5e4a-4b45-9e9f-8b1115f4e878" "objects_0_x_mitre_contents_245_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_246_object_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_0_x_mitre_contents_246_object_modified_2020-09-11T15:52:12.097Z" "objects_0_x_mitre_contents_247_object_ref_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_0_x_mitre_contents_247_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_248_object_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_0_x_mitre_contents_248_object_modified_2020-06-26T20:16:31.850Z" "objects_0_x_mitre_contents_249_object_ref_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_0_x_mitre_contents_249_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_250_object_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_0_x_mitre_contents_250_object_modified_2020-09-11T15:50:18.707Z" "objects_0_x_mitre_contents_251_object_ref_malware--6447e3a1-ef4d-44b1-99d5-6b1c4888674f" "objects_0_x_mitre_contents_251_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_252_object_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_0_x_mitre_contents_252_object_modified_2020-09-14T15:39:17.698Z" "objects_0_x_mitre_contents_253_object_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_0_x_mitre_contents_253_object_modified_2023-03-01T22:00:09.640Z" "objects_0_x_mitre_contents_254_object_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_0_x_mitre_contents_254_object_modified_2021-11-01T18:30:41.998Z" "objects_0_x_mitre_contents_255_object_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_0_x_mitre_contents_255_object_modified_2020-12-16T20:52:20.822Z" "objects_0_x_mitre_contents_256_object_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_0_x_mitre_contents_256_object_modified_2020-03-26T19:00:42.233Z" "objects_0_x_mitre_contents_257_object_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_0_x_mitre_contents_257_object_modified_2023-10-16T16:57:33.534Z" "objects_0_x_mitre_contents_258_object_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_0_x_mitre_contents_258_object_modified_2020-10-06T20:09:57.659Z" "objects_0_x_mitre_contents_259_object_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_0_x_mitre_contents_259_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_260_object_ref_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_0_x_mitre_contents_260_object_modified_2020-04-30T18:30:05.787Z" "objects_0_x_mitre_contents_261_object_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_0_x_mitre_contents_261_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_262_object_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_0_x_mitre_contents_262_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_263_object_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_0_x_mitre_contents_263_object_modified_2021-04-19T14:07:24.519Z" "objects_0_x_mitre_contents_264_object_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_0_x_mitre_contents_264_object_modified_2020-10-29T18:41:49.272Z" "objects_0_x_mitre_contents_265_object_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_0_x_mitre_contents_265_object_modified_2023-02-28T21:05:57.018Z" "objects_0_x_mitre_contents_266_object_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_0_x_mitre_contents_266_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_267_object_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_0_x_mitre_contents_267_object_modified_2021-03-25T16:42:05.526Z" "objects_0_x_mitre_contents_268_object_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_0_x_mitre_contents_268_object_modified_2023-04-20T18:19:15.826Z" "objects_0_x_mitre_contents_269_object_ref_malware--a1867c56-8c86-455a-96ad-b0d5f7e2bc17" "objects_0_x_mitre_contents_269_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_270_object_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_0_x_mitre_contents_270_object_modified_2023-10-20T21:40:21.121Z" "objects_0_x_mitre_contents_271_object_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_0_x_mitre_contents_271_object_modified_2021-09-20T13:50:01.923Z" "objects_0_x_mitre_contents_272_object_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_0_x_mitre_contents_272_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_273_object_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_0_x_mitre_contents_273_object_modified_2022-03-02T15:47:13.329Z" "objects_0_x_mitre_contents_274_object_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_0_x_mitre_contents_274_object_modified_2020-06-17T12:49:21.423Z" "objects_0_x_mitre_contents_275_object_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_0_x_mitre_contents_275_object_modified_2020-12-16T20:21:43.239Z" "objects_0_x_mitre_contents_276_object_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_0_x_mitre_contents_276_object_modified_2020-11-24T17:55:12.561Z" "objects_0_x_mitre_contents_277_object_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_0_x_mitre_contents_277_object_modified_2020-06-26T21:01:58.595Z" "objects_0_x_mitre_contents_278_object_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_0_x_mitre_contents_278_object_modified_2021-04-12T03:02:06.792Z" "objects_0_x_mitre_contents_279_object_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_0_x_mitre_contents_279_object_modified_2019-09-18T13:44:13.080Z" "objects_0_x_mitre_contents_280_object_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_0_x_mitre_contents_280_object_modified_2020-03-26T20:50:07.023Z" "objects_0_x_mitre_contents_281_object_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_0_x_mitre_contents_281_object_modified_2019-09-18T20:17:17.744Z" "objects_0_x_mitre_contents_282_object_ref_malware--c6a07c89-a24c-4c7e-9e3e-6153cc595e24" "objects_0_x_mitre_contents_282_object_modified_2021-04-26T15:33:55.798Z" "objects_0_x_mitre_contents_283_object_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_0_x_mitre_contents_283_object_modified_2021-04-19T16:30:16.930Z" "objects_0_x_mitre_contents_284_object_ref_malware--c709da93-20c3-4d17-ab68-48cba76b2137" "objects_0_x_mitre_contents_284_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_285_object_ref_malware--c80a6bef-b3ce-44d0-b113-946e93124898" "objects_0_x_mitre_contents_285_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_286_object_ref_malware--c8770c81-c29f-40d2-a140-38544206b2b4" "objects_0_x_mitre_contents_286_object_modified_2023-04-21T18:52:08.966Z" "objects_0_x_mitre_contents_287_object_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_0_x_mitre_contents_287_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_288_object_ref_malware--ca4f63b9-a358-4214-bb26-8c912318cfde" "objects_0_x_mitre_contents_288_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_289_object_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_0_x_mitre_contents_289_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_290_object_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_0_x_mitre_contents_290_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_291_object_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_0_x_mitre_contents_291_object_modified_2023-04-13T22:33:34.237Z" "objects_0_x_mitre_contents_292_object_ref_malware--d89c132d-7752-4c7f-9372-954a71522985" "objects_0_x_mitre_contents_292_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_293_object_ref_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_0_x_mitre_contents_293_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_294_object_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_0_x_mitre_contents_294_object_modified_2021-04-19T14:29:45.809Z" "objects_0_x_mitre_contents_295_object_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_0_x_mitre_contents_295_object_modified_2020-09-11T15:58:40.564Z" "objects_0_x_mitre_contents_296_object_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_0_x_mitre_contents_296_object_modified_2023-03-28T17:20:20.194Z" "objects_0_x_mitre_contents_297_object_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_0_x_mitre_contents_297_object_modified_2022-04-15T15:36:43.770Z" "objects_0_x_mitre_contents_298_object_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_0_x_mitre_contents_298_object_modified_2020-12-28T18:59:32.817Z" "objects_0_x_mitre_contents_299_object_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_0_x_mitre_contents_299_object_modified_2023-10-11T14:36:10.445Z" "objects_0_x_mitre_contents_300_object_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_0_x_mitre_contents_300_object_modified_2020-05-28T16:52:37.979Z" "objects_0_x_mitre_contents_301_object_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_0_x_mitre_contents_301_object_modified_2020-12-22T21:48:10.951Z" "objects_0_x_mitre_contents_302_object_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_0_x_mitre_contents_302_object_modified_2023-03-31T23:02:48.577Z" "objects_0_x_mitre_contents_303_object_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_0_x_mitre_contents_303_object_modified_2020-09-29T20:03:42.662Z" "objects_0_x_mitre_contents_304_object_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_0_x_mitre_contents_304_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_305_object_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_0_x_mitre_contents_305_object_modified_2020-01-27T17:01:31.634Z" "objects_0_x_mitre_contents_306_object_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_0_x_mitre_contents_306_object_modified_2020-10-29T19:19:08.848Z" "objects_0_x_mitre_contents_307_object_ref_malware--f9854ba6-989d-43bf-828b-7240b8a65291" "objects_0_x_mitre_contents_307_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_308_object_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_0_x_mitre_contents_308_object_modified_2023-03-29T21:11:14.364Z" "objects_0_x_mitre_contents_309_object_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_0_x_mitre_contents_309_object_modified_2023-10-07T21:33:03.773Z" "objects_0_x_mitre_contents_310_object_ref_malware--ff742eeb-1f90-4f5a-8b92-9d40fffd99ca" "objects_0_x_mitre_contents_310_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_311_object_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_0_x_mitre_contents_311_object_modified_2019-10-14T19:14:17.007Z" "objects_0_x_mitre_contents_312_object_ref_relationship--0008005f-ca51-47c3-8369-55ee5de1c65a" "objects_0_x_mitre_contents_312_object_modified_2023-04-05T17:43:54.975Z" "objects_0_x_mitre_contents_313_object_ref_relationship--006b3910-e9c3-4de8-ba49-dff36b1a3308" "objects_0_x_mitre_contents_313_object_modified_2023-03-27T17:06:11.934Z" "objects_0_x_mitre_contents_314_object_ref_relationship--00dc2b34-1b74-4dae-b6e4-b676528d6341" "objects_0_x_mitre_contents_314_object_modified_2020-04-27T16:52:49.480Z" "objects_0_x_mitre_contents_315_object_ref_relationship--0100020b-97d4-4657-bc71-c6a1774055a6" "objects_0_x_mitre_contents_315_object_modified_2023-04-05T20:39:23.114Z" "objects_0_x_mitre_contents_316_object_ref_relationship--01965668-d033-4aca-a8e5-71a07070e266" "objects_0_x_mitre_contents_316_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_317_object_ref_relationship--01fd0686-d67f-4396-8812-3533063dd6b4" "objects_0_x_mitre_contents_317_object_modified_2023-08-16T16:38:47.766Z" "objects_0_x_mitre_contents_318_object_ref_relationship--020a1aaa-a444-4f3c-a08b-f1369be276f2" "objects_0_x_mitre_contents_318_object_modified_2020-09-15T15:18:12.398Z" "objects_0_x_mitre_contents_319_object_ref_relationship--020f79c6-d5f8-49eb-beee-e716e1fa4e80" "objects_0_x_mitre_contents_319_object_modified_2020-09-24T15:12:24.191Z" "objects_0_x_mitre_contents_320_object_ref_relationship--021ca5c4-7e8a-439b-8c2e-38f817db63e3" "objects_0_x_mitre_contents_320_object_modified_2023-04-14T14:40:57.100Z" "objects_0_x_mitre_contents_321_object_ref_relationship--022e941f-30c3-45a9-9f6f-36e704b80060" "objects_0_x_mitre_contents_321_object_modified_2023-04-05T17:44:13.361Z" "objects_0_x_mitre_contents_322_object_ref_relationship--024f9ee4-cb7d-49f4-b180-ad1e5e168a4c" "objects_0_x_mitre_contents_322_object_modified_2022-03-30T20:32:46.334Z" "objects_0_x_mitre_contents_323_object_ref_relationship--027a36dc-cd9e-4282-b101-b9a0abbb312f" "objects_0_x_mitre_contents_323_object_modified_2020-09-11T14:54:16.640Z" "objects_0_x_mitre_contents_324_object_ref_relationship--0291c9d5-8977-420d-8374-b786e3095a73" "objects_0_x_mitre_contents_324_object_modified_2023-08-08T15:34:15.917Z" "objects_0_x_mitre_contents_325_object_ref_relationship--02b3c8fe-1539-4c77-b67e-07fa8a22c91e" "objects_0_x_mitre_contents_325_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_326_object_ref_relationship--02b5cb07-9eb5-4e47-a4df-9c3985ad70fc" "objects_0_x_mitre_contents_326_object_modified_2023-04-05T17:26:41.762Z" "objects_0_x_mitre_contents_327_object_ref_relationship--02e4aedc-0674-4598-948b-0a32758af9ca" "objects_0_x_mitre_contents_327_object_modified_2022-04-01T13:14:43.195Z" "objects_0_x_mitre_contents_328_object_ref_relationship--03038590-e0c3-4751-b6fb-8a9ffff27e1b" "objects_0_x_mitre_contents_328_object_modified_2020-12-24T22:04:27.914Z" "objects_0_x_mitre_contents_329_object_ref_relationship--03172b09-4f97-4fb8-95f0-92b2d8957408" "objects_0_x_mitre_contents_329_object_modified_2022-04-18T15:57:14.375Z" "objects_0_x_mitre_contents_330_object_ref_relationship--0330db55-06e0-45a2-85a6-17617a37fdaf" "objects_0_x_mitre_contents_330_object_modified_2022-04-06T13:57:49.186Z" "objects_0_x_mitre_contents_331_object_ref_relationship--035192e3-94f4-426d-9be9-312ddd1ce6a8" "objects_0_x_mitre_contents_331_object_modified_2023-04-05T20:22:18.013Z" "objects_0_x_mitre_contents_332_object_ref_relationship--03ff6271-d7bc-40f3-b83d-25c541333694" "objects_0_x_mitre_contents_332_object_modified_2019-12-26T16:14:33.468Z" "objects_0_x_mitre_contents_333_object_ref_relationship--042a4f26-612e-4ed5-b7f3-911a47ec5d71" "objects_0_x_mitre_contents_333_object_modified_2022-04-18T15:49:00.561Z" "objects_0_x_mitre_contents_334_object_ref_relationship--04530307-22d8-4a06-9056-55eea225fabb" "objects_0_x_mitre_contents_334_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_335_object_ref_relationship--046acda0-91de-4385-bcfb-157570d8e51d" "objects_0_x_mitre_contents_335_object_modified_2023-03-30T15:26:46.611Z" "objects_0_x_mitre_contents_336_object_ref_relationship--049a5149-00c9-492a-8ffb-463f3d0cd910" "objects_0_x_mitre_contents_336_object_modified_2022-05-20T17:16:08.998Z" "objects_0_x_mitre_contents_337_object_ref_relationship--049b0c71-63e3-47ce-bb0b-149df0344b15" "objects_0_x_mitre_contents_337_object_modified_2023-04-05T17:15:59.861Z" "objects_0_x_mitre_contents_338_object_ref_relationship--049c39ab-c036-457a-9b8f-4318416658b8" "objects_0_x_mitre_contents_338_object_modified_2022-03-30T19:55:15.724Z" "objects_0_x_mitre_contents_339_object_ref_relationship--04ae1d87-1741-4cfd-84ff-3c5e46c0b112" "objects_0_x_mitre_contents_339_object_modified_2022-04-05T19:59:03.285Z" "objects_0_x_mitre_contents_340_object_ref_relationship--04ec5f2f-b14f-46ae-b151-05f9b7af0bcc" "objects_0_x_mitre_contents_340_object_modified_2023-08-09T14:53:48.653Z" "objects_0_x_mitre_contents_341_object_ref_relationship--04eeed4b-e0fc-4fff-8c61-4c175f26a0fe" "objects_0_x_mitre_contents_341_object_modified_2019-12-10T16:07:41.093Z" "objects_0_x_mitre_contents_342_object_ref_relationship--05243ccb-0aeb-4db4-bb03-51a65fb715ab" "objects_0_x_mitre_contents_342_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_343_object_ref_relationship--05563777-5771-4bd6-a1af-3e244cf42372" "objects_0_x_mitre_contents_343_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_344_object_ref_relationship--0569a1e0-1eb5-4e87-ae09-b698571012ef" "objects_0_x_mitre_contents_344_object_modified_2023-04-05T20:22:32.033Z" "objects_0_x_mitre_contents_345_object_ref_relationship--05c36a8c-1526-4d5d-93c1-331fd132c30b" "objects_0_x_mitre_contents_345_object_modified_2023-09-21T19:38:21.735Z" "objects_0_x_mitre_contents_346_object_ref_relationship--05c57e75-04b8-4bf6-8022-2e89f74e4b76" "objects_0_x_mitre_contents_346_object_modified_2023-04-05T17:35:41.700Z" "objects_0_x_mitre_contents_347_object_ref_relationship--06348e22-9a06-4e4c-a57c-e438462e7fce" "objects_0_x_mitre_contents_347_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_348_object_ref_relationship--069b2328-442b-491e-962d-d3fe01f0549e" "objects_0_x_mitre_contents_348_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_349_object_ref_relationship--06e2e07f-7835-4ef8-bcc0-bb5e2886839d" "objects_0_x_mitre_contents_349_object_modified_2023-08-16T16:40:14.482Z" "objects_0_x_mitre_contents_350_object_ref_relationship--07036963-6f5e-4eb5-9b20-3f81dd582c85" "objects_0_x_mitre_contents_350_object_modified_2020-11-20T16:37:28.547Z" "objects_0_x_mitre_contents_351_object_ref_relationship--0727ac06-5b46-4f79-abe9-63c1b923d383" "objects_0_x_mitre_contents_351_object_modified_2023-03-27T17:07:11.541Z" "objects_0_x_mitre_contents_352_object_ref_relationship--078653a6-3613-4923-ae5a-1bccb8552e67" "objects_0_x_mitre_contents_352_object_modified_2020-09-11T16:22:03.250Z" "objects_0_x_mitre_contents_353_object_ref_relationship--0791f28b-d06f-4fee-9cdb-85a6fd2eed61" "objects_0_x_mitre_contents_353_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_354_object_ref_relationship--079911c5-0db9-4eb2-ab85-6ed6e118fbbc" "objects_0_x_mitre_contents_354_object_modified_2022-03-30T19:36:20.304Z" "objects_0_x_mitre_contents_355_object_ref_relationship--07c727a6-6323-477a-bb55-34e130959b4e" "objects_0_x_mitre_contents_355_object_modified_2023-10-10T15:33:57.556Z" "objects_0_x_mitre_contents_356_object_ref_relationship--07dd3318-2965-4085-be64-a8e956c7b8da" "objects_0_x_mitre_contents_356_object_modified_2020-12-18T20:14:47.319Z" "objects_0_x_mitre_contents_357_object_ref_relationship--07fd2c39-c3e2-4044-b00b-71250cd7df2e" "objects_0_x_mitre_contents_357_object_modified_2022-03-30T18:15:03.625Z" "objects_0_x_mitre_contents_358_object_ref_relationship--0800f6bf-00c5-46d8-b876-1eeeb81b741f" "objects_0_x_mitre_contents_358_object_modified_2023-08-14T16:45:55.097Z" "objects_0_x_mitre_contents_359_object_ref_relationship--084786ee-9384-4a00-9e1b-48f94ea70126" "objects_0_x_mitre_contents_359_object_modified_2023-04-05T17:09:45.426Z" "objects_0_x_mitre_contents_360_object_ref_relationship--085f8397-0233-42d7-855e-3dbd709f2eca" "objects_0_x_mitre_contents_360_object_modified_2023-03-27T18:30:43.093Z" "objects_0_x_mitre_contents_361_object_ref_relationship--086c4c17-dde7-4a1f-90d1-79eb32f3c11f" "objects_0_x_mitre_contents_361_object_modified_2023-08-10T22:15:45.239Z" "objects_0_x_mitre_contents_362_object_ref_relationship--087609b6-cc6c-402f-ada9-00dbcbfecbe8" "objects_0_x_mitre_contents_362_object_modified_2022-04-01T15:16:02.324Z" "objects_0_x_mitre_contents_363_object_ref_relationship--088c74f5-4b43-48aa-a2be-275f0c02ffc8" "objects_0_x_mitre_contents_363_object_modified_2023-07-21T19:38:06.254Z" "objects_0_x_mitre_contents_364_object_ref_relationship--08a43019-d393-451f-a23c-2dfa17ec40b2" "objects_0_x_mitre_contents_364_object_modified_2023-03-27T17:51:07.963Z" "objects_0_x_mitre_contents_365_object_ref_relationship--08c81253-975c-4780-8e85-c72bc6a90c88" "objects_0_x_mitre_contents_365_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_366_object_ref_relationship--08f1a4b1-96c9-44c2-bc5b-5a779541213b" "objects_0_x_mitre_contents_366_object_modified_2023-04-05T20:47:53.438Z" "objects_0_x_mitre_contents_367_object_ref_relationship--0972d3cf-717e-4ed2-a89d-9cbe61081956" "objects_0_x_mitre_contents_367_object_modified_2023-04-05T17:21:56.899Z" "objects_0_x_mitre_contents_368_object_ref_relationship--0993769f-63fb-4720-bbcf-e6f37f71515e" "objects_0_x_mitre_contents_368_object_modified_2020-06-02T14:32:31.875Z" "objects_0_x_mitre_contents_369_object_ref_relationship--09ad7d9f-d618-46c2-a9f3-e4a943245a72" "objects_0_x_mitre_contents_369_object_modified_2023-09-21T19:37:48.020Z" "objects_0_x_mitre_contents_370_object_ref_relationship--09c55c29-ce4f-4d3e-a940-f3a4b6f07bca" "objects_0_x_mitre_contents_370_object_modified_2022-04-06T13:22:57.754Z" "objects_0_x_mitre_contents_371_object_ref_relationship--09c6bbd4-9058-4657-9d8e-656439637ac6" "objects_0_x_mitre_contents_371_object_modified_2023-08-10T22:15:16.326Z" "objects_0_x_mitre_contents_372_object_ref_relationship--09d08f16-9e4d-4279-9a8c-bdda7afdb37d" "objects_0_x_mitre_contents_372_object_modified_2023-03-27T17:07:32.636Z" "objects_0_x_mitre_contents_373_object_ref_relationship--0a28b2f2-ca0e-4d9f-9840-26e8ce944012" "objects_0_x_mitre_contents_373_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_374_object_ref_relationship--0a2e4b01-e78f-4c05-b157-c6714d34fddb" "objects_0_x_mitre_contents_374_object_modified_2020-12-18T20:14:47.412Z" "objects_0_x_mitre_contents_375_object_ref_relationship--0a610208-06af-425f-a9af-cd0899261e33" "objects_0_x_mitre_contents_375_object_modified_2020-09-11T15:45:38.450Z" "objects_0_x_mitre_contents_376_object_ref_relationship--0a737289-c62d-4c0a-a857-6d116f774864" "objects_0_x_mitre_contents_376_object_modified_2020-06-26T15:12:40.077Z" "objects_0_x_mitre_contents_377_object_ref_relationship--0ae94053-1963-45ba-a3a9-62e508281c8e" "objects_0_x_mitre_contents_377_object_modified_2023-03-29T21:21:58.318Z" "objects_0_x_mitre_contents_378_object_ref_relationship--0b1aae4b-4dcd-41b6-a708-1441e5a24070" "objects_0_x_mitre_contents_378_object_modified_2022-04-15T17:18:44.185Z" "objects_0_x_mitre_contents_379_object_ref_relationship--0b1e5e78-9ee1-4fc3-9fe7-dc069b59e77d" "objects_0_x_mitre_contents_379_object_modified_2022-04-15T17:20:54.552Z" "objects_0_x_mitre_contents_380_object_ref_relationship--0b1f2735-97d9-4f4a-9967-9fa1464bb651" "objects_0_x_mitre_contents_380_object_modified_2023-04-11T19:54:52.711Z" "objects_0_x_mitre_contents_381_object_ref_relationship--0b531974-1a28-4f16-ba34-1f7c8371b6b2" "objects_0_x_mitre_contents_381_object_modified_2023-08-07T17:15:34.376Z" "objects_0_x_mitre_contents_382_object_ref_relationship--0b5bfa77-51b4-41b4-ae03-88b585d143c1" "objects_0_x_mitre_contents_382_object_modified_2020-09-11T14:54:16.650Z" "objects_0_x_mitre_contents_383_object_ref_relationship--0b693e45-cc20-45a9-846f-2f5f4d3a3253" "objects_0_x_mitre_contents_383_object_modified_2020-12-31T18:25:05.178Z" "objects_0_x_mitre_contents_384_object_ref_relationship--0bb6f851-4302-4936-a98e-d23feecb234d" "objects_0_x_mitre_contents_384_object_modified_2020-06-02T14:32:31.777Z" "objects_0_x_mitre_contents_385_object_ref_relationship--0bbe5936-04bf-4c9a-bb43-cd37f36c3349" "objects_0_x_mitre_contents_385_object_modified_2023-04-05T17:44:31.187Z" "objects_0_x_mitre_contents_386_object_ref_relationship--0bc73d69-e769-4d0f-9d44-368c94225b6e" "objects_0_x_mitre_contents_386_object_modified_2023-04-05T17:50:39.124Z" "objects_0_x_mitre_contents_387_object_ref_relationship--0bc73eaf-a771-4ed0-b1f9-081ff4ca73ad" "objects_0_x_mitre_contents_387_object_modified_2023-08-09T16:44:01.271Z" "objects_0_x_mitre_contents_388_object_ref_relationship--0bcdeb29-6eed-4c96-a9ae-e56aadc4a5db" "objects_0_x_mitre_contents_388_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_389_object_ref_relationship--0c417238-738d-4bda-8359-d37d39414ebe" "objects_0_x_mitre_contents_389_object_modified_2023-08-04T18:30:41.599Z" "objects_0_x_mitre_contents_390_object_ref_relationship--0c558826-5cea-422e-8e67-83e53c04d409" "objects_0_x_mitre_contents_390_object_modified_2022-04-20T16:37:46.192Z" "objects_0_x_mitre_contents_391_object_ref_relationship--0cabc5f9-045e-490c-a97f-efe00dbade86" "objects_0_x_mitre_contents_391_object_modified_2020-01-27T17:05:58.276Z" "objects_0_x_mitre_contents_392_object_ref_relationship--0cae6859-d7d1-483b-b473-4f32084938a9" "objects_0_x_mitre_contents_392_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_393_object_ref_relationship--0ce5bf43-39e1-4afb-a939-1984cc2d235c" "objects_0_x_mitre_contents_393_object_modified_2022-04-01T18:51:44.595Z" "objects_0_x_mitre_contents_394_object_ref_relationship--0cf39d51-2d80-4576-b088-e787b113513e" "objects_0_x_mitre_contents_394_object_modified_2023-09-30T21:05:31.625Z" "objects_0_x_mitre_contents_395_object_ref_relationship--0cfbea52-d6ab-467f-97e5-8c74b332b16f" "objects_0_x_mitre_contents_395_object_modified_2023-04-05T20:41:52.454Z" "objects_0_x_mitre_contents_396_object_ref_relationship--0d12ee41-9ac0-4083-bc28-6568be4b9d5b" "objects_0_x_mitre_contents_396_object_modified_2023-08-14T16:50:42.655Z" "objects_0_x_mitre_contents_397_object_ref_relationship--0d2d9c6e-6ac8-4cda-bfa4-cedf26a1760a" "objects_0_x_mitre_contents_397_object_modified_2021-02-17T20:43:52.333Z" "objects_0_x_mitre_contents_398_object_ref_relationship--0d305e1e-df8f-4028-bf6f-1d7fed9e6184" "objects_0_x_mitre_contents_398_object_modified_2022-03-30T17:53:56.805Z" "objects_0_x_mitre_contents_399_object_ref_relationship--0d82a9ed-4184-4f95-99f4-5ee467fe6594" "objects_0_x_mitre_contents_399_object_modified_2022-04-05T17:14:08.267Z" "objects_0_x_mitre_contents_400_object_ref_relationship--0e8607f6-daab-44df-b167-105403a4ef41" "objects_0_x_mitre_contents_400_object_modified_2023-03-27T18:39:39.355Z" "objects_0_x_mitre_contents_401_object_ref_relationship--0e9968b7-ad1e-440d-9fe3-2599a1571f39" "objects_0_x_mitre_contents_401_object_modified_2023-04-05T19:59:55.854Z" "objects_0_x_mitre_contents_402_object_ref_relationship--0e9edc13-7af7-43c4-8ec2-636b1f8cb7f1" "objects_0_x_mitre_contents_402_object_modified_2023-04-05T21:25:52.381Z" "objects_0_x_mitre_contents_403_object_ref_relationship--0ef4845d-994e-4f0d-9eed-7cf600fc03b4" "objects_0_x_mitre_contents_403_object_modified_2020-06-02T14:32:31.885Z" "objects_0_x_mitre_contents_404_object_ref_relationship--0efe4125-504f-4eea-b19f-a44c81ee31dd" "objects_0_x_mitre_contents_404_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_405_object_ref_relationship--0f116d99-9ce4-4790-aeda-ad9199d8bf7b" "objects_0_x_mitre_contents_405_object_modified_2023-03-31T22:06:56.734Z" "objects_0_x_mitre_contents_406_object_ref_relationship--0f70bdf1-a6a7-406c-a4c0-cee509ff8369" "objects_0_x_mitre_contents_406_object_modified_2023-03-27T18:43:17.131Z" "objects_0_x_mitre_contents_407_object_ref_relationship--0f7e7c29-43f0-4aff-ae83-dfff331915ef" "objects_0_x_mitre_contents_407_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_408_object_ref_relationship--0f949bc5-9f6a-4ec8-a29a-87e309aa08a2" "objects_0_x_mitre_contents_408_object_modified_2023-04-05T21:20:48.937Z" "objects_0_x_mitre_contents_409_object_ref_relationship--0fd34764-8a5d-43da-9bdf-5a0b7e436936" "objects_0_x_mitre_contents_409_object_modified_2022-04-05T19:41:57.905Z" "objects_0_x_mitre_contents_410_object_ref_relationship--10560632-6449-4579-90eb-20fc46dcca08" "objects_0_x_mitre_contents_410_object_modified_2023-04-05T20:49:16.886Z" "objects_0_x_mitre_contents_411_object_ref_relationship--10c07066-df05-4dff-bb95-c76be02ea4ef" "objects_0_x_mitre_contents_411_object_modified_2023-04-05T21:30:00.975Z" "objects_0_x_mitre_contents_412_object_ref_relationship--10e02179-0434-4d4b-86b4-5d9fbc5d5451" "objects_0_x_mitre_contents_412_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_413_object_ref_relationship--117a7e1e-d5dc-451d-ab79-f29bdfec40ae" "objects_0_x_mitre_contents_413_object_modified_2023-10-10T15:33:59.743Z" "objects_0_x_mitre_contents_414_object_ref_relationship--119b848b-84b4-4f86-a265-0c9eb8680072" "objects_0_x_mitre_contents_414_object_modified_2022-04-18T19:01:58.546Z" "objects_0_x_mitre_contents_415_object_ref_relationship--11a1da8f-f0db-4abe-88bb-1ab06f271f3f" "objects_0_x_mitre_contents_415_object_modified_2023-10-10T15:33:57.223Z" "objects_0_x_mitre_contents_416_object_ref_relationship--11a992e7-83a3-4dc3-b391-fbd79e518943" "objects_0_x_mitre_contents_416_object_modified_2023-07-21T19:40:08.668Z" "objects_0_x_mitre_contents_417_object_ref_relationship--12098dee-27b3-4d0b-a15a-6b5955ba8879" "objects_0_x_mitre_contents_417_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_418_object_ref_relationship--1218ed50-bd44-4f37-baba-1aae998b5a1f" "objects_0_x_mitre_contents_418_object_modified_2023-04-05T21:17:40.860Z" "objects_0_x_mitre_contents_419_object_ref_relationship--1250f91c-723d-4b4c-afea-b3a71101951f" "objects_0_x_mitre_contents_419_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_420_object_ref_relationship--127e6672-d16a-4370-b277-4d04874a4cfe" "objects_0_x_mitre_contents_420_object_modified_2023-04-11T19:29:31.138Z" "objects_0_x_mitre_contents_421_object_ref_relationship--1284ba4a-c48c-4533-ac35-664828616ee3" "objects_0_x_mitre_contents_421_object_modified_2023-07-21T19:52:46.863Z" "objects_0_x_mitre_contents_422_object_ref_relationship--1284f6fe-d352-415c-9479-82141524380a" "objects_0_x_mitre_contents_422_object_modified_2022-03-30T18:06:48.250Z" "objects_0_x_mitre_contents_423_object_ref_relationship--12852406-87df-4892-a177-e15e81739000" "objects_0_x_mitre_contents_423_object_modified_2023-08-08T15:34:56.071Z" "objects_0_x_mitre_contents_424_object_ref_relationship--12d14048-793c-456c-a2b8-d812de547ca7" "objects_0_x_mitre_contents_424_object_modified_2023-09-28T17:19:38.041Z" "objects_0_x_mitre_contents_425_object_ref_relationship--12d61e7d-7fa6-422d-9817-901decf6b650" "objects_0_x_mitre_contents_425_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_426_object_ref_relationship--12de5aeb-9427-4665-81a0-257c76d6f188" "objects_0_x_mitre_contents_426_object_modified_2023-03-03T16:20:48.781Z" "objects_0_x_mitre_contents_427_object_ref_relationship--13078a96-2cda-4d0b-99f8-693a65a4b63d" "objects_0_x_mitre_contents_427_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_428_object_ref_relationship--1317fb3d-ded3-4b84-8007-147f3b02948a" "objects_0_x_mitre_contents_428_object_modified_2022-04-05T19:52:38.539Z" "objects_0_x_mitre_contents_429_object_ref_relationship--1329a866-0f6b-4660-b537-a6d208352502" "objects_0_x_mitre_contents_429_object_modified_2023-09-22T20:48:55.333Z" "objects_0_x_mitre_contents_430_object_ref_relationship--1343f1a3-0f03-4bcf-a9e6-4f5697ae35dd" "objects_0_x_mitre_contents_430_object_modified_2023-08-04T18:35:25.381Z" "objects_0_x_mitre_contents_431_object_ref_relationship--1348c744-3127-4a55-a5b4-2f439f41e941" "objects_0_x_mitre_contents_431_object_modified_2023-04-05T20:48:16.775Z" "objects_0_x_mitre_contents_432_object_ref_relationship--13495d9c-6877-4bc9-888a-7d92362bcb40" "objects_0_x_mitre_contents_432_object_modified_2023-08-04T19:13:50.488Z" "objects_0_x_mitre_contents_433_object_ref_relationship--13518e48-bb32-4ee3-9cd0-e5f367a2fb2d" "objects_0_x_mitre_contents_433_object_modified_2022-03-30T15:52:58.256Z" "objects_0_x_mitre_contents_434_object_ref_relationship--13aba849-5004-4457-9f3b-49e470b589e0" "objects_0_x_mitre_contents_434_object_modified_2023-08-14T16:21:05.598Z" "objects_0_x_mitre_contents_435_object_ref_relationship--13e69c40-1511-4fac-b4c3-d31fc4b6c579" "objects_0_x_mitre_contents_435_object_modified_2023-07-21T19:40:25.197Z" "objects_0_x_mitre_contents_436_object_ref_relationship--13efc415-5e17-4a16-81c2-64e74815907f" "objects_0_x_mitre_contents_436_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_437_object_ref_relationship--14143e21-51bf-4fa7-a949-d22a8271f590" "objects_0_x_mitre_contents_437_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_438_object_ref_relationship--1417d832-3fa5-4a87-a40b-5ca2d4ee5d1c" "objects_0_x_mitre_contents_438_object_modified_2022-04-01T14:59:39.294Z" "objects_0_x_mitre_contents_439_object_ref_relationship--142532a6-bf7c-4b25-be23-16f01160f3c5" "objects_0_x_mitre_contents_439_object_modified_2020-09-15T15:18:12.417Z" "objects_0_x_mitre_contents_440_object_ref_relationship--14474366-938a-4359-bf24-e2c718adfaf5" "objects_0_x_mitre_contents_440_object_modified_2020-06-26T14:55:13.382Z" "objects_0_x_mitre_contents_441_object_ref_relationship--146275c0-b6dd-4700-bded-bc361a67d023" "objects_0_x_mitre_contents_441_object_modified_2020-09-14T14:13:45.253Z" "objects_0_x_mitre_contents_442_object_ref_relationship--147d82a6-a61a-41d0-8eef-b6193bdd92d6" "objects_0_x_mitre_contents_442_object_modified_2022-03-30T15:18:21.256Z" "objects_0_x_mitre_contents_443_object_ref_relationship--148703c5-6d07-439c-a4ff-d77119c70857" "objects_0_x_mitre_contents_443_object_modified_2023-08-14T16:23:41.266Z" "objects_0_x_mitre_contents_444_object_ref_relationship--15065492-1aef-4cf8-af3c-cc763eee5daf" "objects_0_x_mitre_contents_444_object_modified_2023-04-05T20:49:32.064Z" "objects_0_x_mitre_contents_445_object_ref_relationship--1577a79c-5f70-41cc-95bd-2407cfd1acbd" "objects_0_x_mitre_contents_445_object_modified_2020-06-26T15:12:40.094Z" "objects_0_x_mitre_contents_446_object_ref_relationship--15d83ba8-be89-4151-9c6e-35d14df4fa80" "objects_0_x_mitre_contents_446_object_modified_2022-03-30T19:33:05.375Z" "objects_0_x_mitre_contents_447_object_ref_relationship--15eccf44-e528-41fb-9cb8-834c8c0ca9d9" "objects_0_x_mitre_contents_447_object_modified_2020-04-24T17:46:31.582Z" "objects_0_x_mitre_contents_448_object_ref_relationship--16955c8e-65ab-4c9a-a8b1-bec4d5a45f8d" "objects_0_x_mitre_contents_448_object_modified_2021-10-12T13:51:41.045Z" "objects_0_x_mitre_contents_449_object_ref_relationship--17141729-226d-40d4-928d-ffbd2eed7d11" "objects_0_x_mitre_contents_449_object_modified_2022-04-05T19:37:16.086Z" "objects_0_x_mitre_contents_450_object_ref_relationship--173c0c41-c7e3-48e9-b785-d9e0232d85ca" "objects_0_x_mitre_contents_450_object_modified_2023-04-05T17:50:52.737Z" "objects_0_x_mitre_contents_451_object_ref_relationship--17558571-7352-470b-b728-0511fb3f699d" "objects_0_x_mitre_contents_451_object_modified_2020-06-24T15:02:13.534Z" "objects_0_x_mitre_contents_452_object_ref_relationship--17adf4c2-e278-41fc-9183-cda5c8b74de7" "objects_0_x_mitre_contents_452_object_modified_2022-03-31T19:53:01.320Z" "objects_0_x_mitre_contents_453_object_ref_relationship--17e94f34-e367-491c-9f9f-79294e124b4f" "objects_0_x_mitre_contents_453_object_modified_2023-04-05T20:22:48.246Z" "objects_0_x_mitre_contents_454_object_ref_relationship--1822e616-ae33-487c-8aa6-4fa81e724184" "objects_0_x_mitre_contents_454_object_modified_2023-04-05T17:06:22.576Z" "objects_0_x_mitre_contents_455_object_ref_relationship--188c09ee-ca3b-4bac-ad69-36489c50b5bd" "objects_0_x_mitre_contents_455_object_modified_2022-04-01T18:50:00.027Z" "objects_0_x_mitre_contents_456_object_ref_relationship--18a6020d-8fea-4a6e-84ab-a18343f2acea" "objects_0_x_mitre_contents_456_object_modified_2022-04-06T13:40:14.515Z" "objects_0_x_mitre_contents_457_object_ref_relationship--18afa4ad-4fd7-47ad-acdb-3b298b640d3c" "objects_0_x_mitre_contents_457_object_modified_2023-04-05T21:26:05.199Z" "objects_0_x_mitre_contents_458_object_ref_relationship--18d3f4c7-2888-4d27-9ac7-b7ade1a1c04c" "objects_0_x_mitre_contents_458_object_modified_2023-04-05T20:23:04.150Z" "objects_0_x_mitre_contents_459_object_ref_relationship--1987b242-c868-40b2-993d-9dbeea311d4b" "objects_0_x_mitre_contents_459_object_modified_2022-03-30T14:08:09.882Z" "objects_0_x_mitre_contents_460_object_ref_relationship--198b99e6-3954-4c93-90bc-4227b45270a4" "objects_0_x_mitre_contents_460_object_modified_2023-08-04T19:03:55.638Z" "objects_0_x_mitre_contents_461_object_ref_relationship--19b95b83-bac0-455f-882f-0209abddb76f" "objects_0_x_mitre_contents_461_object_modified_2022-04-05T20:11:35.619Z" "objects_0_x_mitre_contents_462_object_ref_relationship--19df76ee-fa85-43cf-96ce-422d46f29a13" "objects_0_x_mitre_contents_462_object_modified_2023-04-05T17:12:48.998Z" "objects_0_x_mitre_contents_463_object_ref_relationship--19f220fd-94e8-4c8f-971d-ad37d7eeee80" "objects_0_x_mitre_contents_463_object_modified_2022-03-31T19:51:41.431Z" "objects_0_x_mitre_contents_464_object_ref_relationship--1a2f6cdc-7c52-4f6e-9182-bc5b16a638dd" "objects_0_x_mitre_contents_464_object_modified_2023-04-05T20:49:47.110Z" "objects_0_x_mitre_contents_465_object_ref_relationship--1a5bde32-aaa9-42d0-ab70-c9f11b0ae81e" "objects_0_x_mitre_contents_465_object_modified_2022-04-18T15:58:08.240Z" "objects_0_x_mitre_contents_466_object_ref_relationship--1b633efc-762f-47f9-96c3-d08ba92e0e3e" "objects_0_x_mitre_contents_466_object_modified_2022-04-01T17:05:56.046Z" "objects_0_x_mitre_contents_467_object_ref_relationship--1b7be26d-cb1d-497b-94bf-a34f11ed66c9" "objects_0_x_mitre_contents_467_object_modified_2020-09-11T14:54:16.548Z" "objects_0_x_mitre_contents_468_object_ref_relationship--1b9b145c-ce80-4d0e-99f2-d756b806745b" "objects_0_x_mitre_contents_468_object_modified_2023-07-21T19:35:17.565Z" "objects_0_x_mitre_contents_469_object_ref_relationship--1bcd4b25-a1e0-4511-b0bf-3923a1e74c4e" "objects_0_x_mitre_contents_469_object_modified_2022-04-18T16:00:57.320Z" "objects_0_x_mitre_contents_470_object_ref_relationship--1be8aca9-d5a6-4cc5-9fbe-7625f7ff8d6a" "objects_0_x_mitre_contents_470_object_modified_2023-08-16T16:36:59.360Z" "objects_0_x_mitre_contents_471_object_ref_relationship--1c180c0e-c789-4176-b568-789ada9487bb" "objects_0_x_mitre_contents_471_object_modified_2020-10-29T19:21:23.162Z" "objects_0_x_mitre_contents_472_object_ref_relationship--1c42ee3a-c400-4de6-84aa-b254422af7b9" "objects_0_x_mitre_contents_472_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_473_object_ref_relationship--1c67b72f-7389-4c21-9347-2b1bba07aaaf" "objects_0_x_mitre_contents_473_object_modified_2023-03-27T17:12:28.993Z" "objects_0_x_mitre_contents_474_object_ref_relationship--1c7d2d48-ea9a-448f-891f-66f635c95f73" "objects_0_x_mitre_contents_474_object_modified_2020-07-20T14:12:15.566Z" "objects_0_x_mitre_contents_475_object_ref_relationship--1cc71849-142f-4097-9546-7946b0b546a6" "objects_0_x_mitre_contents_475_object_modified_2023-04-05T17:29:22.884Z" "objects_0_x_mitre_contents_476_object_ref_relationship--1cca5e17-80ae-4b6e-8919-2768153aa966" "objects_0_x_mitre_contents_476_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_477_object_ref_relationship--1d027925-7d63-459c-b5a5-48ffb49ba1de" "objects_0_x_mitre_contents_477_object_modified_2023-08-08T15:30:59.104Z" "objects_0_x_mitre_contents_478_object_ref_relationship--1d2daf8f-ce51-47b5-b985-63ae4edfad4b" "objects_0_x_mitre_contents_478_object_modified_2023-08-07T22:46:12.263Z" "objects_0_x_mitre_contents_479_object_ref_relationship--1d828f51-1c04-466c-beaf-2d4de741a544" "objects_0_x_mitre_contents_479_object_modified_2023-04-05T17:03:18.675Z" "objects_0_x_mitre_contents_480_object_ref_relationship--1db350b2-1e8b-4d58-9086-eac41de1b110" "objects_0_x_mitre_contents_480_object_modified_2022-04-05T17:13:56.584Z" "objects_0_x_mitre_contents_481_object_ref_relationship--1e286a4a-63cd-47df-a034-11a5d92daceb" "objects_0_x_mitre_contents_481_object_modified_2022-04-06T15:41:03.981Z" "objects_0_x_mitre_contents_482_object_ref_relationship--1e29a9ce-ed11-44ae-b66e-8b90ee79de6a" "objects_0_x_mitre_contents_482_object_modified_2023-04-05T20:42:04.769Z" "objects_0_x_mitre_contents_483_object_ref_relationship--1ed5b4fa-b871-4efa-87ee-1c91dcaa421e" "objects_0_x_mitre_contents_483_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_484_object_ref_relationship--1f027bab-76d9-4f5f-a73e-ea733a1ab223" "objects_0_x_mitre_contents_484_object_modified_2020-11-20T16:37:28.610Z" "objects_0_x_mitre_contents_485_object_ref_relationship--1f31e348-a4ee-4874-891f-393c65a7640a" "objects_0_x_mitre_contents_485_object_modified_2023-07-21T19:34:13.200Z" "objects_0_x_mitre_contents_486_object_ref_relationship--1f32e107-aef9-42f8-84d1-4c4fcd863b7f" "objects_0_x_mitre_contents_486_object_modified_2023-03-31T22:07:21.417Z" "objects_0_x_mitre_contents_487_object_ref_relationship--1f44936e-b84c-404f-a92e-6fb7e24b5435" "objects_0_x_mitre_contents_487_object_modified_2022-04-05T19:51:08.770Z" "objects_0_x_mitre_contents_488_object_ref_relationship--1f7428d7-6f6e-40d0-aedb-cb0578875ff9" "objects_0_x_mitre_contents_488_object_modified_2023-04-05T17:26:02.260Z" "objects_0_x_mitre_contents_489_object_ref_relationship--1f7b7de2-10e8-4eec-9c8f-db44ac3f271b" "objects_0_x_mitre_contents_489_object_modified_2023-04-05T17:29:36.827Z" "objects_0_x_mitre_contents_490_object_ref_relationship--1f8b1ee1-e44b-4a37-a407-5cbceba35d87" "objects_0_x_mitre_contents_490_object_modified_2020-05-04T15:40:21.305Z" "objects_0_x_mitre_contents_491_object_ref_relationship--1f8f0021-6992-476c-ba1c-232542dc1633" "objects_0_x_mitre_contents_491_object_modified_2023-08-10T22:13:53.253Z" "objects_0_x_mitre_contents_492_object_ref_relationship--1fdad4b5-18a1-4fbf-81ce-861feaf2bbdd" "objects_0_x_mitre_contents_492_object_modified_2021-01-20T16:01:19.565Z" "objects_0_x_mitre_contents_493_object_ref_relationship--1fdf9c43-0237-461f-86d4-1da843078744" "objects_0_x_mitre_contents_493_object_modified_2023-09-21T19:38:49.571Z" "objects_0_x_mitre_contents_494_object_ref_relationship--20310407-9b05-4d7b-9548-961f545e14e1" "objects_0_x_mitre_contents_494_object_modified_2023-06-09T19:18:41.955Z" "objects_0_x_mitre_contents_495_object_ref_relationship--20376a7f-897a-4f5d-a87a-93e64200a5a6" "objects_0_x_mitre_contents_495_object_modified_2020-08-10T21:57:54.518Z" "objects_0_x_mitre_contents_496_object_ref_relationship--204e30ed-5e69-400b-a814-b77e10596865" "objects_0_x_mitre_contents_496_object_modified_2022-04-06T15:50:42.481Z" "objects_0_x_mitre_contents_497_object_ref_relationship--2065382f-45ae-4b9a-a77c-027ecd6c1735" "objects_0_x_mitre_contents_497_object_modified_2023-04-05T20:23:38.651Z" "objects_0_x_mitre_contents_498_object_ref_relationship--209aa948-393c-46b0-9488-ef93a6252438" "objects_0_x_mitre_contents_498_object_modified_2022-03-30T20:07:19.296Z" "objects_0_x_mitre_contents_499_object_ref_relationship--20aaafe2-1f55-410f-9eb1-1fc979021fe0" "objects_0_x_mitre_contents_499_object_modified_2023-04-05T17:51:16.331Z" "objects_0_x_mitre_contents_500_object_ref_relationship--20dcd886-56c4-421d-ba36-0f37a47a3f86" "objects_0_x_mitre_contents_500_object_modified_2022-04-06T13:55:37.498Z" "objects_0_x_mitre_contents_501_object_ref_relationship--2115228b-c61a-4ebb-829a-df7355635fbf" "objects_0_x_mitre_contents_501_object_modified_2023-04-05T20:50:12.639Z" "objects_0_x_mitre_contents_502_object_ref_relationship--212801c2-5d14-4381-b25a-340cda11a5ac" "objects_0_x_mitre_contents_502_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_503_object_ref_relationship--21e179f2-49c9-4ec9-ac7a-b8eae8e15bd9" "objects_0_x_mitre_contents_503_object_modified_2023-04-05T17:36:07.297Z" "objects_0_x_mitre_contents_504_object_ref_relationship--22041a01-75e7-4ff6-8768-ad45188c53c7" "objects_0_x_mitre_contents_504_object_modified_2023-03-01T22:03:00.755Z" "objects_0_x_mitre_contents_505_object_ref_relationship--22290cce-856a-46d5-9589-699f5dfc1429" "objects_0_x_mitre_contents_505_object_modified_2020-07-20T13:49:03.687Z" "objects_0_x_mitre_contents_506_object_ref_relationship--22334426-e99f-4e97-b4dd-17e297da4118" "objects_0_x_mitre_contents_506_object_modified_2023-04-05T20:23:54.777Z" "objects_0_x_mitre_contents_507_object_ref_relationship--22708018-defd-4690-8b0f-fe47e11cb5d6" "objects_0_x_mitre_contents_507_object_modified_2020-07-15T20:20:59.316Z" "objects_0_x_mitre_contents_508_object_ref_relationship--22755928-b0e1-4004-a89e-5f5ea2504cf8" "objects_0_x_mitre_contents_508_object_modified_2023-08-04T18:32:57.089Z" "objects_0_x_mitre_contents_509_object_ref_relationship--22773074-4a95-48e0-905f-688ce048b5ed" "objects_0_x_mitre_contents_509_object_modified_2023-04-05T20:53:51.524Z" "objects_0_x_mitre_contents_510_object_ref_relationship--22f3d28b-ba0c-4aa3-99b4-60790ba9c7b6" "objects_0_x_mitre_contents_510_object_modified_2021-01-05T20:16:20.484Z" "objects_0_x_mitre_contents_511_object_ref_relationship--22f5308c-77ee-4198-be1c-54062aa6a613" "objects_0_x_mitre_contents_511_object_modified_2023-04-05T20:00:13.616Z" "objects_0_x_mitre_contents_512_object_ref_relationship--2341fdfa-9699-4798-a35a-2cc4f150cd14" "objects_0_x_mitre_contents_512_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_513_object_ref_relationship--2359ad4b-b00b-4fd5-aef8-2d2be8bcf081" "objects_0_x_mitre_contents_513_object_modified_2023-03-27T17:52:20.587Z" "objects_0_x_mitre_contents_514_object_ref_relationship--23a67f24-a8eb-4e31-acf1-11cb5e9f88b2" "objects_0_x_mitre_contents_514_object_modified_2023-03-27T18:43:35.115Z" "objects_0_x_mitre_contents_515_object_ref_relationship--23cac1d7-27ca-4c78-bfa0-2d6023d21798" "objects_0_x_mitre_contents_515_object_modified_2020-10-29T19:01:13.854Z" "objects_0_x_mitre_contents_516_object_ref_relationship--23ecc134-0623-45ec-b8b5-52516483bda1" "objects_0_x_mitre_contents_516_object_modified_2023-04-14T14:10:04.452Z" "objects_0_x_mitre_contents_517_object_ref_relationship--23fa0fcc-0193-45f2-9e0b-a5f68380015f" "objects_0_x_mitre_contents_517_object_modified_2022-04-01T18:52:13.171Z" "objects_0_x_mitre_contents_518_object_ref_relationship--242dc659-c205-4e9e-95f9-14fee66195af" "objects_0_x_mitre_contents_518_object_modified_2022-04-01T15:29:36.082Z" "objects_0_x_mitre_contents_519_object_ref_relationship--24951cfe-d3ce-4802-86ff-028fc9cbbe53" "objects_0_x_mitre_contents_519_object_modified_2020-07-15T20:20:59.318Z" "objects_0_x_mitre_contents_520_object_ref_relationship--24a7379e-a994-411b-b17c-add6c6c6fc07" "objects_0_x_mitre_contents_520_object_modified_2020-12-24T21:45:56.949Z" "objects_0_x_mitre_contents_521_object_ref_relationship--24bcb2cd-1532-4e98-a485-a55e06d2577d" "objects_0_x_mitre_contents_521_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_522_object_ref_relationship--24de6f6e-86d3-4e4e-a965-3e0435205f48" "objects_0_x_mitre_contents_522_object_modified_2023-04-05T20:24:09.872Z" "objects_0_x_mitre_contents_523_object_ref_relationship--25466097-53c6-4dc7-8409-197758e88673" "objects_0_x_mitre_contents_523_object_modified_2023-08-16T16:45:11.580Z" "objects_0_x_mitre_contents_524_object_ref_relationship--25655385-5b0d-4700-a59f-d5d043625b84" "objects_0_x_mitre_contents_524_object_modified_2023-03-27T17:13:16.813Z" "objects_0_x_mitre_contents_525_object_ref_relationship--25cdb4f2-5b38-411c-bfb6-eca7ea4d4527" "objects_0_x_mitre_contents_525_object_modified_2023-04-05T19:57:56.616Z" "objects_0_x_mitre_contents_526_object_ref_relationship--25de6cf6-38d5-4d1e-b3f1-6956a0ff0ac3" "objects_0_x_mitre_contents_526_object_modified_2023-03-03T16:26:48.531Z" "objects_0_x_mitre_contents_527_object_ref_relationship--2621a020-8d4f-4ca4-b874-0be336a8cafd" "objects_0_x_mitre_contents_527_object_modified_2020-04-09T16:45:38.751Z" "objects_0_x_mitre_contents_528_object_ref_relationship--268c12df-d3bc-46fa-99e9-32caab50b175" "objects_0_x_mitre_contents_528_object_modified_2022-03-30T15:52:09.759Z" "objects_0_x_mitre_contents_529_object_ref_relationship--269d4409-e287-4ef3-b5f3-765ec03e503e" "objects_0_x_mitre_contents_529_object_modified_2023-04-05T21:18:38.700Z" "objects_0_x_mitre_contents_530_object_ref_relationship--26b1025b-5c08-4b6e-8c50-7d2baf29e7b7" "objects_0_x_mitre_contents_530_object_modified_2022-04-01T18:45:11.299Z" "objects_0_x_mitre_contents_531_object_ref_relationship--26bf27dc-f65d-477d-abbd-f4c3ce475c51" "objects_0_x_mitre_contents_531_object_modified_2022-04-01T12:37:17.515Z" "objects_0_x_mitre_contents_532_object_ref_relationship--27050442-e578-44b7-9534-ada78824befe" "objects_0_x_mitre_contents_532_object_modified_2023-02-06T19:45:09.612Z" "objects_0_x_mitre_contents_533_object_ref_relationship--271a311f-71bc-4558-a314-0edfbec44b64" "objects_0_x_mitre_contents_533_object_modified_2019-11-21T16:42:48.495Z" "objects_0_x_mitre_contents_534_object_ref_relationship--27247071-356b-4b5f-bc8f-6436a3fec095" "objects_0_x_mitre_contents_534_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_535_object_ref_relationship--27490b14-8044-408a-8c6a-6d8427eb78ff" "objects_0_x_mitre_contents_535_object_modified_2023-08-08T16:44:47.944Z" "objects_0_x_mitre_contents_536_object_ref_relationship--276bfd69-33cc-4665-8aa7-72bed65d01f9" "objects_0_x_mitre_contents_536_object_modified_2023-03-29T21:25:22.438Z" "objects_0_x_mitre_contents_537_object_ref_relationship--2793d721-df10-4621-8387-f3342def59a1" "objects_0_x_mitre_contents_537_object_modified_2022-03-30T18:14:36.786Z" "objects_0_x_mitre_contents_538_object_ref_relationship--27b8153c-130e-44a7-84a9-840f4c23e2ea" "objects_0_x_mitre_contents_538_object_modified_2020-07-15T20:20:59.377Z" "objects_0_x_mitre_contents_539_object_ref_relationship--27c8d474-f3f8-4a0e-a317-7e57b9de620c" "objects_0_x_mitre_contents_539_object_modified_2020-08-10T22:18:20.777Z" "objects_0_x_mitre_contents_540_object_ref_relationship--27f5dc22-6ab9-406f-9092-6cb610d777a6" "objects_0_x_mitre_contents_540_object_modified_2022-04-01T14:59:53.782Z" "objects_0_x_mitre_contents_541_object_ref_relationship--280aa15d-c7ff-4005-9861-9fc5c3bfe95a" "objects_0_x_mitre_contents_541_object_modified_2023-04-05T21:22:26.702Z" "objects_0_x_mitre_contents_542_object_ref_relationship--2836dc3d-cbea-493b-af31-5f1fa8279ec2" "objects_0_x_mitre_contents_542_object_modified_2023-04-05T20:00:28.299Z" "objects_0_x_mitre_contents_543_object_ref_relationship--289f5e23-088a-4840-a2a6-bab30da2a64b" "objects_0_x_mitre_contents_543_object_modified_2022-04-01T16:51:04.584Z" "objects_0_x_mitre_contents_544_object_ref_relationship--2908f0f6-2408-41a1-aaab-cf3e7db06aad" "objects_0_x_mitre_contents_544_object_modified_2023-04-05T21:26:16.282Z" "objects_0_x_mitre_contents_545_object_ref_relationship--290a627d-172d-494d-a0cc-685f480a1034" "objects_0_x_mitre_contents_545_object_modified_2023-04-05T17:36:27.983Z" "objects_0_x_mitre_contents_546_object_ref_relationship--290c9d3f-f59b-4e2b-9b7b-115014845c15" "objects_0_x_mitre_contents_546_object_modified_2021-10-04T20:08:48.439Z" "objects_0_x_mitre_contents_547_object_ref_relationship--29357289-362c-447c-b387-9a38b50d7296" "objects_0_x_mitre_contents_547_object_modified_2022-04-15T17:20:06.338Z" "objects_0_x_mitre_contents_548_object_ref_relationship--295fab07-9f02-4504-9ae4-1a60c2e8c224" "objects_0_x_mitre_contents_548_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_549_object_ref_relationship--299931f0-4c60-4a9b-8a6a-4adb6362e590" "objects_0_x_mitre_contents_549_object_modified_2023-04-05T16:57:05.633Z" "objects_0_x_mitre_contents_550_object_ref_relationship--29dc105c-0b1b-4645-85ef-436c096bd3e2" "objects_0_x_mitre_contents_550_object_modified_2023-04-05T20:24:38.256Z" "objects_0_x_mitre_contents_551_object_ref_relationship--2a1d27a5-8149-4a6c-bbb7-6db83ce3a7ce" "objects_0_x_mitre_contents_551_object_modified_2020-12-18T20:14:47.339Z" "objects_0_x_mitre_contents_552_object_ref_relationship--2a472430-c30e-4877-8933-2e75f1de9a01" "objects_0_x_mitre_contents_552_object_modified_2022-03-30T14:00:45.120Z" "objects_0_x_mitre_contents_553_object_ref_relationship--2a5f4f05-bd60-4571-bcce-f3b764a5b5a0" "objects_0_x_mitre_contents_553_object_modified_2023-03-31T22:08:11.662Z" "objects_0_x_mitre_contents_554_object_ref_relationship--2acc0c1a-af30-4410-976b-31148df5378d" "objects_0_x_mitre_contents_554_object_modified_2022-03-28T19:39:42.538Z" "objects_0_x_mitre_contents_555_object_ref_relationship--2af26be3-f910-4700-ab14-9d14532601cc" "objects_0_x_mitre_contents_555_object_modified_2023-09-28T17:25:51.814Z" "objects_0_x_mitre_contents_556_object_ref_relationship--2b065fcf-7ed1-4f88-8910-2eb46bde9ab7" "objects_0_x_mitre_contents_556_object_modified_2023-03-27T17:52:35.805Z" "objects_0_x_mitre_contents_557_object_ref_relationship--2b0f4c1d-8d99-4e80-8555-d9a454d5cab7" "objects_0_x_mitre_contents_557_object_modified_2023-08-09T16:44:31.916Z" "objects_0_x_mitre_contents_558_object_ref_relationship--2bbd620d-6deb-4f81-a95b-98a7a74878e9" "objects_0_x_mitre_contents_558_object_modified_2023-08-09T17:20:06.469Z" "objects_0_x_mitre_contents_559_object_ref_relationship--2be3d0a4-2e24-4d04-859e-37d24835ff16" "objects_0_x_mitre_contents_559_object_modified_2021-02-17T20:43:52.420Z" "objects_0_x_mitre_contents_560_object_ref_relationship--2bedbf86-2ef0-45bf-950d-b9d072c03bdc" "objects_0_x_mitre_contents_560_object_modified_2023-04-05T17:37:02.853Z" "objects_0_x_mitre_contents_561_object_ref_relationship--2c5b36b4-5381-4d9e-9ce5-cd7cd19041b1" "objects_0_x_mitre_contents_561_object_modified_2023-04-05T20:35:47.258Z" "objects_0_x_mitre_contents_562_object_ref_relationship--2c9ad579-0c29-4f2a-80f3-242dc6b0bafd" "objects_0_x_mitre_contents_562_object_modified_2020-09-11T14:54:16.644Z" "objects_0_x_mitre_contents_563_object_ref_relationship--2caddf52-2bc2-4f75-90bb-0f292952ada6" "objects_0_x_mitre_contents_563_object_modified_2023-03-29T21:13:32.345Z" "objects_0_x_mitre_contents_564_object_ref_relationship--2cb834dd-d7cf-46f3-a19b-bdbfb5bfee07" "objects_0_x_mitre_contents_564_object_modified_2023-08-08T15:02:50.786Z" "objects_0_x_mitre_contents_565_object_ref_relationship--2cdd5474-620c-499e-8b9c-835505febc2c" "objects_0_x_mitre_contents_565_object_modified_2023-04-05T20:00:45.438Z" "objects_0_x_mitre_contents_566_object_ref_relationship--2ce1e63a-2e9b-4cac-9469-3fb78bf4640f" "objects_0_x_mitre_contents_566_object_modified_2023-08-16T16:38:15.527Z" "objects_0_x_mitre_contents_567_object_ref_relationship--2d1b46d5-cc2e-4312-adf2-43fb130a506b" "objects_0_x_mitre_contents_567_object_modified_2023-04-05T21:22:40.300Z" "objects_0_x_mitre_contents_568_object_ref_relationship--2d3198ff-a481-47ec-ae64-13d7be706929" "objects_0_x_mitre_contents_568_object_modified_2023-02-28T21:41:47.503Z" "objects_0_x_mitre_contents_569_object_ref_relationship--2de76a24-ec87-4808-b0d3-b84d318ac22c" "objects_0_x_mitre_contents_569_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_570_object_ref_relationship--2e08820f-a81d-480e-9e60-f14db3e49080" "objects_0_x_mitre_contents_570_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_571_object_ref_relationship--2e2d1ffa-f6df-4d3c-b99b-f7b8baff53e8" "objects_0_x_mitre_contents_571_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_572_object_ref_relationship--2e3a5d0d-a80a-4606-8be2-208302e995d1" "objects_0_x_mitre_contents_572_object_modified_2023-04-05T17:16:17.615Z" "objects_0_x_mitre_contents_573_object_ref_relationship--2e59d381-eac6-41c6-a5e6-f9617c10259e" "objects_0_x_mitre_contents_573_object_modified_2020-06-02T14:32:31.888Z" "objects_0_x_mitre_contents_574_object_ref_relationship--2e6d507e-afbb-4fa5-b459-2b060ab52db3" "objects_0_x_mitre_contents_574_object_modified_2023-04-05T20:50:29.535Z" "objects_0_x_mitre_contents_575_object_ref_relationship--2e797961-356f-4763-bdb2-0ebc2ad4c8b0" "objects_0_x_mitre_contents_575_object_modified_2022-04-01T13:32:19.919Z" "objects_0_x_mitre_contents_576_object_ref_relationship--2e7f8995-93ae-41bb-9baf-53178341d93e" "objects_0_x_mitre_contents_576_object_modified_2023-04-05T17:06:00.885Z" "objects_0_x_mitre_contents_577_object_ref_relationship--2e826926-fd5b-407c-adbc-e998058728d3" "objects_0_x_mitre_contents_577_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_578_object_ref_relationship--2e913583-123a-47af-8872-98fc12ab4a6a" "objects_0_x_mitre_contents_578_object_modified_2020-11-24T17:55:12.846Z" "objects_0_x_mitre_contents_579_object_ref_relationship--2ebd5c4c-af03-4874-a6fd-1e58d51cc055" "objects_0_x_mitre_contents_579_object_modified_2023-04-05T17:28:20.439Z" "objects_0_x_mitre_contents_580_object_ref_relationship--2f1e5d77-0054-4f8a-8e01-7c0318278a76" "objects_0_x_mitre_contents_580_object_modified_2022-03-25T14:12:54.498Z" "objects_0_x_mitre_contents_581_object_ref_relationship--2f41ab75-3490-4642-8111-9d4d43b88df7" "objects_0_x_mitre_contents_581_object_modified_2023-09-22T20:40:40.079Z" "objects_0_x_mitre_contents_582_object_ref_relationship--2f55e452-f8b3-402b-a193-d261dac9f327" "objects_0_x_mitre_contents_582_object_modified_2022-04-01T18:53:48.715Z" "objects_0_x_mitre_contents_583_object_ref_relationship--2f8b5252-551c-4a0d-8e72-8da4050757f3" "objects_0_x_mitre_contents_583_object_modified_2021-04-19T14:29:46.530Z" "objects_0_x_mitre_contents_584_object_ref_relationship--2f9b95b2-0ef4-40b8-a230-86f273000dc7" "objects_0_x_mitre_contents_584_object_modified_2023-08-09T15:34:52.478Z" "objects_0_x_mitre_contents_585_object_ref_relationship--2f9c31d2-2e6c-4e95-9058-c9a8def46865" "objects_0_x_mitre_contents_585_object_modified_2023-09-28T17:21:02.298Z" "objects_0_x_mitre_contents_586_object_ref_relationship--2fcc6291-9a68-45c2-a5c5-94b1973ed3d2" "objects_0_x_mitre_contents_586_object_modified_2022-04-01T13:27:29.920Z" "objects_0_x_mitre_contents_587_object_ref_relationship--2fdcc49e-1875-4618-b3c5-c0ecfab97386" "objects_0_x_mitre_contents_587_object_modified_2023-08-04T19:02:39.950Z" "objects_0_x_mitre_contents_588_object_ref_relationship--300c824d-5586-411b-b274-8941a99a98fb" "objects_0_x_mitre_contents_588_object_modified_2022-03-30T14:06:01.859Z" "objects_0_x_mitre_contents_589_object_ref_relationship--3057267c-fdd5-41d8-a9d8-76c0a87b28fa" "objects_0_x_mitre_contents_589_object_modified_2023-08-07T17:12:44.013Z" "objects_0_x_mitre_contents_590_object_ref_relationship--30ab9ce7-5369-402a-94ee-f8452642acb9" "objects_0_x_mitre_contents_590_object_modified_2022-03-30T19:50:37.739Z" "objects_0_x_mitre_contents_591_object_ref_relationship--3115a062-e7d0-4eac-9d78-9a9c797e7546" "objects_0_x_mitre_contents_591_object_modified_2023-07-21T19:53:45.997Z" "objects_0_x_mitre_contents_592_object_ref_relationship--312950f2-80d2-4941-bfce-b97b2cb7a1ff" "objects_0_x_mitre_contents_592_object_modified_2019-07-16T15:35:21.063Z" "objects_0_x_mitre_contents_593_object_ref_relationship--31330d32-50c8-4499-91fb-e1dcffa9ea8f" "objects_0_x_mitre_contents_593_object_modified_2022-03-30T18:14:04.881Z" "objects_0_x_mitre_contents_594_object_ref_relationship--319d46b5-de41-4f23-9001-2fa75f954720" "objects_0_x_mitre_contents_594_object_modified_2023-04-05T20:01:14.020Z" "objects_0_x_mitre_contents_595_object_ref_relationship--322d0123-ea4c-4562-a718-672952c83d05" "objects_0_x_mitre_contents_595_object_modified_2023-08-08T15:35:51.271Z" "objects_0_x_mitre_contents_596_object_ref_relationship--3230c032-17e0-49f7-b948-c157049aafe2" "objects_0_x_mitre_contents_596_object_modified_2022-04-01T15:34:50.556Z" "objects_0_x_mitre_contents_597_object_ref_relationship--3272111a-f31d-47d5-a266-1749255b5016" "objects_0_x_mitre_contents_597_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_598_object_ref_relationship--327d0102-2113-4e12-be68-504db097a6fd" "objects_0_x_mitre_contents_598_object_modified_2023-04-05T20:01:31.230Z" "objects_0_x_mitre_contents_599_object_ref_relationship--32958f57-ad9b-4fe1-abf3-6f92df895014" "objects_0_x_mitre_contents_599_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_600_object_ref_relationship--32be51e2-f74d-441f-aa0d-952697a76494" "objects_0_x_mitre_contents_600_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_601_object_ref_relationship--33316f49-f1fb-453a-9ba7-d6889982a010" "objects_0_x_mitre_contents_601_object_modified_2020-08-10T21:57:54.516Z" "objects_0_x_mitre_contents_602_object_ref_relationship--3364dd33-c012-4aaf-852b-86e63bd724ac" "objects_0_x_mitre_contents_602_object_modified_2023-04-11T22:06:53.022Z" "objects_0_x_mitre_contents_603_object_ref_relationship--33857221-2543-4a7f-8255-b0d140d70ad7" "objects_0_x_mitre_contents_603_object_modified_2020-08-10T21:57:54.686Z" "objects_0_x_mitre_contents_604_object_ref_relationship--34351abd-1f58-420a-a893-ad822839815d" "objects_0_x_mitre_contents_604_object_modified_2023-04-05T17:33:36.294Z" "objects_0_x_mitre_contents_605_object_ref_relationship--346b7e4a-dbd1-486b-ba26-55ae2ac613d0" "objects_0_x_mitre_contents_605_object_modified_2020-12-16T20:52:21.426Z" "objects_0_x_mitre_contents_606_object_ref_relationship--348d1acd-3f37-4523-95cd-ae002c02c975" "objects_0_x_mitre_contents_606_object_modified_2023-08-23T22:17:46.116Z" "objects_0_x_mitre_contents_607_object_ref_relationship--3498d304-48e3-4fe4-a3ab-fc261104f413" "objects_0_x_mitre_contents_607_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_608_object_ref_relationship--34a8a945-cc6c-474b-8db1-ffe8b5ecf99f" "objects_0_x_mitre_contents_608_object_modified_2023-04-05T17:44:53.855Z" "objects_0_x_mitre_contents_609_object_ref_relationship--34b6abb0-d199-46bb-af21-b65560e75658" "objects_0_x_mitre_contents_609_object_modified_2022-04-01T19:06:40.361Z" "objects_0_x_mitre_contents_610_object_ref_relationship--34dd5c26-eec9-4288-8e53-677271d490b2" "objects_0_x_mitre_contents_610_object_modified_2023-03-27T18:43:57.834Z" "objects_0_x_mitre_contents_611_object_ref_relationship--34f9aed0-48a7-4815-8456-5541a7b8210f" "objects_0_x_mitre_contents_611_object_modified_2022-04-15T17:34:52.414Z" "objects_0_x_mitre_contents_612_object_ref_relationship--352fabc8-48fe-4190-92b3-49b00348bb22" "objects_0_x_mitre_contents_612_object_modified_2022-04-18T19:04:48.388Z" "objects_0_x_mitre_contents_613_object_ref_relationship--35453bbb-c9b3-4421-8452-95efdd290d21" "objects_0_x_mitre_contents_613_object_modified_2021-01-20T16:01:19.323Z" "objects_0_x_mitre_contents_614_object_ref_relationship--3565140f-1570-494d-9d6f-91c9203ece69" "objects_0_x_mitre_contents_614_object_modified_2023-08-07T17:14:40.565Z" "objects_0_x_mitre_contents_615_object_ref_relationship--35927c96-7645-4ef3-b3da-e44822386a10" "objects_0_x_mitre_contents_615_object_modified_2023-03-27T18:47:19.403Z" "objects_0_x_mitre_contents_616_object_ref_relationship--3598ab6e-9271-40ca-9771-b9a6bbce497c" "objects_0_x_mitre_contents_616_object_modified_2023-08-16T16:44:09.459Z" "objects_0_x_mitre_contents_617_object_ref_relationship--35a12ae8-562d-4e24-979e-ef970dde0b94" "objects_0_x_mitre_contents_617_object_modified_2022-04-15T17:52:24.125Z" "objects_0_x_mitre_contents_618_object_ref_relationship--35c67a18-7e8d-4bd5-9fe1-35b1ac3f401f" "objects_0_x_mitre_contents_618_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_619_object_ref_relationship--3616bacc-6f6e-41f2-832c-cdbbae9622f3" "objects_0_x_mitre_contents_619_object_modified_2023-04-05T17:21:42.102Z" "objects_0_x_mitre_contents_620_object_ref_relationship--36268322-9f5e-4749-8760-6430178a3d68" "objects_0_x_mitre_contents_620_object_modified_2023-04-05T20:25:08.956Z" "objects_0_x_mitre_contents_621_object_ref_relationship--36298fd6-d909-4490-8a04-095aef9ffafe" "objects_0_x_mitre_contents_621_object_modified_2020-11-20T15:54:07.747Z" "objects_0_x_mitre_contents_622_object_ref_relationship--3644d1dd-8d9f-4a89-a618-c6b22c2a1a96" "objects_0_x_mitre_contents_622_object_modified_2023-04-05T20:01:48.463Z" "objects_0_x_mitre_contents_623_object_ref_relationship--36c71b5d-e453-488c-ae63-8fb063924c27" "objects_0_x_mitre_contents_623_object_modified_2023-08-10T21:57:51.879Z" "objects_0_x_mitre_contents_624_object_ref_relationship--370bf74f-7499-4d66-9626-a61926af8f84" "objects_0_x_mitre_contents_624_object_modified_2023-09-21T22:32:19.683Z" "objects_0_x_mitre_contents_625_object_ref_relationship--37123a8d-5c03-459c-bd0b-c17e2ee75a10" "objects_0_x_mitre_contents_625_object_modified_2020-06-26T15:32:25.074Z" "objects_0_x_mitre_contents_626_object_ref_relationship--373223d8-f18c-4151-8fe0-7d40c0c6e631" "objects_0_x_mitre_contents_626_object_modified_2020-11-24T17:55:12.885Z" "objects_0_x_mitre_contents_627_object_ref_relationship--373f33be-9b40-44f5-bfd3-db2a9f5fa72c" "objects_0_x_mitre_contents_627_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_628_object_ref_relationship--3752c235-0576-47dc-b05d-d3eaeaccfecc" "objects_0_x_mitre_contents_628_object_modified_2020-12-24T21:55:56.688Z" "objects_0_x_mitre_contents_629_object_ref_relationship--37d14338-b629-4b54-b734-446789b79f6f" "objects_0_x_mitre_contents_629_object_modified_2023-10-10T15:33:57.641Z" "objects_0_x_mitre_contents_630_object_ref_relationship--37fd2f2a-e4f4-4d39-8698-d17305fb2517" "objects_0_x_mitre_contents_630_object_modified_2023-09-15T19:17:24.158Z" "objects_0_x_mitre_contents_631_object_ref_relationship--383e5b12-061e-45c6-911b-b37187dd9254" "objects_0_x_mitre_contents_631_object_modified_2021-05-24T13:16:56.399Z" "objects_0_x_mitre_contents_632_object_ref_relationship--3841024e-1047-40fa-9e25-ac6d5c14612a" "objects_0_x_mitre_contents_632_object_modified_2023-03-29T21:25:52.302Z" "objects_0_x_mitre_contents_633_object_ref_relationship--3857f790-6ea1-4f37-8d90-90904f175d63" "objects_0_x_mitre_contents_633_object_modified_2023-03-27T18:48:17.771Z" "objects_0_x_mitre_contents_634_object_ref_relationship--38634e49-f19e-41bc-bb6d-e711f0cabd91" "objects_0_x_mitre_contents_634_object_modified_2023-04-05T20:42:27.975Z" "objects_0_x_mitre_contents_635_object_ref_relationship--386b0a9f-9951-4717-8bce-30c8fbe05050" "objects_0_x_mitre_contents_635_object_modified_2020-06-26T15:32:24.955Z" "objects_0_x_mitre_contents_636_object_ref_relationship--38962b26-7cbe-4761-8b4f-50a022167c4d" "objects_0_x_mitre_contents_636_object_modified_2022-04-15T16:55:56.825Z" "objects_0_x_mitre_contents_637_object_ref_relationship--38cb6365-40ba-47c6-a5e4-1a9be665f951" "objects_0_x_mitre_contents_637_object_modified_2023-03-01T16:50:04.964Z" "objects_0_x_mitre_contents_638_object_ref_relationship--38ec048f-7f6e-4bbd-9455-1b1e54968af4" "objects_0_x_mitre_contents_638_object_modified_2023-03-30T15:18:37.934Z" "objects_0_x_mitre_contents_639_object_ref_relationship--38f37e3f-1d4b-4f04-b176-1cae6d22931e" "objects_0_x_mitre_contents_639_object_modified_2020-12-14T14:52:03.310Z" "objects_0_x_mitre_contents_640_object_ref_relationship--38f96449-dfb1-49db-b0d0-f257c3ee2c5d" "objects_0_x_mitre_contents_640_object_modified_2023-04-05T20:25:21.998Z" "objects_0_x_mitre_contents_641_object_ref_relationship--393300c4-6852-466d-a163-1d51330fe055" "objects_0_x_mitre_contents_641_object_modified_2023-08-09T15:40:52.983Z" "objects_0_x_mitre_contents_642_object_ref_relationship--395cb6b2-0848-43c7-ac4a-617e103fb66a" "objects_0_x_mitre_contents_642_object_modified_2023-04-05T20:02:09.253Z" "objects_0_x_mitre_contents_643_object_ref_relationship--3997b2a1-2b70-4eeb-aa8f-1053bb3744c2" "objects_0_x_mitre_contents_643_object_modified_2023-08-08T17:04:24.775Z" "objects_0_x_mitre_contents_644_object_ref_relationship--39b854c1-5906-4d14-a0bc-1242c3eaa5b0" "objects_0_x_mitre_contents_644_object_modified_2022-04-11T20:05:56.540Z" "objects_0_x_mitre_contents_645_object_ref_relationship--3a18f41d-876c-403a-80cc-47ef57ae630d" "objects_0_x_mitre_contents_645_object_modified_2023-09-25T19:53:56.034Z" "objects_0_x_mitre_contents_646_object_ref_relationship--3a282967-0536-474d-8831-30cd60b818a9" "objects_0_x_mitre_contents_646_object_modified_2023-09-28T17:20:38.294Z" "objects_0_x_mitre_contents_647_object_ref_relationship--3a8fea40-69ba-4cfe-b577-c3112a60887a" "objects_0_x_mitre_contents_647_object_modified_2022-04-01T14:51:51.593Z" "objects_0_x_mitre_contents_648_object_ref_relationship--3abc80ad-4ea0-4e91-a170-f040469c2083" "objects_0_x_mitre_contents_648_object_modified_2020-08-10T21:57:54.688Z" "objects_0_x_mitre_contents_649_object_ref_relationship--3abcd7f4-5f6d-4b5d-9b37-eee68751dcbd" "objects_0_x_mitre_contents_649_object_modified_2022-04-01T15:02:43.475Z" "objects_0_x_mitre_contents_650_object_ref_relationship--3acbaa64-fb6e-4c26-ada4-1aab88798265" "objects_0_x_mitre_contents_650_object_modified_2023-04-05T17:15:42.930Z" "objects_0_x_mitre_contents_651_object_ref_relationship--3ae62d66-6405-413f-86e3-ccdb66fac7ba" "objects_0_x_mitre_contents_651_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_652_object_ref_relationship--3b0cb886-dabc-4622-b91f-3851e2a71bf2" "objects_0_x_mitre_contents_652_object_modified_2023-04-05T20:02:40.717Z" "objects_0_x_mitre_contents_653_object_ref_relationship--3b24a287-36e1-49b9-811d-c0080147ff57" "objects_0_x_mitre_contents_653_object_modified_2023-08-07T22:45:47.105Z" "objects_0_x_mitre_contents_654_object_ref_relationship--3be6ad82-722d-4699-8e3a-c1ea60018244" "objects_0_x_mitre_contents_654_object_modified_2023-08-14T16:29:15.000Z" "objects_0_x_mitre_contents_655_object_ref_relationship--3bf4b093-a1a3-48da-9236-bce9514765eb" "objects_0_x_mitre_contents_655_object_modified_2022-04-05T19:46:05.853Z" "objects_0_x_mitre_contents_656_object_ref_relationship--3bf5a566-986b-478c-b2da-e57caf261378" "objects_0_x_mitre_contents_656_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_657_object_ref_relationship--3c0b0763-78d2-4d6e-8e57-b4f27af7e414" "objects_0_x_mitre_contents_657_object_modified_2022-03-30T20:08:17.127Z" "objects_0_x_mitre_contents_658_object_ref_relationship--3c291ee5-1782-4e5b-8131-5188c7388f45" "objects_0_x_mitre_contents_658_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_659_object_ref_relationship--3c3c957e-7a23-4801-9f6a-ba599ad727d7" "objects_0_x_mitre_contents_659_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_660_object_ref_relationship--3c43d125-6719-420e-bb69-878cc91c2474" "objects_0_x_mitre_contents_660_object_modified_2023-04-05T17:45:11.727Z" "objects_0_x_mitre_contents_661_object_ref_relationship--3c57ee56-34bc-4f0c-b363-68dab3e5e7b3" "objects_0_x_mitre_contents_661_object_modified_2023-10-10T15:33:58.361Z" "objects_0_x_mitre_contents_662_object_ref_relationship--3c6776b9-258c-460c-b4b4-ea1a1453e5c5" "objects_0_x_mitre_contents_662_object_modified_2023-08-16T16:40:34.787Z" "objects_0_x_mitre_contents_663_object_ref_relationship--3c874ffa-63c3-491f-8d8c-623b19a7fdad" "objects_0_x_mitre_contents_663_object_modified_2023-04-05T17:37:37.674Z" "objects_0_x_mitre_contents_664_object_ref_relationship--3c90dc4c-8156-49ae-8144-76526268a6c1" "objects_0_x_mitre_contents_664_object_modified_2023-08-04T18:32:08.706Z" "objects_0_x_mitre_contents_665_object_ref_relationship--3ca284e7-062c-4f23-b95d-9f9c6a2d882a" "objects_0_x_mitre_contents_665_object_modified_2023-04-05T20:25:35.330Z" "objects_0_x_mitre_contents_666_object_ref_relationship--3ca453a4-bd78-4087-a93f-9261fb2e3f00" "objects_0_x_mitre_contents_666_object_modified_2020-09-15T15:18:12.421Z" "objects_0_x_mitre_contents_667_object_ref_relationship--3d24d88e-a0ab-42c6-8e8f-11f721082bba" "objects_0_x_mitre_contents_667_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_668_object_ref_relationship--3d5f7bdf-ab59-48f9-89d5-23f9d8cd235b" "objects_0_x_mitre_contents_668_object_modified_2021-01-05T20:16:20.419Z" "objects_0_x_mitre_contents_669_object_ref_relationship--3d65c2b7-c907-45e1-b942-95f7d765e749" "objects_0_x_mitre_contents_669_object_modified_2023-08-14T16:29:32.104Z" "objects_0_x_mitre_contents_670_object_ref_relationship--3db58541-3870-424d-ad74-f2b84ff87abb" "objects_0_x_mitre_contents_670_object_modified_2023-07-14T19:10:57.654Z" "objects_0_x_mitre_contents_671_object_ref_relationship--3dd0cd4d-bcde-4105-b98e-b32add191083" "objects_0_x_mitre_contents_671_object_modified_2023-04-05T20:39:39.589Z" "objects_0_x_mitre_contents_672_object_ref_relationship--3dff770d-9627-4647-b945-7f24a97b2273" "objects_0_x_mitre_contents_672_object_modified_2020-06-24T15:02:13.533Z" "objects_0_x_mitre_contents_673_object_ref_relationship--3e11a61b-14b3-4268-a6dd-937d4baef6de" "objects_0_x_mitre_contents_673_object_modified_2023-06-09T19:17:12.858Z" "objects_0_x_mitre_contents_674_object_ref_relationship--3e2474d3-f36d-4193-92f6-273296befdd3" "objects_0_x_mitre_contents_674_object_modified_2022-04-05T19:38:18.760Z" "objects_0_x_mitre_contents_675_object_ref_relationship--3e2b9dc1-5da0-46a1-a576-4b41a10f3a60" "objects_0_x_mitre_contents_675_object_modified_2023-04-05T17:21:27.210Z" "objects_0_x_mitre_contents_676_object_ref_relationship--3e3cad6c-dd73-43c9-bf99-d4796ba97fb1" "objects_0_x_mitre_contents_676_object_modified_2020-03-20T16:37:06.668Z" "objects_0_x_mitre_contents_677_object_ref_relationship--3e5b5c7a-32e1-4745-8ceb-c46ce7276364" "objects_0_x_mitre_contents_677_object_modified_2023-02-06T19:46:19.592Z" "objects_0_x_mitre_contents_678_object_ref_relationship--3ebcd3d8-dd8e-4cc9-8087-ce9e93df6f56" "objects_0_x_mitre_contents_678_object_modified_2022-04-01T13:51:48.934Z" "objects_0_x_mitre_contents_679_object_ref_relationship--3ebdc17d-401e-4f6a-af51-2dc57437b817" "objects_0_x_mitre_contents_679_object_modified_2022-04-01T18:37:44.516Z" "objects_0_x_mitre_contents_680_object_ref_relationship--3efe7dcc-a572-45ac-aff2-2932206a0632" "objects_0_x_mitre_contents_680_object_modified_2023-04-05T17:52:06.559Z" "objects_0_x_mitre_contents_681_object_ref_relationship--3f2daf2e-c28c-46cd-bf91-ae35e873f365" "objects_0_x_mitre_contents_681_object_modified_2023-04-05T20:35:59.273Z" "objects_0_x_mitre_contents_682_object_ref_relationship--3f31b209-dbc7-4c7e-bb0a-e37801121c13" "objects_0_x_mitre_contents_682_object_modified_2023-04-05T17:45:26.765Z" "objects_0_x_mitre_contents_683_object_ref_relationship--3f392718-87c4-483b-b89f-4f0cc056d251" "objects_0_x_mitre_contents_683_object_modified_2020-09-24T15:12:24.302Z" "objects_0_x_mitre_contents_684_object_ref_relationship--3f47f048-badd-4476-8534-d06e20c02ec6" "objects_0_x_mitre_contents_684_object_modified_2023-06-09T19:18:59.889Z" "objects_0_x_mitre_contents_685_object_ref_relationship--3f5dbd48-5899-4e97-96a6-ad7e68b673cd" "objects_0_x_mitre_contents_685_object_modified_2023-08-08T22:30:26.847Z" "objects_0_x_mitre_contents_686_object_ref_relationship--3f81a680-3151-4608-b83f-550756632013" "objects_0_x_mitre_contents_686_object_modified_2020-09-24T15:12:24.301Z" "objects_0_x_mitre_contents_687_object_ref_relationship--3f973c3c-45f8-432a-9859-e8749f2e7418" "objects_0_x_mitre_contents_687_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_688_object_ref_relationship--3fcd2177-2030-4781-bd19-8b9fa8c6e645" "objects_0_x_mitre_contents_688_object_modified_2021-05-24T13:16:56.410Z" "objects_0_x_mitre_contents_689_object_ref_relationship--3fd2785f-f0eb-4aa9-8a10-e1c9a88b372a" "objects_0_x_mitre_contents_689_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_690_object_ref_relationship--3fdb8bfb-1b2d-4fac-bb41-d26a5ad18dbb" "objects_0_x_mitre_contents_690_object_modified_2023-08-16T16:44:30.692Z" "objects_0_x_mitre_contents_691_object_ref_relationship--4009ff40-4616-4b1c-bff9-599e52ccab37" "objects_0_x_mitre_contents_691_object_modified_2023-04-05T17:28:34.373Z" "objects_0_x_mitre_contents_692_object_ref_relationship--4088b31b-d542-4935-84b4-82b592159591" "objects_0_x_mitre_contents_692_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_693_object_ref_relationship--40c9adb5-9d1a-4f51-8ef2-a80c2d78e4e4" "objects_0_x_mitre_contents_693_object_modified_2022-04-05T19:38:41.538Z" "objects_0_x_mitre_contents_694_object_ref_relationship--40f30137-4db9-4596-b4c7-a12f1497fd92" "objects_0_x_mitre_contents_694_object_modified_2022-04-18T16:02:42.303Z" "objects_0_x_mitre_contents_695_object_ref_relationship--418168ad-fee9-42c8-ac27-11f7472a5f86" "objects_0_x_mitre_contents_695_object_modified_2023-04-05T17:09:08.738Z" "objects_0_x_mitre_contents_696_object_ref_relationship--41da5845-a1a8-4d10-8929-053be3496396" "objects_0_x_mitre_contents_696_object_modified_2023-04-05T20:39:57.165Z" "objects_0_x_mitre_contents_697_object_ref_relationship--4220ec84-3c30-462b-9bad-4fb4de42cfd4" "objects_0_x_mitre_contents_697_object_modified_2022-04-06T15:28:20.249Z" "objects_0_x_mitre_contents_698_object_ref_relationship--42342d72-a37c-477e-b8f1-1768273fcb7f" "objects_0_x_mitre_contents_698_object_modified_2022-04-01T13:32:32.335Z" "objects_0_x_mitre_contents_699_object_ref_relationship--42510b9a-7e72-4a52-bc7a-6e1a7ebacff7" "objects_0_x_mitre_contents_699_object_modified_2023-08-16T16:33:12.493Z" "objects_0_x_mitre_contents_700_object_ref_relationship--42536c96-ae61-41ab-a1bf-3e7d126a4000" "objects_0_x_mitre_contents_700_object_modified_2022-03-30T15:13:42.462Z" "objects_0_x_mitre_contents_701_object_ref_relationship--42624ee9-1bf5-46aa-87d0-9fda0de9a06e" "objects_0_x_mitre_contents_701_object_modified_2023-04-05T20:50:47.973Z" "objects_0_x_mitre_contents_702_object_ref_relationship--429a4b02-f774-4b1e-aaef-5fd9c654dd09" "objects_0_x_mitre_contents_702_object_modified_2021-05-24T13:16:56.596Z" "objects_0_x_mitre_contents_703_object_ref_relationship--42ae42eb-ea75-457a-bf39-4ea04304dd0b" "objects_0_x_mitre_contents_703_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_704_object_ref_relationship--42f8d024-64a7-4bbf-8c05-2b0c7e667396" "objects_0_x_mitre_contents_704_object_modified_2020-12-14T15:02:35.304Z" "objects_0_x_mitre_contents_705_object_ref_relationship--430b2b14-9d63-401c-b76b-d0247ee7e27b" "objects_0_x_mitre_contents_705_object_modified_2020-08-10T21:57:54.524Z" "objects_0_x_mitre_contents_706_object_ref_relationship--433af79b-ce77-4a4c-84f7-6cdc34e70674" "objects_0_x_mitre_contents_706_object_modified_2023-03-27T18:48:53.396Z" "objects_0_x_mitre_contents_707_object_ref_relationship--433ba5b0-76eb-49e1-a2ed-e54994e94041" "objects_0_x_mitre_contents_707_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_708_object_ref_relationship--437f719c-d602-4cb8-a2b9-c33e85ad7c50" "objects_0_x_mitre_contents_708_object_modified_2023-04-05T17:52:43.629Z" "objects_0_x_mitre_contents_709_object_ref_relationship--439d905b-1ad8-461a-ab0d-b2f426cb2c3a" "objects_0_x_mitre_contents_709_object_modified_2023-08-09T16:24:02.473Z" "objects_0_x_mitre_contents_710_object_ref_relationship--43a62244-29f1-4f7f-bc9f-9b7b8e488b38" "objects_0_x_mitre_contents_710_object_modified_2020-05-11T16:37:36.616Z" "objects_0_x_mitre_contents_711_object_ref_relationship--43eeee7f-339a-4f6e-9df3-ccbf08ecf358" "objects_0_x_mitre_contents_711_object_modified_2020-12-01T19:48:44.840Z" "objects_0_x_mitre_contents_712_object_ref_relationship--442dd700-2d7d-4cad-8282-9027e4f69133" "objects_0_x_mitre_contents_712_object_modified_2022-03-30T20:31:41.927Z" "objects_0_x_mitre_contents_713_object_ref_relationship--44304163-9a44-4760-bd04-0e14adb33299" "objects_0_x_mitre_contents_713_object_modified_2022-04-01T15:13:40.779Z" "objects_0_x_mitre_contents_714_object_ref_relationship--4449ac76-8329-4483-b152-99b990006cbc" "objects_0_x_mitre_contents_714_object_modified_2023-04-05T19:58:10.115Z" "objects_0_x_mitre_contents_715_object_ref_relationship--4454a696-7619-40ee-971b-cbf646e4ee61" "objects_0_x_mitre_contents_715_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_716_object_ref_relationship--44a673c9-7ce7-42a0-8ab4-60bbb5001ce2" "objects_0_x_mitre_contents_716_object_modified_2023-08-10T22:23:14.948Z" "objects_0_x_mitre_contents_717_object_ref_relationship--44b63426-1ea7-456e-907b-0856e3eab0c3" "objects_0_x_mitre_contents_717_object_modified_2020-12-31T18:25:05.142Z" "objects_0_x_mitre_contents_718_object_ref_relationship--44da429b-9dee-43c9-9397-445c6f9e647e" "objects_0_x_mitre_contents_718_object_modified_2022-03-30T19:54:59.651Z" "objects_0_x_mitre_contents_719_object_ref_relationship--450a1b75-efa5-4d7a-bcd5-d3e63723b408" "objects_0_x_mitre_contents_719_object_modified_2022-04-15T19:47:48.036Z" "objects_0_x_mitre_contents_720_object_ref_relationship--45253350-c802-4566-a72d-57d43d05fd63" "objects_0_x_mitre_contents_720_object_modified_2020-05-27T13:23:34.536Z" "objects_0_x_mitre_contents_721_object_ref_relationship--45505ae7-0e54-4279-82c3-f92f4a832ed9" "objects_0_x_mitre_contents_721_object_modified_2022-04-06T13:57:38.847Z" "objects_0_x_mitre_contents_722_object_ref_relationship--455b1287-5784-42b4-91fb-01dac007758d" "objects_0_x_mitre_contents_722_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_723_object_ref_relationship--4586277d-bebd-4717-87c6-a31a9be741ed" "objects_0_x_mitre_contents_723_object_modified_2020-12-24T21:45:56.982Z" "objects_0_x_mitre_contents_724_object_ref_relationship--45da5ed9-3a9b-4491-98cb-96db68e245bb" "objects_0_x_mitre_contents_724_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_725_object_ref_relationship--465b7a4a-32d5-475c-9fb9-6335c44fb0d1" "objects_0_x_mitre_contents_725_object_modified_2022-04-05T19:48:31.354Z" "objects_0_x_mitre_contents_726_object_ref_relationship--465d14e7-eb9e-4794-9cb3-1de2cff86a8e" "objects_0_x_mitre_contents_726_object_modified_2023-04-05T17:28:07.442Z" "objects_0_x_mitre_contents_727_object_ref_relationship--4761145d-34ac-4b45-a0d6-a09b1907a196" "objects_0_x_mitre_contents_727_object_modified_2020-12-18T20:14:47.367Z" "objects_0_x_mitre_contents_728_object_ref_relationship--476e269e-3c49-4fda-a54b-3f0cb577c5af" "objects_0_x_mitre_contents_728_object_modified_2023-04-05T17:52:58.974Z" "objects_0_x_mitre_contents_729_object_ref_relationship--477edf7d-cc1f-49b7-9d96-f88399808775" "objects_0_x_mitre_contents_729_object_modified_2022-04-05T20:15:43.660Z" "objects_0_x_mitre_contents_730_object_ref_relationship--4819f391-01de-4525-992b-7e4a4f6667de" "objects_0_x_mitre_contents_730_object_modified_2020-11-20T15:46:51.603Z" "objects_0_x_mitre_contents_731_object_ref_relationship--481e5d33-eca4-453c-9fec-27ee01d50989" "objects_0_x_mitre_contents_731_object_modified_2023-03-29T21:26:12.006Z" "objects_0_x_mitre_contents_732_object_ref_relationship--48486680-530c-4ed9-aca3-94969aa262b6" "objects_0_x_mitre_contents_732_object_modified_2023-04-05T17:38:00.609Z" "objects_0_x_mitre_contents_733_object_ref_relationship--48552acc-5f1a-422f-90fa-37108446f36d" "objects_0_x_mitre_contents_733_object_modified_2022-03-30T19:14:20.374Z" "objects_0_x_mitre_contents_734_object_ref_relationship--48854999-1c12-4454-bb7c-051691a081f9" "objects_0_x_mitre_contents_734_object_modified_2022-03-28T19:25:49.640Z" "objects_0_x_mitre_contents_735_object_ref_relationship--4896e256-fb04-403c-bbb7-2323b158a6e0" "objects_0_x_mitre_contents_735_object_modified_2022-03-30T19:52:05.143Z" "objects_0_x_mitre_contents_736_object_ref_relationship--4897ef75-0035-4ae5-b325-de2f6b27565f" "objects_0_x_mitre_contents_736_object_modified_2023-09-21T22:31:28.428Z" "objects_0_x_mitre_contents_737_object_ref_relationship--48c0d9f7-9293-4f38-8ae5-9f5342621f74" "objects_0_x_mitre_contents_737_object_modified_2021-01-05T20:16:20.511Z" "objects_0_x_mitre_contents_738_object_ref_relationship--48cd0af5-9ad1-44b3-beeb-d576974dadee" "objects_0_x_mitre_contents_738_object_modified_2023-09-28T17:19:00.464Z" "objects_0_x_mitre_contents_739_object_ref_relationship--4920a041-86f7-495b-896c-4d964950ed7e" "objects_0_x_mitre_contents_739_object_modified_2020-12-17T20:15:22.454Z" "objects_0_x_mitre_contents_740_object_ref_relationship--492d5699-f885-411a-8431-254fcf33fb12" "objects_0_x_mitre_contents_740_object_modified_2022-04-01T13:56:12.774Z" "objects_0_x_mitre_contents_741_object_ref_relationship--4943cca6-69b1-4565-ac09-87ebda04584c" "objects_0_x_mitre_contents_741_object_modified_2022-04-01T18:52:02.211Z" "objects_0_x_mitre_contents_742_object_ref_relationship--496976ef-4a0c-4782-95e7-231bd44df162" "objects_0_x_mitre_contents_742_object_modified_2020-12-14T15:02:35.295Z" "objects_0_x_mitre_contents_743_object_ref_relationship--49c0c003-433c-467f-93b7-ca585aab8232" "objects_0_x_mitre_contents_743_object_modified_2023-08-16T16:46:17.841Z" "objects_0_x_mitre_contents_744_object_ref_relationship--4a408dee-07da-4855-b2ff-be512480ccb5" "objects_0_x_mitre_contents_744_object_modified_2023-03-29T21:18:05.095Z" "objects_0_x_mitre_contents_745_object_ref_relationship--4a4aba6e-2dc4-43a5-bcac-876c89114a57" "objects_0_x_mitre_contents_745_object_modified_2023-08-09T16:09:09.008Z" "objects_0_x_mitre_contents_746_object_ref_relationship--4a608d3b-aa02-4563-8b6b-c64a491856f5" "objects_0_x_mitre_contents_746_object_modified_2023-03-03T16:26:20.400Z" "objects_0_x_mitre_contents_747_object_ref_relationship--4a67b14a-e489-4e8f-b545-5bdf134e146e" "objects_0_x_mitre_contents_747_object_modified_2020-04-24T15:06:33.519Z" "objects_0_x_mitre_contents_748_object_ref_relationship--4a77c56b-ed2c-4e43-bd0f-7acf9cce1952" "objects_0_x_mitre_contents_748_object_modified_2023-04-05T20:25:55.378Z" "objects_0_x_mitre_contents_749_object_ref_relationship--4a936488-526c-40c1-b2d5-490052cb0e73" "objects_0_x_mitre_contents_749_object_modified_2023-04-05T21:22:53.698Z" "objects_0_x_mitre_contents_750_object_ref_relationship--4aae6ab8-2a67-4780-a69e-b15ecff7fc5d" "objects_0_x_mitre_contents_750_object_modified_2023-02-28T21:43:12.487Z" "objects_0_x_mitre_contents_751_object_ref_relationship--4ab1867c-b924-4b0d-a332-c0e150a28d7d" "objects_0_x_mitre_contents_751_object_modified_2023-08-10T22:11:01.943Z" "objects_0_x_mitre_contents_752_object_ref_relationship--4ad83f33-c64a-4ad6-ab6f-0548c9dde257" "objects_0_x_mitre_contents_752_object_modified_2020-10-29T17:48:27.469Z" "objects_0_x_mitre_contents_753_object_ref_relationship--4ae0c45f-4ff0-4296-aaf4-c3e0d2e355e3" "objects_0_x_mitre_contents_753_object_modified_2023-04-05T20:42:40.327Z" "objects_0_x_mitre_contents_754_object_ref_relationship--4aec0738-2c76-4dc7-af8a-87785e658193" "objects_0_x_mitre_contents_754_object_modified_2023-04-05T17:26:18.801Z" "objects_0_x_mitre_contents_755_object_ref_relationship--4af26643-880f-4c34-a4a8-23e89b950c9d" "objects_0_x_mitre_contents_755_object_modified_2023-04-05T20:18:38.582Z" "objects_0_x_mitre_contents_756_object_ref_relationship--4b16e681-9542-4f32-b23a-f1b0caf44b6a" "objects_0_x_mitre_contents_756_object_modified_2020-12-24T21:55:56.726Z" "objects_0_x_mitre_contents_757_object_ref_relationship--4b3cfd7c-5e41-4d9e-8879-b126ba66eaf1" "objects_0_x_mitre_contents_757_object_modified_2022-04-15T17:33:49.565Z" "objects_0_x_mitre_contents_758_object_ref_relationship--4b68bcb1-a512-40f7-9aee-235b3668f022" "objects_0_x_mitre_contents_758_object_modified_2020-01-27T17:05:58.271Z" "objects_0_x_mitre_contents_759_object_ref_relationship--4b7e117b-0c82-49d0-bee6-119158b3355b" "objects_0_x_mitre_contents_759_object_modified_2023-02-28T20:32:50.168Z" "objects_0_x_mitre_contents_760_object_ref_relationship--4b838636-bfa4-4592-b72f-3044946b8187" "objects_0_x_mitre_contents_760_object_modified_2023-04-05T17:53:16.656Z" "objects_0_x_mitre_contents_761_object_ref_relationship--4b8d027d-5da2-4a01-ad31-b6644a5cda61" "objects_0_x_mitre_contents_761_object_modified_2020-04-24T15:06:33.495Z" "objects_0_x_mitre_contents_762_object_ref_relationship--4bdda427-2fff-428d-ba19-4bee5d2508e1" "objects_0_x_mitre_contents_762_object_modified_2021-05-24T13:16:56.571Z" "objects_0_x_mitre_contents_763_object_ref_relationship--4c035760-9bf2-40cd-87d1-f286afd76376" "objects_0_x_mitre_contents_763_object_modified_2023-07-21T19:41:45.173Z" "objects_0_x_mitre_contents_764_object_ref_relationship--4c6f1475-3b92-4a37-8bb5-4dcc69660b11" "objects_0_x_mitre_contents_764_object_modified_2022-09-30T18:38:37.195Z" "objects_0_x_mitre_contents_765_object_ref_relationship--4c7e776d-ed19-4e5a-842c-81612f5c07bd" "objects_0_x_mitre_contents_765_object_modified_2023-04-05T17:10:38.937Z" "objects_0_x_mitre_contents_766_object_ref_relationship--4cb926c1-c242-45c2-be46-07c22435a8a5" "objects_0_x_mitre_contents_766_object_modified_2022-09-30T19:23:02.689Z" "objects_0_x_mitre_contents_767_object_ref_relationship--4cc8a16f-562a-42c7-b5d9-10e1088af89c" "objects_0_x_mitre_contents_767_object_modified_2023-04-05T17:31:38.319Z" "objects_0_x_mitre_contents_768_object_ref_relationship--4cccb708-b51b-4e71-94a1-78d6819eaac1" "objects_0_x_mitre_contents_768_object_modified_2023-08-07T22:16:55.879Z" "objects_0_x_mitre_contents_769_object_ref_relationship--4d431474-1dcc-4d0e-9906-129eb02f00b3" "objects_0_x_mitre_contents_769_object_modified_2023-02-06T19:43:43.574Z" "objects_0_x_mitre_contents_770_object_ref_relationship--4d4dfc26-3ab7-4798-abf2-be8dc278fdfa" "objects_0_x_mitre_contents_770_object_modified_2020-11-24T17:55:12.804Z" "objects_0_x_mitre_contents_771_object_ref_relationship--4d542595-1eb0-45aa-9702-9d494142b390" "objects_0_x_mitre_contents_771_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_772_object_ref_relationship--4d6a900d-d1c4-4a91-bded-c9062aae384b" "objects_0_x_mitre_contents_772_object_modified_2023-04-05T17:47:18.774Z" "objects_0_x_mitre_contents_773_object_ref_relationship--4d7e937d-7ea1-49cb-939c-5244815e51d7" "objects_0_x_mitre_contents_773_object_modified_2023-04-05T20:03:03.296Z" "objects_0_x_mitre_contents_774_object_ref_relationship--4d88c5ac-68c0-4304-9474-d07372d0ad99" "objects_0_x_mitre_contents_774_object_modified_2023-09-21T22:19:04.080Z" "objects_0_x_mitre_contents_775_object_ref_relationship--4de3f794-63df-4f9e-8bd8-59796d91aa36" "objects_0_x_mitre_contents_775_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_776_object_ref_relationship--4df6a22e-489f-400c-b953-cc53bfb708a3" "objects_0_x_mitre_contents_776_object_modified_2020-09-14T14:13:45.296Z" "objects_0_x_mitre_contents_777_object_ref_relationship--4e68feca-083f-40ed-88d8-2b6a3935c949" "objects_0_x_mitre_contents_777_object_modified_2023-03-27T17:53:38.271Z" "objects_0_x_mitre_contents_778_object_ref_relationship--4e6b726d-9ef4-4eb6-b9a7-74059caee5b7" "objects_0_x_mitre_contents_778_object_modified_2023-04-05T20:26:22.984Z" "objects_0_x_mitre_contents_779_object_ref_relationship--4e7a1b10-0f68-4a48-a13d-0c7bc13fb819" "objects_0_x_mitre_contents_779_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_780_object_ref_relationship--4e9f021d-3cf4-4790-8f7d-f87f33133446" "objects_0_x_mitre_contents_780_object_modified_2023-04-05T20:26:37.661Z" "objects_0_x_mitre_contents_781_object_ref_relationship--4ee57616-7205-490c-86c3-c27dcffd8689" "objects_0_x_mitre_contents_781_object_modified_2022-04-06T13:35:43.203Z" "objects_0_x_mitre_contents_782_object_ref_relationship--4efa4953-7854-4144-8837-d7831ccbe35d" "objects_0_x_mitre_contents_782_object_modified_2020-04-24T17:46:31.691Z" "objects_0_x_mitre_contents_783_object_ref_relationship--4f2ae057-ef0b-4995-b24d-348a76a74a4f" "objects_0_x_mitre_contents_783_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_784_object_ref_relationship--4f366c8c-9c70-44ed-baa8-d433d5dbfe49" "objects_0_x_mitre_contents_784_object_modified_2023-04-05T17:13:18.720Z" "objects_0_x_mitre_contents_785_object_ref_relationship--4f6f4def-e76d-4d1b-9416-b6543e7dbc54" "objects_0_x_mitre_contents_785_object_modified_2021-10-01T14:42:48.744Z" "objects_0_x_mitre_contents_786_object_ref_relationship--4f812a57-efdc-463b-bf37-baa4bca7502b" "objects_0_x_mitre_contents_786_object_modified_2023-04-05T20:35:00.081Z" "objects_0_x_mitre_contents_787_object_ref_relationship--4fc165fd-185e-4c70-b423-c242cf715510" "objects_0_x_mitre_contents_787_object_modified_2023-04-05T16:55:21.480Z" "objects_0_x_mitre_contents_788_object_ref_relationship--4ff5f854-bfe9-45bc-b11a-196cf826b760" "objects_0_x_mitre_contents_788_object_modified_2022-03-30T14:41:20.735Z" "objects_0_x_mitre_contents_789_object_ref_relationship--4ff9b16f-3643-4fa0-b107-f93a9bb847c3" "objects_0_x_mitre_contents_789_object_modified_2023-03-29T21:26:33.166Z" "objects_0_x_mitre_contents_790_object_ref_relationship--5012c647-9b58-4a4f-b64f-468c9b76a60c" "objects_0_x_mitre_contents_790_object_modified_2023-04-05T17:53:41.561Z" "objects_0_x_mitre_contents_791_object_ref_relationship--502fc83c-ce03-4ce7-a202-095bbe0b492b" "objects_0_x_mitre_contents_791_object_modified_2023-07-21T19:51:08.375Z" "objects_0_x_mitre_contents_792_object_ref_relationship--503ca6f2-a747-43fb-8fc5-7be095dcb966" "objects_0_x_mitre_contents_792_object_modified_2023-08-04T18:31:30.237Z" "objects_0_x_mitre_contents_793_object_ref_relationship--506d657b-1634-442e-8179-7187f82feb3a" "objects_0_x_mitre_contents_793_object_modified_2023-04-05T17:38:17.926Z" "objects_0_x_mitre_contents_794_object_ref_relationship--5088a10e-03d2-4643-8df8-b7b601c2cc24" "objects_0_x_mitre_contents_794_object_modified_2020-01-27T17:05:58.267Z" "objects_0_x_mitre_contents_795_object_ref_relationship--50ad2a8c-ed45-4376-be31-8bafa26ba794" "objects_0_x_mitre_contents_795_object_modified_2020-04-08T15:41:19.451Z" "objects_0_x_mitre_contents_796_object_ref_relationship--50bab448-fee6-49e9-a296-498fe06eacc7" "objects_0_x_mitre_contents_796_object_modified_2019-11-21T16:42:48.490Z" "objects_0_x_mitre_contents_797_object_ref_relationship--50c81a85-8c70-48df-a338-8622d2debc74" "objects_0_x_mitre_contents_797_object_modified_2023-04-05T17:38:39.008Z" "objects_0_x_mitre_contents_798_object_ref_relationship--50d8e788-d405-45e8-b6b7-0f02f353cc97" "objects_0_x_mitre_contents_798_object_modified_2023-09-28T17:20:00.981Z" "objects_0_x_mitre_contents_799_object_ref_relationship--50f03c00-5488-49fe-a527-a8776e526523" "objects_0_x_mitre_contents_799_object_modified_2020-11-24T17:55:12.820Z" "objects_0_x_mitre_contents_800_object_ref_relationship--5107be8a-b5fc-4442-af0d-2c92e086a912" "objects_0_x_mitre_contents_800_object_modified_2020-05-11T16:13:43.062Z" "objects_0_x_mitre_contents_801_object_ref_relationship--51457698-e98b-435a-88c2-75a82cdc2bda" "objects_0_x_mitre_contents_801_object_modified_2023-04-05T17:38:56.380Z" "objects_0_x_mitre_contents_802_object_ref_relationship--5151b976-cfcf-4771-a75a-995d49bcc1ab" "objects_0_x_mitre_contents_802_object_modified_2022-04-11T20:06:38.811Z" "objects_0_x_mitre_contents_803_object_ref_relationship--51757971-17ac-40c3-bae7-78365579db49" "objects_0_x_mitre_contents_803_object_modified_2023-04-05T17:02:27.188Z" "objects_0_x_mitre_contents_804_object_ref_relationship--51b0a4fb-a308-4694-9437-95702a50ebd5" "objects_0_x_mitre_contents_804_object_modified_2020-09-11T16:22:03.231Z" "objects_0_x_mitre_contents_805_object_ref_relationship--51bf6ffc-85c7-4910-8821-9736a1ec60f1" "objects_0_x_mitre_contents_805_object_modified_2022-04-15T17:34:17.813Z" "objects_0_x_mitre_contents_806_object_ref_relationship--51d31e17-6c80-4ab3-9e8e-6231483e0999" "objects_0_x_mitre_contents_806_object_modified_2023-04-05T17:21:12.197Z" "objects_0_x_mitre_contents_807_object_ref_relationship--51f75dd5-b584-482f-8f7f-dbee2d5cf6f3" "objects_0_x_mitre_contents_807_object_modified_2022-04-05T19:42:51.306Z" "objects_0_x_mitre_contents_808_object_ref_relationship--520c7112-9768-42c5-8917-1950efd182f9" "objects_0_x_mitre_contents_808_object_modified_2023-03-29T21:33:30.155Z" "objects_0_x_mitre_contents_809_object_ref_relationship--52649ab6-8d1c-41d0-9804-3fd4b6a1ba48" "objects_0_x_mitre_contents_809_object_modified_2023-08-09T14:52:23.577Z" "objects_0_x_mitre_contents_810_object_ref_relationship--526ce88f-ee58-4a55-a1b2-b72e1b5971aa" "objects_0_x_mitre_contents_810_object_modified_2022-04-01T16:52:36.974Z" "objects_0_x_mitre_contents_811_object_ref_relationship--529107fd-6420-4573-8dbf-cdcd49c2708c" "objects_0_x_mitre_contents_811_object_modified_2020-06-26T14:55:13.307Z" "objects_0_x_mitre_contents_812_object_ref_relationship--52ad5145-3b04-4cc8-bed8-4a14501afe25" "objects_0_x_mitre_contents_812_object_modified_2020-09-11T15:55:43.774Z" "objects_0_x_mitre_contents_813_object_ref_relationship--52f7e464-db89-4201-aea8-38d9b44bbd1b" "objects_0_x_mitre_contents_813_object_modified_2020-12-18T20:14:47.314Z" "objects_0_x_mitre_contents_814_object_ref_relationship--53364899-1ea5-47fa-afde-c210aed64120" "objects_0_x_mitre_contents_814_object_modified_2019-07-16T15:35:21.086Z" "objects_0_x_mitre_contents_815_object_ref_relationship--533e5ce5-138c-4bfc-9a59-eb0ced8e6e1a" "objects_0_x_mitre_contents_815_object_modified_2023-10-10T15:33:59.484Z" "objects_0_x_mitre_contents_816_object_ref_relationship--535d2425-21aa-4fe5-ae6d-5b677f459020" "objects_0_x_mitre_contents_816_object_modified_2022-03-28T19:41:37.162Z" "objects_0_x_mitre_contents_817_object_ref_relationship--53ebd5b6-e60e-4aa4-a342-de586917f06d" "objects_0_x_mitre_contents_817_object_modified_2023-08-10T22:26:05.065Z" "objects_0_x_mitre_contents_818_object_ref_relationship--54151897-cc7e-4f92-af50-bed41ea78d92" "objects_0_x_mitre_contents_818_object_modified_2023-04-05T20:03:20.968Z" "objects_0_x_mitre_contents_819_object_ref_relationship--5417959b-9478-49fb-b779-3c82a10ad080" "objects_0_x_mitre_contents_819_object_modified_2020-12-17T20:15:22.498Z" "objects_0_x_mitre_contents_820_object_ref_relationship--544e8fc3-c656-4081-9b4f-8a5d60926f47" "objects_0_x_mitre_contents_820_object_modified_2022-04-01T17:08:41.293Z" "objects_0_x_mitre_contents_821_object_ref_relationship--545d9313-3fcc-4d4a-b9d2-7555430df8f2" "objects_0_x_mitre_contents_821_object_modified_2023-04-05T21:28:58.447Z" "objects_0_x_mitre_contents_822_object_ref_relationship--5482462c-08bc-4e28-bc20-bfbbc60f3f81" "objects_0_x_mitre_contents_822_object_modified_2022-04-05T20:03:46.789Z" "objects_0_x_mitre_contents_823_object_ref_relationship--54bfecbc-4d1d-4bca-bb9c-652d09b29515" "objects_0_x_mitre_contents_823_object_modified_2023-08-04T19:14:31.727Z" "objects_0_x_mitre_contents_824_object_ref_relationship--54ce9375-cc0f-456e-ac22-e6fe822a6cec" "objects_0_x_mitre_contents_824_object_modified_2022-04-01T15:54:48.924Z" "objects_0_x_mitre_contents_825_object_ref_relationship--54dac52d-5279-407f-b7b4-5484ae90b98c" "objects_0_x_mitre_contents_825_object_modified_2021-02-17T20:43:52.402Z" "objects_0_x_mitre_contents_826_object_ref_relationship--554ec347-c8b2-43da-876b-36608dcc543d" "objects_0_x_mitre_contents_826_object_modified_2022-03-30T21:04:59.921Z" "objects_0_x_mitre_contents_827_object_ref_relationship--557e6d99-d7d8-4e2f-bc01-66b0754de089" "objects_0_x_mitre_contents_827_object_modified_2022-03-28T19:41:27.610Z" "objects_0_x_mitre_contents_828_object_ref_relationship--55afe9a0-d261-48ea-b5a8-0b1685ff2f15" "objects_0_x_mitre_contents_828_object_modified_2020-04-24T15:06:33.319Z" "objects_0_x_mitre_contents_829_object_ref_relationship--55b3df0f-252d-4208-bdb8-91fa1e1119b4" "objects_0_x_mitre_contents_829_object_modified_2023-04-05T21:23:12.919Z" "objects_0_x_mitre_contents_830_object_ref_relationship--5619e263-d48c-47a5-ab68-8677fe080a15" "objects_0_x_mitre_contents_830_object_modified_2022-03-30T14:42:27.821Z" "objects_0_x_mitre_contents_831_object_ref_relationship--56551987-326a-46ad-a34a-59bb7ab793a9" "objects_0_x_mitre_contents_831_object_modified_2023-04-05T21:24:07.828Z" "objects_0_x_mitre_contents_832_object_ref_relationship--56758bb5-230e-43ac-9851-167c296c3dfa" "objects_0_x_mitre_contents_832_object_modified_2023-08-10T22:25:29.731Z" "objects_0_x_mitre_contents_833_object_ref_relationship--56a255a5-9fa2-45bb-8848-fd0a68514467" "objects_0_x_mitre_contents_833_object_modified_2022-04-11T20:06:56.034Z" "objects_0_x_mitre_contents_834_object_ref_relationship--56c8af86-2924-46f8-a1d7-8309ee6f0282" "objects_0_x_mitre_contents_834_object_modified_2023-07-21T19:36:35.822Z" "objects_0_x_mitre_contents_835_object_ref_relationship--5706742b-733d-44e9-a032-62b81ba05bcf" "objects_0_x_mitre_contents_835_object_modified_2023-04-05T20:26:52.491Z" "objects_0_x_mitre_contents_836_object_ref_relationship--57293fc9-8838-4acd-a16f-48f516d0921e" "objects_0_x_mitre_contents_836_object_modified_2023-04-05T17:29:51.699Z" "objects_0_x_mitre_contents_837_object_ref_relationship--576dfa89-d400-4cac-b32d-8ee85a9de5d7" "objects_0_x_mitre_contents_837_object_modified_2023-08-10T22:17:40.405Z" "objects_0_x_mitre_contents_838_object_ref_relationship--57881f4b-8463-430c-912a-0e3c961e7784" "objects_0_x_mitre_contents_838_object_modified_2023-07-21T19:52:30.529Z" "objects_0_x_mitre_contents_839_object_ref_relationship--57a069a0-399f-43ab-9efc-50432a41b26b" "objects_0_x_mitre_contents_839_object_modified_2023-04-05T20:36:12.585Z" "objects_0_x_mitre_contents_840_object_ref_relationship--57a5ae72-6932-45e6-83f2-609943902b35" "objects_0_x_mitre_contents_840_object_modified_2023-08-09T16:30:03.505Z" "objects_0_x_mitre_contents_841_object_ref_relationship--57df3046-2f14-4bb8-93e9-84a9c8b46791" "objects_0_x_mitre_contents_841_object_modified_2022-03-30T19:33:17.520Z" "objects_0_x_mitre_contents_842_object_ref_relationship--57e441f8-6799-4d1b-8e2a-13d8ac1c8e78" "objects_0_x_mitre_contents_842_object_modified_2023-03-31T22:08:37.122Z" "objects_0_x_mitre_contents_843_object_ref_relationship--58c0fe4b-612d-4fc6-973f-16914b0f4b72" "objects_0_x_mitre_contents_843_object_modified_2020-11-24T17:55:12.900Z" "objects_0_x_mitre_contents_844_object_ref_relationship--58c15bce-1593-4be1-ae56-7e7b2634fc56" "objects_0_x_mitre_contents_844_object_modified_2023-04-05T20:27:05.040Z" "objects_0_x_mitre_contents_845_object_ref_relationship--58c857f8-4f40-48e0-b3ac-41944d82b576" "objects_0_x_mitre_contents_845_object_modified_2023-04-05T17:54:02.223Z" "objects_0_x_mitre_contents_846_object_ref_relationship--592331d2-60a7-4264-b844-fbeb89b6386c" "objects_0_x_mitre_contents_846_object_modified_2023-08-14T16:53:16.626Z" "objects_0_x_mitre_contents_847_object_ref_relationship--5977289e-d38f-4974-912b-2151fc00c850" "objects_0_x_mitre_contents_847_object_modified_2020-11-20T16:37:28.524Z" "objects_0_x_mitre_contents_848_object_ref_relationship--59aaa62b-a629-42c8-9bd2-8e75810135a9" "objects_0_x_mitre_contents_848_object_modified_2022-04-05T19:52:32.201Z" "objects_0_x_mitre_contents_849_object_ref_relationship--59c2bfb5-a55b-43d3-b1e9-3fbaff0fb7fc" "objects_0_x_mitre_contents_849_object_modified_2023-08-08T22:35:46.046Z" "objects_0_x_mitre_contents_850_object_ref_relationship--59d463d3-3a41-4269-be9a-7a69f44eca78" "objects_0_x_mitre_contents_850_object_modified_2023-04-05T20:03:47.434Z" "objects_0_x_mitre_contents_851_object_ref_relationship--59e225fa-b181-4906-9f0b-ef8f6ce7f2ef" "objects_0_x_mitre_contents_851_object_modified_2022-04-05T20:14:17.442Z" "objects_0_x_mitre_contents_852_object_ref_relationship--5a036fb8-9f72-4383-91c5-0f47b33b2c9d" "objects_0_x_mitre_contents_852_object_modified_2023-04-05T19:57:40.371Z" "objects_0_x_mitre_contents_853_object_ref_relationship--5a18e6c3-4bbf-4418-8815-55ebf283c8a1" "objects_0_x_mitre_contents_853_object_modified_2022-04-15T16:53:00.735Z" "objects_0_x_mitre_contents_854_object_ref_relationship--5a277966-4559-487e-bdfb-7be6366ccdb6" "objects_0_x_mitre_contents_854_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_855_object_ref_relationship--5a2bff26-f5e5-41f9-b3da-a558988ef3f3" "objects_0_x_mitre_contents_855_object_modified_2020-06-26T14:55:13.351Z" "objects_0_x_mitre_contents_856_object_ref_relationship--5a50d9da-3fa5-443e-8367-8a0520d58cae" "objects_0_x_mitre_contents_856_object_modified_2023-04-05T20:04:02.992Z" "objects_0_x_mitre_contents_857_object_ref_relationship--5a64b957-32fb-4dd6-84ae-48a2c74c560f" "objects_0_x_mitre_contents_857_object_modified_2023-08-08T15:27:56.357Z" "objects_0_x_mitre_contents_858_object_ref_relationship--5a6df1dd-9aa4-4f67-9195-8c3a9f5c0f7a" "objects_0_x_mitre_contents_858_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_859_object_ref_relationship--5a7295a2-ad95-4362-8b2c-9265ad5c73b0" "objects_0_x_mitre_contents_859_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_860_object_ref_relationship--5a96d87e-f70e-49dc-a272-c98aad672ce0" "objects_0_x_mitre_contents_860_object_modified_2020-07-09T14:07:02.315Z" "objects_0_x_mitre_contents_861_object_ref_relationship--5aa167b8-4166-440b-b49f-bf1bab597237" "objects_0_x_mitre_contents_861_object_modified_2023-04-05T17:39:13.309Z" "objects_0_x_mitre_contents_862_object_ref_relationship--5b04c8d0-c026-4838-9383-e4146de36d4d" "objects_0_x_mitre_contents_862_object_modified_2023-08-09T15:34:11.221Z" "objects_0_x_mitre_contents_863_object_ref_relationship--5b235ed4-548d-49f2-ae01-1874666e6747" "objects_0_x_mitre_contents_863_object_modified_2022-03-30T19:51:56.543Z" "objects_0_x_mitre_contents_864_object_ref_relationship--5b37d94a-64a3-432a-b340-1c9a4f553d02" "objects_0_x_mitre_contents_864_object_modified_2020-12-17T20:15:22.452Z" "objects_0_x_mitre_contents_865_object_ref_relationship--5b5586b9-75ee-476f-b3eb-49878254302c" "objects_0_x_mitre_contents_865_object_modified_2020-04-27T16:52:49.643Z" "objects_0_x_mitre_contents_866_object_ref_relationship--5b670281-0054-42b4-8e54-ea01a692f5bf" "objects_0_x_mitre_contents_866_object_modified_2021-10-01T14:42:48.900Z" "objects_0_x_mitre_contents_867_object_ref_relationship--5b87bb01-9587-42bd-aa6b-30158ca8f55f" "objects_0_x_mitre_contents_867_object_modified_2020-09-11T15:42:15.628Z" "objects_0_x_mitre_contents_868_object_ref_relationship--5b9a2c93-95bf-4f39-aeac-b2af051faca9" "objects_0_x_mitre_contents_868_object_modified_2023-08-23T22:50:55.591Z" "objects_0_x_mitre_contents_869_object_ref_relationship--5c1e3aa9-160d-49fd-83a2-2ed2f8c5435c" "objects_0_x_mitre_contents_869_object_modified_2021-02-17T20:43:52.324Z" "objects_0_x_mitre_contents_870_object_ref_relationship--5c447471-2b97-4d96-b75f-1cbb574b39cf" "objects_0_x_mitre_contents_870_object_modified_2023-08-09T15:39:37.117Z" "objects_0_x_mitre_contents_871_object_ref_relationship--5c746ac8-4034-4ae3-98c3-66d89f5a6d6a" "objects_0_x_mitre_contents_871_object_modified_2023-04-05T21:19:00.199Z" "objects_0_x_mitre_contents_872_object_ref_relationship--5c7508ae-5d05-49fd-a489-b944d3b45dd0" "objects_0_x_mitre_contents_872_object_modified_2020-12-24T22:04:27.997Z" "objects_0_x_mitre_contents_873_object_ref_relationship--5ced57a7-b674-40d4-98b8-a090963a6ade" "objects_0_x_mitre_contents_873_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_874_object_ref_relationship--5d0fdc8a-af17-4334-88e6-111aa290b22f" "objects_0_x_mitre_contents_874_object_modified_2023-08-08T21:18:54.014Z" "objects_0_x_mitre_contents_875_object_ref_relationship--5d2a3a9f-2467-4ac6-ab64-ffe91ec584da" "objects_0_x_mitre_contents_875_object_modified_2021-09-24T14:52:41.308Z" "objects_0_x_mitre_contents_876_object_ref_relationship--5d37400f-80f9-4500-9357-185650e5a7b2" "objects_0_x_mitre_contents_876_object_modified_2023-03-27T17:14:02.866Z" "objects_0_x_mitre_contents_877_object_ref_relationship--5dc4eaca-ff82-412a-a8dd-168de1857d8c" "objects_0_x_mitre_contents_877_object_modified_2023-03-27T18:49:16.069Z" "objects_0_x_mitre_contents_878_object_ref_relationship--5dd9e0aa-e4dc-4776-9580-5a765c2cc08d" "objects_0_x_mitre_contents_878_object_modified_2023-03-27T17:14:41.449Z" "objects_0_x_mitre_contents_879_object_ref_relationship--5de0caa8-81f8-453c-b70c-a74e7ea9e5c2" "objects_0_x_mitre_contents_879_object_modified_2022-03-30T19:12:31.481Z" "objects_0_x_mitre_contents_880_object_ref_relationship--5e360913-4986-4423-8d3c-46d3202b7787" "objects_0_x_mitre_contents_880_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_881_object_ref_relationship--5e74f4f8-5057-42f4-9796-aee60122cf6d" "objects_0_x_mitre_contents_881_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_882_object_ref_relationship--5e95ca90-bf75-4031-a28f-f8565c02185c" "objects_0_x_mitre_contents_882_object_modified_2023-04-05T17:23:49.569Z" "objects_0_x_mitre_contents_883_object_ref_relationship--5ec3fcbb-d2ac-44ba-a2d4-99e7ddacf3a2" "objects_0_x_mitre_contents_883_object_modified_2023-08-08T17:05:08.407Z" "objects_0_x_mitre_contents_884_object_ref_relationship--6001f77a-da30-4ebc-85fd-5bf9afe5f0a1" "objects_0_x_mitre_contents_884_object_modified_2023-08-08T15:26:59.132Z" "objects_0_x_mitre_contents_885_object_ref_relationship--603df08f-22d3-4418-9151-4b3a3c9c7c24" "objects_0_x_mitre_contents_885_object_modified_2023-08-10T21:03:10.023Z" "objects_0_x_mitre_contents_886_object_ref_relationship--605d95a1-0493-418e-9d81-de58531c4421" "objects_0_x_mitre_contents_886_object_modified_2023-04-05T20:04:31.136Z" "objects_0_x_mitre_contents_887_object_ref_relationship--60782df8-1e96-48eb-a6b7-843c94b32b59" "objects_0_x_mitre_contents_887_object_modified_2023-03-29T21:33:52.290Z" "objects_0_x_mitre_contents_888_object_ref_relationship--6086e1e2-1b39-4ff2-910e-4a4eb86d57b7" "objects_0_x_mitre_contents_888_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_889_object_ref_relationship--609ec9f8-f702-444b-b837-72a0880d429b" "objects_0_x_mitre_contents_889_object_modified_2023-09-22T19:17:01.704Z" "objects_0_x_mitre_contents_890_object_ref_relationship--60ad088f-3133-4b0c-a441-e1e06fff1765" "objects_0_x_mitre_contents_890_object_modified_2023-03-29T21:34:29.147Z" "objects_0_x_mitre_contents_891_object_ref_relationship--60db521a-ae2d-4a9a-8c6d-47a5528f1ecb" "objects_0_x_mitre_contents_891_object_modified_2020-01-27T17:05:58.308Z" "objects_0_x_mitre_contents_892_object_ref_relationship--60e2ebd0-90dc-4131-ba4f-adc9b49ec113" "objects_0_x_mitre_contents_892_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_893_object_ref_relationship--60ecd154-e907-419a-b41d-1a9a1f59e7c3" "objects_0_x_mitre_contents_893_object_modified_2023-04-05T20:36:27.557Z" "objects_0_x_mitre_contents_894_object_ref_relationship--61071d73-fcdf-4820-afd0-e3f0983e0a71" "objects_0_x_mitre_contents_894_object_modified_2023-04-05T17:01:46.513Z" "objects_0_x_mitre_contents_895_object_ref_relationship--61550ef4-41f0-4354-af5c-f47db8aca654" "objects_0_x_mitre_contents_895_object_modified_2020-06-02T14:32:31.910Z" "objects_0_x_mitre_contents_896_object_ref_relationship--6176a297-3097-42e2-b1c2-815e7fd8c81c" "objects_0_x_mitre_contents_896_object_modified_2020-01-21T15:29:27.041Z" "objects_0_x_mitre_contents_897_object_ref_relationship--6209cccd-2877-4941-ac0c-bec3ba7a5544" "objects_0_x_mitre_contents_897_object_modified_2022-04-05T19:40:25.071Z" "objects_0_x_mitre_contents_898_object_ref_relationship--62623afc-8222-4d59-b5d0-7bc1ccc7fadc" "objects_0_x_mitre_contents_898_object_modified_2023-03-29T21:35:04.072Z" "objects_0_x_mitre_contents_899_object_ref_relationship--626d4c6c-97e4-4aa3-922b-c1a81e677213" "objects_0_x_mitre_contents_899_object_modified_2023-08-07T17:18:06.656Z" "objects_0_x_mitre_contents_900_object_ref_relationship--628435f7-7d1e-40f1-a29a-7c5861b14c7d" "objects_0_x_mitre_contents_900_object_modified_2022-03-30T20:13:40.625Z" "objects_0_x_mitre_contents_901_object_ref_relationship--6294e276-e4ac-4097-a5cd-3b81e0d4498f" "objects_0_x_mitre_contents_901_object_modified_2020-12-14T15:02:35.290Z" "objects_0_x_mitre_contents_902_object_ref_relationship--62cc60d9-1581-4a0f-b7e2-a18d386511e6" "objects_0_x_mitre_contents_902_object_modified_2022-03-30T13:48:43.977Z" "objects_0_x_mitre_contents_903_object_ref_relationship--6315b6ec-35f8-4b28-8603-664664311a33" "objects_0_x_mitre_contents_903_object_modified_2023-08-16T16:44:53.770Z" "objects_0_x_mitre_contents_904_object_ref_relationship--634071ce-d386-4143-8e6e-b88bc077de6d" "objects_0_x_mitre_contents_904_object_modified_2020-08-10T22:18:20.782Z" "objects_0_x_mitre_contents_905_object_ref_relationship--638f3d4b-f1d4-4c61-91a0-7c125ef8437a" "objects_0_x_mitre_contents_905_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_906_object_ref_relationship--63e67cba-4eae-4495-8897-2610103a0c41" "objects_0_x_mitre_contents_906_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_907_object_ref_relationship--642a2599-a50c-480c-8e07-2a3a217f4a46" "objects_0_x_mitre_contents_907_object_modified_2023-07-21T19:52:13.807Z" "objects_0_x_mitre_contents_908_object_ref_relationship--64489abc-5c2f-4620-833d-9ac010040955" "objects_0_x_mitre_contents_908_object_modified_2023-08-14T16:19:54.684Z" "objects_0_x_mitre_contents_909_object_ref_relationship--644a19d3-c94f-40d9-87ac-02ef20b14eda" "objects_0_x_mitre_contents_909_object_modified_2023-03-27T17:16:28.481Z" "objects_0_x_mitre_contents_910_object_ref_relationship--64ddcf35-dbf0-4b9f-bf07-1e0bde8bbe65" "objects_0_x_mitre_contents_910_object_modified_2021-04-19T17:05:42.574Z" "objects_0_x_mitre_contents_911_object_ref_relationship--6556536c-d5ea-4a3d-ae48-4016d4d762ff" "objects_0_x_mitre_contents_911_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_912_object_ref_relationship--657f1d8c-3982-4ee5-95dc-c8ec3164cb2e" "objects_0_x_mitre_contents_912_object_modified_2020-07-15T20:20:59.382Z" "objects_0_x_mitre_contents_913_object_ref_relationship--65803bfa-7601-44ad-95ea-64d8bfd778a4" "objects_0_x_mitre_contents_913_object_modified_2020-04-08T15:51:25.157Z" "objects_0_x_mitre_contents_914_object_ref_relationship--6588186c-2fa1-408d-bef4-2d63ccf49c28" "objects_0_x_mitre_contents_914_object_modified_2023-10-10T15:33:58.533Z" "objects_0_x_mitre_contents_915_object_ref_relationship--6588914f-d270-47d3-b889-046564ad616f" "objects_0_x_mitre_contents_915_object_modified_2023-08-16T16:35:21.853Z" "objects_0_x_mitre_contents_916_object_ref_relationship--65a24b75-4bb0-441a-8cb2-a34077b13f61" "objects_0_x_mitre_contents_916_object_modified_2020-03-26T20:50:07.154Z" "objects_0_x_mitre_contents_917_object_ref_relationship--65acbbe2-48e1-4fba-a781-39fb040a711d" "objects_0_x_mitre_contents_917_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_918_object_ref_relationship--65dc7cc1-e047-4087-8b2b-7d0d0f67576a" "objects_0_x_mitre_contents_918_object_modified_2023-08-16T16:34:14.088Z" "objects_0_x_mitre_contents_919_object_ref_relationship--6603a556-9732-4f8b-ac9c-5c3949b251ed" "objects_0_x_mitre_contents_919_object_modified_2023-09-21T22:25:08.129Z" "objects_0_x_mitre_contents_920_object_ref_relationship--6609b892-d388-4b8a-ac21-5cbf12e0d574" "objects_0_x_mitre_contents_920_object_modified_2023-10-10T15:33:58.701Z" "objects_0_x_mitre_contents_921_object_ref_relationship--66132260-65d1-4bf5-8200-abdb2014be6f" "objects_0_x_mitre_contents_921_object_modified_2023-04-05T20:51:12.881Z" "objects_0_x_mitre_contents_922_object_ref_relationship--6661823b-4fdd-4879-ad5d-64c9a4b12519" "objects_0_x_mitre_contents_922_object_modified_2022-04-05T17:03:53.457Z" "objects_0_x_mitre_contents_923_object_ref_relationship--66ba3094-7c14-41b9-b7c1-814d026156b9" "objects_0_x_mitre_contents_923_object_modified_2020-09-11T15:58:40.846Z" "objects_0_x_mitre_contents_924_object_ref_relationship--66c7fdcf-b9ef-429e-81b2-e97e971cfb42" "objects_0_x_mitre_contents_924_object_modified_2020-11-10T17:08:35.593Z" "objects_0_x_mitre_contents_925_object_ref_relationship--66fb8a34-9d48-4599-a56e-19b057380030" "objects_0_x_mitre_contents_925_object_modified_2023-08-08T15:04:38.833Z" "objects_0_x_mitre_contents_926_object_ref_relationship--670a0995-a789-4674-9e91-c74316cdef90" "objects_0_x_mitre_contents_926_object_modified_2020-09-11T14:54:16.621Z" "objects_0_x_mitre_contents_927_object_ref_relationship--67aa692c-24e4-483e-996e-02ce1e861ec8" "objects_0_x_mitre_contents_927_object_modified_2023-03-31T22:09:02.129Z" "objects_0_x_mitre_contents_928_object_ref_relationship--67c2b73d-cd51-4894-a7bd-fdd5d14b33a2" "objects_0_x_mitre_contents_928_object_modified_2022-04-15T17:18:58.074Z" "objects_0_x_mitre_contents_929_object_ref_relationship--67db22d4-6f89-40c6-b31b-737c1e3dec3f" "objects_0_x_mitre_contents_929_object_modified_2023-04-05T17:17:07.374Z" "objects_0_x_mitre_contents_930_object_ref_relationship--681161b2-4e30-4d49-8524-6cc0d94585cb" "objects_0_x_mitre_contents_930_object_modified_2023-08-14T16:34:55.830Z" "objects_0_x_mitre_contents_931_object_ref_relationship--681d5e61-9412-4c58-bef1-c6ef7bffcb0c" "objects_0_x_mitre_contents_931_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_932_object_ref_relationship--6846dc09-b66a-42d3-aea2-c80b51f22952" "objects_0_x_mitre_contents_932_object_modified_2023-02-28T21:42:31.008Z" "objects_0_x_mitre_contents_933_object_ref_relationship--684c17bb-2075-4e1f-9fcb-17408511222d" "objects_0_x_mitre_contents_933_object_modified_2021-09-20T13:54:19.957Z" "objects_0_x_mitre_contents_934_object_ref_relationship--6885280e-5423-422a-94f1-e91d557e043e" "objects_0_x_mitre_contents_934_object_modified_2022-04-15T15:10:16.607Z" "objects_0_x_mitre_contents_935_object_ref_relationship--68c17e9b-1fda-49dd-982b-566d473cc32b" "objects_0_x_mitre_contents_935_object_modified_2022-04-06T15:51:11.939Z" "objects_0_x_mitre_contents_936_object_ref_relationship--68e5789c-9f60-421e-9c79-fae207a29e83" "objects_0_x_mitre_contents_936_object_modified_2023-04-05T20:27:20.839Z" "objects_0_x_mitre_contents_937_object_ref_relationship--6920d0d0-27f4-4d29-8622-c8a92090eec3" "objects_0_x_mitre_contents_937_object_modified_2023-04-05T17:54:25.851Z" "objects_0_x_mitre_contents_938_object_ref_relationship--6935752c-e400-4dfa-863f-1d44a8f6dd50" "objects_0_x_mitre_contents_938_object_modified_2021-09-20T13:50:02.036Z" "objects_0_x_mitre_contents_939_object_ref_relationship--694857ba-92e8-462e-8900-a9f6fdcf495d" "objects_0_x_mitre_contents_939_object_modified_2020-12-31T18:25:05.133Z" "objects_0_x_mitre_contents_940_object_ref_relationship--6961eec4-8e31-4be1-88d9-dca682e38b8c" "objects_0_x_mitre_contents_940_object_modified_2022-05-20T17:13:16.507Z" "objects_0_x_mitre_contents_941_object_ref_relationship--69718f1d-7761-41ae-b9d0-12c45f6b4ac4" "objects_0_x_mitre_contents_941_object_modified_2023-04-05T17:33:51.882Z" "objects_0_x_mitre_contents_942_object_ref_relationship--697f5584-667f-4489-a535-586dd1a8b48c" "objects_0_x_mitre_contents_942_object_modified_2023-10-10T15:33:59.823Z" "objects_0_x_mitre_contents_943_object_ref_relationship--69bb264a-3f44-4132-9248-dd80a9f5efa2" "objects_0_x_mitre_contents_943_object_modified_2023-04-05T21:17:53.923Z" "objects_0_x_mitre_contents_944_object_ref_relationship--69de3f7e-faa7-4342-b755-4777a68fd89b" "objects_0_x_mitre_contents_944_object_modified_2022-05-20T17:13:16.508Z" "objects_0_x_mitre_contents_945_object_ref_relationship--6a1d8b2f-9007-46ba-b559-356b81632cee" "objects_0_x_mitre_contents_945_object_modified_2023-10-10T15:33:58.444Z" "objects_0_x_mitre_contents_946_object_ref_relationship--6a4fd7bd-b73b-403b-aff9-8be6bc0afc7b" "objects_0_x_mitre_contents_946_object_modified_2020-09-14T14:13:45.259Z" "objects_0_x_mitre_contents_947_object_ref_relationship--6a5926f3-8c44-4806-83c2-e8ed0be36bc2" "objects_0_x_mitre_contents_947_object_modified_2022-04-01T15:13:55.124Z" "objects_0_x_mitre_contents_948_object_ref_relationship--6a5f151f-36cb-496a-9d0c-d726f1b00d4e" "objects_0_x_mitre_contents_948_object_modified_2023-08-08T15:21:42.253Z" "objects_0_x_mitre_contents_949_object_ref_relationship--6a715733-cde6-4903-b967-35562b584c6f" "objects_0_x_mitre_contents_949_object_modified_2020-06-02T14:32:31.878Z" "objects_0_x_mitre_contents_950_object_ref_relationship--6a813057-5fe0-46b5-89a3-c804d223568c" "objects_0_x_mitre_contents_950_object_modified_2023-09-26T12:54:10.319Z" "objects_0_x_mitre_contents_951_object_ref_relationship--6a821e14-8247-408b-af37-9cecbba616ec" "objects_0_x_mitre_contents_951_object_modified_2020-05-07T15:33:32.945Z" "objects_0_x_mitre_contents_952_object_ref_relationship--6ac2d9a5-248b-42c5-af71-3ffad7bc7f3e" "objects_0_x_mitre_contents_952_object_modified_2023-09-22T19:39:19.069Z" "objects_0_x_mitre_contents_953_object_ref_relationship--6ad4f199-99fe-4366-87be-7a462f6c89b0" "objects_0_x_mitre_contents_953_object_modified_2023-09-22T20:48:41.487Z" "objects_0_x_mitre_contents_954_object_ref_relationship--6b41d649-bcd0-4427-baa1-15a145bace6e" "objects_0_x_mitre_contents_954_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_955_object_ref_relationship--6b64d3f4-96d6-48e5-a57e-b5cf897670f9" "objects_0_x_mitre_contents_955_object_modified_2023-04-05T20:27:33.948Z" "objects_0_x_mitre_contents_956_object_ref_relationship--6b74d347-4d28-401f-9ac2-b3e1c9428bab" "objects_0_x_mitre_contents_956_object_modified_2023-03-27T17:54:10.458Z" "objects_0_x_mitre_contents_957_object_ref_relationship--6ba09d73-4ed5-4a37-8191-fc54a8f01696" "objects_0_x_mitre_contents_957_object_modified_2022-03-28T19:38:23.190Z" "objects_0_x_mitre_contents_958_object_ref_relationship--6bb4de7d-1ef9-4bc8-8d34-62e176d4188a" "objects_0_x_mitre_contents_958_object_modified_2023-03-27T17:17:24.417Z" "objects_0_x_mitre_contents_959_object_ref_relationship--6c0105f3-e919-499d-b080-d127394d2837" "objects_0_x_mitre_contents_959_object_modified_2022-03-30T18:14:23.210Z" "objects_0_x_mitre_contents_960_object_ref_relationship--6c35f99c-153d-4023-a29a-821488ce5418" "objects_0_x_mitre_contents_960_object_modified_2020-04-08T15:41:19.383Z" "objects_0_x_mitre_contents_961_object_ref_relationship--6c859d6b-28b1-409d-90ea-d4eba64edf82" "objects_0_x_mitre_contents_961_object_modified_2020-09-11T16:22:03.301Z" "objects_0_x_mitre_contents_962_object_ref_relationship--6c887e1b-ff9a-4d7f-baec-7d19e1c982bd" "objects_0_x_mitre_contents_962_object_modified_2023-08-07T22:48:30.275Z" "objects_0_x_mitre_contents_963_object_ref_relationship--6ca3e3d9-2db9-4bed-98a0-417ff1e6a78e" "objects_0_x_mitre_contents_963_object_modified_2021-05-24T13:16:56.443Z" "objects_0_x_mitre_contents_964_object_ref_relationship--6cace9e3-f095-4914-bddc-24cec8bcc859" "objects_0_x_mitre_contents_964_object_modified_2020-09-24T15:34:51.276Z" "objects_0_x_mitre_contents_965_object_ref_relationship--6ce36374-2ff6-4b41-8493-148416153232" "objects_0_x_mitre_contents_965_object_modified_2020-08-10T21:57:54.526Z" "objects_0_x_mitre_contents_966_object_ref_relationship--6d2c7743-fc75-4524-b217-13867ca1dd10" "objects_0_x_mitre_contents_966_object_modified_2023-04-05T17:32:04.659Z" "objects_0_x_mitre_contents_967_object_ref_relationship--6d659130-545b-4917-891c-6c1b7d54ed07" "objects_0_x_mitre_contents_967_object_modified_2021-01-05T20:16:20.505Z" "objects_0_x_mitre_contents_968_object_ref_relationship--6d88242f-e45b-481c-bd41-b66a662618ce" "objects_0_x_mitre_contents_968_object_modified_2022-04-06T13:57:24.730Z" "objects_0_x_mitre_contents_969_object_ref_relationship--6d910b1c-df72-4fcb-9d9e-0bb666c9c108" "objects_0_x_mitre_contents_969_object_modified_2023-08-14T20:53:47.270Z" "objects_0_x_mitre_contents_970_object_ref_relationship--6de29595-e63e-4d7e-992f-b4622b7b8e23" "objects_0_x_mitre_contents_970_object_modified_2020-09-11T14:54:16.566Z" "objects_0_x_mitre_contents_971_object_ref_relationship--6e811d89-6526-480f-be40-1ad6483182ff" "objects_0_x_mitre_contents_971_object_modified_2023-10-10T15:33:58.801Z" "objects_0_x_mitre_contents_972_object_ref_relationship--6ee69225-7c42-49e6-bfe4-c7009c82e76a" "objects_0_x_mitre_contents_972_object_modified_2023-08-09T15:56:10.432Z" "objects_0_x_mitre_contents_973_object_ref_relationship--6f240b1d-de8f-465d-a0f1-f75e828493c3" "objects_0_x_mitre_contents_973_object_modified_2023-09-22T20:42:54.574Z" "objects_0_x_mitre_contents_974_object_ref_relationship--6f27a13d-b353-47f3-8a71-a13e8c4c3d60" "objects_0_x_mitre_contents_974_object_modified_2021-04-19T17:11:50.418Z" "objects_0_x_mitre_contents_975_object_ref_relationship--6f30b02b-5d88-453d-af1e-305a75bfaf87" "objects_0_x_mitre_contents_975_object_modified_2020-06-26T15:12:40.098Z" "objects_0_x_mitre_contents_976_object_ref_relationship--6f63395f-a826-45e2-8d3b-dccd6375f54d" "objects_0_x_mitre_contents_976_object_modified_2023-04-05T17:39:29.860Z" "objects_0_x_mitre_contents_977_object_ref_relationship--6f9f892e-56ec-480b-aa40-337f20f2bb9c" "objects_0_x_mitre_contents_977_object_modified_2020-11-10T17:08:35.624Z" "objects_0_x_mitre_contents_978_object_ref_relationship--6faacfdd-d17d-4c6e-a33e-5fdea2cc3998" "objects_0_x_mitre_contents_978_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_979_object_ref_relationship--7017085c-c612-48b2-b655-e18d7822d0e7" "objects_0_x_mitre_contents_979_object_modified_2023-04-05T17:39:48.895Z" "objects_0_x_mitre_contents_980_object_ref_relationship--70367e5c-15e0-4bcd-b538-7a90c4eefd30" "objects_0_x_mitre_contents_980_object_modified_2023-04-05T21:26:35.443Z" "objects_0_x_mitre_contents_981_object_ref_relationship--706c698c-aa8d-4fac-a6c1-2e047c3f965c" "objects_0_x_mitre_contents_981_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_982_object_ref_relationship--70ec9e67-b755-41ee-a1db-71d250a90b4e" "objects_0_x_mitre_contents_982_object_modified_2020-01-14T17:47:08.826Z" "objects_0_x_mitre_contents_983_object_ref_relationship--70f8cbed-b20d-4ff2-ad02-8d78e7d49159" "objects_0_x_mitre_contents_983_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_984_object_ref_relationship--70fa8498-6117-4e15-ae3c-f53d63996826" "objects_0_x_mitre_contents_984_object_modified_2020-06-26T15:32:25.050Z" "objects_0_x_mitre_contents_985_object_ref_relationship--71490fdb-e271-4a67-b932-5288924b1dae" "objects_0_x_mitre_contents_985_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_986_object_ref_relationship--716f68ee-1e77-4254-8f67-d8f3c71db678" "objects_0_x_mitre_contents_986_object_modified_2021-09-20T13:59:00.498Z" "objects_0_x_mitre_contents_987_object_ref_relationship--718a612e-50c5-40ab-9081-b88cefeafcb6" "objects_0_x_mitre_contents_987_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_988_object_ref_relationship--721cc30c-74cf-4eed-89a8-7a8e63e6c0e1" "objects_0_x_mitre_contents_988_object_modified_2023-04-05T20:27:47.788Z" "objects_0_x_mitre_contents_989_object_ref_relationship--724e1b64-7c9b-4a8f-a2ab-3f9cab539e68" "objects_0_x_mitre_contents_989_object_modified_2023-10-10T19:19:38.654Z" "objects_0_x_mitre_contents_990_object_ref_relationship--7258542e-029b-45b9-be69-6e76d9c93b35" "objects_0_x_mitre_contents_990_object_modified_2023-04-05T20:43:03.565Z" "objects_0_x_mitre_contents_991_object_ref_relationship--7260c8fe-6b3b-48a2-889f-f329fb5b4ef0" "objects_0_x_mitre_contents_991_object_modified_2022-03-30T20:25:46.994Z" "objects_0_x_mitre_contents_992_object_ref_relationship--72a5350f-f0cf-4f44-82d5-28a25492c6af" "objects_0_x_mitre_contents_992_object_modified_2020-04-24T17:55:55.049Z" "objects_0_x_mitre_contents_993_object_ref_relationship--72a88d43-4144-444e-8f71-ac0d19ae3710" "objects_0_x_mitre_contents_993_object_modified_2020-09-14T14:13:45.256Z" "objects_0_x_mitre_contents_994_object_ref_relationship--73410b22-5aca-4b86-8efc-98c1ad75399a" "objects_0_x_mitre_contents_994_object_modified_2023-10-10T15:33:59.572Z" "objects_0_x_mitre_contents_995_object_ref_relationship--734fa2bf-17af-4e54-8d83-4cf9759e4ba9" "objects_0_x_mitre_contents_995_object_modified_2020-09-11T15:52:12.520Z" "objects_0_x_mitre_contents_996_object_ref_relationship--73d22490-4043-42d7-ad25-74e4a642bf6a" "objects_0_x_mitre_contents_996_object_modified_2023-08-15T15:06:03.429Z" "objects_0_x_mitre_contents_997_object_ref_relationship--73d78f2c-dd3b-469c-a622-e2e89cb521d3" "objects_0_x_mitre_contents_997_object_modified_2022-03-28T19:20:30.375Z" "objects_0_x_mitre_contents_998_object_ref_relationship--74080f4f-1de2-464f-8ec1-0635fc142273" "objects_0_x_mitre_contents_998_object_modified_2023-08-08T16:23:41.141Z" "objects_0_x_mitre_contents_999_object_ref_relationship--740ea19e-d248-44e5-a0e5-3e9420df9dc8" "objects_0_x_mitre_contents_999_object_modified_2020-04-24T17:46:31.613Z" "objects_0_x_mitre_contents_1000_object_ref_relationship--746eaf98-bd95-4e9a-a4ed-0e3f20402276" "objects_0_x_mitre_contents_1000_object_modified_2023-10-10T15:33:57.989Z" "objects_0_x_mitre_contents_1001_object_ref_relationship--749dcdbd-9be9-403b-850f-8ee5452b7aed" "objects_0_x_mitre_contents_1001_object_modified_2023-08-08T16:30:21.044Z" "objects_0_x_mitre_contents_1002_object_ref_relationship--74a137c7-b3f8-421f-bc52-bf9f0785d0ba" "objects_0_x_mitre_contents_1002_object_modified_2023-09-22T19:15:56.498Z" "objects_0_x_mitre_contents_1003_object_ref_relationship--74c3c88c-956b-4bc7-9ea2-585e7366fe69" "objects_0_x_mitre_contents_1003_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1004_object_ref_relationship--74c8c9e7-cd8b-4f3a-830d-a7e6e9668330" "objects_0_x_mitre_contents_1004_object_modified_2022-04-01T15:01:53.321Z" "objects_0_x_mitre_contents_1005_object_ref_relationship--74eb8469-1cce-40f8-8b6b-486338e8cfbe" "objects_0_x_mitre_contents_1005_object_modified_2020-07-15T20:20:59.282Z" "objects_0_x_mitre_contents_1006_object_ref_relationship--75400f2e-8a9a-4bc6-a40b-f860b38868b6" "objects_0_x_mitre_contents_1006_object_modified_2023-08-10T21:08:37.537Z" "objects_0_x_mitre_contents_1007_object_ref_relationship--75472bf8-c7fd-4fc7-a11e-74189bc23b78" "objects_0_x_mitre_contents_1007_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1008_object_ref_relationship--75770898-93a7-45e3-bdb2-03172004a88f" "objects_0_x_mitre_contents_1008_object_modified_2022-03-30T14:49:47.451Z" "objects_0_x_mitre_contents_1009_object_ref_relationship--75989cf6-c023-4ed3-9d23-a83f55690186" "objects_0_x_mitre_contents_1009_object_modified_2023-02-28T21:43:36.886Z" "objects_0_x_mitre_contents_1010_object_ref_relationship--759a2e09-32b6-4857-9b6d-adf5dcee142b" "objects_0_x_mitre_contents_1010_object_modified_2020-12-14T15:02:35.286Z" "objects_0_x_mitre_contents_1011_object_ref_relationship--75a8614f-bf92-455d-b2ef-7085aff9a64d" "objects_0_x_mitre_contents_1011_object_modified_2023-09-15T19:16:57.874Z" "objects_0_x_mitre_contents_1012_object_ref_relationship--75ed2348-279f-4485-97a3-9a5ada27d799" "objects_0_x_mitre_contents_1012_object_modified_2023-02-06T19:06:17.406Z" "objects_0_x_mitre_contents_1013_object_ref_relationship--760037f0-f027-41bb-adf8-1ced6c7085be" "objects_0_x_mitre_contents_1013_object_modified_2023-10-10T15:33:59.225Z" "objects_0_x_mitre_contents_1014_object_ref_relationship--760faa7b-06cb-48b7-9103-1c52f2ca408f" "objects_0_x_mitre_contents_1014_object_modified_2020-11-10T17:08:35.644Z" "objects_0_x_mitre_contents_1015_object_ref_relationship--764ba23e-9902-4a60-8ec3-e0ae1abf92ce" "objects_0_x_mitre_contents_1015_object_modified_2023-09-22T19:16:35.609Z" "objects_0_x_mitre_contents_1016_object_ref_relationship--7657a4d4-1ba3-4b66-83f7-6db5eab14847" "objects_0_x_mitre_contents_1016_object_modified_2022-04-06T13:30:03.527Z" "objects_0_x_mitre_contents_1017_object_ref_relationship--7696b512-ba2f-4310-86e1-7c528529fc5e" "objects_0_x_mitre_contents_1017_object_modified_2020-09-15T15:18:12.425Z" "objects_0_x_mitre_contents_1018_object_ref_relationship--76cc66f4-ce85-4873-a63e-879b4a14a540" "objects_0_x_mitre_contents_1018_object_modified_2023-03-03T16:23:20.764Z" "objects_0_x_mitre_contents_1019_object_ref_relationship--76f852f3-f218-40e2-8fa1-6fb15c4cbf98" "objects_0_x_mitre_contents_1019_object_modified_2023-10-10T15:33:59.661Z" "objects_0_x_mitre_contents_1020_object_ref_relationship--7793a066-d72b-4a60-9579-e16369ea7185" "objects_0_x_mitre_contents_1020_object_modified_2023-08-10T22:22:25.132Z" "objects_0_x_mitre_contents_1021_object_ref_relationship--77efa84c-5ef0-4554-b774-2dbfcca74087" "objects_0_x_mitre_contents_1021_object_modified_2020-10-29T19:20:58.116Z" "objects_0_x_mitre_contents_1022_object_ref_relationship--7825f4b1-75ca-4377-b8f6-0dda9311d889" "objects_0_x_mitre_contents_1022_object_modified_2023-08-04T18:30:58.116Z" "objects_0_x_mitre_contents_1023_object_ref_relationship--78417fce-5aaa-4ad3-a2f1-279fa18bfe45" "objects_0_x_mitre_contents_1023_object_modified_2023-02-06T19:47:26.528Z" "objects_0_x_mitre_contents_1024_object_ref_relationship--7850d933-120b-4ae6-998d-8dc4dfd6d164" "objects_0_x_mitre_contents_1024_object_modified_2020-01-27T17:49:05.664Z" "objects_0_x_mitre_contents_1025_object_ref_relationship--789699c2-44f1-4280-bf86-ab23e6a13e84" "objects_0_x_mitre_contents_1025_object_modified_2023-04-05T20:18:51.813Z" "objects_0_x_mitre_contents_1026_object_ref_relationship--789cb76e-27b0-4762-a2f7-3ff32ce0762d" "objects_0_x_mitre_contents_1026_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1027_object_ref_relationship--789dd0f9-527c-49b3-93b7-851ce4961f0f" "objects_0_x_mitre_contents_1027_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1028_object_ref_relationship--78cc0d6d-6347-45a4-a18c-ca76150aa7a9" "objects_0_x_mitre_contents_1028_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1029_object_ref_relationship--78fc4506-5c80-4638-8f51-44a2e28f7aaf" "objects_0_x_mitre_contents_1029_object_modified_2020-09-11T15:43:49.309Z" "objects_0_x_mitre_contents_1030_object_ref_relationship--794c3cb4-1a1f-4d7e-969f-c97dfcd006c7" "objects_0_x_mitre_contents_1030_object_modified_2023-04-05T17:22:27.554Z" "objects_0_x_mitre_contents_1031_object_ref_relationship--7965128c-89d6-411e-b765-c60e0cae96c6" "objects_0_x_mitre_contents_1031_object_modified_2023-03-29T21:36:23.084Z" "objects_0_x_mitre_contents_1032_object_ref_relationship--79c3fe5d-585b-401a-8bb4-84bfdc7252a1" "objects_0_x_mitre_contents_1032_object_modified_2022-04-06T13:52:46.831Z" "objects_0_x_mitre_contents_1033_object_ref_relationship--79ef0025-3e1c-4914-9873-19808c2a5bec" "objects_0_x_mitre_contents_1033_object_modified_2023-02-28T21:44:22.373Z" "objects_0_x_mitre_contents_1034_object_ref_relationship--79f04c05-8299-4e5e-b4c1-3f82637fa47a" "objects_0_x_mitre_contents_1034_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_1035_object_ref_relationship--7a50961b-9be4-4042-a6a0-878b612c520e" "objects_0_x_mitre_contents_1035_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1036_object_ref_relationship--7a8e1611-1a7e-45a0-b518-6efd744fce4f" "objects_0_x_mitre_contents_1036_object_modified_2020-12-24T22:04:28.002Z" "objects_0_x_mitre_contents_1037_object_ref_relationship--7accde36-cb29-43c6-8c66-6486efd867a8" "objects_0_x_mitre_contents_1037_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1038_object_ref_relationship--7af7d094-3a49-4e5e-99d0-385c79f95f06" "objects_0_x_mitre_contents_1038_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1039_object_ref_relationship--7b1477bc-8fd0-45ce-8eaa-b3b307f18024" "objects_0_x_mitre_contents_1039_object_modified_2023-04-05T21:28:11.000Z" "objects_0_x_mitre_contents_1040_object_ref_relationship--7b3fa5cb-bd70-47e0-acfb-7db99e29e70f" "objects_0_x_mitre_contents_1040_object_modified_2022-04-01T18:49:19.284Z" "objects_0_x_mitre_contents_1041_object_ref_relationship--7b45e72f-5741-4942-aa28-ee7abb6f7046" "objects_0_x_mitre_contents_1041_object_modified_2022-04-05T17:14:35.469Z" "objects_0_x_mitre_contents_1042_object_ref_relationship--7b611c76-0ea1-49c5-9b9a-2e504a0bbe14" "objects_0_x_mitre_contents_1042_object_modified_2023-04-05T20:53:04.417Z" "objects_0_x_mitre_contents_1043_object_ref_relationship--7b679dbf-4e31-4d0b-9e13-eb8c3b98b7fb" "objects_0_x_mitre_contents_1043_object_modified_2022-04-01T15:21:13.296Z" "objects_0_x_mitre_contents_1044_object_ref_relationship--7b8c3ae2-7e52-4f1d-ad30-788b367a7531" "objects_0_x_mitre_contents_1044_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1045_object_ref_relationship--7ba30703-c3aa-425a-9482-9e9941fd7038" "objects_0_x_mitre_contents_1045_object_modified_2020-12-24T21:45:56.961Z" "objects_0_x_mitre_contents_1046_object_ref_relationship--7ba4fb2e-99ff-41ff-8b07-f02e9f74e890" "objects_0_x_mitre_contents_1046_object_modified_2023-03-27T17:58:45.439Z" "objects_0_x_mitre_contents_1047_object_ref_relationship--7baa3cab-c4f8-4b91-a6c3-189ad7a6416c" "objects_0_x_mitre_contents_1047_object_modified_2023-04-05T17:34:08.372Z" "objects_0_x_mitre_contents_1048_object_ref_relationship--7bbbd2aa-104f-443a-907e-6e1fbcf0a73e" "objects_0_x_mitre_contents_1048_object_modified_2023-07-21T19:34:29.630Z" "objects_0_x_mitre_contents_1049_object_ref_relationship--7bc6460d-b36e-41ed-baa0-82d54ec19e57" "objects_0_x_mitre_contents_1049_object_modified_2023-08-04T18:58:58.480Z" "objects_0_x_mitre_contents_1050_object_ref_relationship--7bf2e05e-496f-49d1-8a37-48cc3ff8d6cc" "objects_0_x_mitre_contents_1050_object_modified_2023-04-05T17:17:41.320Z" "objects_0_x_mitre_contents_1051_object_ref_relationship--7c4a4766-cb63-4a3c-85ef-a1dba3be4a47" "objects_0_x_mitre_contents_1051_object_modified_2023-06-09T19:19:56.840Z" "objects_0_x_mitre_contents_1052_object_ref_relationship--7c6207c7-d738-4a17-8380-595c86574b64" "objects_0_x_mitre_contents_1052_object_modified_2020-09-11T16:22:03.298Z" "objects_0_x_mitre_contents_1053_object_ref_relationship--7cae8c80-c603-4352-a704-f3a2f4aa4a56" "objects_0_x_mitre_contents_1053_object_modified_2022-04-15T17:39:08.123Z" "objects_0_x_mitre_contents_1054_object_ref_relationship--7d2f869d-a117-4b1f-a783-c6d3fc002562" "objects_0_x_mitre_contents_1054_object_modified_2023-07-21T19:38:52.085Z" "objects_0_x_mitre_contents_1055_object_ref_relationship--7d481598-ece7-469c-b231-619a804c25e5" "objects_0_x_mitre_contents_1055_object_modified_2023-04-05T17:34:25.318Z" "objects_0_x_mitre_contents_1056_object_ref_relationship--7d6bba99-ea81-42bc-b02a-e5e98b34a688" "objects_0_x_mitre_contents_1056_object_modified_2023-04-05T17:19:44.427Z" "objects_0_x_mitre_contents_1057_object_ref_relationship--7db33293-6971-4c0d-88e0-18f505ebd943" "objects_0_x_mitre_contents_1057_object_modified_2022-04-05T20:11:51.188Z" "objects_0_x_mitre_contents_1058_object_ref_relationship--7de1af68-d893-40a0-b27a-c9010f5cdc62" "objects_0_x_mitre_contents_1058_object_modified_2023-08-09T14:49:51.309Z" "objects_0_x_mitre_contents_1059_object_ref_relationship--7ded1b79-cf7c-435d-b6ed-2c8872f9393f" "objects_0_x_mitre_contents_1059_object_modified_2020-12-24T22:04:28.005Z" "objects_0_x_mitre_contents_1060_object_ref_relationship--7defdb15-65d1-40ca-a9da-5c0484892484" "objects_0_x_mitre_contents_1060_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1061_object_ref_relationship--7e00d3ac-a97a-4db0-9699-7474d81413a8" "objects_0_x_mitre_contents_1061_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1062_object_ref_relationship--7e2d9773-1320-4c8f-a595-2b92bf0fd8ed" "objects_0_x_mitre_contents_1062_object_modified_2023-04-05T17:55:00.294Z" "objects_0_x_mitre_contents_1063_object_ref_relationship--7e8956e3-7d90-412d-a82f-d61e43239923" "objects_0_x_mitre_contents_1063_object_modified_2023-08-14T16:21:32.437Z" "objects_0_x_mitre_contents_1064_object_ref_relationship--7ec3ee9a-6710-46ed-aecb-c0f2a64739ad" "objects_0_x_mitre_contents_1064_object_modified_2020-11-20T16:37:28.429Z" "objects_0_x_mitre_contents_1065_object_ref_relationship--7ee49e53-e75d-4e65-a71f-79919ebb08f4" "objects_0_x_mitre_contents_1065_object_modified_2020-04-08T18:55:29.238Z" "objects_0_x_mitre_contents_1066_object_ref_relationship--7ef9f4cf-863b-4bc4-bdaf-55055263c030" "objects_0_x_mitre_contents_1066_object_modified_2022-03-30T20:42:04.251Z" "objects_0_x_mitre_contents_1067_object_ref_relationship--7f4e1ac1-145e-4983-b735-7f70003893aa" "objects_0_x_mitre_contents_1067_object_modified_2023-08-04T18:29:35.223Z" "objects_0_x_mitre_contents_1068_object_ref_relationship--7fcfc36b-bebc-481f-b9af-b65008b045ec" "objects_0_x_mitre_contents_1068_object_modified_2022-04-19T15:46:20.166Z" "objects_0_x_mitre_contents_1069_object_ref_relationship--7fe8ab9f-b207-4c39-ab5c-e929a1c949f9" "objects_0_x_mitre_contents_1069_object_modified_2022-04-19T15:47:32.152Z" "objects_0_x_mitre_contents_1070_object_ref_relationship--806a9338-be20-4eef-aa54-067633ac0e58" "objects_0_x_mitre_contents_1070_object_modified_2020-04-08T15:41:19.421Z" "objects_0_x_mitre_contents_1071_object_ref_relationship--80778a1e-715d-477b-87fa-e92181b31659" "objects_0_x_mitre_contents_1071_object_modified_2023-04-05T17:15:22.472Z" "objects_0_x_mitre_contents_1072_object_ref_relationship--80ac52f9-ffa4-4b6e-b420-95d1b69ae9d9" "objects_0_x_mitre_contents_1072_object_modified_2021-01-05T20:16:20.502Z" "objects_0_x_mitre_contents_1073_object_ref_relationship--812490b8-2160-47e9-9e1e-c1749b7ee86d" "objects_0_x_mitre_contents_1073_object_modified_2023-10-10T19:13:17.011Z" "objects_0_x_mitre_contents_1074_object_ref_relationship--81722aad-f503-4a74-91d5-1843adf8a995" "objects_0_x_mitre_contents_1074_object_modified_2023-08-16T16:36:04.747Z" "objects_0_x_mitre_contents_1075_object_ref_relationship--818b8c2b-bd23-4a83-9970-d42063608699" "objects_0_x_mitre_contents_1075_object_modified_2023-04-05T19:49:04.950Z" "objects_0_x_mitre_contents_1076_object_ref_relationship--81db3270-4cb8-4982-8ff8-c28a874e8421" "objects_0_x_mitre_contents_1076_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1077_object_ref_relationship--81dbe111-0f02-49a1-9bba-42a31e6bb416" "objects_0_x_mitre_contents_1077_object_modified_2023-08-08T22:33:23.699Z" "objects_0_x_mitre_contents_1078_object_ref_relationship--81e1311e-4fe1-4177-ae12-1d50037c5e4f" "objects_0_x_mitre_contents_1078_object_modified_2022-04-20T16:40:05.898Z" "objects_0_x_mitre_contents_1079_object_ref_relationship--81fb62ac-ba04-48d2-8817-52d0652f61a0" "objects_0_x_mitre_contents_1079_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1080_object_ref_relationship--8244700e-6f96-463a-a9c3-810c489a2c60" "objects_0_x_mitre_contents_1080_object_modified_2023-08-08T14:54:57.884Z" "objects_0_x_mitre_contents_1081_object_ref_relationship--82555171-8b78-40f3-84d9-058359ae808a" "objects_0_x_mitre_contents_1081_object_modified_2020-09-24T15:34:51.244Z" "objects_0_x_mitre_contents_1082_object_ref_relationship--825ffecc-090f-44c8-87be-f7b72e07f987" "objects_0_x_mitre_contents_1082_object_modified_2022-04-01T18:43:15.716Z" "objects_0_x_mitre_contents_1083_object_ref_relationship--828417ec-c444-41c8-95b4-c339c5ecf62b" "objects_0_x_mitre_contents_1083_object_modified_2022-03-30T20:48:00.360Z" "objects_0_x_mitre_contents_1084_object_ref_relationship--82a51cc3-7a91-43b0-9147-df5983e52b41" "objects_0_x_mitre_contents_1084_object_modified_2023-04-05T20:08:11.798Z" "objects_0_x_mitre_contents_1085_object_ref_relationship--82b58c75-239e-4dac-b848-bc1f3354adc4" "objects_0_x_mitre_contents_1085_object_modified_2023-08-07T22:14:04.455Z" "objects_0_x_mitre_contents_1086_object_ref_relationship--82e93a9e-6968-497f-8043-a08d0f35bd32" "objects_0_x_mitre_contents_1086_object_modified_2023-10-10T15:33:57.378Z" "objects_0_x_mitre_contents_1087_object_ref_relationship--82f12052-783e-40e4-8079-d9c030c310fd" "objects_0_x_mitre_contents_1087_object_modified_2022-03-30T20:08:40.223Z" "objects_0_x_mitre_contents_1088_object_ref_relationship--82f51cc6-6ce4-459e-b598-7b2b77983469" "objects_0_x_mitre_contents_1088_object_modified_2023-04-05T20:28:18.530Z" "objects_0_x_mitre_contents_1089_object_ref_relationship--83358774-0857-429c-9f7a-151403e52881" "objects_0_x_mitre_contents_1089_object_modified_2023-10-10T15:33:59.912Z" "objects_0_x_mitre_contents_1090_object_ref_relationship--833b4c44-7370-4b27-b9b2-a058c27dcf8c" "objects_0_x_mitre_contents_1090_object_modified_2023-04-05T20:28:32.568Z" "objects_0_x_mitre_contents_1091_object_ref_relationship--834c9a7e-6520-486d-ba60-c3a8b2f9eb1a" "objects_0_x_mitre_contents_1091_object_modified_2023-04-05T20:28:46.820Z" "objects_0_x_mitre_contents_1092_object_ref_relationship--83991b5c-59b9-4fe5-9ef2-39c6ddc8b835" "objects_0_x_mitre_contents_1092_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1093_object_ref_relationship--83d95d05-7545-4295-894b-f33a2ba1063b" "objects_0_x_mitre_contents_1093_object_modified_2023-04-05T17:47:45.408Z" "objects_0_x_mitre_contents_1094_object_ref_relationship--848581bc-bf8f-40e2-871e-cd67042b4adf" "objects_0_x_mitre_contents_1094_object_modified_2023-03-27T17:59:26.448Z" "objects_0_x_mitre_contents_1095_object_ref_relationship--8499ffce-1045-4a8a-9e09-ec53d535a021" "objects_0_x_mitre_contents_1095_object_modified_2023-10-10T15:33:58.887Z" "objects_0_x_mitre_contents_1096_object_ref_relationship--84dbe7c6-421b-4bfb-b022-6c585c2e50c4" "objects_0_x_mitre_contents_1096_object_modified_2023-10-10T15:33:59.401Z" "objects_0_x_mitre_contents_1097_object_ref_relationship--8570b7ef-a84d-480e-b1ca-b15f15d12103" "objects_0_x_mitre_contents_1097_object_modified_2023-04-05T16:58:27.974Z" "objects_0_x_mitre_contents_1098_object_ref_relationship--85c7e956-3ce5-4495-b52e-385ae2ee4f9b" "objects_0_x_mitre_contents_1098_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1099_object_ref_relationship--85e0d8c5-b9d6-4a10-963a-aeb54eba4f02" "objects_0_x_mitre_contents_1099_object_modified_2023-04-05T20:10:26.480Z" "objects_0_x_mitre_contents_1100_object_ref_relationship--8611661c-04b4-4a82-9669-2d0e26b7b3f3" "objects_0_x_mitre_contents_1100_object_modified_2023-04-05T20:53:17.865Z" "objects_0_x_mitre_contents_1101_object_ref_relationship--86170d29-0e41-44d0-94b0-de7d23718302" "objects_0_x_mitre_contents_1101_object_modified_2022-04-05T19:51:47.956Z" "objects_0_x_mitre_contents_1102_object_ref_relationship--8634a732-1c5e-4931-a24f-cdcc2f81c788" "objects_0_x_mitre_contents_1102_object_modified_2023-04-05T17:20:05.166Z" "objects_0_x_mitre_contents_1103_object_ref_relationship--8650e2e8-d8bd-472d-8b9b-54befbea05b8" "objects_0_x_mitre_contents_1103_object_modified_2022-04-05T19:49:59.027Z" "objects_0_x_mitre_contents_1104_object_ref_relationship--867b4929-20f2-47cd-9ab3-43a5a6ea98b5" "objects_0_x_mitre_contents_1104_object_modified_2023-08-04T19:11:52.875Z" "objects_0_x_mitre_contents_1105_object_ref_relationship--86afe8cc-6d6d-4952-8fee-619e95d53a7f" "objects_0_x_mitre_contents_1105_object_modified_2022-04-06T13:39:39.883Z" "objects_0_x_mitre_contents_1106_object_ref_relationship--86e3c37c-1e4a-450c-850b-c80be8156fe3" "objects_0_x_mitre_contents_1106_object_modified_2020-05-04T15:40:21.081Z" "objects_0_x_mitre_contents_1107_object_ref_relationship--8726b157-3575-450f-bb7f-f17bb18e6aef" "objects_0_x_mitre_contents_1107_object_modified_2022-03-30T20:41:43.314Z" "objects_0_x_mitre_contents_1108_object_ref_relationship--873b98de-d7cf-471b-9aa2-229eb03c9165" "objects_0_x_mitre_contents_1108_object_modified_2020-09-15T15:18:12.459Z" "objects_0_x_mitre_contents_1109_object_ref_relationship--875dc21d-92c3-45bf-be37-faa44f4449bf" "objects_0_x_mitre_contents_1109_object_modified_2023-04-05T19:51:44.262Z" "objects_0_x_mitre_contents_1110_object_ref_relationship--876fc8ee-aeae-4d4b-b4ce-541b432e5298" "objects_0_x_mitre_contents_1110_object_modified_2023-04-05T18:06:30.456Z" "objects_0_x_mitre_contents_1111_object_ref_relationship--886849fc-f83c-4d69-b700-bfad0def765d" "objects_0_x_mitre_contents_1111_object_modified_2023-08-10T22:12:27.186Z" "objects_0_x_mitre_contents_1112_object_ref_relationship--8870c211-820a-46a1-96fc-02f4e6eaec03" "objects_0_x_mitre_contents_1112_object_modified_2021-04-19T15:40:36.387Z" "objects_0_x_mitre_contents_1113_object_ref_relationship--88de8869-2b01-4702-8518-e4e78fde44d9" "objects_0_x_mitre_contents_1113_object_modified_2023-07-12T20:45:18.766Z" "objects_0_x_mitre_contents_1114_object_ref_relationship--88ded3fb-759e-4e96-946b-e7148c54856e" "objects_0_x_mitre_contents_1114_object_modified_2022-04-08T16:29:30.371Z" "objects_0_x_mitre_contents_1115_object_ref_relationship--88e33687-e999-42c8-b46b-49d2adfa17d0" "objects_0_x_mitre_contents_1115_object_modified_2022-04-01T15:02:04.528Z" "objects_0_x_mitre_contents_1116_object_ref_relationship--88ea5004-8bdb-4af4-a2dc-a8c56236ff03" "objects_0_x_mitre_contents_1116_object_modified_2020-12-17T20:15:22.449Z" "objects_0_x_mitre_contents_1117_object_ref_relationship--891edea2-817c-4eeb-9991-b6e095c269a8" "objects_0_x_mitre_contents_1117_object_modified_2023-04-05T17:40:06.957Z" "objects_0_x_mitre_contents_1118_object_ref_relationship--8936c564-b11a-4c9e-a32a-76e7d7e0c8b0" "objects_0_x_mitre_contents_1118_object_modified_2020-04-24T15:12:11.185Z" "objects_0_x_mitre_contents_1119_object_ref_relationship--89565753-23c4-422d-a9ba-39f4101cd819" "objects_0_x_mitre_contents_1119_object_modified_2020-11-20T16:37:28.485Z" "objects_0_x_mitre_contents_1120_object_ref_relationship--89d0de37-87ba-4aa8-832a-a2305e658a7d" "objects_0_x_mitre_contents_1120_object_modified_2023-08-14T16:44:32.659Z" "objects_0_x_mitre_contents_1121_object_ref_relationship--8a255d63-a770-4b9d-911c-bd906733ceef" "objects_0_x_mitre_contents_1121_object_modified_2023-03-27T18:05:42.846Z" "objects_0_x_mitre_contents_1122_object_ref_relationship--8a55c28d-9cdd-4b6f-91e7-bcb3b05f6724" "objects_0_x_mitre_contents_1122_object_modified_2022-04-01T15:02:21.344Z" "objects_0_x_mitre_contents_1123_object_ref_relationship--8a89f675-4e43-4fe1-8bbd-8e49e07d11be" "objects_0_x_mitre_contents_1123_object_modified_2023-07-21T19:35:34.846Z" "objects_0_x_mitre_contents_1124_object_ref_relationship--8a961514-3372-4c3e-b7ee-e3d053c3d5f3" "objects_0_x_mitre_contents_1124_object_modified_2020-09-11T14:54:16.615Z" "objects_0_x_mitre_contents_1125_object_ref_relationship--8b27a786-b4d9-4014-a249-3725442f9f1d" "objects_0_x_mitre_contents_1125_object_modified_2021-01-05T20:16:20.499Z" "objects_0_x_mitre_contents_1126_object_ref_relationship--8b2c2716-a62b-4c3a-a211-d72bb5ed29b9" "objects_0_x_mitre_contents_1126_object_modified_2023-04-05T19:52:05.260Z" "objects_0_x_mitre_contents_1127_object_ref_relationship--8b3e74ad-7cc4-4ed2-84d2-c745e6997711" "objects_0_x_mitre_contents_1127_object_modified_2023-03-27T18:04:59.445Z" "objects_0_x_mitre_contents_1128_object_ref_relationship--8b66543e-2ea1-4ff7-84d9-f8f431f53781" "objects_0_x_mitre_contents_1128_object_modified_2020-04-24T15:06:33.503Z" "objects_0_x_mitre_contents_1129_object_ref_relationship--8b8a9c44-c8a4-4f30-a3d8-a23310f6c090" "objects_0_x_mitre_contents_1129_object_modified_2023-08-08T16:43:56.718Z" "objects_0_x_mitre_contents_1130_object_ref_relationship--8bc0abc2-a413-4c05-b2b8-2a92d9cc5556" "objects_0_x_mitre_contents_1130_object_modified_2023-04-05T20:44:31.870Z" "objects_0_x_mitre_contents_1131_object_ref_relationship--8bc21e5d-b6bb-4c93-9419-19a12061de52" "objects_0_x_mitre_contents_1131_object_modified_2023-03-29T21:19:25.438Z" "objects_0_x_mitre_contents_1132_object_ref_relationship--8bcc9da8-c390-4151-b72d-30604820673e" "objects_0_x_mitre_contents_1132_object_modified_2023-08-04T19:05:04.644Z" "objects_0_x_mitre_contents_1133_object_ref_relationship--8c034c66-18ad-4b30-9f17-ed574c10918f" "objects_0_x_mitre_contents_1133_object_modified_2023-08-10T22:08:44.242Z" "objects_0_x_mitre_contents_1134_object_ref_relationship--8c3296f6-3520-4d1b-8b57-bdd48a5aac91" "objects_0_x_mitre_contents_1134_object_modified_2023-04-05T17:48:00.045Z" "objects_0_x_mitre_contents_1135_object_ref_relationship--8c50e9e7-e13c-4814-98d0-088d73b10005" "objects_0_x_mitre_contents_1135_object_modified_2023-03-03T16:21:24.531Z" "objects_0_x_mitre_contents_1136_object_ref_relationship--8c656539-aa1e-42db-9016-d38f1daaae16" "objects_0_x_mitre_contents_1136_object_modified_2023-03-27T18:06:05.822Z" "objects_0_x_mitre_contents_1137_object_ref_relationship--8c7598a6-6046-491d-99a7-52c31974a9a9" "objects_0_x_mitre_contents_1137_object_modified_2023-08-08T15:36:24.934Z" "objects_0_x_mitre_contents_1138_object_ref_relationship--8c8ce536-d9b5-4dfc-93f1-84c4f222b49e" "objects_0_x_mitre_contents_1138_object_modified_2021-01-05T20:16:20.512Z" "objects_0_x_mitre_contents_1139_object_ref_relationship--8c9dbc53-27d2-420c-b698-98c23a7ead2b" "objects_0_x_mitre_contents_1139_object_modified_2023-04-05T20:36:55.810Z" "objects_0_x_mitre_contents_1140_object_ref_relationship--8cb42e3d-69f4-4b0d-98c9-0bb7560947c1" "objects_0_x_mitre_contents_1140_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1141_object_ref_relationship--8d027310-93a0-4046-b7ad-d1f461f30838" "objects_0_x_mitre_contents_1141_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1142_object_ref_relationship--8d3ca04e-867f-4274-bc61-f18c0282a0a9" "objects_0_x_mitre_contents_1142_object_modified_2023-09-26T12:53:15.952Z" "objects_0_x_mitre_contents_1143_object_ref_relationship--8d71e646-74d1-4d62-8989-2ad4ddf7a67b" "objects_0_x_mitre_contents_1143_object_modified_2023-03-30T15:13:44.210Z" "objects_0_x_mitre_contents_1144_object_ref_relationship--8d72c224-0cf5-4b9b-a98a-76ee3a406803" "objects_0_x_mitre_contents_1144_object_modified_2023-03-27T17:20:37.796Z" "objects_0_x_mitre_contents_1145_object_ref_relationship--8e67f2e0-65da-4d27-9d41-e2f9a174331b" "objects_0_x_mitre_contents_1145_object_modified_2023-10-10T15:33:58.186Z" "objects_0_x_mitre_contents_1146_object_ref_relationship--8e6b9c1e-5e28-4519-95c3-6b4a836661de" "objects_0_x_mitre_contents_1146_object_modified_2023-03-27T18:07:34.581Z" "objects_0_x_mitre_contents_1147_object_ref_relationship--8ea39534-6fe9-404c-94b7-0f320af95404" "objects_0_x_mitre_contents_1147_object_modified_2022-04-01T15:17:21.511Z" "objects_0_x_mitre_contents_1148_object_ref_relationship--8ec03f4c-5ed8-4c25-956c-3ee6c777a5cc" "objects_0_x_mitre_contents_1148_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1149_object_ref_relationship--8ed14c81-0b30-4bfc-8552-439aa0e920c3" "objects_0_x_mitre_contents_1149_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1150_object_ref_relationship--8f142643-0448-4b04-8260-8e4e62ad80bb" "objects_0_x_mitre_contents_1150_object_modified_2023-09-26T12:54:48.541Z" "objects_0_x_mitre_contents_1151_object_ref_relationship--8f22a4ce-f075-4343-acb0-1d45c56e91e8" "objects_0_x_mitre_contents_1151_object_modified_2022-03-30T18:06:21.355Z" "objects_0_x_mitre_contents_1152_object_ref_relationship--8f2929a9-cd25-4e07-b402-447da68aaa56" "objects_0_x_mitre_contents_1152_object_modified_2023-04-05T20:10:43.246Z" "objects_0_x_mitre_contents_1153_object_ref_relationship--8f2ff9c5-249d-4a9a-bdc6-0cef887eaefc" "objects_0_x_mitre_contents_1153_object_modified_2020-07-15T20:20:59.298Z" "objects_0_x_mitre_contents_1154_object_ref_relationship--8f4c7030-f3e2-4c7d-b5b1-dc6815055c68" "objects_0_x_mitre_contents_1154_object_modified_2023-08-04T19:07:51.438Z" "objects_0_x_mitre_contents_1155_object_ref_relationship--8f52e1ab-284e-4d0c-bae1-3a8544a22f57" "objects_0_x_mitre_contents_1155_object_modified_2023-04-05T17:22:41.797Z" "objects_0_x_mitre_contents_1156_object_ref_relationship--8f72a070-cfcb-4d75-ace6-b4427f3ba8d3" "objects_0_x_mitre_contents_1156_object_modified_2023-04-05T17:18:13.761Z" "objects_0_x_mitre_contents_1157_object_ref_relationship--8f88d438-3150-4317-b1fe-b14f13c15ac5" "objects_0_x_mitre_contents_1157_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1158_object_ref_relationship--8fd05d96-552d-4ef9-98e3-ea70dc84f6a9" "objects_0_x_mitre_contents_1158_object_modified_2022-03-30T14:26:02.359Z" "objects_0_x_mitre_contents_1159_object_ref_relationship--8ff45341-60d6-40d3-bb38-566814a466f9" "objects_0_x_mitre_contents_1159_object_modified_2023-04-05T20:51:31.121Z" "objects_0_x_mitre_contents_1160_object_ref_relationship--901492b5-b074-4631-ad6e-4178caa4164a" "objects_0_x_mitre_contents_1160_object_modified_2020-12-24T22:04:28.017Z" "objects_0_x_mitre_contents_1161_object_ref_relationship--907db911-b39c-4230-b6ad-a0ba5ef6926a" "objects_0_x_mitre_contents_1161_object_modified_2023-09-28T17:39:24.890Z" "objects_0_x_mitre_contents_1162_object_ref_relationship--90d4d964-efa2-46ac-adc2-759886e07158" "objects_0_x_mitre_contents_1162_object_modified_2023-04-05T20:11:02.157Z" "objects_0_x_mitre_contents_1163_object_ref_relationship--90d58c65-acb9-4d7b-89b9-f4b35593c861" "objects_0_x_mitre_contents_1163_object_modified_2023-04-05T17:06:46.369Z" "objects_0_x_mitre_contents_1164_object_ref_relationship--910009da-65c0-4e6a-aeb2-386c643d1c0e" "objects_0_x_mitre_contents_1164_object_modified_2023-04-05T17:24:53.701Z" "objects_0_x_mitre_contents_1165_object_ref_relationship--91831379-b0da-4019-a7bb-17e53cda9d0b" "objects_0_x_mitre_contents_1165_object_modified_2020-12-31T18:25:05.131Z" "objects_0_x_mitre_contents_1166_object_ref_relationship--919a13bc-74be-4660-af63-454abee92635" "objects_0_x_mitre_contents_1166_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1167_object_ref_relationship--91a4924f-2519-4662-91f2-b7ef715a459f" "objects_0_x_mitre_contents_1167_object_modified_2023-08-08T17:10:20.748Z" "objects_0_x_mitre_contents_1168_object_ref_relationship--91de92af-fe1d-469e-8c36-1a9f4b621a27" "objects_0_x_mitre_contents_1168_object_modified_2020-08-10T21:57:54.704Z" "objects_0_x_mitre_contents_1169_object_ref_relationship--92129d5b-7822-4e84-8a69-f96b598fba9e" "objects_0_x_mitre_contents_1169_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1170_object_ref_relationship--92879f0e-d1db-4407-9cc6-c1dbcc47caea" "objects_0_x_mitre_contents_1170_object_modified_2022-03-30T20:07:50.094Z" "objects_0_x_mitre_contents_1171_object_ref_relationship--92c9106d-a71b-4a4f-a9d4-ef692a0294eb" "objects_0_x_mitre_contents_1171_object_modified_2020-06-26T14:55:13.261Z" "objects_0_x_mitre_contents_1172_object_ref_relationship--93395e61-0d3e-4ea6-9c1b-08d4a04005a0" "objects_0_x_mitre_contents_1172_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1173_object_ref_relationship--935fd3e3-dd47-4c43-bdd8-1668af26395f" "objects_0_x_mitre_contents_1173_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1174_object_ref_relationship--9366529d-fba9-4ef6-b4ee-b6b41aa3b18c" "objects_0_x_mitre_contents_1174_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1175_object_ref_relationship--9373912a-affa-4a3c-ad97-1b8311e228ee" "objects_0_x_mitre_contents_1175_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1176_object_ref_relationship--9398bf9d-be77-4ac2-acea-893152cafd16" "objects_0_x_mitre_contents_1176_object_modified_2022-03-30T14:43:46.034Z" "objects_0_x_mitre_contents_1177_object_ref_relationship--93b2474b-0ba6-469e-a4e8-d17a41d0d016" "objects_0_x_mitre_contents_1177_object_modified_2023-04-05T21:28:29.839Z" "objects_0_x_mitre_contents_1178_object_ref_relationship--93b6bf37-5614-4317-8ed7-42f098152c40" "objects_0_x_mitre_contents_1178_object_modified_2023-03-31T22:10:38.672Z" "objects_0_x_mitre_contents_1179_object_ref_relationship--93c20f43-6684-471c-910f-d9577f289677" "objects_0_x_mitre_contents_1179_object_modified_2022-04-19T15:47:05.436Z" "objects_0_x_mitre_contents_1180_object_ref_relationship--94040d2e-3f60-423c-8a93-a83b61cafe7d" "objects_0_x_mitre_contents_1180_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1181_object_ref_relationship--9432fabf-9487-469c-86c9-b9d26b013c85" "objects_0_x_mitre_contents_1181_object_modified_2022-04-01T13:13:10.587Z" "objects_0_x_mitre_contents_1182_object_ref_relationship--945db15a-b356-4e05-a6a0-9b24ca9aa348" "objects_0_x_mitre_contents_1182_object_modified_2023-04-05T20:40:15.440Z" "objects_0_x_mitre_contents_1183_object_ref_relationship--947e2398-4565-4ae0-8cc2-fb0ef5f9c73f" "objects_0_x_mitre_contents_1183_object_modified_2023-04-05T21:21:03.081Z" "objects_0_x_mitre_contents_1184_object_ref_relationship--94bf07c4-3bf0-4ecc-8043-644e59fb9ec4" "objects_0_x_mitre_contents_1184_object_modified_2022-03-28T19:30:27.364Z" "objects_0_x_mitre_contents_1185_object_ref_relationship--94e111fa-81d1-4882-ae73-4d6ad6367b9f" "objects_0_x_mitre_contents_1185_object_modified_2022-03-28T19:25:38.355Z" "objects_0_x_mitre_contents_1186_object_ref_relationship--950e1476-83ca-4e81-b542-c91a19b206d7" "objects_0_x_mitre_contents_1186_object_modified_2020-04-24T17:46:31.466Z" "objects_0_x_mitre_contents_1187_object_ref_relationship--95bf4e8b-f388-48a0-b236-c2077252e71e" "objects_0_x_mitre_contents_1187_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1188_object_ref_relationship--95fec5e4-d48a-471f-8223-711cd32659b8" "objects_0_x_mitre_contents_1188_object_modified_2022-04-01T18:49:51.050Z" "objects_0_x_mitre_contents_1189_object_ref_relationship--96298aed-9e9f-4836-b29b-04c88e79e53e" "objects_0_x_mitre_contents_1189_object_modified_2022-04-01T18:42:37.987Z" "objects_0_x_mitre_contents_1190_object_ref_relationship--9634001c-575b-47aa-acd2-c3b1e900bd0b" "objects_0_x_mitre_contents_1190_object_modified_2020-12-17T20:15:22.397Z" "objects_0_x_mitre_contents_1191_object_ref_relationship--96490f73-d8ef-4c6b-9a3a-3c66fc963306" "objects_0_x_mitre_contents_1191_object_modified_2020-05-07T15:33:32.778Z" "objects_0_x_mitre_contents_1192_object_ref_relationship--96569099-db95-4f3c-8ded-6d9cf023e55e" "objects_0_x_mitre_contents_1192_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1193_object_ref_relationship--96ec33c8-78b6-421f-bab3-bd9d0564db31" "objects_0_x_mitre_contents_1193_object_modified_2022-09-30T18:39:16.003Z" "objects_0_x_mitre_contents_1194_object_ref_relationship--97158eda-5092-4939-8b5c-1ef5ab918089" "objects_0_x_mitre_contents_1194_object_modified_2020-04-24T15:12:11.189Z" "objects_0_x_mitre_contents_1195_object_ref_relationship--972f0703-f4d7-42d2-8ca2-bec175dac0bf" "objects_0_x_mitre_contents_1195_object_modified_2020-09-11T14:54:16.617Z" "objects_0_x_mitre_contents_1196_object_ref_relationship--97408547-bacd-4308-a8be-556e9ff04951" "objects_0_x_mitre_contents_1196_object_modified_2023-08-09T16:43:16.137Z" "objects_0_x_mitre_contents_1197_object_ref_relationship--97417113-1840-4e00-98d3-bb222e1a1f60" "objects_0_x_mitre_contents_1197_object_modified_2020-08-10T22:18:20.815Z" "objects_0_x_mitre_contents_1198_object_ref_relationship--97738857-d496-4d39-9809-1921e0ad10b7" "objects_0_x_mitre_contents_1198_object_modified_2020-12-31T18:25:05.125Z" "objects_0_x_mitre_contents_1199_object_ref_relationship--980430c1-6173-440e-b75e-c1cdb4c41560" "objects_0_x_mitre_contents_1199_object_modified_2023-09-28T17:40:16.985Z" "objects_0_x_mitre_contents_1200_object_ref_relationship--980c49f8-d991-4e1f-8feb-6173e3dfca1f" "objects_0_x_mitre_contents_1200_object_modified_2023-04-05T20:29:18.098Z" "objects_0_x_mitre_contents_1201_object_ref_relationship--9814ecd5-911a-4776-9dc0-4a4ae0bf6a39" "objects_0_x_mitre_contents_1201_object_modified_2020-04-08T15:41:19.364Z" "objects_0_x_mitre_contents_1202_object_ref_relationship--9819974c-f093-482b-8b2b-93a05ab7382e" "objects_0_x_mitre_contents_1202_object_modified_2023-08-04T18:31:48.507Z" "objects_0_x_mitre_contents_1203_object_ref_relationship--9858ae0b-140b-4dd2-8ba9-1ef22183dec3" "objects_0_x_mitre_contents_1203_object_modified_2022-04-15T17:35:26.197Z" "objects_0_x_mitre_contents_1204_object_ref_relationship--98a4a746-e7bf-494c-9ee3-584403d76d3e" "objects_0_x_mitre_contents_1204_object_modified_2023-03-31T22:12:45.147Z" "objects_0_x_mitre_contents_1205_object_ref_relationship--98ae9cb2-1141-48c6-81fd-f16adb430031" "objects_0_x_mitre_contents_1205_object_modified_2023-03-27T18:07:52.850Z" "objects_0_x_mitre_contents_1206_object_ref_relationship--98b14660-79e1-4244-99c2-3dedd84eb68d" "objects_0_x_mitre_contents_1206_object_modified_2020-09-11T14:54:16.582Z" "objects_0_x_mitre_contents_1207_object_ref_relationship--98dec4bf-6753-4d7a-8983-d4fd6d1d892a" "objects_0_x_mitre_contents_1207_object_modified_2023-04-05T19:52:20.309Z" "objects_0_x_mitre_contents_1208_object_ref_relationship--98fb2884-c912-42ff-9c87-4fbabfa70115" "objects_0_x_mitre_contents_1208_object_modified_2023-08-08T16:14:01.661Z" "objects_0_x_mitre_contents_1209_object_ref_relationship--991ef2f2-c196-4d5d-bd29-504ea25831f4" "objects_0_x_mitre_contents_1209_object_modified_2021-10-01T14:42:48.815Z" "objects_0_x_mitre_contents_1210_object_ref_relationship--9951d8c0-d210-4776-808b-421b613f244f" "objects_0_x_mitre_contents_1210_object_modified_2023-04-05T16:55:41.638Z" "objects_0_x_mitre_contents_1211_object_ref_relationship--99b4be95-74f2-48f7-b4e9-8b4d88ecd31f" "objects_0_x_mitre_contents_1211_object_modified_2023-04-05T21:21:19.617Z" "objects_0_x_mitre_contents_1212_object_ref_relationship--9a575420-cdce-4a9f-9ea9-2ae5c469cad9" "objects_0_x_mitre_contents_1212_object_modified_2023-09-30T22:22:13.142Z" "objects_0_x_mitre_contents_1213_object_ref_relationship--9b34ae1e-027f-4b52-9a4f-1e58f6efdc25" "objects_0_x_mitre_contents_1213_object_modified_2023-09-22T20:48:05.605Z" "objects_0_x_mitre_contents_1214_object_ref_relationship--9b56528f-cf04-4d81-80ee-7bacb862383a" "objects_0_x_mitre_contents_1214_object_modified_2023-08-14T20:52:56.065Z" "objects_0_x_mitre_contents_1215_object_ref_relationship--9b8b51fb-c380-4516-b109-821f015506d4" "objects_0_x_mitre_contents_1215_object_modified_2023-08-10T22:16:28.207Z" "objects_0_x_mitre_contents_1216_object_ref_relationship--9bbfa759-5555-4048-a79d-fed27a1efd93" "objects_0_x_mitre_contents_1216_object_modified_2023-06-09T19:14:21.299Z" "objects_0_x_mitre_contents_1217_object_ref_relationship--9c284d41-21ef-4009-bb47-3ae09b08f38d" "objects_0_x_mitre_contents_1217_object_modified_2022-04-01T17:06:06.950Z" "objects_0_x_mitre_contents_1218_object_ref_relationship--9c302eb1-1810-48a5-b34d-6aae303d2097" "objects_0_x_mitre_contents_1218_object_modified_2022-04-01T15:16:26.387Z" "objects_0_x_mitre_contents_1219_object_ref_relationship--9c7c302a-d5ba-4fc9-a4e5-e865fd7fb708" "objects_0_x_mitre_contents_1219_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1220_object_ref_relationship--9c853c22-7607-4cbd-b114-08aaa4625c35" "objects_0_x_mitre_contents_1220_object_modified_2020-12-28T18:47:52.600Z" "objects_0_x_mitre_contents_1221_object_ref_relationship--9caf7cd5-fa15-45f0-8e1e-75917ea33af2" "objects_0_x_mitre_contents_1221_object_modified_2023-08-09T16:45:40.815Z" "objects_0_x_mitre_contents_1222_object_ref_relationship--9cfc30de-3e68-4361-a213-3c37ce27b70e" "objects_0_x_mitre_contents_1222_object_modified_2023-08-09T14:51:29.206Z" "objects_0_x_mitre_contents_1223_object_ref_relationship--9cfcda7d-bb82-4122-a38b-fec4f5532856" "objects_0_x_mitre_contents_1223_object_modified_2023-04-05T17:03:51.504Z" "objects_0_x_mitre_contents_1224_object_ref_relationship--9d264e84-27b2-4867-82c8-55486a969d7c" "objects_0_x_mitre_contents_1224_object_modified_2020-12-17T20:15:22.489Z" "objects_0_x_mitre_contents_1225_object_ref_relationship--9d2a9348-5d0a-43b0-8776-e9bbddc659c7" "objects_0_x_mitre_contents_1225_object_modified_2023-08-09T15:53:41.268Z" "objects_0_x_mitre_contents_1226_object_ref_relationship--9d4c1d68-3cc8-4cf9-b3ee-1525d0ce32de" "objects_0_x_mitre_contents_1226_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1227_object_ref_relationship--9d621873-6d3c-4660-be9a-57e2e8648236" "objects_0_x_mitre_contents_1227_object_modified_2023-04-05T21:24:29.502Z" "objects_0_x_mitre_contents_1228_object_ref_relationship--9d72c60b-d5d1-4b50-a01f-3882ddb335d9" "objects_0_x_mitre_contents_1228_object_modified_2023-04-05T21:26:48.912Z" "objects_0_x_mitre_contents_1229_object_ref_relationship--9dec6b2f-790a-4da9-86c9-1f4b7141c32c" "objects_0_x_mitre_contents_1229_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1230_object_ref_relationship--9e3921a8-a9e1-48c4-9b61-ff190c104f63" "objects_0_x_mitre_contents_1230_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1231_object_ref_relationship--9e458d77-c856-4b02-82a7-50947b232dc3" "objects_0_x_mitre_contents_1231_object_modified_2021-10-06T15:32:46.533Z" "objects_0_x_mitre_contents_1232_object_ref_relationship--9e66ec3b-cdd6-461c-bd84-e75316818e15" "objects_0_x_mitre_contents_1232_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1233_object_ref_relationship--9e95ef68-0650-49eb-888f-47c211481be9" "objects_0_x_mitre_contents_1233_object_modified_2023-08-09T17:16:36.672Z" "objects_0_x_mitre_contents_1234_object_ref_relationship--9f83d618-a42d-4797-b9fe-030affdbd13f" "objects_0_x_mitre_contents_1234_object_modified_2023-03-27T18:49:35.020Z" "objects_0_x_mitre_contents_1235_object_ref_relationship--9f9a0349-ca95-4bde-8d8d-af524ce19bc7" "objects_0_x_mitre_contents_1235_object_modified_2023-04-05T20:52:33.829Z" "objects_0_x_mitre_contents_1236_object_ref_relationship--9fa03a70-ad00-4148-ae5e-8315f3e618d2" "objects_0_x_mitre_contents_1236_object_modified_2023-04-05T21:29:29.307Z" "objects_0_x_mitre_contents_1237_object_ref_relationship--a011bcc6-b5d8-4923-b533-55abec69ff2f" "objects_0_x_mitre_contents_1237_object_modified_2022-03-30T20:07:33.291Z" "objects_0_x_mitre_contents_1238_object_ref_relationship--a042d55c-b31e-41c1-9cd0-66070ec9a11d" "objects_0_x_mitre_contents_1238_object_modified_2020-10-29T19:21:23.235Z" "objects_0_x_mitre_contents_1239_object_ref_relationship--a0464679-71b6-4ab4-a72d-0428e4d75d5e" "objects_0_x_mitre_contents_1239_object_modified_2022-03-30T13:45:39.184Z" "objects_0_x_mitre_contents_1240_object_ref_relationship--a04ae7d7-1500-49c9-bada-1a75a8670f5c" "objects_0_x_mitre_contents_1240_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1241_object_ref_relationship--a04dfb58-b7d3-4abe-9f4a-fad4f7158965" "objects_0_x_mitre_contents_1241_object_modified_2020-04-08T15:51:25.106Z" "objects_0_x_mitre_contents_1242_object_ref_relationship--a09f8daa-aa02-45f1-8dac-9bea355c9415" "objects_0_x_mitre_contents_1242_object_modified_2020-11-10T17:08:35.819Z" "objects_0_x_mitre_contents_1243_object_ref_relationship--a1023a75-31cc-420a-9c59-b440f7fb27e6" "objects_0_x_mitre_contents_1243_object_modified_2020-01-21T14:20:50.492Z" "objects_0_x_mitre_contents_1244_object_ref_relationship--a111ab3c-97f2-4b17-b291-f141e9b7613f" "objects_0_x_mitre_contents_1244_object_modified_2022-04-01T12:50:48.459Z" "objects_0_x_mitre_contents_1245_object_ref_relationship--a120ac54-32fa-43ad-a826-8325823b656d" "objects_0_x_mitre_contents_1245_object_modified_2023-09-22T19:14:12.741Z" "objects_0_x_mitre_contents_1246_object_ref_relationship--a1814198-1f91-41d4-a413-d55e1a66c8e9" "objects_0_x_mitre_contents_1246_object_modified_2020-08-10T22:00:43.490Z" "objects_0_x_mitre_contents_1247_object_ref_relationship--a186540d-d235-48f1-8757-d0b46f13c6ce" "objects_0_x_mitre_contents_1247_object_modified_2023-09-22T20:42:33.371Z" "objects_0_x_mitre_contents_1248_object_ref_relationship--a1a9db79-4a80-4e65-91bf-72e358d2ce41" "objects_0_x_mitre_contents_1248_object_modified_2023-02-21T18:44:26.569Z" "objects_0_x_mitre_contents_1249_object_ref_relationship--a1c53fcf-a691-4233-a136-0a51d5a3840f" "objects_0_x_mitre_contents_1249_object_modified_2023-04-05T17:11:03.802Z" "objects_0_x_mitre_contents_1250_object_ref_relationship--a1fac829-275a-409a-9060-e7bd7c63057e" "objects_0_x_mitre_contents_1250_object_modified_2020-12-18T20:14:47.375Z" "objects_0_x_mitre_contents_1251_object_ref_relationship--a20493e1-4699-405d-a291-c28aae8ed737" "objects_0_x_mitre_contents_1251_object_modified_2022-04-20T16:33:23.507Z" "objects_0_x_mitre_contents_1252_object_ref_relationship--a20581b4-21fa-4ed9-b056-d139998868e8" "objects_0_x_mitre_contents_1252_object_modified_2023-04-05T19:52:44.819Z" "objects_0_x_mitre_contents_1253_object_ref_relationship--a2323d47-348c-4e3c-9c25-7feb20e2e457" "objects_0_x_mitre_contents_1253_object_modified_2023-04-05T19:53:03.638Z" "objects_0_x_mitre_contents_1254_object_ref_relationship--a2365c91-60f6-4249-af13-6bc2fdb80d52" "objects_0_x_mitre_contents_1254_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1255_object_ref_relationship--a25a0454-d6da-4448-a3c5-33648ee6675a" "objects_0_x_mitre_contents_1255_object_modified_2023-07-21T19:36:50.262Z" "objects_0_x_mitre_contents_1256_object_ref_relationship--a25d58af-dbb3-4025-b91d-898c6adffcb3" "objects_0_x_mitre_contents_1256_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1257_object_ref_relationship--a2803d73-f5bf-4815-bfbf-662c372e1f5a" "objects_0_x_mitre_contents_1257_object_modified_2023-08-09T16:08:37.797Z" "objects_0_x_mitre_contents_1258_object_ref_relationship--a285f343-09c3-49af-9c18-1dccf89e9009" "objects_0_x_mitre_contents_1258_object_modified_2020-11-20T16:37:28.391Z" "objects_0_x_mitre_contents_1259_object_ref_relationship--a28a53e9-7a42-4f81-bced-0efbc3128cbd" "objects_0_x_mitre_contents_1259_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1260_object_ref_relationship--a290a8ca-e650-456c-b33e-03343fe5ea4e" "objects_0_x_mitre_contents_1260_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1261_object_ref_relationship--a299e0a6-cada-4629-a6c6-ed73dc4422aa" "objects_0_x_mitre_contents_1261_object_modified_2020-11-24T17:55:12.903Z" "objects_0_x_mitre_contents_1262_object_ref_relationship--a32db277-593f-4fd1-bdcb-9f677b1a05e1" "objects_0_x_mitre_contents_1262_object_modified_2020-06-26T14:55:13.289Z" "objects_0_x_mitre_contents_1263_object_ref_relationship--a34f3873-3df7-4e93-915c-fc2b4af3444d" "objects_0_x_mitre_contents_1263_object_modified_2022-04-18T19:18:24.378Z" "objects_0_x_mitre_contents_1264_object_ref_relationship--a3a8b2f2-f1aa-49ba-be55-a674f371f209" "objects_0_x_mitre_contents_1264_object_modified_2020-04-24T15:06:33.450Z" "objects_0_x_mitre_contents_1265_object_ref_relationship--a3c4b392-2879-4f31-9431-3398e034851b" "objects_0_x_mitre_contents_1265_object_modified_2022-04-06T13:52:37.470Z" "objects_0_x_mitre_contents_1266_object_ref_relationship--a3c9d5d6-acc5-46e9-9e4f-b078aeac553c" "objects_0_x_mitre_contents_1266_object_modified_2022-04-20T17:56:51.457Z" "objects_0_x_mitre_contents_1267_object_ref_relationship--a3f36e9e-e2f4-4745-a9a3-0d1231db116d" "objects_0_x_mitre_contents_1267_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1268_object_ref_relationship--a427ce33-d1e1-4c38-a024-e44fc00033d3" "objects_0_x_mitre_contents_1268_object_modified_2022-04-20T16:43:23.973Z" "objects_0_x_mitre_contents_1269_object_ref_relationship--a451966b-f826-422b-9505-f564b9988a9c" "objects_0_x_mitre_contents_1269_object_modified_2023-04-05T21:27:39.012Z" "objects_0_x_mitre_contents_1270_object_ref_relationship--a466f8f0-c9da-46d1-80d0-b8654e727526" "objects_0_x_mitre_contents_1270_object_modified_2023-08-04T18:33:37.920Z" "objects_0_x_mitre_contents_1271_object_ref_relationship--a46c3b05-07d5-461c-b1b1-4a81912b79f8" "objects_0_x_mitre_contents_1271_object_modified_2023-03-27T17:21:10.915Z" "objects_0_x_mitre_contents_1272_object_ref_relationship--a501b700-250f-4e9a-a20f-656ae9bf90f9" "objects_0_x_mitre_contents_1272_object_modified_2020-12-24T21:55:56.753Z" "objects_0_x_mitre_contents_1273_object_ref_relationship--a503ca06-7f98-4ab4-a8fc-ff55c3da7f0a" "objects_0_x_mitre_contents_1273_object_modified_2023-04-05T17:48:18.023Z" "objects_0_x_mitre_contents_1274_object_ref_relationship--a54c8c09-c849-4146-a7cc-158887222a6d" "objects_0_x_mitre_contents_1274_object_modified_2023-04-05T17:15:05.454Z" "objects_0_x_mitre_contents_1275_object_ref_relationship--a563fc97-a452-4348-a831-f4fb55c71e35" "objects_0_x_mitre_contents_1275_object_modified_2023-03-03T16:22:45.712Z" "objects_0_x_mitre_contents_1276_object_ref_relationship--a5b37f26-7629-4195-9536-12e349e5843b" "objects_0_x_mitre_contents_1276_object_modified_2023-08-09T14:54:47.199Z" "objects_0_x_mitre_contents_1277_object_ref_relationship--a5b72279-f99e-4f03-8669-04322b40ee6b" "objects_0_x_mitre_contents_1277_object_modified_2020-07-20T13:49:03.710Z" "objects_0_x_mitre_contents_1278_object_ref_relationship--a5dac41f-4a16-44ea-b279-b84c927ce62d" "objects_0_x_mitre_contents_1278_object_modified_2023-04-05T20:11:36.853Z" "objects_0_x_mitre_contents_1279_object_ref_relationship--a5f64f9e-3ed9-442b-a244-9857b926d93b" "objects_0_x_mitre_contents_1279_object_modified_2023-08-08T15:03:56.766Z" "objects_0_x_mitre_contents_1280_object_ref_relationship--a63bafb6-6647-410f-8673-a53ef2dee5e2" "objects_0_x_mitre_contents_1280_object_modified_2023-04-05T20:52:46.975Z" "objects_0_x_mitre_contents_1281_object_ref_relationship--a67c5611-00bc-4e1a-a1be-2512a2bcf072" "objects_0_x_mitre_contents_1281_object_modified_2020-10-22T17:04:15.708Z" "objects_0_x_mitre_contents_1282_object_ref_relationship--a6bb6c55-3b33-4cd4-981b-055551edc4c2" "objects_0_x_mitre_contents_1282_object_modified_2023-03-27T18:55:39.648Z" "objects_0_x_mitre_contents_1283_object_ref_relationship--a7336f2c-8f89-4d54-ac2b-77743afb2943" "objects_0_x_mitre_contents_1283_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1284_object_ref_relationship--a76d731b-484c-442a-b1a3-255d8398aefd" "objects_0_x_mitre_contents_1284_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1285_object_ref_relationship--a772d1fc-e2d1-4553-b93f-12412cdc8360" "objects_0_x_mitre_contents_1285_object_modified_2023-08-14T16:52:18.036Z" "objects_0_x_mitre_contents_1286_object_ref_relationship--a7b276ac-6f07-4d1f-8d24-dc5682acf62d" "objects_0_x_mitre_contents_1286_object_modified_2023-04-05T17:13:36.481Z" "objects_0_x_mitre_contents_1287_object_ref_relationship--a7cc0168-247d-4a6d-b6f4-d5a04f99216c" "objects_0_x_mitre_contents_1287_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_1288_object_ref_relationship--a8079e6a-ef87-4e3b-9f71-cf1ea2360892" "objects_0_x_mitre_contents_1288_object_modified_2023-04-05T19:53:24.312Z" "objects_0_x_mitre_contents_1289_object_ref_relationship--a808c887-b2b8-4b05-9cab-47c918e48d48" "objects_0_x_mitre_contents_1289_object_modified_2020-12-14T15:02:35.257Z" "objects_0_x_mitre_contents_1290_object_ref_relationship--a81431c4-ac34-4b63-9647-eb7c8e529e03" "objects_0_x_mitre_contents_1290_object_modified_2023-04-05T17:14:46.472Z" "objects_0_x_mitre_contents_1291_object_ref_relationship--a82d3cfb-7ef2-4e39-a6e1-3097d7b106f7" "objects_0_x_mitre_contents_1291_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1292_object_ref_relationship--a8565c17-7054-4d3f-bca5-6e17dc931491" "objects_0_x_mitre_contents_1292_object_modified_2023-03-03T16:20:08.033Z" "objects_0_x_mitre_contents_1293_object_ref_relationship--a87fa426-3968-4d3b-8f8d-8e3c3a9c32f5" "objects_0_x_mitre_contents_1293_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1294_object_ref_relationship--a8ac5084-5631-4670-8ac6-6fbe7bdb0a84" "objects_0_x_mitre_contents_1294_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1295_object_ref_relationship--a8bf6bbd-88f0-4725-ba4f-3b9317dca388" "objects_0_x_mitre_contents_1295_object_modified_2022-03-30T20:36:18.656Z" "objects_0_x_mitre_contents_1296_object_ref_relationship--a8c21a71-f3e9-43e9-9212-faf9181e70ce" "objects_0_x_mitre_contents_1296_object_modified_2022-04-01T18:42:50.381Z" "objects_0_x_mitre_contents_1297_object_ref_relationship--a8dd6ed7-910d-4bae-a2a8-19f3f32c915c" "objects_0_x_mitre_contents_1297_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1298_object_ref_relationship--a92a805e-d5f5-4e94-8592-c253e03e4476" "objects_0_x_mitre_contents_1298_object_modified_2022-04-11T19:19:34.658Z" "objects_0_x_mitre_contents_1299_object_ref_relationship--a93ee044-bd5d-48f3-972e-0abab780c35c" "objects_0_x_mitre_contents_1299_object_modified_2023-03-29T21:21:22.070Z" "objects_0_x_mitre_contents_1300_object_ref_relationship--a95fe853-d1d1-47dc-a776-b905daacfe32" "objects_0_x_mitre_contents_1300_object_modified_2023-04-05T20:11:53.609Z" "objects_0_x_mitre_contents_1301_object_ref_relationship--a9689f2c-ad8f-4861-8cad-d78e07fd1530" "objects_0_x_mitre_contents_1301_object_modified_2020-01-27T17:05:58.213Z" "objects_0_x_mitre_contents_1302_object_ref_relationship--a98c127b-8da9-4ea5-980e-d154ea541ec9" "objects_0_x_mitre_contents_1302_object_modified_2023-08-15T15:06:03.429Z" "objects_0_x_mitre_contents_1303_object_ref_relationship--a9e97a14-ea3c-47b1-a865-0a1edea9c81c" "objects_0_x_mitre_contents_1303_object_modified_2021-02-17T20:43:52.410Z" "objects_0_x_mitre_contents_1304_object_ref_relationship--aa1deed1-800c-470b-ac88-eb8013c11ec0" "objects_0_x_mitre_contents_1304_object_modified_2022-04-19T19:42:17.904Z" "objects_0_x_mitre_contents_1305_object_ref_relationship--aa40d01f-0741-4bf2-bacd-75e1f3a77af0" "objects_0_x_mitre_contents_1305_object_modified_2022-04-01T16:52:03.322Z" "objects_0_x_mitre_contents_1306_object_ref_relationship--aa5877fd-ef7d-435e-86af-c427f086b3c5" "objects_0_x_mitre_contents_1306_object_modified_2022-04-01T16:35:38.189Z" "objects_0_x_mitre_contents_1307_object_ref_relationship--aa628e44-ff05-4ac9-bb0b-11c22384a443" "objects_0_x_mitre_contents_1307_object_modified_2022-04-20T17:58:16.567Z" "objects_0_x_mitre_contents_1308_object_ref_relationship--aa8e45c2-4276-451b-b1eb-59c396bf720a" "objects_0_x_mitre_contents_1308_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1309_object_ref_relationship--aaf55dd1-33df-4f02-8025-eaae01f30b33" "objects_0_x_mitre_contents_1309_object_modified_2023-04-05T19:53:38.161Z" "objects_0_x_mitre_contents_1310_object_ref_relationship--ab18ee61-f94a-411c-9893-941714ce713e" "objects_0_x_mitre_contents_1310_object_modified_2023-08-14T16:47:05.294Z" "objects_0_x_mitre_contents_1311_object_ref_relationship--ab67b233-2c3d-4ac2-a3f0-13b6484ea920" "objects_0_x_mitre_contents_1311_object_modified_2022-04-05T19:46:22.326Z" "objects_0_x_mitre_contents_1312_object_ref_relationship--ab7cd212-7faa-46a8-9666-92a67ae7a6b0" "objects_0_x_mitre_contents_1312_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1313_object_ref_relationship--abd2e863-4bd3-4686-b2aa-f8a097a41c99" "objects_0_x_mitre_contents_1313_object_modified_2022-04-01T15:35:28.360Z" "objects_0_x_mitre_contents_1314_object_ref_relationship--abf03652-acd0-4361-8a66-f7e70e8e4376" "objects_0_x_mitre_contents_1314_object_modified_2023-04-05T20:12:12.766Z" "objects_0_x_mitre_contents_1315_object_ref_relationship--abf3b5c8-9ee5-42ff-ba94-2b3a15317783" "objects_0_x_mitre_contents_1315_object_modified_2023-08-09T15:57:46.908Z" "objects_0_x_mitre_contents_1316_object_ref_relationship--ac31f650-4bd2-4bb6-b450-71e66db4888f" "objects_0_x_mitre_contents_1316_object_modified_2022-03-30T19:28:55.980Z" "objects_0_x_mitre_contents_1317_object_ref_relationship--ac415e32-e204-4382-b500-2370cec7a608" "objects_0_x_mitre_contents_1317_object_modified_2023-08-16T16:45:58.547Z" "objects_0_x_mitre_contents_1318_object_ref_relationship--ac53e382-a140-4bbf-a59d-db3fe21acfaa" "objects_0_x_mitre_contents_1318_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_1319_object_ref_relationship--ad0c873b-9e45-44e0-adaf-529921ee7a77" "objects_0_x_mitre_contents_1319_object_modified_2020-06-26T15:32:25.035Z" "objects_0_x_mitre_contents_1320_object_ref_relationship--ad2c8b49-bbfb-47dd-84bb-cd4dbc49a64c" "objects_0_x_mitre_contents_1320_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1321_object_ref_relationship--ad723fb0-7439-407e-9bf5-1cb3fd7df8aa" "objects_0_x_mitre_contents_1321_object_modified_2023-02-06T19:05:28.288Z" "objects_0_x_mitre_contents_1322_object_ref_relationship--ad76b0ad-fa76-4d56-8a6e-8818bbc6509e" "objects_0_x_mitre_contents_1322_object_modified_2022-03-30T18:07:07.306Z" "objects_0_x_mitre_contents_1323_object_ref_relationship--ada67532-039d-4b4f-93ab-82ceba13ec56" "objects_0_x_mitre_contents_1323_object_modified_2023-07-21T19:53:12.605Z" "objects_0_x_mitre_contents_1324_object_ref_relationship--adc9957c-fa57-4e81-9231-b60f01b69859" "objects_0_x_mitre_contents_1324_object_modified_2020-12-24T22:04:28.010Z" "objects_0_x_mitre_contents_1325_object_ref_relationship--ade5c0c5-8b53-4bc5-9d81-0284be2e5fee" "objects_0_x_mitre_contents_1325_object_modified_2023-07-21T19:51:55.111Z" "objects_0_x_mitre_contents_1326_object_ref_relationship--aeeadd6b-30d3-4b4f-ac61-fd0bc367b415" "objects_0_x_mitre_contents_1326_object_modified_2022-03-30T14:50:07.291Z" "objects_0_x_mitre_contents_1327_object_ref_relationship--af55d12a-5f58-4135-90d0-f465a66f7a3f" "objects_0_x_mitre_contents_1327_object_modified_2020-07-15T20:20:59.305Z" "objects_0_x_mitre_contents_1328_object_ref_relationship--afba6b19-7486-4e5a-8fda-e91852b0b354" "objects_0_x_mitre_contents_1328_object_modified_2021-09-27T18:05:43.107Z" "objects_0_x_mitre_contents_1329_object_ref_relationship--afc0e8b2-2e85-4640-8517-fb2e16831082" "objects_0_x_mitre_contents_1329_object_modified_2023-03-27T18:56:03.190Z" "objects_0_x_mitre_contents_1330_object_ref_relationship--afc0f502-39bb-41e3-b4fc-5b5bb1a1175b" "objects_0_x_mitre_contents_1330_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1331_object_ref_relationship--afe9e326-01f7-4296-a11b-09cfffd80120" "objects_0_x_mitre_contents_1331_object_modified_2020-08-10T22:18:20.747Z" "objects_0_x_mitre_contents_1332_object_ref_relationship--b018fe06-740b-4864-b30a-f047598506b3" "objects_0_x_mitre_contents_1332_object_modified_2020-04-24T15:06:33.510Z" "objects_0_x_mitre_contents_1333_object_ref_relationship--b05668b9-aa06-4191-a4fa-f7e5a7804694" "objects_0_x_mitre_contents_1333_object_modified_2021-01-05T20:16:20.514Z" "objects_0_x_mitre_contents_1334_object_ref_relationship--b0625604-e4c4-402b-b191-f43137d38d99" "objects_0_x_mitre_contents_1334_object_modified_2023-04-05T20:29:50.160Z" "objects_0_x_mitre_contents_1335_object_ref_relationship--b0bade50-bcca-4924-9746-c4ed0c3be76c" "objects_0_x_mitre_contents_1335_object_modified_2023-07-21T19:41:31.114Z" "objects_0_x_mitre_contents_1336_object_ref_relationship--b0d0541d-caeb-43c0-906c-2e1e2ec25f69" "objects_0_x_mitre_contents_1336_object_modified_2023-04-05T17:32:47.359Z" "objects_0_x_mitre_contents_1337_object_ref_relationship--b0fe69e0-d08f-488d-b1cf-3f0dbb28accc" "objects_0_x_mitre_contents_1337_object_modified_2023-03-31T22:13:55.642Z" "objects_0_x_mitre_contents_1338_object_ref_relationship--b110d919-acd4-4fe0-a46a-ac4819508667" "objects_0_x_mitre_contents_1338_object_modified_2023-04-05T21:21:35.992Z" "objects_0_x_mitre_contents_1339_object_ref_relationship--b19082d2-c151-45dd-8844-82335fbe3ed9" "objects_0_x_mitre_contents_1339_object_modified_2023-02-28T21:43:54.880Z" "objects_0_x_mitre_contents_1340_object_ref_relationship--b1e5bd2f-01e4-402d-a9b6-255110510a83" "objects_0_x_mitre_contents_1340_object_modified_2020-12-24T21:45:56.986Z" "objects_0_x_mitre_contents_1341_object_ref_relationship--b2277deb-0ddb-45a7-9690-4a2168e1026b" "objects_0_x_mitre_contents_1341_object_modified_2023-10-10T15:33:59.058Z" "objects_0_x_mitre_contents_1342_object_ref_relationship--b22addc1-6a23-4657-8164-3705e12bb95b" "objects_0_x_mitre_contents_1342_object_modified_2023-07-21T19:40:41.725Z" "objects_0_x_mitre_contents_1343_object_ref_relationship--b24553a7-01c7-49b2-b1e0-fb961e788de2" "objects_0_x_mitre_contents_1343_object_modified_2020-06-26T15:32:25.062Z" "objects_0_x_mitre_contents_1344_object_ref_relationship--b247a4f6-3629-4123-84b0-c7c5b3e7e37e" "objects_0_x_mitre_contents_1344_object_modified_2022-04-11T19:19:52.562Z" "objects_0_x_mitre_contents_1345_object_ref_relationship--b263e4e9-972d-4ba7-8be8-e55eb6a483c0" "objects_0_x_mitre_contents_1345_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1346_object_ref_relationship--b2896068-4d54-41e1-b0f2-db9385615112" "objects_0_x_mitre_contents_1346_object_modified_2021-01-05T20:16:20.426Z" "objects_0_x_mitre_contents_1347_object_ref_relationship--b309c25a-6baf-4874-829d-63712a38652c" "objects_0_x_mitre_contents_1347_object_modified_2023-03-27T17:21:41.461Z" "objects_0_x_mitre_contents_1348_object_ref_relationship--b30fa851-75cf-46ac-aa1b-cfa8b7f36545" "objects_0_x_mitre_contents_1348_object_modified_2023-04-05T16:56:23.365Z" "objects_0_x_mitre_contents_1349_object_ref_relationship--b356d405-f6b1-485b-bd35-236b9da766d2" "objects_0_x_mitre_contents_1349_object_modified_2020-04-27T15:27:26.539Z" "objects_0_x_mitre_contents_1350_object_ref_relationship--b360a1c8-8939-428e-bc6e-3f4755bd9ee0" "objects_0_x_mitre_contents_1350_object_modified_2023-04-05T20:30:18.307Z" "objects_0_x_mitre_contents_1351_object_ref_relationship--b37ebb4e-0536-4de0-8e00-7b3d942a02b7" "objects_0_x_mitre_contents_1351_object_modified_2023-08-07T17:19:28.650Z" "objects_0_x_mitre_contents_1352_object_ref_relationship--b3866c07-e143-4d0d-9176-c2845f85c5ab" "objects_0_x_mitre_contents_1352_object_modified_2023-01-18T19:58:21.223Z" "objects_0_x_mitre_contents_1353_object_ref_relationship--b3a14001-e0c0-4f13-ac03-04e56dc0e312" "objects_0_x_mitre_contents_1353_object_modified_2023-10-10T15:33:59.311Z" "objects_0_x_mitre_contents_1354_object_ref_relationship--b3bb33bf-9034-4d5c-8ea0-31d3bbd12b6b" "objects_0_x_mitre_contents_1354_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1355_object_ref_relationship--b402664b-a5b4-45e4-832f-02638e6c67a7" "objects_0_x_mitre_contents_1355_object_modified_2022-04-01T14:59:17.991Z" "objects_0_x_mitre_contents_1356_object_ref_relationship--b40e34ad-b699-4196-aa07-5bd71fe8f213" "objects_0_x_mitre_contents_1356_object_modified_2022-04-20T17:31:58.697Z" "objects_0_x_mitre_contents_1357_object_ref_relationship--b4180067-52b6-4109-91df-52fd9a7ed2e8" "objects_0_x_mitre_contents_1357_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1358_object_ref_relationship--b43c87a7-de40-4673-9808-57c7ffca7b98" "objects_0_x_mitre_contents_1358_object_modified_2023-07-21T19:54:21.877Z" "objects_0_x_mitre_contents_1359_object_ref_relationship--b43f4cef-138e-4b5d-8e68-e8eeae3591be" "objects_0_x_mitre_contents_1359_object_modified_2023-04-05T20:30:32.294Z" "objects_0_x_mitre_contents_1360_object_ref_relationship--b45cf5e0-7427-4d5c-be2c-22f5231493d1" "objects_0_x_mitre_contents_1360_object_modified_2021-10-01T14:42:49.184Z" "objects_0_x_mitre_contents_1361_object_ref_relationship--b4735277-516a-4cd2-9607-a3e415945d93" "objects_0_x_mitre_contents_1361_object_modified_2021-09-20T13:54:20.494Z" "objects_0_x_mitre_contents_1362_object_ref_relationship--b477afcb-7449-4fae-b4aa-c512c22d7500" "objects_0_x_mitre_contents_1362_object_modified_2020-09-15T15:18:12.394Z" "objects_0_x_mitre_contents_1363_object_ref_relationship--b49ecb71-92b3-4813-be4d-9f8c2aa67ccd" "objects_0_x_mitre_contents_1363_object_modified_2023-04-05T17:05:01.189Z" "objects_0_x_mitre_contents_1364_object_ref_relationship--b4ef35e9-3dba-49c7-8842-a7dff403241f" "objects_0_x_mitre_contents_1364_object_modified_2020-12-17T20:15:22.445Z" "objects_0_x_mitre_contents_1365_object_ref_relationship--b536f233-8c43-4671-b8e8-d72a4806946d" "objects_0_x_mitre_contents_1365_object_modified_2022-04-05T17:14:23.789Z" "objects_0_x_mitre_contents_1366_object_ref_relationship--b53d1c92-b71f-434e-aa4f-08b8db765248" "objects_0_x_mitre_contents_1366_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1367_object_ref_relationship--b5590b50-0aaa-4f43-9b29-f17ee717b551" "objects_0_x_mitre_contents_1367_object_modified_2021-05-24T13:16:56.412Z" "objects_0_x_mitre_contents_1368_object_ref_relationship--b5e8cef4-e8a1-484f-baae-cf12b26e6070" "objects_0_x_mitre_contents_1368_object_modified_2022-04-18T19:18:56.475Z" "objects_0_x_mitre_contents_1369_object_ref_relationship--b5f3b110-fc66-4369-89f3-621c945d655f" "objects_0_x_mitre_contents_1369_object_modified_2020-04-27T16:52:49.444Z" "objects_0_x_mitre_contents_1370_object_ref_relationship--b610c587-576a-40cc-9f76-6362455c8ff4" "objects_0_x_mitre_contents_1370_object_modified_2023-08-14T16:49:09.975Z" "objects_0_x_mitre_contents_1371_object_ref_relationship--b6323cf4-8141-4910-8743-e42cd15b49e9" "objects_0_x_mitre_contents_1371_object_modified_2023-07-21T19:53:59.148Z" "objects_0_x_mitre_contents_1372_object_ref_relationship--b641e5b8-5981-452a-99f0-3598c783e5ee" "objects_0_x_mitre_contents_1372_object_modified_2023-04-05T20:30:47.506Z" "objects_0_x_mitre_contents_1373_object_ref_relationship--b6726136-3c20-4921-a0cb-75a66f59107c" "objects_0_x_mitre_contents_1373_object_modified_2020-09-11T16:22:03.296Z" "objects_0_x_mitre_contents_1374_object_ref_relationship--b67f04d9-1cbd-49b4-9ec3-a33a41ac42ab" "objects_0_x_mitre_contents_1374_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1375_object_ref_relationship--b697a198-8949-43e0-b2b8-23498373c920" "objects_0_x_mitre_contents_1375_object_modified_2023-08-14T16:28:09.643Z" "objects_0_x_mitre_contents_1376_object_ref_relationship--b6feb018-65e3-46ff-b872-e4385b6f3b34" "objects_0_x_mitre_contents_1376_object_modified_2023-08-23T22:50:11.248Z" "objects_0_x_mitre_contents_1377_object_ref_relationship--b7282bf9-63f8-49ad-8ee0-f2ad523a367e" "objects_0_x_mitre_contents_1377_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1378_object_ref_relationship--b7652f27-1cf6-4310-bf6b-5fb99c4fd725" "objects_0_x_mitre_contents_1378_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1379_object_ref_relationship--b7a31a11-6c84-4c28-a548-4751e4d71134" "objects_0_x_mitre_contents_1379_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1380_object_ref_relationship--b7c8abf7-d4e4-40a4-aa2a-ee995a6f4f10" "objects_0_x_mitre_contents_1380_object_modified_2023-03-03T15:36:15.840Z" "objects_0_x_mitre_contents_1381_object_ref_relationship--b7cf1c31-8722-4eeb-ae59-66936c15fa87" "objects_0_x_mitre_contents_1381_object_modified_2021-01-05T20:16:20.495Z" "objects_0_x_mitre_contents_1382_object_ref_relationship--b81a284d-34ec-4e61-a073-bf6cd85e4c3f" "objects_0_x_mitre_contents_1382_object_modified_2023-04-05T20:54:05.374Z" "objects_0_x_mitre_contents_1383_object_ref_relationship--b81ba10a-73c2-4616-a8bc-eeb422e1c5ea" "objects_0_x_mitre_contents_1383_object_modified_2022-04-15T15:16:35.892Z" "objects_0_x_mitre_contents_1384_object_ref_relationship--b81f9698-b9d1-4a6a-b836-f7e29232693a" "objects_0_x_mitre_contents_1384_object_modified_2023-09-28T17:26:10.893Z" "objects_0_x_mitre_contents_1385_object_ref_relationship--b8606318-8c12-4381-ba33-5b2321772ea0" "objects_0_x_mitre_contents_1385_object_modified_2022-03-30T20:31:57.183Z" "objects_0_x_mitre_contents_1386_object_ref_relationship--b96e8699-4bd2-4793-8f9c-88d6e4c50e98" "objects_0_x_mitre_contents_1386_object_modified_2023-09-28T17:39:35.622Z" "objects_0_x_mitre_contents_1387_object_ref_relationship--b98fa6ef-a5f2-4867-8108-8daf8534cc3c" "objects_0_x_mitre_contents_1387_object_modified_2022-04-01T16:51:20.688Z" "objects_0_x_mitre_contents_1388_object_ref_relationship--b9af8369-a6b2-4081-9f07-2ee15d56bffc" "objects_0_x_mitre_contents_1388_object_modified_2020-06-24T18:24:35.795Z" "objects_0_x_mitre_contents_1389_object_ref_relationship--b9b9ce86-89f6-41ea-8ba1-9520985acb49" "objects_0_x_mitre_contents_1389_object_modified_2020-12-24T22:04:28.004Z" "objects_0_x_mitre_contents_1390_object_ref_relationship--ba02a1dc-d5b9-41cb-9adf-883119e1aa51" "objects_0_x_mitre_contents_1390_object_modified_2023-04-05T20:12:27.624Z" "objects_0_x_mitre_contents_1391_object_ref_relationship--ba116807-ef1c-4621-84c8-9921fa7b735e" "objects_0_x_mitre_contents_1391_object_modified_2023-09-28T17:19:21.499Z" "objects_0_x_mitre_contents_1392_object_ref_relationship--ba5fc090-d420-4006-9dc0-57b75260b5f6" "objects_0_x_mitre_contents_1392_object_modified_2020-07-15T20:20:59.296Z" "objects_0_x_mitre_contents_1393_object_ref_relationship--ba8735ad-b9c6-4b35-9fac-d4747ab0b2ae" "objects_0_x_mitre_contents_1393_object_modified_2020-12-01T19:48:44.878Z" "objects_0_x_mitre_contents_1394_object_ref_relationship--baa82c0a-b51c-4d4a-ae1d-6d6fd637f78d" "objects_0_x_mitre_contents_1394_object_modified_2020-07-15T20:20:59.294Z" "objects_0_x_mitre_contents_1395_object_ref_relationship--baad8ab8-f05f-4e31-9671-44c009ae3ecf" "objects_0_x_mitre_contents_1395_object_modified_2023-08-09T14:38:34.721Z" "objects_0_x_mitre_contents_1396_object_ref_relationship--bb006be2-7d2c-4bb3-ab48-7c95e0ab8106" "objects_0_x_mitre_contents_1396_object_modified_2020-12-14T14:52:03.255Z" "objects_0_x_mitre_contents_1397_object_ref_relationship--bb11b7d1-e661-49af-9746-9fa4c56324bf" "objects_0_x_mitre_contents_1397_object_modified_2023-08-08T16:31:10.270Z" "objects_0_x_mitre_contents_1398_object_ref_relationship--bb34aff0-9af9-463b-a1aa-7f5ec7b84630" "objects_0_x_mitre_contents_1398_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1399_object_ref_relationship--bb3be217-08e2-4bb0-9f1a-d8e538010451" "objects_0_x_mitre_contents_1399_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1400_object_ref_relationship--bb77cfbe-ac95-4cc2-acbc-8cefa15b9387" "objects_0_x_mitre_contents_1400_object_modified_2023-08-04T19:15:08.695Z" "objects_0_x_mitre_contents_1401_object_ref_relationship--bb83ee25-8875-4806-9f69-ac39bf7cb402" "objects_0_x_mitre_contents_1401_object_modified_2023-04-05T17:25:39.509Z" "objects_0_x_mitre_contents_1402_object_ref_relationship--bba8b056-acbe-4fed-b890-965a446d7a3c" "objects_0_x_mitre_contents_1402_object_modified_2022-04-01T18:45:00.923Z" "objects_0_x_mitre_contents_1403_object_ref_relationship--bbc6308e-f7f6-40c7-80cb-f760d623c8af" "objects_0_x_mitre_contents_1403_object_modified_2023-03-27T18:56:41.614Z" "objects_0_x_mitre_contents_1404_object_ref_relationship--bbe1af69-7303-4205-82d8-5b03c43e39c1" "objects_0_x_mitre_contents_1404_object_modified_2020-11-24T17:55:12.887Z" "objects_0_x_mitre_contents_1405_object_ref_relationship--bc0d2cbb-30fa-40e6-a250-bf6e5d8f9005" "objects_0_x_mitre_contents_1405_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1406_object_ref_relationship--bc0d86de-0642-4cbf-a785-7ff70507a9a2" "objects_0_x_mitre_contents_1406_object_modified_2023-08-08T17:08:11.867Z" "objects_0_x_mitre_contents_1407_object_ref_relationship--bc4e848a-adb7-40a2-94a1-d5ab9854ff0f" "objects_0_x_mitre_contents_1407_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1408_object_ref_relationship--bc59883f-672e-4dc8-a7de-f713a26f88e1" "objects_0_x_mitre_contents_1408_object_modified_2023-08-14T16:31:37.179Z" "objects_0_x_mitre_contents_1409_object_ref_relationship--bc79a212-139f-4dce-be72-e90585f38f03" "objects_0_x_mitre_contents_1409_object_modified_2023-08-10T21:11:17.731Z" "objects_0_x_mitre_contents_1410_object_ref_relationship--bc79d59b-1828-4133-9f8f-df8cad9543a8" "objects_0_x_mitre_contents_1410_object_modified_2023-04-05T20:37:19.124Z" "objects_0_x_mitre_contents_1411_object_ref_relationship--bc870a55-5499-4146-91ef-ea74647c3e10" "objects_0_x_mitre_contents_1411_object_modified_2023-07-12T20:50:03.159Z" "objects_0_x_mitre_contents_1412_object_ref_relationship--bcc8eb7a-d2a8-41d2-832e-f435e51c685a" "objects_0_x_mitre_contents_1412_object_modified_2022-03-30T19:54:43.835Z" "objects_0_x_mitre_contents_1413_object_ref_relationship--bce64ec2-43d5-4501-a0aa-0abe65551a19" "objects_0_x_mitre_contents_1413_object_modified_2021-02-17T20:43:52.381Z" "objects_0_x_mitre_contents_1414_object_ref_relationship--bd1e016a-1ebb-4f30-9342-998f656dd8b8" "objects_0_x_mitre_contents_1414_object_modified_2023-04-05T21:21:49.009Z" "objects_0_x_mitre_contents_1415_object_ref_relationship--bd29ce15-1771-470c-a74b-5ea90832ce23" "objects_0_x_mitre_contents_1415_object_modified_2023-04-05T20:31:11.269Z" "objects_0_x_mitre_contents_1416_object_ref_relationship--bd351b17-e995-4528-bbea-e1138c51476a" "objects_0_x_mitre_contents_1416_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1417_object_ref_relationship--bd6829ee-dc51-477b-9739-1cd1cd304b6c" "objects_0_x_mitre_contents_1417_object_modified_2023-04-05T20:45:14.199Z" "objects_0_x_mitre_contents_1418_object_ref_relationship--bd889077-d4bd-4475-8e1f-6f507a7bedb9" "objects_0_x_mitre_contents_1418_object_modified_2022-04-01T13:19:41.207Z" "objects_0_x_mitre_contents_1419_object_ref_relationship--bd952153-4902-4fc4-8e2e-b7c7b8bad7f1" "objects_0_x_mitre_contents_1419_object_modified_2023-03-27T18:11:24.686Z" "objects_0_x_mitre_contents_1420_object_ref_relationship--bd99b570-5966-4337-8ab4-2d6f4afd0f7f" "objects_0_x_mitre_contents_1420_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1421_object_ref_relationship--bdb29822-63c5-4dd0-961b-cdf3f2482adf" "objects_0_x_mitre_contents_1421_object_modified_2023-08-10T22:11:45.377Z" "objects_0_x_mitre_contents_1422_object_ref_relationship--bdc59dcf-0e0a-4d47-b289-0c298115215f" "objects_0_x_mitre_contents_1422_object_modified_2023-08-23T22:17:13.986Z" "objects_0_x_mitre_contents_1423_object_ref_relationship--be136fd1-6949-4de6-be37-6d76f8def41a" "objects_0_x_mitre_contents_1423_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1424_object_ref_relationship--be17dc63-5b0a-491a-be5f-132058444c3a" "objects_0_x_mitre_contents_1424_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1425_object_ref_relationship--be256f8a-8bae-4a00-8682-22797ba7e0ce" "objects_0_x_mitre_contents_1425_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1426_object_ref_relationship--be27a303-5748-4b72-ba69-a328e2f6cc08" "objects_0_x_mitre_contents_1426_object_modified_2020-12-31T18:25:05.177Z" "objects_0_x_mitre_contents_1427_object_ref_relationship--be39c012-7201-4757-8cd6-c855bc945a9e" "objects_0_x_mitre_contents_1427_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1428_object_ref_relationship--be7c3f83-b164-4d53-bfac-65f7437dabec" "objects_0_x_mitre_contents_1428_object_modified_2023-08-08T17:13:28.972Z" "objects_0_x_mitre_contents_1429_object_ref_relationship--be8d0cd6-be77-456e-bcfb-6325cb8ba137" "objects_0_x_mitre_contents_1429_object_modified_2023-09-28T17:20:15.010Z" "objects_0_x_mitre_contents_1430_object_ref_relationship--bed52256-e5d2-4f15-8c4c-27f709e10c6c" "objects_0_x_mitre_contents_1430_object_modified_2020-06-26T14:55:13.380Z" "objects_0_x_mitre_contents_1431_object_ref_relationship--bee6407a-1f05-4f91-b6e7-a8f8b58fa421" "objects_0_x_mitre_contents_1431_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1432_object_ref_relationship--bee919a6-c488-49a0-9848-fff19aa2c276" "objects_0_x_mitre_contents_1432_object_modified_2021-10-04T20:08:48.556Z" "objects_0_x_mitre_contents_1433_object_ref_relationship--bef936d5-736e-491a-9c30-37b8362a5d96" "objects_0_x_mitre_contents_1433_object_modified_2023-07-21T19:33:48.439Z" "objects_0_x_mitre_contents_1434_object_ref_relationship--befa3b5a-e4f4-4ed3-ada1-860a034284d2" "objects_0_x_mitre_contents_1434_object_modified_2023-09-28T17:19:51.110Z" "objects_0_x_mitre_contents_1435_object_ref_relationship--bf19207a-ac71-436d-8ef4-4ab059b533c8" "objects_0_x_mitre_contents_1435_object_modified_2023-04-05T17:48:43.225Z" "objects_0_x_mitre_contents_1436_object_ref_relationship--bf2ea132-c8f3-4ea0-8c4c-bdc95923c3b1" "objects_0_x_mitre_contents_1436_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1437_object_ref_relationship--bf33711d-a4d2-4957-9b1f-49c5b83958db" "objects_0_x_mitre_contents_1437_object_modified_2023-09-21T22:51:40.666Z" "objects_0_x_mitre_contents_1438_object_ref_relationship--bf901bab-3caa-4d05-a859-d9fb4d838304" "objects_0_x_mitre_contents_1438_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1439_object_ref_relationship--bfad064a-0a49-44e3-b283-94653edc12af" "objects_0_x_mitre_contents_1439_object_modified_2023-08-07T17:13:04.270Z" "objects_0_x_mitre_contents_1440_object_ref_relationship--bfd0d9cb-27e2-42a2-9207-764bb1491962" "objects_0_x_mitre_contents_1440_object_modified_2022-03-30T19:54:07.548Z" "objects_0_x_mitre_contents_1441_object_ref_relationship--bff3f22c-660d-4ceb-b1bb-dbd064d363c0" "objects_0_x_mitre_contents_1441_object_modified_2023-08-10T21:00:59.182Z" "objects_0_x_mitre_contents_1442_object_ref_relationship--c00031dd-0466-4fd2-9724-ab1c04232bad" "objects_0_x_mitre_contents_1442_object_modified_2023-08-08T16:28:27.010Z" "objects_0_x_mitre_contents_1443_object_ref_relationship--c021d9b9-3850-425d-b3d2-6b7bd7e62b95" "objects_0_x_mitre_contents_1443_object_modified_2019-10-18T15:51:48.525Z" "objects_0_x_mitre_contents_1444_object_ref_relationship--c1453cd9-44bb-4dd2-bdbd-eb06a239d38c" "objects_0_x_mitre_contents_1444_object_modified_2022-04-06T15:52:07.805Z" "objects_0_x_mitre_contents_1445_object_ref_relationship--c14efc74-8a5c-4a2d-b9ba-a231738c90dd" "objects_0_x_mitre_contents_1445_object_modified_2022-04-18T16:04:02.127Z" "objects_0_x_mitre_contents_1446_object_ref_relationship--c1512591-7440-4a69-93b9-fe439a4c197e" "objects_0_x_mitre_contents_1446_object_modified_2022-03-28T19:40:40.860Z" "objects_0_x_mitre_contents_1447_object_ref_relationship--c16c7904-3c85-49de-a0f4-872f4227d775" "objects_0_x_mitre_contents_1447_object_modified_2023-10-10T15:33:59.143Z" "objects_0_x_mitre_contents_1448_object_ref_relationship--c186864b-0af9-42eb-92ba-b8a6952e89b6" "objects_0_x_mitre_contents_1448_object_modified_2023-07-21T19:36:09.214Z" "objects_0_x_mitre_contents_1449_object_ref_relationship--c1d78c3d-9ed6-4e3f-9cad-b98b5dfb8ebd" "objects_0_x_mitre_contents_1449_object_modified_2023-08-10T22:13:31.468Z" "objects_0_x_mitre_contents_1450_object_ref_relationship--c23d9eff-1d4e-479f-a114-acc535540a23" "objects_0_x_mitre_contents_1450_object_modified_2023-08-08T16:29:07.329Z" "objects_0_x_mitre_contents_1451_object_ref_relationship--c2536a3c-bb84-42b7-8ac6-05f26205a4ad" "objects_0_x_mitre_contents_1451_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1452_object_ref_relationship--c264d954-8b5f-4be1-acf0-6387b7f04fae" "objects_0_x_mitre_contents_1452_object_modified_2021-02-17T20:43:52.407Z" "objects_0_x_mitre_contents_1453_object_ref_relationship--c33b7dfb-82ad-4a7c-a84c-6e7e9849253b" "objects_0_x_mitre_contents_1453_object_modified_2023-08-14T16:35:55.610Z" "objects_0_x_mitre_contents_1454_object_ref_relationship--c340b30d-0ad5-4e90-94ce-b6a6b229a7c4" "objects_0_x_mitre_contents_1454_object_modified_2023-04-05T20:31:30.741Z" "objects_0_x_mitre_contents_1455_object_ref_relationship--c3439bdd-a0db-401b-97fd-5e2ec135a396" "objects_0_x_mitre_contents_1455_object_modified_2023-08-08T17:15:46.818Z" "objects_0_x_mitre_contents_1456_object_ref_relationship--c368c932-7d5a-40e3-a18b-f30e82b9e4e6" "objects_0_x_mitre_contents_1456_object_modified_2020-10-29T17:48:27.332Z" "objects_0_x_mitre_contents_1457_object_ref_relationship--c374c9ce-ff30-4daa-bdec-8015a507746a" "objects_0_x_mitre_contents_1457_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1458_object_ref_relationship--c393fe8f-5708-40eb-ada9-6ca0d9b16c7d" "objects_0_x_mitre_contents_1458_object_modified_2023-08-14T16:43:05.577Z" "objects_0_x_mitre_contents_1459_object_ref_relationship--c3c0ff44-71bb-4774-a850-7b7c9dccb619" "objects_0_x_mitre_contents_1459_object_modified_2023-08-09T15:59:29.793Z" "objects_0_x_mitre_contents_1460_object_ref_relationship--c3c2bf20-fa33-4af4-92ec-d60679e1d4ee" "objects_0_x_mitre_contents_1460_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1461_object_ref_relationship--c41d817e-913e-4574-b8d4-370de9f0034b" "objects_0_x_mitre_contents_1461_object_modified_2023-04-05T21:19:16.331Z" "objects_0_x_mitre_contents_1462_object_ref_relationship--c43341e3-6fb9-46f1-8ea3-8daede1a4c77" "objects_0_x_mitre_contents_1462_object_modified_2022-04-06T15:52:41.579Z" "objects_0_x_mitre_contents_1463_object_ref_relationship--c438b973-c2f3-43fc-8312-2a5bbde4facb" "objects_0_x_mitre_contents_1463_object_modified_2023-08-08T21:11:29.381Z" "objects_0_x_mitre_contents_1464_object_ref_relationship--c49bae52-63b4-4e5e-adfd-65a0e852ed76" "objects_0_x_mitre_contents_1464_object_modified_2023-08-08T21:12:52.481Z" "objects_0_x_mitre_contents_1465_object_ref_relationship--c49cdcb7-3cb8-40ed-a745-0cebad20b1fd" "objects_0_x_mitre_contents_1465_object_modified_2020-05-04T15:40:21.076Z" "objects_0_x_mitre_contents_1466_object_ref_relationship--c4d71eb8-2099-44b9-be45-758f9e6a771a" "objects_0_x_mitre_contents_1466_object_modified_2023-10-10T15:33:57.823Z" "objects_0_x_mitre_contents_1467_object_ref_relationship--c4e73a6c-d523-4f3c-bcb6-200f63867fb4" "objects_0_x_mitre_contents_1467_object_modified_2020-09-11T15:57:37.770Z" "objects_0_x_mitre_contents_1468_object_ref_relationship--c50b4da7-f0e1-4f6d-969c-dbc739d49d7c" "objects_0_x_mitre_contents_1468_object_modified_2023-04-05T17:40:43.898Z" "objects_0_x_mitre_contents_1469_object_ref_relationship--c53170a0-ca7f-4827-9c3c-1803ecd131f9" "objects_0_x_mitre_contents_1469_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1470_object_ref_relationship--c546dd04-2060-44bf-ba1e-d1c1edc54687" "objects_0_x_mitre_contents_1470_object_modified_2023-10-10T15:33:58.973Z" "objects_0_x_mitre_contents_1471_object_ref_relationship--c574251b-93ad-4f55-8b84-2700dfab4622" "objects_0_x_mitre_contents_1471_object_modified_2023-04-05T20:45:27.443Z" "objects_0_x_mitre_contents_1472_object_ref_relationship--c58a26af-cc4c-41a2-b884-9a4fa8a2ad5c" "objects_0_x_mitre_contents_1472_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1473_object_ref_relationship--c5cb9fb4-2593-412f-82f8-a04a125bd429" "objects_0_x_mitre_contents_1473_object_modified_2022-04-01T18:51:28.859Z" "objects_0_x_mitre_contents_1474_object_ref_relationship--c5db5bb5-9877-43cd-8851-5aa62405dcb2" "objects_0_x_mitre_contents_1474_object_modified_2019-11-21T16:42:48.497Z" "objects_0_x_mitre_contents_1475_object_ref_relationship--c61c16a9-8d1a-4329-b784-ba71f8421b33" "objects_0_x_mitre_contents_1475_object_modified_2023-08-08T17:11:30.820Z" "objects_0_x_mitre_contents_1476_object_ref_relationship--c6241ba3-e0f9-48a7-9ed7-a5544a090081" "objects_0_x_mitre_contents_1476_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1477_object_ref_relationship--c6464a84-e23b-412f-b435-5b23853d3643" "objects_0_x_mitre_contents_1477_object_modified_2022-04-20T12:58:23.550Z" "objects_0_x_mitre_contents_1478_object_ref_relationship--c65661a6-6047-4901-ac2c-3ca4b1bbbb28" "objects_0_x_mitre_contents_1478_object_modified_2023-04-05T17:24:32.173Z" "objects_0_x_mitre_contents_1479_object_ref_relationship--c659256c-82e3-4f4c-ac70-3d2400cf6695" "objects_0_x_mitre_contents_1479_object_modified_2020-09-11T16:23:16.363Z" "objects_0_x_mitre_contents_1480_object_ref_relationship--c6a32f64-3105-4a94-8172-28ac0e10dd93" "objects_0_x_mitre_contents_1480_object_modified_2023-08-08T16:24:44.982Z" "objects_0_x_mitre_contents_1481_object_ref_relationship--c720fd30-5694-42b7-bf77-d948f7ba2b6f" "objects_0_x_mitre_contents_1481_object_modified_2023-04-05T21:30:27.616Z" "objects_0_x_mitre_contents_1482_object_ref_relationship--c778593c-1583-48cc-a99d-0ac1b5b537e2" "objects_0_x_mitre_contents_1482_object_modified_2023-08-09T15:56:56.738Z" "objects_0_x_mitre_contents_1483_object_ref_relationship--c78a3e66-b7aa-4feb-bc18-b8af77f27a47" "objects_0_x_mitre_contents_1483_object_modified_2023-08-08T14:54:04.526Z" "objects_0_x_mitre_contents_1484_object_ref_relationship--c7f876d4-99f2-41ac-993c-57a3f2b4e0eb" "objects_0_x_mitre_contents_1484_object_modified_2023-03-27T17:22:43.518Z" "objects_0_x_mitre_contents_1485_object_ref_relationship--c81757a7-16b1-4b48-ae52-3d375f533dfd" "objects_0_x_mitre_contents_1485_object_modified_2022-04-01T15:03:02.553Z" "objects_0_x_mitre_contents_1486_object_ref_relationship--c83c84e8-a556-4efe-ae24-75970ee8ad4b" "objects_0_x_mitre_contents_1486_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1487_object_ref_relationship--c8559423-10b0-4d5e-9057-65cbfd7ee1c0" "objects_0_x_mitre_contents_1487_object_modified_2021-10-01T14:42:48.728Z" "objects_0_x_mitre_contents_1488_object_ref_relationship--c86918a3-6e41-4dfb-8b18-650fff596801" "objects_0_x_mitre_contents_1488_object_modified_2020-09-11T16:22:03.207Z" "objects_0_x_mitre_contents_1489_object_ref_relationship--c89d6493-3f33-4568-ac77-ba13b206ae69" "objects_0_x_mitre_contents_1489_object_modified_2023-08-08T22:24:12.960Z" "objects_0_x_mitre_contents_1490_object_ref_relationship--c89f8f8d-222b-4b83-9fa4-47fd716a271f" "objects_0_x_mitre_contents_1490_object_modified_2023-04-05T17:49:00.042Z" "objects_0_x_mitre_contents_1491_object_ref_relationship--c8d0d360-eb9e-4fb4-97a2-efaf6d4f1059" "objects_0_x_mitre_contents_1491_object_modified_2023-03-20T18:51:23.032Z" "objects_0_x_mitre_contents_1492_object_ref_relationship--c90bfd4c-3c7e-4528-b5f6-574ef29ecdc9" "objects_0_x_mitre_contents_1492_object_modified_2022-03-28T19:32:05.234Z" "objects_0_x_mitre_contents_1493_object_ref_relationship--c943d462-fea7-4c01-88b2-de134153095b" "objects_0_x_mitre_contents_1493_object_modified_2023-08-10T22:09:50.728Z" "objects_0_x_mitre_contents_1494_object_ref_relationship--c96c3405-1d9b-46e4-8f57-a6c49eb68a31" "objects_0_x_mitre_contents_1494_object_modified_2022-04-06T13:41:17.517Z" "objects_0_x_mitre_contents_1495_object_ref_relationship--c9769c36-d89b-40eb-92cb-8faa7d37a140" "objects_0_x_mitre_contents_1495_object_modified_2023-09-25T19:54:37.211Z" "objects_0_x_mitre_contents_1496_object_ref_relationship--c9b3d86a-9c5e-4fe3-9c1c-dbd0bb89a74b" "objects_0_x_mitre_contents_1496_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1497_object_ref_relationship--c9c22e0d-c427-42ef-ae76-beb8ae9f6bf2" "objects_0_x_mitre_contents_1497_object_modified_2023-04-05T19:58:31.945Z" "objects_0_x_mitre_contents_1498_object_ref_relationship--ca0d9894-0c37-4a34-9b24-1887b7cd1106" "objects_0_x_mitre_contents_1498_object_modified_2023-08-09T15:29:35.623Z" "objects_0_x_mitre_contents_1499_object_ref_relationship--ca486783-9413-4f39-8d2f-3adcb3e79127" "objects_0_x_mitre_contents_1499_object_modified_2020-12-24T21:55:56.657Z" "objects_0_x_mitre_contents_1500_object_ref_relationship--ca4eb452-4a2f-41d7-a015-81f43e96737e" "objects_0_x_mitre_contents_1500_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1501_object_ref_relationship--ca568149-9971-4d15-b3db-ff7dabd49695" "objects_0_x_mitre_contents_1501_object_modified_2023-07-21T19:37:16.030Z" "objects_0_x_mitre_contents_1502_object_ref_relationship--ca8c38e6-8343-4f5e-929d-2759a0d49d59" "objects_0_x_mitre_contents_1502_object_modified_2022-04-15T17:39:22.154Z" "objects_0_x_mitre_contents_1503_object_ref_relationship--ca9e5e50-49e9-44cc-a0a4-4ec8633a9506" "objects_0_x_mitre_contents_1503_object_modified_2020-11-20T16:37:28.567Z" "objects_0_x_mitre_contents_1504_object_ref_relationship--cacc0b72-9d73-4381-90e9-545ba908722c" "objects_0_x_mitre_contents_1504_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1505_object_ref_relationship--cb5465c0-a577-45b1-becf-305e0bd47497" "objects_0_x_mitre_contents_1505_object_modified_2023-08-23T22:49:18.075Z" "objects_0_x_mitre_contents_1506_object_ref_relationship--cb5a81bb-a3c6-4d7c-836c-c0bd6227b48f" "objects_0_x_mitre_contents_1506_object_modified_2023-07-21T19:42:12.649Z" "objects_0_x_mitre_contents_1507_object_ref_relationship--cb80178a-5f9c-41bd-95a2-a7c5fe23c12c" "objects_0_x_mitre_contents_1507_object_modified_2022-04-01T18:48:03.156Z" "objects_0_x_mitre_contents_1508_object_ref_relationship--cbb07bef-f1da-41f6-b786-4a255e8bf985" "objects_0_x_mitre_contents_1508_object_modified_2023-08-04T18:34:07.176Z" "objects_0_x_mitre_contents_1509_object_ref_relationship--cbb48fa1-0677-4a07-bdbf-eda1827e52f1" "objects_0_x_mitre_contents_1509_object_modified_2023-04-05T21:18:05.613Z" "objects_0_x_mitre_contents_1510_object_ref_relationship--cbf17fea-141e-44b8-831c-b3cc41066420" "objects_0_x_mitre_contents_1510_object_modified_2021-01-20T16:01:19.409Z" "objects_0_x_mitre_contents_1511_object_ref_relationship--cc0b8984-f561-4453-a2be-9be8bd62561e" "objects_0_x_mitre_contents_1511_object_modified_2023-09-28T17:21:45.855Z" "objects_0_x_mitre_contents_1512_object_ref_relationship--cc345ae4-0d60-4f21-98b3-596c15118745" "objects_0_x_mitre_contents_1512_object_modified_2023-03-29T21:38:03.367Z" "objects_0_x_mitre_contents_1513_object_ref_relationship--cc3cf438-7206-46df-a4a4-999472ea6a9a" "objects_0_x_mitre_contents_1513_object_modified_2023-04-05T20:45:42.081Z" "objects_0_x_mitre_contents_1514_object_ref_relationship--cc49561f-8364-4908-9111-ad3a6dcd922c" "objects_0_x_mitre_contents_1514_object_modified_2018-10-17T00:14:20.652Z" "objects_0_x_mitre_contents_1515_object_ref_relationship--cc4ae06f-0258-4fe9-b63a-334d283e766d" "objects_0_x_mitre_contents_1515_object_modified_2021-05-24T13:16:56.495Z" "objects_0_x_mitre_contents_1516_object_ref_relationship--cc81b56c-cf73-4307-b950-e80246985195" "objects_0_x_mitre_contents_1516_object_modified_2022-03-28T19:20:44.337Z" "objects_0_x_mitre_contents_1517_object_ref_relationship--ccb6f906-a785-4695-91a5-f1bc210892dc" "objects_0_x_mitre_contents_1517_object_modified_2023-08-04T18:35:55.269Z" "objects_0_x_mitre_contents_1518_object_ref_relationship--cce5d90f-edff-454d-bafa-caf33b71ed6c" "objects_0_x_mitre_contents_1518_object_modified_2019-12-10T16:07:41.078Z" "objects_0_x_mitre_contents_1519_object_ref_relationship--cce82a76-5390-473d-9e7c-9450d1509d1d" "objects_0_x_mitre_contents_1519_object_modified_2020-07-15T20:20:59.314Z" "objects_0_x_mitre_contents_1520_object_ref_relationship--ccfffa97-17fd-4826-9a16-c9d8174fb8ac" "objects_0_x_mitre_contents_1520_object_modified_2020-01-27T17:05:58.237Z" "objects_0_x_mitre_contents_1521_object_ref_relationship--cd0f76da-ea06-4710-ab1d-53a7e29a6328" "objects_0_x_mitre_contents_1521_object_modified_2022-03-30T19:34:09.377Z" "objects_0_x_mitre_contents_1522_object_ref_relationship--cd503879-ccb4-4d47-af5a-90fe7e37c438" "objects_0_x_mitre_contents_1522_object_modified_2023-04-05T19:53:53.384Z" "objects_0_x_mitre_contents_1523_object_ref_relationship--cd6a9777-a8fd-43ca-91dc-cafc7d4b7df3" "objects_0_x_mitre_contents_1523_object_modified_2020-01-27T17:05:58.215Z" "objects_0_x_mitre_contents_1524_object_ref_relationship--cd7a2294-1e14-42e8-b870-d99d73443b88" "objects_0_x_mitre_contents_1524_object_modified_2022-04-01T12:37:42.068Z" "objects_0_x_mitre_contents_1525_object_ref_relationship--cd8c383a-2a62-45e5-917f-a26efe5ba03c" "objects_0_x_mitre_contents_1525_object_modified_2023-08-08T17:08:59.640Z" "objects_0_x_mitre_contents_1526_object_ref_relationship--cd9e8334-2ff6-4f64-993f-4e11a68ef7ca" "objects_0_x_mitre_contents_1526_object_modified_2023-08-09T16:34:37.498Z" "objects_0_x_mitre_contents_1527_object_ref_relationship--cda58372-ae70-4716-8baf-cc06cb884ad6" "objects_0_x_mitre_contents_1527_object_modified_2020-12-24T22:04:28.015Z" "objects_0_x_mitre_contents_1528_object_ref_relationship--cdb9788e-7d16-482e-92b6-cbde0b3de357" "objects_0_x_mitre_contents_1528_object_modified_2020-12-17T20:15:22.408Z" "objects_0_x_mitre_contents_1529_object_ref_relationship--cde60121-3d7c-47c8-abeb-582854425599" "objects_0_x_mitre_contents_1529_object_modified_2020-08-10T21:57:54.531Z" "objects_0_x_mitre_contents_1530_object_ref_relationship--cdf06664-903e-499b-86b4-b7bcce3c0740" "objects_0_x_mitre_contents_1530_object_modified_2023-09-28T17:20:27.451Z" "objects_0_x_mitre_contents_1531_object_ref_relationship--ce26f077-c47a-4185-8ed7-ec0d9ae2b625" "objects_0_x_mitre_contents_1531_object_modified_2022-03-31T16:33:55.074Z" "objects_0_x_mitre_contents_1532_object_ref_relationship--ce51f1b3-7813-4517-bbcf-7ae8abf6d2ef" "objects_0_x_mitre_contents_1532_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1533_object_ref_relationship--ce5f506a-8fc9-40a2-a78e-96796c896f1b" "objects_0_x_mitre_contents_1533_object_modified_2023-08-08T15:31:45.237Z" "objects_0_x_mitre_contents_1534_object_ref_relationship--ce645a25-160f-443d-b288-fdd108b78a06" "objects_0_x_mitre_contents_1534_object_modified_2023-04-05T17:41:00.652Z" "objects_0_x_mitre_contents_1535_object_ref_relationship--ce6c7f21-91a5-4d63-bd03-a6b57e025afe" "objects_0_x_mitre_contents_1535_object_modified_2022-03-30T20:07:33.678Z" "objects_0_x_mitre_contents_1536_object_ref_relationship--ce8cc50a-f3c9-4a6a-b6be-f3e8bdd293bd" "objects_0_x_mitre_contents_1536_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1537_object_ref_relationship--cea30219-a255-43ae-b731-9512c5044523" "objects_0_x_mitre_contents_1537_object_modified_2022-04-18T19:46:02.547Z" "objects_0_x_mitre_contents_1538_object_ref_relationship--ced70cea-b2ac-45b8-9f7d-779eedbdf06c" "objects_0_x_mitre_contents_1538_object_modified_2020-01-27T17:05:58.273Z" "objects_0_x_mitre_contents_1539_object_ref_relationship--cf26d49c-1d1b-4861-9d6e-959f4f15b73a" "objects_0_x_mitre_contents_1539_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1540_object_ref_relationship--cf2cfc6e-896a-4c99-b286-41f8dbd6fa4c" "objects_0_x_mitre_contents_1540_object_modified_2023-09-28T17:21:26.448Z" "objects_0_x_mitre_contents_1541_object_ref_relationship--cf4243f5-562a-457f-bb15-d45a2047f7ca" "objects_0_x_mitre_contents_1541_object_modified_2023-04-05T17:10:15.827Z" "objects_0_x_mitre_contents_1542_object_ref_relationship--cf4fe189-58cf-42aa-89c7-75bd0a83a263" "objects_0_x_mitre_contents_1542_object_modified_2023-08-08T15:29:32.423Z" "objects_0_x_mitre_contents_1543_object_ref_relationship--cf696296-751a-41e5-a9b0-907c7b991b2a" "objects_0_x_mitre_contents_1543_object_modified_2023-09-22T19:14:54.719Z" "objects_0_x_mitre_contents_1544_object_ref_relationship--cf879fe8-9c31-48de-9e49-668d6cda67c5" "objects_0_x_mitre_contents_1544_object_modified_2023-07-12T20:35:36.527Z" "objects_0_x_mitre_contents_1545_object_ref_relationship--cfa1d194-7401-46ba-bfed-5f311aeb22d3" "objects_0_x_mitre_contents_1545_object_modified_2023-04-05T19:54:13.685Z" "objects_0_x_mitre_contents_1546_object_ref_relationship--d01b311d-8741-4b58-b127-88fecb2b0544" "objects_0_x_mitre_contents_1546_object_modified_2022-04-15T17:33:02.327Z" "objects_0_x_mitre_contents_1547_object_ref_relationship--d0669f8d-0aa2-416f-9ec4-a991a2000d3e" "objects_0_x_mitre_contents_1547_object_modified_2023-09-21T19:37:30.610Z" "objects_0_x_mitre_contents_1548_object_ref_relationship--d09a4d42-45bd-4b2a-aef4-3aa3982115ad" "objects_0_x_mitre_contents_1548_object_modified_2022-04-05T19:45:03.117Z" "objects_0_x_mitre_contents_1549_object_ref_relationship--d09abcd8-49bf-4d0f-8b17-0db7ada10ec2" "objects_0_x_mitre_contents_1549_object_modified_2020-09-11T15:53:38.453Z" "objects_0_x_mitre_contents_1550_object_ref_relationship--d0c039cb-c815-4d9c-a100-a45f923bc65b" "objects_0_x_mitre_contents_1550_object_modified_2020-12-24T21:45:56.981Z" "objects_0_x_mitre_contents_1551_object_ref_relationship--d0c21324-62e3-46e5-823b-ea0c03a4885d" "objects_0_x_mitre_contents_1551_object_modified_2020-01-21T15:30:39.335Z" "objects_0_x_mitre_contents_1552_object_ref_relationship--d1318f71-7f70-4820-a3fc-0d05af038733" "objects_0_x_mitre_contents_1552_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1553_object_ref_relationship--d13724d0-a5e2-433b-86bf-ead04359edec" "objects_0_x_mitre_contents_1553_object_modified_2022-04-01T15:13:10.022Z" "objects_0_x_mitre_contents_1554_object_ref_relationship--d170a088-b115-4a86-b093-8aa32666a470" "objects_0_x_mitre_contents_1554_object_modified_2023-08-10T21:04:21.890Z" "objects_0_x_mitre_contents_1555_object_ref_relationship--d1e11627-23e4-40f3-bcbc-2b832b0bbaa3" "objects_0_x_mitre_contents_1555_object_modified_2023-02-28T20:31:31.983Z" "objects_0_x_mitre_contents_1556_object_ref_relationship--d22be48b-90fa-4dba-ab6f-f3ad5e08c03e" "objects_0_x_mitre_contents_1556_object_modified_2023-09-22T19:15:22.670Z" "objects_0_x_mitre_contents_1557_object_ref_relationship--d22d309b-ab00-4f17-b6bf-7706f499cc5e" "objects_0_x_mitre_contents_1557_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1558_object_ref_relationship--d22f2c45-d6fa-419a-8f25-65ea37529ccc" "objects_0_x_mitre_contents_1558_object_modified_2023-04-05T20:19:04.639Z" "objects_0_x_mitre_contents_1559_object_ref_relationship--d2749285-47d9-44a4-962f-9215e6fb580e" "objects_0_x_mitre_contents_1559_object_modified_2023-04-05T19:54:30.569Z" "objects_0_x_mitre_contents_1560_object_ref_relationship--d2d7476e-66a4-4d46-877c-6e80678bbb38" "objects_0_x_mitre_contents_1560_object_modified_2022-04-01T18:43:25.764Z" "objects_0_x_mitre_contents_1561_object_ref_relationship--d300eb82-5ca0-48aa-a45f-d34242545e27" "objects_0_x_mitre_contents_1561_object_modified_2022-03-30T15:08:28.814Z" "objects_0_x_mitre_contents_1562_object_ref_relationship--d32003ba-959b-4377-aa04-f75275c32abf" "objects_0_x_mitre_contents_1562_object_modified_2023-04-05T20:40:27.131Z" "objects_0_x_mitre_contents_1563_object_ref_relationship--d358ac0b-4c67-44e3-939b-24cd36d3c3fb" "objects_0_x_mitre_contents_1563_object_modified_2023-04-05T19:58:57.686Z" "objects_0_x_mitre_contents_1564_object_ref_relationship--d39ceb9c-ef0c-4820-b363-dc8ce0f0d00c" "objects_0_x_mitre_contents_1564_object_modified_2023-10-10T15:33:58.621Z" "objects_0_x_mitre_contents_1565_object_ref_relationship--d3e06522-2a30-4d56-801e-9461178b80ce" "objects_0_x_mitre_contents_1565_object_modified_2023-04-05T20:45:54.913Z" "objects_0_x_mitre_contents_1566_object_ref_relationship--d3e52467-d090-4ebd-b9b1-3022cc6d5df0" "objects_0_x_mitre_contents_1566_object_modified_2023-04-11T22:08:03.095Z" "objects_0_x_mitre_contents_1567_object_ref_relationship--d3e6bc20-1f9c-41b6-89f0-ef95689add86" "objects_0_x_mitre_contents_1567_object_modified_2023-08-07T22:12:07.772Z" "objects_0_x_mitre_contents_1568_object_ref_relationship--d4154247-90ce-43b9-8c17-5c28f67617f5" "objects_0_x_mitre_contents_1568_object_modified_2020-12-24T21:55:56.747Z" "objects_0_x_mitre_contents_1569_object_ref_relationship--d44b097a-1bba-40bd-8ec8-d717a3f3df0c" "objects_0_x_mitre_contents_1569_object_modified_2023-03-03T16:24:30.564Z" "objects_0_x_mitre_contents_1570_object_ref_relationship--d4a5a902-231e-4878-ad5b-39620498b018" "objects_0_x_mitre_contents_1570_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1571_object_ref_relationship--d53a8ff0-7252-477e-8767-fd485dd62e7c" "objects_0_x_mitre_contents_1571_object_modified_2020-12-28T18:59:33.140Z" "objects_0_x_mitre_contents_1572_object_ref_relationship--d54bdaff-8eb8-4a02-9f64-bc33c892e9d1" "objects_0_x_mitre_contents_1572_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1573_object_ref_relationship--d54d3475-19ee-4ac5-98b0-ec1ae9336dfb" "objects_0_x_mitre_contents_1573_object_modified_2023-08-08T17:06:44.919Z" "objects_0_x_mitre_contents_1574_object_ref_relationship--d5533ca1-d57e-4bbf-bf0c-d114e4b79078" "objects_0_x_mitre_contents_1574_object_modified_2023-08-04T18:32:39.763Z" "objects_0_x_mitre_contents_1575_object_ref_relationship--d562ed4d-ac4d-476b-872e-9e228c580889" "objects_0_x_mitre_contents_1575_object_modified_2020-11-20T16:37:28.506Z" "objects_0_x_mitre_contents_1576_object_ref_relationship--d5928f73-c4ba-4eb1-bf8a-e75ff6806a4a" "objects_0_x_mitre_contents_1576_object_modified_2020-11-10T17:08:35.713Z" "objects_0_x_mitre_contents_1577_object_ref_relationship--d59da983-c521-47b6-83ab-435f7d58611d" "objects_0_x_mitre_contents_1577_object_modified_2023-04-05T20:12:57.861Z" "objects_0_x_mitre_contents_1578_object_ref_relationship--d621eba9-676f-47a4-8358-d68eeff2fb9a" "objects_0_x_mitre_contents_1578_object_modified_2023-03-03T16:25:09.978Z" "objects_0_x_mitre_contents_1579_object_ref_relationship--d638565b-ca8e-459f-9c3b-1bd8828606f5" "objects_0_x_mitre_contents_1579_object_modified_2020-11-24T17:55:12.897Z" "objects_0_x_mitre_contents_1580_object_ref_relationship--d63de13b-0253-42f4-b13d-34bccf76ad94" "objects_0_x_mitre_contents_1580_object_modified_2023-08-08T15:01:30.483Z" "objects_0_x_mitre_contents_1581_object_ref_relationship--d63f27cf-95a3-42bb-86dd-dc18e22cb898" "objects_0_x_mitre_contents_1581_object_modified_2023-04-05T17:41:16.423Z" "objects_0_x_mitre_contents_1582_object_ref_relationship--d64c4924-76f0-4b2e-858d-b0df733334d0" "objects_0_x_mitre_contents_1582_object_modified_2023-03-27T17:23:09.430Z" "objects_0_x_mitre_contents_1583_object_ref_relationship--d663cb6f-9fc8-48a0-827f-29757b12ae71" "objects_0_x_mitre_contents_1583_object_modified_2022-03-30T20:53:54.296Z" "objects_0_x_mitre_contents_1584_object_ref_relationship--d66a3e5f-700e-40d0-b16a-bbb3306256c7" "objects_0_x_mitre_contents_1584_object_modified_2023-08-07T22:17:39.302Z" "objects_0_x_mitre_contents_1585_object_ref_relationship--d6be8665-afbb-4be5-a56a-493af01b120a" "objects_0_x_mitre_contents_1585_object_modified_2022-03-30T15:52:29.935Z" "objects_0_x_mitre_contents_1586_object_ref_relationship--d6e4fdc6-c936-4bb9-861f-fafd3b72fcb4" "objects_0_x_mitre_contents_1586_object_modified_2021-02-17T20:43:52.413Z" "objects_0_x_mitre_contents_1587_object_ref_relationship--d6f78e9b-94d1-4d59-b00e-89fad2261c55" "objects_0_x_mitre_contents_1587_object_modified_2020-04-24T17:46:31.603Z" "objects_0_x_mitre_contents_1588_object_ref_relationship--d7007bf2-fcd6-4327-9ffb-bdee5bdeb383" "objects_0_x_mitre_contents_1588_object_modified_2022-04-05T20:17:46.149Z" "objects_0_x_mitre_contents_1589_object_ref_relationship--d700c625-d0b6-4570-a538-0ba57bd7bda5" "objects_0_x_mitre_contents_1589_object_modified_2023-08-09T16:32:32.957Z" "objects_0_x_mitre_contents_1590_object_ref_relationship--d70aaf50-29b7-4687-98ea-ffaa3fa858c0" "objects_0_x_mitre_contents_1590_object_modified_2020-12-24T21:55:56.692Z" "objects_0_x_mitre_contents_1591_object_ref_relationship--d716163d-2492-4088-9235-b2310312ba27" "objects_0_x_mitre_contents_1591_object_modified_2022-04-06T15:44:48.422Z" "objects_0_x_mitre_contents_1592_object_ref_relationship--d71fab20-a56c-4404-a65d-aaa37056f16e" "objects_0_x_mitre_contents_1592_object_modified_2022-04-01T15:16:16.027Z" "objects_0_x_mitre_contents_1593_object_ref_relationship--d724bcf3-25d2-406a-b612-333fea5e2385" "objects_0_x_mitre_contents_1593_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1594_object_ref_relationship--d76d838b-bbc7-459a-884a-2da8c36a2ba2" "objects_0_x_mitre_contents_1594_object_modified_2022-04-08T16:29:55.322Z" "objects_0_x_mitre_contents_1595_object_ref_relationship--d7aa436a-e66d-4217-be66-4414703dec07" "objects_0_x_mitre_contents_1595_object_modified_2020-11-10T17:08:35.634Z" "objects_0_x_mitre_contents_1596_object_ref_relationship--d7ae7fb1-c363-4969-a4af-e2dd44a3c064" "objects_0_x_mitre_contents_1596_object_modified_2023-04-05T21:27:01.081Z" "objects_0_x_mitre_contents_1597_object_ref_relationship--d7ca70d4-2006-4252-b243-e52be760e24d" "objects_0_x_mitre_contents_1597_object_modified_2022-04-01T13:26:39.773Z" "objects_0_x_mitre_contents_1598_object_ref_relationship--d7d78682-c9ad-4880-ae6e-3fc79f3737f1" "objects_0_x_mitre_contents_1598_object_modified_2023-04-05T20:37:35.704Z" "objects_0_x_mitre_contents_1599_object_ref_relationship--d84604bc-2314-4340-b9c1-b1265c0f6c37" "objects_0_x_mitre_contents_1599_object_modified_2020-05-27T13:23:34.544Z" "objects_0_x_mitre_contents_1600_object_ref_relationship--d87b468e-f610-4e95-8dfb-8cf029f0e891" "objects_0_x_mitre_contents_1600_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1601_object_ref_relationship--d87b9e3a-9e6b-404d-8fc1-22262ff31157" "objects_0_x_mitre_contents_1601_object_modified_2023-08-23T22:18:21.774Z" "objects_0_x_mitre_contents_1602_object_ref_relationship--d886f368-a38b-4cb3-906f-9b284f58b369" "objects_0_x_mitre_contents_1602_object_modified_2019-12-10T16:07:41.066Z" "objects_0_x_mitre_contents_1603_object_ref_relationship--d8ca4ea5-5242-4f0f-b3b7-008673f561ab" "objects_0_x_mitre_contents_1603_object_modified_2020-09-11T16:22:03.229Z" "objects_0_x_mitre_contents_1604_object_ref_relationship--d8d773ab-b0e3-484b-bdb8-c1a1ab48d218" "objects_0_x_mitre_contents_1604_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1605_object_ref_relationship--d933bba1-61ab-4fea-b7db-7e2a4f4146e7" "objects_0_x_mitre_contents_1605_object_modified_2020-12-14T15:02:35.230Z" "objects_0_x_mitre_contents_1606_object_ref_relationship--d995dfff-e4b2-4e07-8e76-b064354f591a" "objects_0_x_mitre_contents_1606_object_modified_2022-04-01T12:49:32.365Z" "objects_0_x_mitre_contents_1607_object_ref_relationship--d9aab2e1-31e0-45b2-a40b-0cbe60677b4b" "objects_0_x_mitre_contents_1607_object_modified_2023-04-05T21:24:43.120Z" "objects_0_x_mitre_contents_1608_object_ref_relationship--da424f3f-8a93-4a66-858c-b33f587108e6" "objects_0_x_mitre_contents_1608_object_modified_2020-10-29T17:48:27.225Z" "objects_0_x_mitre_contents_1609_object_ref_relationship--da4296d7-5fdb-45b6-9791-b023d634c08d" "objects_0_x_mitre_contents_1609_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1610_object_ref_relationship--da55ec01-daf2-4fac-ba0b-243f759b73aa" "objects_0_x_mitre_contents_1610_object_modified_2023-08-14T16:19:34.080Z" "objects_0_x_mitre_contents_1611_object_ref_relationship--dae02ffb-1db5-4b7d-80a9-2a8cbf1bc852" "objects_0_x_mitre_contents_1611_object_modified_2023-09-28T17:22:13.691Z" "objects_0_x_mitre_contents_1612_object_ref_relationship--db1201f0-f925-4c3c-8673-7524a8c20886" "objects_0_x_mitre_contents_1612_object_modified_2021-02-17T20:43:52.274Z" "objects_0_x_mitre_contents_1613_object_ref_relationship--db34a2c8-01e0-4cd3-a497-0f4bca36812a" "objects_0_x_mitre_contents_1613_object_modified_2023-04-05T17:27:51.998Z" "objects_0_x_mitre_contents_1614_object_ref_relationship--db3fc82d-d353-438d-aa5e-9b5e7e60f0ac" "objects_0_x_mitre_contents_1614_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1615_object_ref_relationship--dba7bd66-5f8e-41a8-ad67-ae04cfd1c8ff" "objects_0_x_mitre_contents_1615_object_modified_2023-09-21T22:31:55.337Z" "objects_0_x_mitre_contents_1616_object_ref_relationship--dbef53a9-f9c4-4582-8e93-349ad488de12" "objects_0_x_mitre_contents_1616_object_modified_2023-03-29T21:27:42.197Z" "objects_0_x_mitre_contents_1617_object_ref_relationship--dbeff88d-441f-47f9-8afc-60400ee3ab97" "objects_0_x_mitre_contents_1617_object_modified_2023-02-06T19:06:37.359Z" "objects_0_x_mitre_contents_1618_object_ref_relationship--dc354395-cccf-471a-9335-8538ce20f1ec" "objects_0_x_mitre_contents_1618_object_modified_2023-07-21T19:33:28.471Z" "objects_0_x_mitre_contents_1619_object_ref_relationship--dc6514a0-2e9c-4f29-8c15-99e6d382e357" "objects_0_x_mitre_contents_1619_object_modified_2023-04-05T20:31:46.913Z" "objects_0_x_mitre_contents_1620_object_ref_relationship--dc7ef843-a073-4e23-b717-c505d4863b02" "objects_0_x_mitre_contents_1620_object_modified_2023-08-14T16:27:15.979Z" "objects_0_x_mitre_contents_1621_object_ref_relationship--dcae3b7c-27d2-4377-9dc6-59dae15ac962" "objects_0_x_mitre_contents_1621_object_modified_2023-04-05T16:58:03.072Z" "objects_0_x_mitre_contents_1622_object_ref_relationship--dcf01e96-1498-4ebf-b46f-d4f4eb796f23" "objects_0_x_mitre_contents_1622_object_modified_2023-07-21T19:37:42.022Z" "objects_0_x_mitre_contents_1623_object_ref_relationship--dd54e35c-d68b-4aa8-ad2a-acd4c76243c8" "objects_0_x_mitre_contents_1623_object_modified_2023-03-27T18:57:14.522Z" "objects_0_x_mitre_contents_1624_object_ref_relationship--ddb5ba6d-0549-44bd-a669-972bd48e927b" "objects_0_x_mitre_contents_1624_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1625_object_ref_relationship--ddca1254-b404-4850-9566-0be35c6d7564" "objects_0_x_mitre_contents_1625_object_modified_2023-04-05T17:00:11.412Z" "objects_0_x_mitre_contents_1626_object_ref_relationship--ddfc5d8c-750d-424a-88d9-acc99bc5f69e" "objects_0_x_mitre_contents_1626_object_modified_2022-03-30T19:29:07.379Z" "objects_0_x_mitre_contents_1627_object_ref_relationship--de45db46-2251-4a29-b4d7-3fcf679e9484" "objects_0_x_mitre_contents_1627_object_modified_2023-04-05T20:32:16.401Z" "objects_0_x_mitre_contents_1628_object_ref_relationship--de4ecfa3-fa91-4377-810c-5c567de9688b" "objects_0_x_mitre_contents_1628_object_modified_2023-04-05T20:38:01.842Z" "objects_0_x_mitre_contents_1629_object_ref_relationship--de69fd86-aaef-4a1e-99e9-ee32c71997d6" "objects_0_x_mitre_contents_1629_object_modified_2022-04-05T19:54:12.660Z" "objects_0_x_mitre_contents_1630_object_ref_relationship--de7e3a71-1152-481c-8e5c-88f53852cab6" "objects_0_x_mitre_contents_1630_object_modified_2022-04-01T15:16:53.239Z" "objects_0_x_mitre_contents_1631_object_ref_relationship--def81edd-4410-47b2-a80f-d47b3f353f54" "objects_0_x_mitre_contents_1631_object_modified_2023-08-08T14:59:40.699Z" "objects_0_x_mitre_contents_1632_object_ref_relationship--df036f55-f749-4dad-9473-d69535e0f98d" "objects_0_x_mitre_contents_1632_object_modified_2022-04-15T17:39:39.931Z" "objects_0_x_mitre_contents_1633_object_ref_relationship--df07166f-917e-4bc4-899e-d689d1d3f785" "objects_0_x_mitre_contents_1633_object_modified_2023-10-10T15:33:58.104Z" "objects_0_x_mitre_contents_1634_object_ref_relationship--df337ad4-c88e-425f-b869-ecac29674bf4" "objects_0_x_mitre_contents_1634_object_modified_2021-03-25T16:39:40.200Z" "objects_0_x_mitre_contents_1635_object_ref_relationship--dfe6d454-1a24-4c42-97eb-4ddfd1dbb09b" "objects_0_x_mitre_contents_1635_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1636_object_ref_relationship--dff37d8a-b7ca-409b-b4eb-581ca3a74bb5" "objects_0_x_mitre_contents_1636_object_modified_2022-04-20T17:57:23.327Z" "objects_0_x_mitre_contents_1637_object_ref_relationship--e0121f6c-0312-4fff-9d6c-0a8aea945bea" "objects_0_x_mitre_contents_1637_object_modified_2023-04-11T22:08:45.192Z" "objects_0_x_mitre_contents_1638_object_ref_relationship--e012da15-7669-4764-ad9d-8a1d817bcca9" "objects_0_x_mitre_contents_1638_object_modified_2023-08-08T16:22:19.012Z" "objects_0_x_mitre_contents_1639_object_ref_relationship--e03b0eb5-32c6-4867-9235-77fe32192983" "objects_0_x_mitre_contents_1639_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1640_object_ref_relationship--e03b25b0-0779-48da-b5d7-28f1f6106363" "objects_0_x_mitre_contents_1640_object_modified_2020-12-24T22:04:27.992Z" "objects_0_x_mitre_contents_1641_object_ref_relationship--e05b61a4-ba8a-4aa5-813b-ad76de5945a8" "objects_0_x_mitre_contents_1641_object_modified_2020-09-24T15:34:51.433Z" "objects_0_x_mitre_contents_1642_object_ref_relationship--e0c3afc8-4b23-45fc-89cf-2cafbb51291e" "objects_0_x_mitre_contents_1642_object_modified_2023-03-03T16:25:52.931Z" "objects_0_x_mitre_contents_1643_object_ref_relationship--e0ebf0cd-9244-4cef-9171-128a12b87b58" "objects_0_x_mitre_contents_1643_object_modified_2023-04-05T20:32:29.636Z" "objects_0_x_mitre_contents_1644_object_ref_relationship--e0f58ab7-b246-4c41-9afc-89b582590809" "objects_0_x_mitre_contents_1644_object_modified_2020-12-18T20:14:47.374Z" "objects_0_x_mitre_contents_1645_object_ref_relationship--e135cefa-f019-479d-86eb-438972df73e0" "objects_0_x_mitre_contents_1645_object_modified_2023-04-05T20:48:30.652Z" "objects_0_x_mitre_contents_1646_object_ref_relationship--e14db7d0-4053-4e0a-8b43-b950133e6e36" "objects_0_x_mitre_contents_1646_object_modified_2023-08-07T22:18:26.965Z" "objects_0_x_mitre_contents_1647_object_ref_relationship--e245ad04-3fe9-4132-8bb4-77cdc4c3a1eb" "objects_0_x_mitre_contents_1647_object_modified_2023-10-10T15:33:58.272Z" "objects_0_x_mitre_contents_1648_object_ref_relationship--e245e45a-71a8-408d-8f32-7b7337bffc26" "objects_0_x_mitre_contents_1648_object_modified_2023-03-27T18:10:23.208Z" "objects_0_x_mitre_contents_1649_object_ref_relationship--e269e6a2-a709-4aa1-a260-f3f0d0284056" "objects_0_x_mitre_contents_1649_object_modified_2020-12-24T22:04:27.919Z" "objects_0_x_mitre_contents_1650_object_ref_relationship--e29d91f0-ebee-481d-9344-702c90775109" "objects_0_x_mitre_contents_1650_object_modified_2020-05-07T15:33:32.928Z" "objects_0_x_mitre_contents_1651_object_ref_relationship--e2ee6825-43c2-441f-ba96-404a330a9059" "objects_0_x_mitre_contents_1651_object_modified_2023-04-05T19:54:51.590Z" "objects_0_x_mitre_contents_1652_object_ref_relationship--e33106e1-16ef-41b8-8d47-78c9f2b4dceb" "objects_0_x_mitre_contents_1652_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1653_object_ref_relationship--e34c8c23-be8f-4da9-b051-5246e5f16ba8" "objects_0_x_mitre_contents_1653_object_modified_2023-03-31T22:14:48.174Z" "objects_0_x_mitre_contents_1654_object_ref_relationship--e35b013b-89e8-41b3-a518-7737234ab71b" "objects_0_x_mitre_contents_1654_object_modified_2020-01-27T17:05:58.312Z" "objects_0_x_mitre_contents_1655_object_ref_relationship--e3a961ec-8184-4143-b8c2-c33ea0503678" "objects_0_x_mitre_contents_1655_object_modified_2020-09-24T15:34:51.315Z" "objects_0_x_mitre_contents_1656_object_ref_relationship--e3d04885-95a5-47cb-a038-b58542cf787d" "objects_0_x_mitre_contents_1656_object_modified_2023-04-05T17:08:39.524Z" "objects_0_x_mitre_contents_1657_object_ref_relationship--e4019493-bd52-4011-9355-8902be6ff3f3" "objects_0_x_mitre_contents_1657_object_modified_2023-04-05T17:49:19.083Z" "objects_0_x_mitre_contents_1658_object_ref_relationship--e457921c-4a0b-4d6e-92e7-553929ddf943" "objects_0_x_mitre_contents_1658_object_modified_2023-03-27T17:23:48.120Z" "objects_0_x_mitre_contents_1659_object_ref_relationship--e4beccfa-a9a5-447d-8164-d39a1b2c5532" "objects_0_x_mitre_contents_1659_object_modified_2023-02-06T19:46:43.041Z" "objects_0_x_mitre_contents_1660_object_ref_relationship--e4f90a20-f1c6-4820-8c3e-751c79cc82e8" "objects_0_x_mitre_contents_1660_object_modified_2023-08-09T15:54:20.664Z" "objects_0_x_mitre_contents_1661_object_ref_relationship--e5113d45-05bd-499f-a2e0-9edc6d7c03b6" "objects_0_x_mitre_contents_1661_object_modified_2022-04-20T17:56:24.292Z" "objects_0_x_mitre_contents_1662_object_ref_relationship--e5ccc5c7-11ee-4357-8dd4-bf23ce2111bb" "objects_0_x_mitre_contents_1662_object_modified_2023-04-05T17:41:54.548Z" "objects_0_x_mitre_contents_1663_object_ref_relationship--e5e4567e-05a3-4d79-beab-191efc336473" "objects_0_x_mitre_contents_1663_object_modified_2020-03-26T20:50:07.266Z" "objects_0_x_mitre_contents_1664_object_ref_relationship--e723d78f-b6c3-4ba5-8946-b44e651834e3" "objects_0_x_mitre_contents_1664_object_modified_2023-08-10T21:06:58.988Z" "objects_0_x_mitre_contents_1665_object_ref_relationship--e75c623a-f9ac-4f46-b093-dd0e40b50cc6" "objects_0_x_mitre_contents_1665_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1666_object_ref_relationship--e767fc9e-5211-4e7c-b628-5dd03a24af39" "objects_0_x_mitre_contents_1666_object_modified_2023-04-05T20:32:42.890Z" "objects_0_x_mitre_contents_1667_object_ref_relationship--e78b2cd9-ef73-45d9-9477-e2e95454e208" "objects_0_x_mitre_contents_1667_object_modified_2020-08-10T21:57:54.537Z" "objects_0_x_mitre_contents_1668_object_ref_relationship--e7af5be1-721f-40c5-b647-659243a0a14b" "objects_0_x_mitre_contents_1668_object_modified_2021-09-20T13:50:02.057Z" "objects_0_x_mitre_contents_1669_object_ref_relationship--e7b33eb5-6c2e-4743-ac8d-c27d5e7121ac" "objects_0_x_mitre_contents_1669_object_modified_2023-04-05T20:35:13.005Z" "objects_0_x_mitre_contents_1670_object_ref_relationship--e7b7e813-4867-46fe-bf86-6f367553d765" "objects_0_x_mitre_contents_1670_object_modified_2020-01-21T14:20:50.455Z" "objects_0_x_mitre_contents_1671_object_ref_relationship--e84ad4b0-9f7a-48a5-89ae-33804b11eb56" "objects_0_x_mitre_contents_1671_object_modified_2023-04-05T17:12:22.002Z" "objects_0_x_mitre_contents_1672_object_ref_relationship--e8768455-4d0c-4e3c-a901-1fc871227745" "objects_0_x_mitre_contents_1672_object_modified_2022-03-30T17:54:56.603Z" "objects_0_x_mitre_contents_1673_object_ref_relationship--e87aa0d6-241f-4f72-bdb6-54e8d5584ae2" "objects_0_x_mitre_contents_1673_object_modified_2023-04-05T17:42:14.121Z" "objects_0_x_mitre_contents_1674_object_ref_relationship--e889782a-f66b-448e-a466-e55b1bce7b64" "objects_0_x_mitre_contents_1674_object_modified_2023-02-28T20:38:25.598Z" "objects_0_x_mitre_contents_1675_object_ref_relationship--e8c833ee-4c7d-45a2-b29b-187fe3661c0d" "objects_0_x_mitre_contents_1675_object_modified_2023-04-05T19:55:35.453Z" "objects_0_x_mitre_contents_1676_object_ref_relationship--e928c0ce-2b98-4af5-a990-f690f4306681" "objects_0_x_mitre_contents_1676_object_modified_2023-08-08T14:56:32.077Z" "objects_0_x_mitre_contents_1677_object_ref_relationship--e95ac47c-8822-4ce5-bd65-f61ca873854b" "objects_0_x_mitre_contents_1677_object_modified_2023-09-28T17:21:15.893Z" "objects_0_x_mitre_contents_1678_object_ref_relationship--e9607e4f-5743-4bbb-b7d4-5554d66c8be7" "objects_0_x_mitre_contents_1678_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1679_object_ref_relationship--e99fd1c9-441f-41bc-83a1-e7bed8f2d7fb" "objects_0_x_mitre_contents_1679_object_modified_2020-12-17T20:15:22.444Z" "objects_0_x_mitre_contents_1680_object_ref_relationship--e9b262ba-1c32-40b3-8622-121b30d6df50" "objects_0_x_mitre_contents_1680_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1681_object_ref_relationship--e9c5deb9-30d4-4bc3-98ca-6089d4b74b1e" "objects_0_x_mitre_contents_1681_object_modified_2020-12-24T21:55:56.745Z" "objects_0_x_mitre_contents_1682_object_ref_relationship--e9cbc901-38cb-4895-9dfb-7a4fe10ba6d7" "objects_0_x_mitre_contents_1682_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1683_object_ref_relationship--e9d5992e-04ef-4835-87df-cf6434dcabbc" "objects_0_x_mitre_contents_1683_object_modified_2023-08-09T15:51:08.240Z" "objects_0_x_mitre_contents_1684_object_ref_relationship--ea2ad242-4365-4868-8beb-4a634f3ba6b7" "objects_0_x_mitre_contents_1684_object_modified_2020-11-24T17:55:12.822Z" "objects_0_x_mitre_contents_1685_object_ref_relationship--eb052029-e1c9-4f24-8594-299aaec7f1df" "objects_0_x_mitre_contents_1685_object_modified_2023-04-05T17:42:46.952Z" "objects_0_x_mitre_contents_1686_object_ref_relationship--eb1eeb37-37a8-47b6-aff8-9703735a4d93" "objects_0_x_mitre_contents_1686_object_modified_2020-09-11T15:50:18.937Z" "objects_0_x_mitre_contents_1687_object_ref_relationship--eb27258f-6bb9-49b5-928e-b66f37f8f16e" "objects_0_x_mitre_contents_1687_object_modified_2023-04-05T21:24:55.047Z" "objects_0_x_mitre_contents_1688_object_ref_relationship--eb58117c-5803-4f72-a499-5fa888a9a7a5" "objects_0_x_mitre_contents_1688_object_modified_2022-04-06T15:47:06.163Z" "objects_0_x_mitre_contents_1689_object_ref_relationship--eb69d3c1-aa16-429e-9b72-c1a993e584fa" "objects_0_x_mitre_contents_1689_object_modified_2023-07-14T19:11:45.176Z" "objects_0_x_mitre_contents_1690_object_ref_relationship--eb6dbe2a-6f76-4bce-ab37-66ec67148041" "objects_0_x_mitre_contents_1690_object_modified_2020-06-24T15:08:18.481Z" "objects_0_x_mitre_contents_1691_object_ref_relationship--eb784dcf-4188-47e2-9217-837b262acfb9" "objects_0_x_mitre_contents_1691_object_modified_2022-04-01T18:43:01.860Z" "objects_0_x_mitre_contents_1692_object_ref_relationship--eba4b561-84c9-4d49-a8b8-1842c3ed94f3" "objects_0_x_mitre_contents_1692_object_modified_2023-03-27T17:25:11.903Z" "objects_0_x_mitre_contents_1693_object_ref_relationship--ec734b52-a823-495c-9684-c4649269723e" "objects_0_x_mitre_contents_1693_object_modified_2023-09-28T17:22:03.028Z" "objects_0_x_mitre_contents_1694_object_ref_relationship--ec819008-396a-4ca3-b8d3-fda7f28128d0" "objects_0_x_mitre_contents_1694_object_modified_2023-08-14T16:33:56.635Z" "objects_0_x_mitre_contents_1695_object_ref_relationship--eca02e5c-f8de-4436-a7dd-0f656c759a42" "objects_0_x_mitre_contents_1695_object_modified_2021-10-06T15:32:46.477Z" "objects_0_x_mitre_contents_1696_object_ref_relationship--eca69d9c-7c27-4147-ad7a-a1c30317df1d" "objects_0_x_mitre_contents_1696_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1697_object_ref_relationship--ece70dca-803c-4209-8792-7e56e9901288" "objects_0_x_mitre_contents_1697_object_modified_2023-04-05T20:38:15.470Z" "objects_0_x_mitre_contents_1698_object_ref_relationship--eceeb39e-887c-4a9b-a93b-a6fd768e455a" "objects_0_x_mitre_contents_1698_object_modified_2020-07-15T20:20:59.186Z" "objects_0_x_mitre_contents_1699_object_ref_relationship--ed3293cf-de4f-4a73-98af-24325e8187c9" "objects_0_x_mitre_contents_1699_object_modified_2023-04-05T20:51:43.135Z" "objects_0_x_mitre_contents_1700_object_ref_relationship--ed48a86f-e55f-4abf-8f18-98591b756399" "objects_0_x_mitre_contents_1700_object_modified_2023-03-03T16:19:30.443Z" "objects_0_x_mitre_contents_1701_object_ref_relationship--ed7e9368-004c-484f-9eed-03b158325564" "objects_0_x_mitre_contents_1701_object_modified_2023-08-09T14:39:38.390Z" "objects_0_x_mitre_contents_1702_object_ref_relationship--eda3c5c4-d062-48d3-a78e-051f0c9d62f6" "objects_0_x_mitre_contents_1702_object_modified_2023-02-28T20:31:55.191Z" "objects_0_x_mitre_contents_1703_object_ref_relationship--ede5c314-5988-4151-bb30-b6a6983d02c0" "objects_0_x_mitre_contents_1703_object_modified_2022-04-15T15:16:53.317Z" "objects_0_x_mitre_contents_1704_object_ref_relationship--edfb68d0-5efd-4fb5-93f9-c432535686cb" "objects_0_x_mitre_contents_1704_object_modified_2023-04-05T19:56:00.761Z" "objects_0_x_mitre_contents_1705_object_ref_relationship--ee095f20-eef5-4dcc-a537-70b387592c2c" "objects_0_x_mitre_contents_1705_object_modified_2023-03-31T22:15:20.089Z" "objects_0_x_mitre_contents_1706_object_ref_relationship--ee92911e-e2a2-4b40-916d-ce01b6e897f9" "objects_0_x_mitre_contents_1706_object_modified_2023-04-05T19:56:18.859Z" "objects_0_x_mitre_contents_1707_object_ref_relationship--ee9c1a8c-5f84-4571-8518-300a6412df0f" "objects_0_x_mitre_contents_1707_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1708_object_ref_relationship--eee008fa-a46f-4542-93e3-8fe5f949130f" "objects_0_x_mitre_contents_1708_object_modified_2023-03-29T21:21:37.086Z" "objects_0_x_mitre_contents_1709_object_ref_relationship--eef4ffb7-892d-4d3f-826c-0b78d1f22671" "objects_0_x_mitre_contents_1709_object_modified_2022-04-18T16:07:26.671Z" "objects_0_x_mitre_contents_1710_object_ref_relationship--eef8fb1f-3e8c-44d7-b0d1-1fbad81e392f" "objects_0_x_mitre_contents_1710_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1711_object_ref_relationship--ef792cb5-cb1f-4871-a2ef-20e6150d4005" "objects_0_x_mitre_contents_1711_object_modified_2023-10-10T15:33:57.735Z" "objects_0_x_mitre_contents_1712_object_ref_relationship--efd35b6f-7a61-4998-97ff-608547e40f66" "objects_0_x_mitre_contents_1712_object_modified_2022-04-18T16:07:57.631Z" "objects_0_x_mitre_contents_1713_object_ref_relationship--f012feab-5612-429f-81bd-ff75d6ffd04e" "objects_0_x_mitre_contents_1713_object_modified_2022-04-05T17:03:34.941Z" "objects_0_x_mitre_contents_1714_object_ref_relationship--f051c943-998c-4db2-9dbc-d4755057bcf0" "objects_0_x_mitre_contents_1714_object_modified_2022-04-05T19:49:06.417Z" "objects_0_x_mitre_contents_1715_object_ref_relationship--f062ebc5-bad0-4b19-8c97-bf3915d687bd" "objects_0_x_mitre_contents_1715_object_modified_2023-08-14T16:23:02.162Z" "objects_0_x_mitre_contents_1716_object_ref_relationship--f0851531-e554-4658-920c-f2342632c19a" "objects_0_x_mitre_contents_1716_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1717_object_ref_relationship--f0a0005e-cc38-4f7a-ba49-21a4c48ae1a1" "objects_0_x_mitre_contents_1717_object_modified_2020-07-15T20:20:59.284Z" "objects_0_x_mitre_contents_1718_object_ref_relationship--f0e39856-4d2d-45c5-bf16-f683ee993010" "objects_0_x_mitre_contents_1718_object_modified_2022-03-30T18:18:15.915Z" "objects_0_x_mitre_contents_1719_object_ref_relationship--f1130c77-3d20-4c41-9e75-1953bf9b8abc" "objects_0_x_mitre_contents_1719_object_modified_2023-04-05T20:40:48.237Z" "objects_0_x_mitre_contents_1720_object_ref_relationship--f157970b-4782-46d0-abdd-000ae6eea14b" "objects_0_x_mitre_contents_1720_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1721_object_ref_relationship--f240e06c-3a5b-4a34-a69c-5fccb4c94150" "objects_0_x_mitre_contents_1721_object_modified_2020-05-11T16:37:36.673Z" "objects_0_x_mitre_contents_1722_object_ref_relationship--f259b5a8-bf2f-48c9-ae1b-b20d53daf665" "objects_0_x_mitre_contents_1722_object_modified_2023-07-21T19:39:51.044Z" "objects_0_x_mitre_contents_1723_object_ref_relationship--f28a2873-281f-405b-bad0-4a93dac8a5ee" "objects_0_x_mitre_contents_1723_object_modified_2022-04-12T10:01:44.682Z" "objects_0_x_mitre_contents_1724_object_ref_relationship--f2d05b16-3565-453e-9fbb-1c02146e17e1" "objects_0_x_mitre_contents_1724_object_modified_2022-04-15T17:33:17.868Z" "objects_0_x_mitre_contents_1725_object_ref_relationship--f31490e8-ef81-40d5-bba9-24ca580d2ee6" "objects_0_x_mitre_contents_1725_object_modified_2023-04-05T20:46:20.857Z" "objects_0_x_mitre_contents_1726_object_ref_relationship--f3599919-c4d1-4f2e-92d4-b34a04e33132" "objects_0_x_mitre_contents_1726_object_modified_2022-03-30T14:06:26.530Z" "objects_0_x_mitre_contents_1727_object_ref_relationship--f390ee16-a7c8-4ef2-b6f4-28940a8f0d81" "objects_0_x_mitre_contents_1727_object_modified_2023-08-09T15:40:17.754Z" "objects_0_x_mitre_contents_1728_object_ref_relationship--f3e902fe-7eea-4b85-9067-25d29fd01dc5" "objects_0_x_mitre_contents_1728_object_modified_2023-08-07T17:20:13.644Z" "objects_0_x_mitre_contents_1729_object_ref_relationship--f4aeacef-035c-4308-9e85-997703e27809" "objects_0_x_mitre_contents_1729_object_modified_2023-04-05T17:27:33.906Z" "objects_0_x_mitre_contents_1730_object_ref_relationship--f4cc3b3a-284d-4a2d-9ab8-e7fa916c4012" "objects_0_x_mitre_contents_1730_object_modified_2020-12-14T14:52:03.218Z" "objects_0_x_mitre_contents_1731_object_ref_relationship--f4d5e619-7c83-4845-aecd-de62c33cc0a1" "objects_0_x_mitre_contents_1731_object_modified_2023-04-05T20:32:57.154Z" "objects_0_x_mitre_contents_1732_object_ref_relationship--f4e4c3ae-4c4d-4eba-8330-022464cbf828" "objects_0_x_mitre_contents_1732_object_modified_2023-04-05T20:33:12.082Z" "objects_0_x_mitre_contents_1733_object_ref_relationship--f4f4660c-6324-4da4-be2f-ac87fda85a45" "objects_0_x_mitre_contents_1733_object_modified_2022-04-01T14:50:28.686Z" "objects_0_x_mitre_contents_1734_object_ref_relationship--f517a7ce-dfdc-4f42-84c1-fef136e2ea19" "objects_0_x_mitre_contents_1734_object_modified_2023-04-05T20:41:01.468Z" "objects_0_x_mitre_contents_1735_object_ref_relationship--f5196775-2c99-4dc5-b173-6a10af503c6e" "objects_0_x_mitre_contents_1735_object_modified_2023-09-25T19:55:13.827Z" "objects_0_x_mitre_contents_1736_object_ref_relationship--f552ee2f-5e6a-47a1-b6a5-d5e5594feb0d" "objects_0_x_mitre_contents_1736_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1737_object_ref_relationship--f56b8307-80e3-4d73-869f-1e8b9538dbc4" "objects_0_x_mitre_contents_1737_object_modified_2022-09-30T18:45:10.156Z" "objects_0_x_mitre_contents_1738_object_ref_relationship--f58d3fc4-e0a2-4924-884d-85d7c8f00b8a" "objects_0_x_mitre_contents_1738_object_modified_2023-08-08T17:14:24.009Z" "objects_0_x_mitre_contents_1739_object_ref_relationship--f5acd046-2943-48bf-836a-2109c4f1a5c4" "objects_0_x_mitre_contents_1739_object_modified_2023-09-28T17:20:50.748Z" "objects_0_x_mitre_contents_1740_object_ref_relationship--f5d24a31-53d2-4e84-9110-2da0582132cb" "objects_0_x_mitre_contents_1740_object_modified_2022-04-15T16:44:17.145Z" "objects_0_x_mitre_contents_1741_object_ref_relationship--f5e9afdc-1aeb-472f-b267-46e7978f9d78" "objects_0_x_mitre_contents_1741_object_modified_2023-08-09T15:58:57.985Z" "objects_0_x_mitre_contents_1742_object_ref_relationship--f5fab17b-43e7-46ff-bdea-eb8c52a0c6c3" "objects_0_x_mitre_contents_1742_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1743_object_ref_relationship--f6098dca-3a9e-4991-8d51-1310b12161b6" "objects_0_x_mitre_contents_1743_object_modified_2022-04-19T14:25:41.669Z" "objects_0_x_mitre_contents_1744_object_ref_relationship--f622a267-7a58-4082-a3f5-10e9bb549a5e" "objects_0_x_mitre_contents_1744_object_modified_2022-03-30T20:43:31.249Z" "objects_0_x_mitre_contents_1745_object_ref_relationship--f62e0aaf-e52f-40b9-a059-001f298a0660" "objects_0_x_mitre_contents_1745_object_modified_2023-04-05T17:19:00.168Z" "objects_0_x_mitre_contents_1746_object_ref_relationship--f632b0bb-69ce-4678-bc3c-9ddff5a38794" "objects_0_x_mitre_contents_1746_object_modified_2020-01-21T14:20:50.474Z" "objects_0_x_mitre_contents_1747_object_ref_relationship--f6417788-0c6e-4172-9010-f20870ec2278" "objects_0_x_mitre_contents_1747_object_modified_2023-06-09T19:16:07.193Z" "objects_0_x_mitre_contents_1748_object_ref_relationship--f65087b4-adf2-4292-a711-7ae829e91397" "objects_0_x_mitre_contents_1748_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1749_object_ref_relationship--f6770c26-ae93-468d-acaa-ab4ffea0e047" "objects_0_x_mitre_contents_1749_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1750_object_ref_relationship--f69ff81e-22e4-450c-b3dd-7f3f66610663" "objects_0_x_mitre_contents_1750_object_modified_2023-08-16T16:39:10.564Z" "objects_0_x_mitre_contents_1751_object_ref_relationship--f6a451e8-2125-4bbe-be52-e682523cd169" "objects_0_x_mitre_contents_1751_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1752_object_ref_relationship--f6f21954-c592-40d8-b7a0-75f332c42eaa" "objects_0_x_mitre_contents_1752_object_modified_2023-04-05T17:00:38.611Z" "objects_0_x_mitre_contents_1753_object_ref_relationship--f7039142-dbdc-4ffc-a54f-136ad57a6ac1" "objects_0_x_mitre_contents_1753_object_modified_2020-09-24T15:12:24.242Z" "objects_0_x_mitre_contents_1754_object_ref_relationship--f709a4a5-2d7f-4fa8-bad8-a536fd3cc7fc" "objects_0_x_mitre_contents_1754_object_modified_2022-04-01T13:18:40.460Z" "objects_0_x_mitre_contents_1755_object_ref_relationship--f747ccb7-32c0-45fc-9842-bfb160a9db22" "objects_0_x_mitre_contents_1755_object_modified_2023-07-21T19:39:20.054Z" "objects_0_x_mitre_contents_1756_object_ref_relationship--f776a4da-0fa6-414c-a705-e9e8b419e056" "objects_0_x_mitre_contents_1756_object_modified_2020-06-26T15:32:25.058Z" "objects_0_x_mitre_contents_1757_object_ref_relationship--f7bebe78-2e21-466d-878b-f70be6c0e94a" "objects_0_x_mitre_contents_1757_object_modified_2023-04-05T19:56:32.861Z" "objects_0_x_mitre_contents_1758_object_ref_relationship--f7c5c344-4310-4e2a-a5aa-133f3d132fff" "objects_0_x_mitre_contents_1758_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1759_object_ref_relationship--f8151852-5a56-4c91-a691-1e50387a291d" "objects_0_x_mitre_contents_1759_object_modified_2023-09-28T17:39:14.900Z" "objects_0_x_mitre_contents_1760_object_ref_relationship--f84355c2-b829-4324-821a-b5148734bb6b" "objects_0_x_mitre_contents_1760_object_modified_2022-04-01T15:21:35.655Z" "objects_0_x_mitre_contents_1761_object_ref_relationship--f857935b-653a-4b9a-a2dc-59c042059a39" "objects_0_x_mitre_contents_1761_object_modified_2023-08-14T16:28:45.049Z" "objects_0_x_mitre_contents_1762_object_ref_relationship--f87bb2d2-e7fd-44ce-b537-e7e01086731c" "objects_0_x_mitre_contents_1762_object_modified_2020-12-18T21:00:05.246Z" "objects_0_x_mitre_contents_1763_object_ref_relationship--f88cbb0c-ca34-4a87-82fa-e0e567ee8d57" "objects_0_x_mitre_contents_1763_object_modified_2020-04-08T15:51:25.120Z" "objects_0_x_mitre_contents_1764_object_ref_relationship--f92fe9dd-7296-42f6-904e-e245c438376e" "objects_0_x_mitre_contents_1764_object_modified_2023-04-05T21:25:06.012Z" "objects_0_x_mitre_contents_1765_object_ref_relationship--f947d845-4d70-41f3-ae3c-18ea8b44e667" "objects_0_x_mitre_contents_1765_object_modified_2023-04-21T18:51:23.251Z" "objects_0_x_mitre_contents_1766_object_ref_relationship--f95fec2e-f5cf-49c9-8e0b-1c6c5fd15d8f" "objects_0_x_mitre_contents_1766_object_modified_2022-04-11T14:26:44.192Z" "objects_0_x_mitre_contents_1767_object_ref_relationship--f989562f-41a8-46d3-94ba-fca7269ae592" "objects_0_x_mitre_contents_1767_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1768_object_ref_relationship--f9d0cfb5-aeda-4de4-9c72-7098297555ae" "objects_0_x_mitre_contents_1768_object_modified_2022-04-01T13:31:59.712Z" "objects_0_x_mitre_contents_1769_object_ref_relationship--f9de9819-b131-459e-948b-bdf3fe6f1ef0" "objects_0_x_mitre_contents_1769_object_modified_2020-12-24T21:55:56.686Z" "objects_0_x_mitre_contents_1770_object_ref_relationship--fa13936f-9b9d-4b48-a33f-81044f6cdedb" "objects_0_x_mitre_contents_1770_object_modified_2023-04-05T20:17:07.033Z" "objects_0_x_mitre_contents_1771_object_ref_relationship--fa1da6db-da32-45d2-98a8-6bbe153166da" "objects_0_x_mitre_contents_1771_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1772_object_ref_relationship--fa222de8-ba3a-45c1-a7eb-d7502843cc2d" "objects_0_x_mitre_contents_1772_object_modified_2021-01-05T20:16:20.417Z" "objects_0_x_mitre_contents_1773_object_ref_relationship--fa5f3aea-2131-4690-8833-dc428fae2b22" "objects_0_x_mitre_contents_1773_object_modified_2023-03-27T18:57:53.504Z" "objects_0_x_mitre_contents_1774_object_ref_relationship--fada5ba5-7449-4878-b555-82f225473c8b" "objects_0_x_mitre_contents_1774_object_modified_2022-03-30T19:28:42.179Z" "objects_0_x_mitre_contents_1775_object_ref_relationship--fadd27ec-56ac-4834-af40-76c9e8764eb9" "objects_0_x_mitre_contents_1775_object_modified_2023-07-21T19:34:53.934Z" "objects_0_x_mitre_contents_1776_object_ref_relationship--faf3396c-3a53-478c-b15c-7ff44ef4a5f5" "objects_0_x_mitre_contents_1776_object_modified_2023-06-09T19:16:53.458Z" "objects_0_x_mitre_contents_1777_object_ref_relationship--faff9f9c-9064-4b3a-bdf9-bbeced2447a6" "objects_0_x_mitre_contents_1777_object_modified_2023-04-05T20:33:34.466Z" "objects_0_x_mitre_contents_1778_object_ref_relationship--fb2a14c1-bed9-4c3f-a60b-8df384c18b68" "objects_0_x_mitre_contents_1778_object_modified_2021-04-19T14:29:46.650Z" "objects_0_x_mitre_contents_1779_object_ref_relationship--fb3b32a8-6422-4d44-91e3-27a58e569963" "objects_0_x_mitre_contents_1779_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1780_object_ref_relationship--fb51161a-ef2e-41a4-b5f9-bd1f64f95674" "objects_0_x_mitre_contents_1780_object_modified_2020-12-24T22:04:28.025Z" "objects_0_x_mitre_contents_1781_object_ref_relationship--fb587f81-1300-438d-a33b-f8d08530788b" "objects_0_x_mitre_contents_1781_object_modified_2023-04-05T20:41:13.182Z" "objects_0_x_mitre_contents_1782_object_ref_relationship--fb5c6c5e-53d4-4bb9-b9cf-74170058b19b" "objects_0_x_mitre_contents_1782_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1783_object_ref_relationship--fb62afa9-d593-44f8-840d-bd5c595a1228" "objects_0_x_mitre_contents_1783_object_modified_2022-04-01T18:44:46.780Z" "objects_0_x_mitre_contents_1784_object_ref_relationship--fb6458b0-01b8-4c3f-b0f2-ef5d5bd9f6a8" "objects_0_x_mitre_contents_1784_object_modified_2023-04-05T16:50:54.500Z" "objects_0_x_mitre_contents_1785_object_ref_relationship--fbdbddd7-4980-4061-9192-24a887bc6bad" "objects_0_x_mitre_contents_1785_object_modified_2020-12-07T14:28:32.141Z" "objects_0_x_mitre_contents_1786_object_ref_relationship--fbeef07b-7aa1-461c-884a-d3c4f730d5f7" "objects_0_x_mitre_contents_1786_object_modified_2023-09-28T17:22:27.968Z" "objects_0_x_mitre_contents_1787_object_ref_relationship--fc22c1f0-6888-43c0-ac7e-ee3d21feafc4" "objects_0_x_mitre_contents_1787_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1788_object_ref_relationship--fc7639c8-0e52-4f6f-9cf3-7840be81ad55" "objects_0_x_mitre_contents_1788_object_modified_2023-03-03T16:23:56.031Z" "objects_0_x_mitre_contents_1789_object_ref_relationship--fc816ddc-199d-47b0-93af-c81305d0919f" "objects_0_x_mitre_contents_1789_object_modified_2020-06-02T14:32:31.767Z" "objects_0_x_mitre_contents_1790_object_ref_relationship--fcb3a139-f644-45c9-8123-dfea0455143a" "objects_0_x_mitre_contents_1790_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1791_object_ref_relationship--fcc42341-ec3a-4e24-a374-46bed72d061f" "objects_0_x_mitre_contents_1791_object_modified_2021-10-01T14:42:49.191Z" "objects_0_x_mitre_contents_1792_object_ref_relationship--fcda686d-0c3a-457a-a34d-6dcfb28f54bd" "objects_0_x_mitre_contents_1792_object_modified_2023-04-05T17:49:38.924Z" "objects_0_x_mitre_contents_1793_object_ref_relationship--fcdc2f1f-9787-4faa-86bf-2ed73f15a576" "objects_0_x_mitre_contents_1793_object_modified_2020-09-14T15:39:17.961Z" "objects_0_x_mitre_contents_1794_object_ref_relationship--fd50cda0-66d4-4ae1-864e-9345d8124ce2" "objects_0_x_mitre_contents_1794_object_modified_2023-08-08T16:14:27.679Z" "objects_0_x_mitre_contents_1795_object_ref_relationship--fd5b3d4b-5d56-4d66-8b57-f858bc139901" "objects_0_x_mitre_contents_1795_object_modified_2020-04-24T17:46:31.607Z" "objects_0_x_mitre_contents_1796_object_ref_relationship--fd6c7f4b-ce0f-4770-8487-786e41b63549" "objects_0_x_mitre_contents_1796_object_modified_2023-08-07T17:12:07.475Z" "objects_0_x_mitre_contents_1797_object_ref_relationship--fd8a4b6d-0e7b-4105-ad7b-576836be6394" "objects_0_x_mitre_contents_1797_object_modified_2023-04-05T17:07:15.780Z" "objects_0_x_mitre_contents_1798_object_ref_relationship--fda8fe32-6121-4b81-9aa0-4e9596db88b1" "objects_0_x_mitre_contents_1798_object_modified_2023-04-05T20:33:57.748Z" "objects_0_x_mitre_contents_1799_object_ref_relationship--fdf06a0b-08d2-4cac-9d49-b3f1454ec4ea" "objects_0_x_mitre_contents_1799_object_modified_2022-03-30T19:32:43.015Z" "objects_0_x_mitre_contents_1800_object_ref_relationship--fe794ba6-42be-4d42-a16f-a41473874331" "objects_0_x_mitre_contents_1800_object_modified_2022-03-30T15:08:13.679Z" "objects_0_x_mitre_contents_1801_object_ref_relationship--ff3aa49b-c054-44ec-89da-6c67d4995193" "objects_0_x_mitre_contents_1801_object_modified_2023-08-09T15:52:15.261Z" "objects_0_x_mitre_contents_1802_object_ref_relationship--ff410bea-7b23-4b0c-9979-b7ae3050d938" "objects_0_x_mitre_contents_1802_object_modified_2023-08-04T18:34:26.118Z" "objects_0_x_mitre_contents_1803_object_ref_relationship--ff55feec-669d-4199-a05c-e8dfaebaaf8f" "objects_0_x_mitre_contents_1803_object_modified_2023-10-10T15:33:57.463Z" "objects_0_x_mitre_contents_1804_object_ref_relationship--ffc24804-42db-4be1-a418-7f5ab9de453c" "objects_0_x_mitre_contents_1804_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1805_object_ref_relationship--ffc82546-f4da-4f47-88ec-b215edb1d695" "objects_0_x_mitre_contents_1805_object_modified_2021-05-24T13:16:56.589Z" "objects_0_x_mitre_contents_1806_object_ref_relationship--ffddcabb-0f03-46ae-abd6-7ab94e91b055" "objects_0_x_mitre_contents_1806_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_1807_object_ref_relationship--fff16b5e-49c2-45e2-8b3a-fd5f82c96dd9" "objects_0_x_mitre_contents_1807_object_modified_2023-04-05T17:30:28.587Z" "objects_0_x_mitre_contents_1808_object_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_0_x_mitre_contents_1808_object_modified_2019-10-14T18:08:28.349Z" "objects_0_x_mitre_contents_1809_object_ref_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_0_x_mitre_contents_1809_object_modified_2022-10-24T15:09:07.609Z" "objects_0_x_mitre_contents_1810_object_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_0_x_mitre_contents_1810_object_modified_2022-10-20T20:18:06.745Z" "objects_0_x_mitre_contents_1811_object_ref_x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c" "objects_0_x_mitre_contents_1811_object_modified_2021-10-20T15:05:19.274Z" "objects_0_x_mitre_contents_1812_object_ref_x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077" "objects_0_x_mitre_contents_1812_object_modified_2022-10-07T16:15:56.932Z" "objects_0_x_mitre_contents_1813_object_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_0_x_mitre_contents_1813_object_modified_2023-03-13T20:48:14.540Z" "objects_0_x_mitre_contents_1814_object_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_0_x_mitre_contents_1814_object_modified_2023-03-13T19:59:14.491Z" "objects_0_x_mitre_contents_1815_object_ref_x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f" "objects_0_x_mitre_contents_1815_object_modified_2021-10-20T15:05:19.272Z" "objects_0_x_mitre_contents_1816_object_ref_x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0" "objects_0_x_mitre_contents_1816_object_modified_2022-10-07T16:14:39.124Z" "objects_0_x_mitre_contents_1817_object_ref_x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2" "objects_0_x_mitre_contents_1817_object_modified_2023-03-13T20:00:38.029Z" "objects_0_x_mitre_contents_1818_object_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_0_x_mitre_contents_1818_object_modified_2023-03-13T19:59:42.141Z" "objects_0_x_mitre_contents_1819_object_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_0_x_mitre_contents_1819_object_modified_2022-10-20T20:22:45.613Z" "objects_0_x_mitre_contents_1820_object_ref_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_0_x_mitre_contents_1820_object_modified_2021-10-20T15:05:19.274Z" "objects_0_x_mitre_contents_1821_object_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_0_x_mitre_contents_1821_object_modified_2023-03-13T20:00:08.487Z" "objects_0_x_mitre_contents_1822_object_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_0_x_mitre_contents_1822_object_modified_2023-03-13T20:47:52.557Z" "objects_0_x_mitre_contents_1823_object_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_0_x_mitre_contents_1823_object_modified_2023-03-13T20:47:24.038Z" "objects_0_x_mitre_contents_1824_object_ref_x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1" "objects_0_x_mitre_contents_1824_object_modified_2021-10-20T15:05:19.272Z" "objects_0_x_mitre_contents_1825_object_ref_x-mitre-data-source--4523e7f3-8de2-4078-96f8-1227eb537159" "objects_0_x_mitre_contents_1825_object_modified_2023-04-20T18:38:40.409Z" "objects_0_x_mitre_contents_1826_object_ref_x-mitre-data-source--55ba7d30-887f-42c1-a24e-c4e90aff24b8" "objects_0_x_mitre_contents_1826_object_modified_2023-03-13T19:36:25.108Z" "objects_0_x_mitre_contents_1827_object_ref_x-mitre-data-source--73691708-ffb5-4e29-906d-f485f6fa7089" "objects_0_x_mitre_contents_1827_object_modified_2023-04-20T18:38:00.625Z" "objects_0_x_mitre_contents_1828_object_ref_x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3" "objects_0_x_mitre_contents_1828_object_modified_2023-04-20T18:38:13.356Z" "objects_0_x_mitre_contents_1829_object_ref_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_0_x_mitre_contents_1829_object_modified_2023-03-13T19:30:41.131Z" "objects_0_x_mitre_contents_1830_object_ref_x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22" "objects_0_x_mitre_contents_1830_object_modified_2023-04-20T18:38:26.515Z" "objects_0_x_mitre_contents_1831_object_ref_x-mitre-matrix--5104d5f0-16b7-4aec-8ae3-0a90cd5494fc" "objects_0_x_mitre_contents_1831_object_modified_2022-04-06T15:44:04.736Z" "objects_0_x_mitre_contents_1832_object_ref_x-mitre-matrix--a382db5e-d009-4135-b893-0e0ff021c95b" "objects_0_x_mitre_contents_1832_object_modified_2022-04-06T15:43:22.080Z" "objects_0_x_mitre_contents_1833_object_ref_x-mitre-tactic--0a93fd8e-4a83-4c15-8203-db290e5f2ac6" "objects_0_x_mitre_contents_1833_object_modified_2020-01-27T14:02:36.744Z" "objects_0_x_mitre_contents_1834_object_ref_x-mitre-tactic--10fa8d8d-1b04-4176-917e-738724239981" "objects_0_x_mitre_contents_1834_object_modified_2020-01-27T14:06:42.009Z" "objects_0_x_mitre_contents_1835_object_ref_x-mitre-tactic--363bbeff-bb2a-4734-ac74-d6d37202fe54" "objects_0_x_mitre_contents_1835_object_modified_2020-01-27T14:03:15.455Z" "objects_0_x_mitre_contents_1836_object_ref_x-mitre-tactic--3e962de5-3280-43b7-bc10-334fbc1d6fa8" "objects_0_x_mitre_contents_1836_object_modified_2020-01-27T14:03:49.343Z" "objects_0_x_mitre_contents_1837_object_ref_x-mitre-tactic--3f660805-fa2e-42e8-8851-57f9e9b653e3" "objects_0_x_mitre_contents_1837_object_modified_2020-01-27T14:06:59.132Z" "objects_0_x_mitre_contents_1838_object_ref_x-mitre-tactic--4a800987-a3a8-4d56-a1bd-0d7171431756" "objects_0_x_mitre_contents_1838_object_modified_2020-01-27T14:00:49.089Z" "objects_0_x_mitre_contents_1839_object_ref_x-mitre-tactic--6ebce653-294a-444a-bffb-14c04c8d137e" "objects_0_x_mitre_contents_1839_object_modified_2020-01-27T16:09:15.308Z" "objects_0_x_mitre_contents_1840_object_ref_x-mitre-tactic--6fcb36b8-3776-483b-8699-42215714fb10" "objects_0_x_mitre_contents_1840_object_modified_2020-01-27T14:05:02.718Z" "objects_0_x_mitre_contents_1841_object_ref_x-mitre-tactic--7a0d25d3-f0c0-40bf-bf90-c743871b19ba" "objects_0_x_mitre_contents_1841_object_modified_2020-01-27T14:06:10.915Z" "objects_0_x_mitre_contents_1842_object_ref_x-mitre-tactic--7be441c2-0095-4b1e-8125-fa8ffda29b0f" "objects_0_x_mitre_contents_1842_object_modified_2020-01-27T14:05:37.854Z" "objects_0_x_mitre_contents_1843_object_ref_x-mitre-tactic--987cda6d-eb77-406b-bf68-bcb5f3d2e1df" "objects_0_x_mitre_contents_1843_object_modified_2020-01-27T14:04:46.497Z" "objects_0_x_mitre_contents_1844_object_ref_x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210" "objects_0_x_mitre_contents_1844_object_modified_2022-11-07T21:01:17.781Z" "objects_0_x_mitre_contents_1845_object_ref_x-mitre-tactic--d418cdeb-1b9f-4a6b-a15d-2f89f549f8c1" "objects_0_x_mitre_contents_1845_object_modified_2020-01-27T16:09:00.466Z" "objects_0_x_mitre_contents_1846_object_ref_x-mitre-tactic--e78d7d60-41b5-49b7-b0a9-5c5d4cbabe17" "objects_0_x_mitre_contents_1846_object_modified_2022-11-07T21:01:36.112Z" "objects_0_x_mitre_contents_1847_object_ref_relationship--bde9304b-4421-4185-a2c6-dabe1c080587" "objects_0_x_mitre_contents_1847_object_modified_2023-10-31T14:00:00.188Z" "objects_0_x_mitre_contents_1848_object_ref_relationship--55f12292-dc9d-4bfd-9de9-2d07cd67b044" "objects_0_x_mitre_contents_1848_object_modified_2023-04-25T14:00:00.188Z" "objects_0_x_mitre_contents_1849_object_ref_relationship--ac523dfb-36be-4402-acf2-abe98e183eef" "objects_0_x_mitre_contents_1849_object_modified_2023-04-25T14:00:00.188Z" "objects_0_x_mitre_contents_1850_object_ref_relationship--fb1fe91d-0997-4403-b2a6-88400f174791" "objects_0_x_mitre_contents_1850_object_modified_2023-04-25T14:00:00.188Z" "objects_0_x_mitre_contents_1851_object_ref_relationship--fbd2d4f7-96ff-4624-a567-d4882f0c10ca" "objects_0_x_mitre_contents_1851_object_modified_2023-04-25T14:00:00.188Z" "objects_0_x_mitre_contents_1852_object_ref_relationship--00e80df1-33e4-4b1b-8c6b-79197945c4e5" "objects_0_x_mitre_contents_1852_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1853_object_ref_relationship--018c744e-8d14-4b75-8c58-f661857dcb85" "objects_0_x_mitre_contents_1853_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1854_object_ref_relationship--02f9a60a-2115-4c43-b9c2-c49809fb9e76" "objects_0_x_mitre_contents_1854_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1855_object_ref_relationship--03683255-a5fa-44ef-83b8-0bd55386c4b9" "objects_0_x_mitre_contents_1855_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1856_object_ref_relationship--08327d65-1a15-4d65-961f-4c088c971a25" "objects_0_x_mitre_contents_1856_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1857_object_ref_relationship--08662ec2-e5c0-4512-960e-bc2e44804f1e" "objects_0_x_mitre_contents_1857_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1858_object_ref_relationship--08e7c0ad-f2d7-472c-97de-3627ca5d2991" "objects_0_x_mitre_contents_1858_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1859_object_ref_relationship--0977107c-9dd3-4cc5-b769-7e29da9f4bb6" "objects_0_x_mitre_contents_1859_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1860_object_ref_relationship--09fa9342-34cb-4f0d-8cdf-df4d51d0ae12" "objects_0_x_mitre_contents_1860_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1861_object_ref_relationship--0aab3d6b-a2b7-4e55-9614-4f2af8543af6" "objects_0_x_mitre_contents_1861_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1862_object_ref_relationship--0c53692d-16a1-4c25-8a3e-30802b2d0c7f" "objects_0_x_mitre_contents_1862_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1863_object_ref_relationship--0cb64ad4-bf3b-482c-be22-ce75e065691d" "objects_0_x_mitre_contents_1863_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1864_object_ref_relationship--0d2c663e-ac1a-402d-957b-b078654e57c1" "objects_0_x_mitre_contents_1864_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1865_object_ref_relationship--0e302702-222a-4239-bdc9-0f7500497983" "objects_0_x_mitre_contents_1865_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1866_object_ref_relationship--0fa68550-d0de-405b-acb3-b6a4b219753e" "objects_0_x_mitre_contents_1866_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1867_object_ref_relationship--108e8cb9-8f35-4b63-8b0b-466f4ab0ed02" "objects_0_x_mitre_contents_1867_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1868_object_ref_relationship--10c503d7-850b-4ae2-8b14-186cbe214d33" "objects_0_x_mitre_contents_1868_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1869_object_ref_relationship--1121d23e-a20a-4de2-a1d6-e0d519664850" "objects_0_x_mitre_contents_1869_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1870_object_ref_relationship--12332d52-6fd2-47a6-a3b5-d673150a9d12" "objects_0_x_mitre_contents_1870_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1871_object_ref_relationship--16a68568-f240-47f4-9f0c-5b4de449b5d6" "objects_0_x_mitre_contents_1871_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1872_object_ref_relationship--1bfffe11-00f6-449a-9e08-0395080147ef" "objects_0_x_mitre_contents_1872_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1873_object_ref_relationship--1ed76ca9-0ed6-40f9-89c6-64662fdd447d" "objects_0_x_mitre_contents_1873_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1874_object_ref_relationship--1f5ce357-f273-4a97-9086-b74652063372" "objects_0_x_mitre_contents_1874_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1875_object_ref_relationship--1fe03d39-31e0-4ecf-be7a-e14ec734b037" "objects_0_x_mitre_contents_1875_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1876_object_ref_relationship--205e2cd0-3f0b-459f-95c9-4e2745b67d83" "objects_0_x_mitre_contents_1876_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1877_object_ref_relationship--208c99ae-cc99-4172-89e7-3503600a9338" "objects_0_x_mitre_contents_1877_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1878_object_ref_relationship--254a8d5f-8431-4364-96db-d34d740e1384" "objects_0_x_mitre_contents_1878_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1879_object_ref_relationship--2555c438-cd9f-49ed-93f6-a935a9861c54" "objects_0_x_mitre_contents_1879_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1880_object_ref_relationship--26a9db86-5ecf-400a-bdd9-419448c2f776" "objects_0_x_mitre_contents_1880_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1881_object_ref_relationship--26c224fb-906a-48bd-b550-5608e2492c03" "objects_0_x_mitre_contents_1881_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1882_object_ref_relationship--2758c6ce-8c56-462f-8cbc-fb32ab098646" "objects_0_x_mitre_contents_1882_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1883_object_ref_relationship--275a0930-7409-4238-a072-f194cbd84057" "objects_0_x_mitre_contents_1883_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1884_object_ref_relationship--282d2448-6fe8-4995-b17e-4ce7586f75b9" "objects_0_x_mitre_contents_1884_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1885_object_ref_relationship--283f4e8e-07dc-4d22-84f9-536f9024307a" "objects_0_x_mitre_contents_1885_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1886_object_ref_relationship--28638246-abfb-4964-aa0f-57eb825338cc" "objects_0_x_mitre_contents_1886_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1887_object_ref_relationship--29c45d94-f985-4128-b845-bf1159d606cb" "objects_0_x_mitre_contents_1887_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1888_object_ref_relationship--2a287c91-2792-407f-a9ee-8153a802b7c6" "objects_0_x_mitre_contents_1888_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1889_object_ref_relationship--2a94bb7e-67af-4031-b4be-25c2a3ccd35c" "objects_0_x_mitre_contents_1889_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1890_object_ref_relationship--2c2a572c-92d1-47aa-9809-4a470cfae83c" "objects_0_x_mitre_contents_1890_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1891_object_ref_relationship--2e58b22f-b889-49fd-bbe1-37a907a5fcb1" "objects_0_x_mitre_contents_1891_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1892_object_ref_relationship--308823b4-c0de-4416-9d4a-26e2b69577f6" "objects_0_x_mitre_contents_1892_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1893_object_ref_relationship--30c39439-27e9-4247-bf2c-e8d2d7fd3b6d" "objects_0_x_mitre_contents_1893_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1894_object_ref_relationship--32625429-e05a-48a5-8f0b-53c6046e9b1a" "objects_0_x_mitre_contents_1894_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1895_object_ref_relationship--32d0832c-be5e-4939-a25a-a448cd679225" "objects_0_x_mitre_contents_1895_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1896_object_ref_relationship--336f139f-b771-48d4-a3d6-7ef94289d56e" "objects_0_x_mitre_contents_1896_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1897_object_ref_relationship--34cd9b65-70c5-4be4-958c-32dc4673934c" "objects_0_x_mitre_contents_1897_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1898_object_ref_relationship--37459382-00b7-4699-a294-d25f53bf1096" "objects_0_x_mitre_contents_1898_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1899_object_ref_relationship--376b8f2a-636e-4fa7-be6a-4300410c1954" "objects_0_x_mitre_contents_1899_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1900_object_ref_relationship--37c4a0cf-0552-46fd-b067-419b15833044" "objects_0_x_mitre_contents_1900_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1901_object_ref_relationship--3a869988-15a7-4ec8-9d7b-d460dc0ee494" "objects_0_x_mitre_contents_1901_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1902_object_ref_relationship--3b5d6c4f-1669-47d9-84fc-8af0adce2a29" "objects_0_x_mitre_contents_1902_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1903_object_ref_relationship--3f3d63f0-1f03-4931-9624-10eaf4b207b4" "objects_0_x_mitre_contents_1903_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1904_object_ref_relationship--3f984e70-7826-4208-872f-48844fd0ab82" "objects_0_x_mitre_contents_1904_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1905_object_ref_relationship--409570bb-77c9-4021-920e-1600a7f4efbd" "objects_0_x_mitre_contents_1905_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1906_object_ref_relationship--41e58a79-f8e4-4929-82ad-e15ce384f7a1" "objects_0_x_mitre_contents_1906_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1907_object_ref_relationship--4386e7d1-f21f-4055-9468-6af209ec4731" "objects_0_x_mitre_contents_1907_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1908_object_ref_relationship--443da947-76ab-4e1e-aefd-24aa83dcc131" "objects_0_x_mitre_contents_1908_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1909_object_ref_relationship--465ff71b-2b1b-43b6-ab78-afb273d956d2" "objects_0_x_mitre_contents_1909_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1910_object_ref_relationship--4727b752-0dc3-49b7-9fb1-2909ee560836" "objects_0_x_mitre_contents_1910_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1911_object_ref_relationship--47f9195c-d7b5-4336-9f65-814fa90d6bd2" "objects_0_x_mitre_contents_1911_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1912_object_ref_relationship--4bac7e76-7a1f-4091-9e38-ab5af842d73a" "objects_0_x_mitre_contents_1912_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1913_object_ref_relationship--4d2d892c-9d3a-445c-b9bf-1eab45703dcc" "objects_0_x_mitre_contents_1913_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1914_object_ref_relationship--4df969b3-f5a0-4802-b87e-a458e3e439ed" "objects_0_x_mitre_contents_1914_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1915_object_ref_relationship--4ed2e379-ce9c-44b2-b862-666b0b008427" "objects_0_x_mitre_contents_1915_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1916_object_ref_relationship--4fc45b06-287d-4151-9f5a-37bb34dcdeec" "objects_0_x_mitre_contents_1916_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1917_object_ref_relationship--51186ad6-e721-49cf-9cf7-89466d5f29f4" "objects_0_x_mitre_contents_1917_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1918_object_ref_relationship--525211c1-6c8c-4d0c-899e-c31664c9629e" "objects_0_x_mitre_contents_1918_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1919_object_ref_relationship--52a18c72-4370-485b-9a40-837eeddffd0d" "objects_0_x_mitre_contents_1919_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1920_object_ref_relationship--535113f0-0a0b-4a2e-b812-bba3fe995c0b" "objects_0_x_mitre_contents_1920_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1921_object_ref_relationship--5592b50e-a184-4a75-8501-99072d3a5b5f" "objects_0_x_mitre_contents_1921_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1922_object_ref_relationship--55ce7832-8322-4cb3-b300-1abae68ce2ac" "objects_0_x_mitre_contents_1922_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1923_object_ref_relationship--56c28b61-6372-4bd8-b711-772232eebbb5" "objects_0_x_mitre_contents_1923_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1924_object_ref_relationship--58de1b14-43bb-4788-915b-9cd15cd11bf0" "objects_0_x_mitre_contents_1924_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1925_object_ref_relationship--5aaf8838-d4c3-4d11-b70a-0dc1e72c3c07" "objects_0_x_mitre_contents_1925_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1926_object_ref_relationship--5ab9a1e6-cd16-4553-bc29-b0f01c1cc7e1" "objects_0_x_mitre_contents_1926_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1927_object_ref_relationship--5eb0452b-63c2-4f47-8a1e-4268a08f0802" "objects_0_x_mitre_contents_1927_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1928_object_ref_relationship--5f82db63-d7c2-43c7-a056-3cf718201ced" "objects_0_x_mitre_contents_1928_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1929_object_ref_relationship--5fddb05c-6123-4354-8844-3e8a7d624d78" "objects_0_x_mitre_contents_1929_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1930_object_ref_relationship--60e02651-278f-4f84-9dbc-cbbadaa18086" "objects_0_x_mitre_contents_1930_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1931_object_ref_relationship--62c3656a-e771-4da1-80f9-2c93fc42e7ec" "objects_0_x_mitre_contents_1931_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1932_object_ref_relationship--655c98a5-5af0-4b51-95fb-30100d52a0f1" "objects_0_x_mitre_contents_1932_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1933_object_ref_relationship--690111d3-c281-4d55-a7ed-73b8dab72a85" "objects_0_x_mitre_contents_1933_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1934_object_ref_relationship--6a0ce31a-72bb-4634-8d24-daa5880a99b0" "objects_0_x_mitre_contents_1934_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1935_object_ref_relationship--6b7a37c7-42a5-49ab-810a-4cf60784dea1" "objects_0_x_mitre_contents_1935_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1936_object_ref_relationship--6bb99599-aa51-4492-9c79-296a772233b4" "objects_0_x_mitre_contents_1936_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1937_object_ref_relationship--6e135f1d-e947-4079-8363-9a1344c57560" "objects_0_x_mitre_contents_1937_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1938_object_ref_relationship--6ee89b0e-a2ab-40c8-88fd-54f974ea00b1" "objects_0_x_mitre_contents_1938_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1939_object_ref_relationship--6f8b3839-ea91-44d5-ba68-b9d1e6076c19" "objects_0_x_mitre_contents_1939_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1940_object_ref_relationship--710071cc-efa5-4428-b0cd-f153f34ff5a4" "objects_0_x_mitre_contents_1940_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1941_object_ref_relationship--71b8f72c-72da-4547-9729-0f60b11917c4" "objects_0_x_mitre_contents_1941_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1942_object_ref_relationship--7351f186-991d-42aa-a426-d839178d4124" "objects_0_x_mitre_contents_1942_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1943_object_ref_relationship--737b3964-d09c-4e62-94bc-208302402c9b" "objects_0_x_mitre_contents_1943_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1944_object_ref_relationship--74155759-4c76-42d3-b64f-a898f7b582f9" "objects_0_x_mitre_contents_1944_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1945_object_ref_relationship--75d99f9b-aa91-45c0-803e-60f462ee3ab3" "objects_0_x_mitre_contents_1945_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1946_object_ref_relationship--77812d6a-4d1a-432e-805a-d810a742e93f" "objects_0_x_mitre_contents_1946_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1947_object_ref_relationship--7ba3b225-5446-4e9d-886b-1eb5c503e77a" "objects_0_x_mitre_contents_1947_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1948_object_ref_relationship--7c86cc89-2c2d-43fc-a5b6-bc5047af7cb4" "objects_0_x_mitre_contents_1948_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1949_object_ref_relationship--7e030fba-c123-4515-bc4f-482ea0947e2c" "objects_0_x_mitre_contents_1949_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1950_object_ref_relationship--7e189d23-1317-4c1d-a8b1-c5877eeb7a02" "objects_0_x_mitre_contents_1950_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1951_object_ref_relationship--822a677b-6d7b-4aa2-9cc3-878029b2ba4c" "objects_0_x_mitre_contents_1951_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1952_object_ref_relationship--826a8c49-a137-4cbe-9efe-6395365a9adc" "objects_0_x_mitre_contents_1952_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1953_object_ref_relationship--8719ab74-a3d7-4e00-84f0-040541aa6698" "objects_0_x_mitre_contents_1953_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1954_object_ref_relationship--8a9ab14a-c666-47ef-a92e-57872a5a82ae" "objects_0_x_mitre_contents_1954_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1955_object_ref_relationship--8ccfab20-58cf-4af6-9fb0-6bbf59258ac9" "objects_0_x_mitre_contents_1955_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1956_object_ref_relationship--8ea95198-d36f-44fd-a4a9-195237a0ed5e" "objects_0_x_mitre_contents_1956_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1957_object_ref_relationship--9047dd87-40da-4d01-a4fd-23cc56df6a08" "objects_0_x_mitre_contents_1957_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1958_object_ref_relationship--91160659-69ef-452d-8668-5497a68e0e75" "objects_0_x_mitre_contents_1958_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1959_object_ref_relationship--91477b6c-38d3-447a-981a-ea11652f4bc2" "objects_0_x_mitre_contents_1959_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1960_object_ref_relationship--93103ac2-0e3b-4f0f-a054-7f9b947b3172" "objects_0_x_mitre_contents_1960_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1961_object_ref_relationship--94b368c8-7983-4f42-983b-3b89fb824943" "objects_0_x_mitre_contents_1961_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1962_object_ref_relationship--955942ac-cb07-45e3-8ff1-1a2113c6aa49" "objects_0_x_mitre_contents_1962_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1963_object_ref_relationship--95e1941a-23a1-4c04-be62-726b1097bb3b" "objects_0_x_mitre_contents_1963_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1964_object_ref_relationship--979e6503-41a2-43f5-a30f-045272faa7d0" "objects_0_x_mitre_contents_1964_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1965_object_ref_relationship--9861a2c9-88b6-4e63-88d1-31cd574fd763" "objects_0_x_mitre_contents_1965_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1966_object_ref_relationship--986cb3bf-98bb-4558-bec4-bd8c015449fd" "objects_0_x_mitre_contents_1966_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1967_object_ref_relationship--9b818e26-0be8-4f03-9587-364c0e9f6a74" "objects_0_x_mitre_contents_1967_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1968_object_ref_relationship--9c834f8f-390e-4c60-b0be-9bdd8d9815c9" "objects_0_x_mitre_contents_1968_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1969_object_ref_relationship--9c8bbd04-0e12-4066-a276-feec87db8271" "objects_0_x_mitre_contents_1969_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1970_object_ref_relationship--9d087e80-c58e-45ed-bc5d-bc99e3e3e42e" "objects_0_x_mitre_contents_1970_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1971_object_ref_relationship--9d7f01ed-f9aa-4545-8ce3-4654d8e86f48" "objects_0_x_mitre_contents_1971_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1972_object_ref_relationship--9de24ec5-63bc-4520-9f81-d1b93a31cd02" "objects_0_x_mitre_contents_1972_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1973_object_ref_relationship--9e87b99f-9ff6-4e40-aeaf-4e35668f72e9" "objects_0_x_mitre_contents_1973_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1974_object_ref_relationship--9ea1777b-44d5-4763-bee9-fe782e29e68f" "objects_0_x_mitre_contents_1974_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1975_object_ref_relationship--9ea81224-70ef-46c2-89d4-2261c11789b4" "objects_0_x_mitre_contents_1975_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1976_object_ref_relationship--9f737872-3503-4ef4-b575-ab6037b33a98" "objects_0_x_mitre_contents_1976_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1977_object_ref_relationship--a2b67309-7912-4fe2-a689-aaa1ce8778e0" "objects_0_x_mitre_contents_1977_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1978_object_ref_relationship--a32a8f00-8168-4aed-a928-4c107cda3328" "objects_0_x_mitre_contents_1978_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1979_object_ref_relationship--a3ba222d-8dcd-4222-b1d0-169eff16922f" "objects_0_x_mitre_contents_1979_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1980_object_ref_relationship--a4b53160-fdb8-4cab-90cc-ad12ab13a8a0" "objects_0_x_mitre_contents_1980_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1981_object_ref_relationship--a62f9f72-d5a6-4e12-ac53-62bd4c81aa4d" "objects_0_x_mitre_contents_1981_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1982_object_ref_relationship--a6876100-1ed4-4c26-8de7-dc5ee09a8feb" "objects_0_x_mitre_contents_1982_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1983_object_ref_relationship--a6cfae27-9ba8-458e-85cc-ec1b1dc22d8a" "objects_0_x_mitre_contents_1983_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1984_object_ref_relationship--a7c74081-2844-4f0a-9fcc-c30a98717798" "objects_0_x_mitre_contents_1984_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1985_object_ref_relationship--a7cb8193-7a07-45e8-b2a4-6f650ccac1f3" "objects_0_x_mitre_contents_1985_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1986_object_ref_relationship--a976221c-7ed2-4e4e-a8db-ca87d49fb5eb" "objects_0_x_mitre_contents_1986_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1987_object_ref_relationship--ab28edec-a105-4dee-a3f0-3090daafb7f3" "objects_0_x_mitre_contents_1987_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1988_object_ref_relationship--ab5e939b-bd6f-4301-b341-85e70965f193" "objects_0_x_mitre_contents_1988_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1989_object_ref_relationship--ac6c2133-e50e-4c17-804d-484653d2881f" "objects_0_x_mitre_contents_1989_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1990_object_ref_relationship--ac9704b7-a4d0-4f85-9f7d-53b05809719b" "objects_0_x_mitre_contents_1990_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1991_object_ref_relationship--ae9a0fb3-901b-4da2-b6ad-633ddbfa0a5f" "objects_0_x_mitre_contents_1991_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1992_object_ref_relationship--b28c1e81-4f78-4e40-9899-2872cdbcceba" "objects_0_x_mitre_contents_1992_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1993_object_ref_relationship--b2b31911-5b7e-4df3-89c6-00b5b372fb4f" "objects_0_x_mitre_contents_1993_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1994_object_ref_relationship--b2c289bf-e981-4bcd-87dd-b6c0680557e9" "objects_0_x_mitre_contents_1994_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1995_object_ref_relationship--b2c43f7d-f0df-46f8-9257-40ded1948307" "objects_0_x_mitre_contents_1995_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1996_object_ref_relationship--b2c61294-707f-4735-8874-e36ed6c1ff47" "objects_0_x_mitre_contents_1996_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1997_object_ref_relationship--b3cdaa2c-30a2-496b-b577-db2e18045ff8" "objects_0_x_mitre_contents_1997_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1998_object_ref_relationship--b5097495-f417-46ed-88e2-02cba2371936" "objects_0_x_mitre_contents_1998_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_1999_object_ref_relationship--b596251a-73db-4e53-a04d-51be783b0241" "objects_0_x_mitre_contents_1999_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2000_object_ref_relationship--b6cf5e3a-84a1-4b76-81d4-f1420b0acdb5" "objects_0_x_mitre_contents_2000_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2001_object_ref_relationship--b6e43431-5312-44ae-bc61-54d4d6283bcc" "objects_0_x_mitre_contents_2001_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2002_object_ref_relationship--b8afc5b9-3ffc-4b3c-b2d8-ee2888a7b6ad" "objects_0_x_mitre_contents_2002_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2003_object_ref_relationship--b8be7302-e02c-4ca8-927b-0460558a0441" "objects_0_x_mitre_contents_2003_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2004_object_ref_relationship--b985f78d-ba86-414d-8471-31311d96bee0" "objects_0_x_mitre_contents_2004_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2005_object_ref_relationship--bb001e52-a649-43cb-bdba-64b331886e2b" "objects_0_x_mitre_contents_2005_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2006_object_ref_relationship--bbf13431-c3d2-4800-aada-273b3a47dcba" "objects_0_x_mitre_contents_2006_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2007_object_ref_relationship--bd41c8b6-b587-4531-b015-55fdb357cb25" "objects_0_x_mitre_contents_2007_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2008_object_ref_relationship--be92314d-bf3f-4a02-852b-3d1ab85e8d7d" "objects_0_x_mitre_contents_2008_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2009_object_ref_relationship--c08a1ce8-2c04-4802-a08b-4ce86efd8d5a" "objects_0_x_mitre_contents_2009_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2010_object_ref_relationship--c16d8700-dadb-47df-8e17-2716a46ed663" "objects_0_x_mitre_contents_2010_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2011_object_ref_relationship--c200184f-3d11-452c-8362-bb66337df1f5" "objects_0_x_mitre_contents_2011_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2012_object_ref_relationship--c2f436e1-cdd7-4d5c-ae62-9aaa31e47b10" "objects_0_x_mitre_contents_2012_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2013_object_ref_relationship--c761ed82-24cc-4c40-94ef-c4d0f4d1cd7a" "objects_0_x_mitre_contents_2013_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2014_object_ref_relationship--c8516d70-8992-4946-90b3-37435be40822" "objects_0_x_mitre_contents_2014_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2015_object_ref_relationship--c8b04178-2aa8-44c0-8bf6-787caa3f64e7" "objects_0_x_mitre_contents_2015_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2016_object_ref_relationship--c9ece136-83fe-446f-abde-f3f30a5ceaa3" "objects_0_x_mitre_contents_2016_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2017_object_ref_relationship--cbde808a-08b3-4afc-bb87-21acc4b767c1" "objects_0_x_mitre_contents_2017_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2018_object_ref_relationship--ccdc17ba-eced-40df-ab9d-7734e0e9243c" "objects_0_x_mitre_contents_2018_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2019_object_ref_relationship--cda9f3cf-01e4-41b3-8e45-4dda9fe5eb30" "objects_0_x_mitre_contents_2019_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2020_object_ref_relationship--cdc1b090-1ca8-4fb3-a149-ca8c4e070250" "objects_0_x_mitre_contents_2020_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2021_object_ref_relationship--cedf4ccb-7fbb-45bb-aab4-a5ae676d9f48" "objects_0_x_mitre_contents_2021_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2022_object_ref_relationship--cf09dc99-25fc-4434-82b0-ee6696e87f91" "objects_0_x_mitre_contents_2022_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2023_object_ref_relationship--cf23f54e-214b-4780-891f-99ab6e023951" "objects_0_x_mitre_contents_2023_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2024_object_ref_relationship--cfda3abb-4372-4dbf-ace3-b8d5a0a6ad60" "objects_0_x_mitre_contents_2024_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2025_object_ref_relationship--d110c0b7-7187-4a0e-99c4-f64d8f9a3f99" "objects_0_x_mitre_contents_2025_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2026_object_ref_relationship--d227781f-94c0-4ddd-9b2e-0f5eac142d5d" "objects_0_x_mitre_contents_2026_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2027_object_ref_relationship--d4efa617-fd66-46db-ab25-94f761e2279e" "objects_0_x_mitre_contents_2027_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2028_object_ref_relationship--d5110dc7-ffcc-4c8b-ad09-8697ad2f64e3" "objects_0_x_mitre_contents_2028_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2029_object_ref_relationship--d625bbc3-317c-4f94-a1b6-d51d03d20109" "objects_0_x_mitre_contents_2029_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2030_object_ref_relationship--d6930d98-f8a2-4556-baa4-95275d3fa23d" "objects_0_x_mitre_contents_2030_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2031_object_ref_relationship--d7b22dc7-24fa-4036-befb-83fc2eeab6f6" "objects_0_x_mitre_contents_2031_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2032_object_ref_relationship--d8e82c46-436c-4d1b-98be-0c95b13d7628" "objects_0_x_mitre_contents_2032_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2033_object_ref_relationship--d8ee0bd2-3f05-4fc0-854b-63ee92a293ca" "objects_0_x_mitre_contents_2033_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2034_object_ref_relationship--d9aac094-c5b6-437a-b457-0febe85f0db8" "objects_0_x_mitre_contents_2034_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2035_object_ref_relationship--db2bbb61-e931-4059-97c8-863dff44b708" "objects_0_x_mitre_contents_2035_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2036_object_ref_relationship--dc6eb5d7-acef-4eb4-bece-4e8c90c914dc" "objects_0_x_mitre_contents_2036_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2037_object_ref_relationship--dd4dc3ef-6076-4232-8cf4-f0efe9c0b2f3" "objects_0_x_mitre_contents_2037_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2038_object_ref_relationship--dfc1f490-f8b9-4287-8c79-652d42f0a64a" "objects_0_x_mitre_contents_2038_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2039_object_ref_relationship--e2173c11-f4be-4d50-882f-f83758782109" "objects_0_x_mitre_contents_2039_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2040_object_ref_relationship--e373111c-aa34-4686-a286-7c9b4267e246" "objects_0_x_mitre_contents_2040_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2041_object_ref_relationship--e3940ca1-1a78-4440-97a3-c9990151cc6a" "objects_0_x_mitre_contents_2041_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2042_object_ref_relationship--e4e207ff-dd64-45e2-b876-ef5c3012bff2" "objects_0_x_mitre_contents_2042_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2043_object_ref_relationship--e723fde7-7fa9-4ac8-a8ec-3fcbf097dbc8" "objects_0_x_mitre_contents_2043_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2044_object_ref_relationship--e88151f0-f880-452e-9a00-8f38d33c4412" "objects_0_x_mitre_contents_2044_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2045_object_ref_relationship--e8dac11f-8c51-4b80-9ada-db15ff5f1114" "objects_0_x_mitre_contents_2045_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2046_object_ref_relationship--e9f2a3ac-162c-4fa0-b23a-0da5746344bc" "objects_0_x_mitre_contents_2046_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2047_object_ref_relationship--ebbae7c2-fd79-4191-9369-e3b35283d4e1" "objects_0_x_mitre_contents_2047_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2048_object_ref_relationship--ebdb9385-6311-4532-b021-2da48734aab7" "objects_0_x_mitre_contents_2048_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2049_object_ref_relationship--ec2742c3-9e55-448c-9661-f98ad933e65a" "objects_0_x_mitre_contents_2049_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2050_object_ref_relationship--ee0afd88-a0fc-4b1d-b047-9b9bf04d36fe" "objects_0_x_mitre_contents_2050_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2051_object_ref_relationship--ef7f8f51-6aea-4f5c-9c96-f353a14cf062" "objects_0_x_mitre_contents_2051_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2052_object_ref_relationship--ef977f9e-c505-449f-883a-915c1de1015f" "objects_0_x_mitre_contents_2052_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2053_object_ref_relationship--efcfe1a3-3351-4b4f-ae36-101f103b4798" "objects_0_x_mitre_contents_2053_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2054_object_ref_relationship--f0a81b31-97ce-403b-90e9-7a910a93a31f" "objects_0_x_mitre_contents_2054_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2055_object_ref_relationship--f0becdb8-2772-4848-be23-8e821067ada5" "objects_0_x_mitre_contents_2055_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2056_object_ref_relationship--f101c454-affd-432b-b08b-a8dd7513684a" "objects_0_x_mitre_contents_2056_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2057_object_ref_relationship--f4f983cc-1934-4b56-b5ec-d84ed3a9b40b" "objects_0_x_mitre_contents_2057_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2058_object_ref_relationship--f7d4d71b-d648-433a-90cb-bd758f25b715" "objects_0_x_mitre_contents_2058_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2059_object_ref_relationship--f8277cd5-b14a-4b59-9f29-8ce24dfbdf5e" "objects_0_x_mitre_contents_2059_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2060_object_ref_relationship--f97e3b5d-531d-4d06-b876-baf9a43aa01c" "objects_0_x_mitre_contents_2060_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2061_object_ref_relationship--fab8c40d-b934-4ee0-8e83-f017af2e347a" "objects_0_x_mitre_contents_2061_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2062_object_ref_relationship--fad69d13-2611-43b7-ad06-55489011f182" "objects_0_x_mitre_contents_2062_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2063_object_ref_relationship--fe3ac79b-8bd2-4d95-805c-6a38de402add" "objects_0_x_mitre_contents_2063_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2064_object_ref_relationship--fedd60df-8d71-4799-8e94-73a3fd9700de" "objects_0_x_mitre_contents_2064_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2065_object_ref_relationship--ff628c18-8abf-4add-a055-d38031ca940d" "objects_0_x_mitre_contents_2065_object_modified_2022-07-07T14:00:00.188Z" "objects_0_x_mitre_contents_2066_object_ref_relationship--1fe811ec-9ca8-4956-9a94-02748f03ad8a" "objects_0_x_mitre_contents_2066_object_modified_2021-04-29T14:49:39.188Z" "objects_0_x_mitre_contents_2067_object_ref_relationship--39f46abc-d9e3-463d-9340-3bc8334af314" "objects_0_x_mitre_contents_2067_object_modified_2021-04-29T14:49:39.188Z" "objects_0_x_mitre_contents_2068_object_ref_relationship--3c2d7ccc-5980-4012-8aab-64979bcd0ea6" "objects_0_x_mitre_contents_2068_object_modified_2021-04-29T14:49:39.188Z" "objects_0_x_mitre_contents_2069_object_ref_relationship--4574a342-ab80-48b6-82d4-da3ea3536590" "objects_0_x_mitre_contents_2069_object_modified_2020-10-27T14:49:39.188Z" "objects_0_x_mitre_contents_2070_object_ref_relationship--ed06f5dc-9d02-4896-a0a3-2f457c64f125" "objects_0_x_mitre_contents_2070_object_modified_2020-10-27T14:49:39.188Z" "objects_0_x_mitre_contents_2071_object_ref_relationship--8697ff31-22fa-4e9c-8961-0383086adf68" "objects_0_x_mitre_contents_2071_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_2072_object_ref_relationship--e8f2d694-cf28-4ac7-bd15-c298c07c7c22" "objects_0_x_mitre_contents_2072_object_modified_2020-03-31T14:49:39.188Z" "objects_0_x_mitre_contents_2073_object_ref_course-of-action--d2a199d2-dfea-4d0c-987d-6195ed17be9c" "objects_0_x_mitre_contents_2073_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2074_object_ref_malware--b6d3657a-2d6a-400f-8b7e-4d60391aa1f7" "objects_0_x_mitre_contents_2074_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2075_object_ref_relationship--00b20e5c-5f52-4a07-bfec-e30872e793e3" "objects_0_x_mitre_contents_2075_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2076_object_ref_relationship--05c87985-4f8a-4a38-b1cd-ab01f0a628ed" "objects_0_x_mitre_contents_2076_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2077_object_ref_relationship--077da2d7-0913-4040-b25e-2f6913ed4ea0" "objects_0_x_mitre_contents_2077_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2078_object_ref_relationship--0818895a-0d6d-47cc-ad34-a09bdb76a81b" "objects_0_x_mitre_contents_2078_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2079_object_ref_relationship--095f71ad-9a93-45ce-9b77-a101f6c894de" "objects_0_x_mitre_contents_2079_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2080_object_ref_relationship--15a2702e-4e49-4255-909d-bbf94abfd1d7" "objects_0_x_mitre_contents_2080_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2081_object_ref_relationship--16f55053-285d-411d-881c-6f8c1bdef8d7" "objects_0_x_mitre_contents_2081_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2082_object_ref_relationship--2388ba94-8e49-40d0-a697-eea948e6cfb6" "objects_0_x_mitre_contents_2082_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2083_object_ref_relationship--2979b822-3f0e-4cd6-b2dc-ea6da72008ed" "objects_0_x_mitre_contents_2083_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2084_object_ref_relationship--2bd272ca-8a14-42cd-9664-6cc6f7451e42" "objects_0_x_mitre_contents_2084_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2085_object_ref_relationship--2c48d774-99b0-4d69-b485-1a8ef1f23808" "objects_0_x_mitre_contents_2085_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2086_object_ref_relationship--31942635-81b1-4657-8882-50fb97fae64b" "objects_0_x_mitre_contents_2086_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2087_object_ref_relationship--3a446bee-007b-4b1f-849e-60e9d39c2e92" "objects_0_x_mitre_contents_2087_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2088_object_ref_relationship--3faed885-6a3d-444f-8e57-fd8818abb1cc" "objects_0_x_mitre_contents_2088_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2089_object_ref_relationship--45a48a16-66ba-444e-89d2-61c163b956da" "objects_0_x_mitre_contents_2089_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2090_object_ref_relationship--49f0f7b8-7208-4650-89c2-5d6b1f166113" "objects_0_x_mitre_contents_2090_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2091_object_ref_relationship--4a697724-4457-436b-97ad-9d6f445fb6b0" "objects_0_x_mitre_contents_2091_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2092_object_ref_relationship--4caf3ad1-6ef8-42de-851d-bdc3a22977b3" "objects_0_x_mitre_contents_2092_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2093_object_ref_relationship--4cf9511e-da0e-4055-bc8c-56121ae120d2" "objects_0_x_mitre_contents_2093_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2094_object_ref_relationship--50986206-ad56-4dea-baed-846545fb2f5a" "objects_0_x_mitre_contents_2094_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2095_object_ref_relationship--513c05e2-afc6-4d1b-8a8e-6d6935a8626f" "objects_0_x_mitre_contents_2095_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2096_object_ref_relationship--566555df-fe3c-4d8b-94b7-6bf3bbd69973" "objects_0_x_mitre_contents_2096_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2097_object_ref_relationship--57474dcb-329d-4135-8f1a-87490bffdaef" "objects_0_x_mitre_contents_2097_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2098_object_ref_relationship--5b14149e-09f1-4d38-82bc-0ff3cff8b650" "objects_0_x_mitre_contents_2098_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2099_object_ref_relationship--5b9a54cd-4925-4a2b-ad61-27d70e673093" "objects_0_x_mitre_contents_2099_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2100_object_ref_relationship--5f6f5913-cade-4b14-aa96-5a921b0927a7" "objects_0_x_mitre_contents_2100_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2101_object_ref_relationship--6186ed87-69a1-43e7-bb60-76527d287e31" "objects_0_x_mitre_contents_2101_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2102_object_ref_relationship--62480750-2218-4ea0-b168-b9035b9ee998" "objects_0_x_mitre_contents_2102_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2103_object_ref_relationship--634e2691-341f-4e5b-83e7-e28369d88c64" "objects_0_x_mitre_contents_2103_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2104_object_ref_relationship--6407562a-d297-43cd-95df-aec9cf501ce2" "objects_0_x_mitre_contents_2104_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2105_object_ref_relationship--69d6f3fc-17ea-4a32-b4dd-a006c75362d6" "objects_0_x_mitre_contents_2105_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2106_object_ref_relationship--69efe716-affe-419e-ac06-924d2e416695" "objects_0_x_mitre_contents_2106_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2107_object_ref_relationship--6c0491ee-53e0-44ae-bcd0-253fc47de61e" "objects_0_x_mitre_contents_2107_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2108_object_ref_relationship--6d8ea31a-da35-442a-8e0d-1d0c0dcdf14b" "objects_0_x_mitre_contents_2108_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2109_object_ref_relationship--6eca2456-fdcf-42e9-bcbb-a4c51ce54139" "objects_0_x_mitre_contents_2109_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2110_object_ref_relationship--6f1cadef-283b-466b-bfa2-0cb51edf88f7" "objects_0_x_mitre_contents_2110_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2111_object_ref_relationship--72d7fa07-e559-4e35-b791-64b7bf8a0aef" "objects_0_x_mitre_contents_2111_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2112_object_ref_relationship--7b899be0-4a9c-4e52-aeab-d8acedfe26d0" "objects_0_x_mitre_contents_2112_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2113_object_ref_relationship--7ec08d5c-73a1-4444-bd27-892090d6b2e3" "objects_0_x_mitre_contents_2113_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2114_object_ref_relationship--85328449-c231-444d-905a-2988c14d3e82" "objects_0_x_mitre_contents_2114_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2115_object_ref_relationship--86696d32-0af7-4308-b1fe-52306b9f839a" "objects_0_x_mitre_contents_2115_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2116_object_ref_relationship--8aa790cc-0d42-4114-8cbe-783abc595b8b" "objects_0_x_mitre_contents_2116_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2117_object_ref_relationship--8d435703-05c0-4320-945c-05ebe1b06399" "objects_0_x_mitre_contents_2117_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2118_object_ref_relationship--8e94da58-86b7-4a45-886e-6da58828eacd" "objects_0_x_mitre_contents_2118_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2119_object_ref_relationship--903660e1-3996-4ed2-9e7a-4f8c397a71eb" "objects_0_x_mitre_contents_2119_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2120_object_ref_relationship--92333055-88ce-4db2-a589-e0e1e617d8e0" "objects_0_x_mitre_contents_2120_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2121_object_ref_relationship--93a524e2-cb17-4b40-8640-a03949e89775" "objects_0_x_mitre_contents_2121_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2122_object_ref_relationship--94a737af-9a72-48f6-a85e-d9d7fa93bfdd" "objects_0_x_mitre_contents_2122_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2123_object_ref_relationship--95f4db59-e0b4-4c1b-b888-1fc76b21e8c0" "objects_0_x_mitre_contents_2123_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2124_object_ref_relationship--96027d55-0bdb-4f5f-a559-66c93eab3a17" "objects_0_x_mitre_contents_2124_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2125_object_ref_relationship--9e83607e-2936-4f25-b6d2-c357846840f3" "objects_0_x_mitre_contents_2125_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2126_object_ref_relationship--a01af4da-0910-4a20-805f-86b3ae1dc046" "objects_0_x_mitre_contents_2126_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2127_object_ref_relationship--a3dab73a-0af2-44c3-ba33-9b20133ae5cf" "objects_0_x_mitre_contents_2127_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2128_object_ref_relationship--aa39b402-7ecc-4057-a989-663887e540e7" "objects_0_x_mitre_contents_2128_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2129_object_ref_relationship--b18aa181-b1b7-43dd-9389-16a13ef2a6ed" "objects_0_x_mitre_contents_2129_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2130_object_ref_relationship--b1f2770e-11f0-429c-9bac-9fa5bc5859b0" "objects_0_x_mitre_contents_2130_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2131_object_ref_relationship--b23ec81b-8610-4bb0-a837-2c316c67fa79" "objects_0_x_mitre_contents_2131_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2132_object_ref_relationship--b4e055cf-f77e-4888-9610-6cd328e035c8" "objects_0_x_mitre_contents_2132_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2133_object_ref_relationship--ba556d98-4ff2-43a4-bb93-52f99265ff99" "objects_0_x_mitre_contents_2133_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2134_object_ref_relationship--be2895e2-7e1d-4467-8b6a-ac06b17ce0bb" "objects_0_x_mitre_contents_2134_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2135_object_ref_relationship--bebf345c-21d5-410f-9015-90c144161e5d" "objects_0_x_mitre_contents_2135_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2136_object_ref_relationship--bedb2088-2f26-4380-84df-f238f514dd4c" "objects_0_x_mitre_contents_2136_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2137_object_ref_relationship--c5b80ca7-eceb-43ea-991e-10af5d9ca4bc" "objects_0_x_mitre_contents_2137_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2138_object_ref_relationship--d22dc053-24a7-4a5b-ae51-8a626569ec9b" "objects_0_x_mitre_contents_2138_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2139_object_ref_relationship--d98a030f-c551-4fd0-9948-32e1ea01f79c" "objects_0_x_mitre_contents_2139_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2140_object_ref_relationship--de1b1f92-c060-4d8c-81bf-465b7fb21be4" "objects_0_x_mitre_contents_2140_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2141_object_ref_relationship--e183af70-44d5-4d56-9aad-753eb4c1c964" "objects_0_x_mitre_contents_2141_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2142_object_ref_relationship--f6fa0801-418e-43e5-bfae-332e909624fc" "objects_0_x_mitre_contents_2142_object_modified_2019-10-23T14:19:37.289Z" "objects_0_x_mitre_contents_2143_object_ref_relationship--9d7ac1b2-3fa9-4236-b72d-5565f0c66eab" "objects_0_x_mitre_contents_2143_object_modified_2020-10-27T14:49:39.188Z" "objects_0_x_mitre_contents_2144_object_ref_relationship--f2e23cb7-7bac-4938-91ea-7dd42b41ba29" "objects_0_x_mitre_contents_2144_object_modified_2018-04-30T13:45:13.024Z" "objects_0_x_mitre_contents_2145_object_ref_relationship--f825f5ea-3815-431f-b005-4c01b8b2fed9" "objects_0_x_mitre_contents_2145_object_modified_2018-04-30T13:45:13.024Z" "objects_0_x_mitre_contents_2146_object_ref_relationship--047ab474-c4ec-4675-a817-1e0a9f8dd92f" "objects_0_x_mitre_contents_2146_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2147_object_ref_relationship--0673ca70-d403-4e49-8e18-de4bf8ab700c" "objects_0_x_mitre_contents_2147_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2148_object_ref_relationship--0e81eb1d-cd1e-43e1-8c09-03927681ce76" "objects_0_x_mitre_contents_2148_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2149_object_ref_relationship--176ba064-0657-4850-baa3-626bc845efd3" "objects_0_x_mitre_contents_2149_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2150_object_ref_relationship--1a493cb6-452f-46ce-a7b4-267eacd5d2ff" "objects_0_x_mitre_contents_2150_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2151_object_ref_relationship--1a62c9c7-2d3b-4ee7-87d1-d8774050c566" "objects_0_x_mitre_contents_2151_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2152_object_ref_relationship--2f5da3a1-19da-421f-be48-cfdcd3c79be1" "objects_0_x_mitre_contents_2152_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2153_object_ref_relationship--3a9467d4-09df-4266-ba5a-d40309949e70" "objects_0_x_mitre_contents_2153_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2154_object_ref_relationship--3baf01c5-591b-43a0-8963-506531313e68" "objects_0_x_mitre_contents_2154_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2155_object_ref_relationship--40581c90-e948-4e91-8530-a9bc59cce9d7" "objects_0_x_mitre_contents_2155_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2156_object_ref_relationship--49fe6eac-73a7-4147-9121-85fb71fca4ed" "objects_0_x_mitre_contents_2156_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2157_object_ref_relationship--64a6fb42-65ce-4160-a5c8-ac176f60a2ae" "objects_0_x_mitre_contents_2157_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2158_object_ref_relationship--69bdeed3-d6a8-4d10-8bf5-44c6cb4392e5" "objects_0_x_mitre_contents_2158_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2159_object_ref_relationship--6fce6a21-ab9b-44a5-be20-9b631109487b" "objects_0_x_mitre_contents_2159_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2160_object_ref_relationship--718949aa-6841-48d2-9343-f01be0aa32c1" "objects_0_x_mitre_contents_2160_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2161_object_ref_relationship--7c966cde-22fd-4eb2-b518-3e37a8fad88b" "objects_0_x_mitre_contents_2161_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2162_object_ref_relationship--7e4be913-d916-4a79-ac00-262a49afe070" "objects_0_x_mitre_contents_2162_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2163_object_ref_relationship--8e49feb1-e401-4e63-acfa-7f8b9a8ca026" "objects_0_x_mitre_contents_2163_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2164_object_ref_relationship--8e4b2305-1280-4456-8ec7-93c66da5c674" "objects_0_x_mitre_contents_2164_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2165_object_ref_relationship--8f7c14bf-4c0f-4e54-99c2-41b511220b33" "objects_0_x_mitre_contents_2165_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2166_object_ref_relationship--9adde9d7-4ba0-4e35-93ba-1e85e9eb16bc" "objects_0_x_mitre_contents_2166_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2167_object_ref_relationship--9e77b80d-4981-4908-9203-c4e7cea5b5d8" "objects_0_x_mitre_contents_2167_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2168_object_ref_relationship--a834341f-d909-41e3-adaf-5f3450e4090e" "objects_0_x_mitre_contents_2168_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2169_object_ref_relationship--a912f528-5218-4e0b-a350-7e9012cccdf3" "objects_0_x_mitre_contents_2169_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2170_object_ref_relationship--aa23a2c6-ed8a-4453-95d1-f9a47e14b0f9" "objects_0_x_mitre_contents_2170_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2171_object_ref_relationship--aaf0ae2f-07ea-479e-8419-e524e23dbaef" "objects_0_x_mitre_contents_2171_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2172_object_ref_relationship--b104c62f-771c-46c5-afc4-a964a94cea50" "objects_0_x_mitre_contents_2172_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2173_object_ref_relationship--bf859944-d097-45ba-ae01-2f85a00cad1f" "objects_0_x_mitre_contents_2173_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2174_object_ref_relationship--c2437c8b-709f-47e8-ae65-21ae48410a9e" "objects_0_x_mitre_contents_2174_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2175_object_ref_relationship--c5d6fb25-1782-44c4-b3ae-0cd72e8a6d37" "objects_0_x_mitre_contents_2175_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2176_object_ref_relationship--ca7c3278-1d12-4e55-b320-39efa5a285db" "objects_0_x_mitre_contents_2176_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2177_object_ref_relationship--cdb1ed75-d8a5-4088-b282-0b85588bbc8c" "objects_0_x_mitre_contents_2177_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2178_object_ref_relationship--d792bffd-6745-4da6-a70f-2d5843ef05ca" "objects_0_x_mitre_contents_2178_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2179_object_ref_relationship--e3a03a80-0e31-43ef-b802-d6f65c44896d" "objects_0_x_mitre_contents_2179_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2180_object_ref_relationship--eb686f55-85de-42d8-a5a1-69a78af0f1f3" "objects_0_x_mitre_contents_2180_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2181_object_ref_relationship--ebc0aa93-93ac-4b7e-ad87-9d5743a09c8e" "objects_0_x_mitre_contents_2181_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2182_object_ref_relationship--f14af74f-fb6b-480f-91de-d755c89960ce" "objects_0_x_mitre_contents_2182_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2183_object_ref_relationship--fa7b38df-eedc-469b-bcec-facdd8365231" "objects_0_x_mitre_contents_2183_object_modified_2018-10-23T00:14:20.652Z" "objects_0_x_mitre_contents_2184_object_ref_relationship--fb371daf-2771-488f-90ca-5e08b9a36c5c" "objects_0_x_mitre_contents_2184_object_modified_2018-10-23T00:14:20.652Z" "objects_1_modified_2022-10-24T15:09:07.609Z" "objects_1_name_Scheduled Task/Job" "objects_1_description_Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. On Android and iOS, APIs and libraries exist to facilitate scheduling tasks to execute at a specified date, time, or interval.\n\nOn Android, the `WorkManager` API allows asynchronous tasks to be scheduled with the system. `WorkManager` was introduced to unify task scheduling on Android, using `JobScheduler`, `GcmNetworkManager`, and `AlarmManager` internally. `WorkManager` offers a lot of flexibility for scheduling, including periodically, one time, or constraint-based (e.g. only when the device is charging).(Citation: Android WorkManager)\n\nOn iOS, the `NSBackgroundActivityScheduler` API allows asynchronous tasks to be scheduled with the system. The tasks can be scheduled to be repeating or non-repeating, however, the system chooses when the tasks will be executed. The app can choose the interval for repeating tasks, or the delay between scheduling and execution for one-time tasks.(Citation: Apple NSBackgroundActivityScheduler)" "objects_1_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_1_kill_chain_phases_0_phase_name_execution" "objects_1_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_1_kill_chain_phases_1_phase_name_persistence" "objects_1_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1_x_mitre_detection_Scheduling tasks/jobs can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_1_x_mitre_platforms_0_Android" "objects_1_x_mitre_platforms_1_iOS" "objects_1_x_mitre_domains_0_mobile-attack" "objects_1_x_mitre_version_1.0" "objects_1_x_mitre_contributors_0_Lorin Wu, Trend Micro" "objects_1_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_1_type_attack-pattern" "objects_1_id_attack-pattern--00290ac5-551e-44aa-bbd8-c4b913488a6d" "objects_1_created_2020-11-04T16:43:31.619Z" "objects_1_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1_external_references_0_source_name_mitre-attack" "objects_1_external_references_0_url_https://attack.mitre.org/techniques/T1603" "objects_1_external_references_0_external_id_T1603" "objects_1_external_references_1_source_name_Android WorkManager" "objects_1_external_references_1_description_Google. (n.d.). Schedule tasks with WorkManager. Retrieved November 4, 2020." "objects_1_external_references_1_url_https://developer.android.com/topic/libraries/architecture/workmanager" "objects_1_external_references_2_source_name_Apple NSBackgroundActivityScheduler" "objects_1_external_references_2_description_Apple. (n.d.). NSBackgroundActivityScheduler. Retrieved November 4, 2020." "objects_1_external_references_2_url_https://developer.apple.com/documentation/foundation/nsbackgroundactivityscheduler" "objects_1_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1_x_mitre_attack_spec_version_2.1.0" "objects_1_x_mitre_is_subtechnique_False" "objects_1_spec_version_2.1" "objects_2_x_mitre_platforms_0_Android" "objects_2_x_mitre_platforms_1_iOS" "objects_2_x_mitre_domains_0_mobile-attack" "objects_2_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2_type_attack-pattern" "objects_2_id_attack-pattern--039bc59c-ecc7-4997-b2b4-4ab728bd91aa" "objects_2_created_2019-10-30T15:37:55.029Z" "objects_2_x_mitre_version_1.0" "objects_2_external_references_0_source_name_mitre-attack" "objects_2_external_references_0_external_id_T1540" "objects_2_external_references_0_url_https://attack.mitre.org/techniques/T1540" "objects_2_external_references_1_source_name_Fadeev Code Injection Aug 2018" "objects_2_external_references_1_url_https://fadeevab.com/shared-library-injection-on-android-8/" "objects_2_external_references_1_description_Alexandr Fadeev. (2018, August 26). Shared Library Injection on Android 8.0. Retrieved October 30, 2019." "objects_2_external_references_2_source_name_Google Triada June 2019" "objects_2_external_references_2_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_2_external_references_2_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_2_external_references_3_source_name_Shunix Code Injection Mar 2016" "objects_2_external_references_3_url_https://shunix.com/shared-library-injection-in-android/" "objects_2_external_references_3_description_Shunix . (2016, March 22). Shared Library Injection in Android. Retrieved October 30, 2019." "objects_2_x_mitre_deprecated_False" "objects_2_revoked_True" "objects_2_description_Adversaries may use code injection attacks to implant arbitrary code into the address space of a running application. Code is then executed or interpreted by that application. Adversaries utilizing this technique may exploit capabilities to load code in at runtime through dynamic libraries.\n\nWith root access, `ptrace` can be used to target specific applications and load shared libraries into its process memory.(Citation: Shunix Code Injection Mar 2016)(Citation: Fadeev Code Injection Aug 2018) By injecting code, an adversary may be able to gain access to higher permissions held by the targeted application by executing as the targeted application. In addition, the adversary may be able to evade detection or enable persistent access to a system under the guise of the application\u2019s process.(Citation: Google Triada June 2019)\n" "objects_2_modified_2022-03-30T19:14:20.369Z" "objects_2_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2_name_Code Injection" "objects_2_x_mitre_detection_Code injection can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_2_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_2_kill_chain_phases_0_phase_name_persistence" "objects_2_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_2_kill_chain_phases_1_phase_name_privilege-escalation" "objects_2_kill_chain_phases_2_kill_chain_name_mitre-mobile-attack" "objects_2_kill_chain_phases_2_phase_name_defense-evasion" "objects_2_x_mitre_is_subtechnique_False" "objects_2_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_2_x_mitre_attack_spec_version_2.1.0" "objects_2_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2_spec_version_2.1" "objects_3_modified_2023-03-15T16:39:32.207Z" "objects_3_name_Adversary-in-the-Middle" "objects_3_description_Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). \n\n \n\n[Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. \n\n \n\nOutside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. \n\n \n\nIf applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture. " "objects_3_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_3_kill_chain_phases_0_phase_name_collection" "objects_3_x_mitre_deprecated_False" "objects_3_x_mitre_detection_Application vetting services should look for applications that request VPN access. These applications should be heavily scrutinized since VPN functionality is not very common. Mobile security products can potentially detect rogue Wi-Fi access points if the adversary is attempting to decrypt traffic using an untrusted SSL certificate. \n\n \n\nOn both Android and iOS, users must grant consent to an application to act as a VPN. Both platforms also provide visual context to the user in the top status bar when a VPN connection is active. Users can see registered VPN services in the device settings. " "objects_3_x_mitre_domains_0_mobile-attack" "objects_3_x_mitre_is_subtechnique_False" "objects_3_x_mitre_platforms_0_Android" "objects_3_x_mitre_platforms_1_iOS" "objects_3_x_mitre_version_2.1" "objects_3_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_3_type_attack-pattern" "objects_3_id_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_3_created_2022-04-05T20:11:08.894Z" "objects_3_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_3_revoked_False" "objects_3_external_references_0_source_name_mitre-attack" "objects_3_external_references_0_url_https://attack.mitre.org/techniques/T1638" "objects_3_external_references_0_external_id_T1638" "objects_3_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_3_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html" "objects_3_external_references_1_external_id_CEL-3" "objects_3_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_3_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-0.html" "objects_3_external_references_2_external_id_APP-0" "objects_3_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_3_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.html" "objects_3_external_references_3_external_id_APP-1" "objects_3_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_3_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-8.html" "objects_3_external_references_4_external_id_APP-8" "objects_3_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_3_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-12.html" "objects_3_external_references_5_external_id_ECO-12" "objects_3_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_3_x_mitre_attack_spec_version_3.1.0" "objects_3_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_3_spec_version_2.1" "objects_4_modified_2023-03-15T16:23:59.281Z" "objects_4_name_Abuse Elevation Control Mechanism" "objects_4_description_Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can gain on a machine. Authorization has to be granted to specific users in order to perform tasks that are designated as higher risk. An adversary can use several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system. " "objects_4_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_4_kill_chain_phases_0_phase_name_privilege-escalation" "objects_4_x_mitre_deprecated_False" "objects_4_x_mitre_detection_When an application requests administrator permission, users are presented with a popup and the option to grant or deny the request. Application vetting services can detect when an application requests administrator permission. Extra scrutiny could be applied to applications that do" "objects_4_x_mitre_domains_0_mobile-attack" "objects_4_x_mitre_is_subtechnique_False" "objects_4_x_mitre_platforms_0_Android" "objects_4_x_mitre_version_1.1" "objects_4_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_4_type_attack-pattern" "objects_4_id_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_4_created_2022-04-01T15:54:05.633Z" "objects_4_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_4_revoked_False" "objects_4_external_references_0_source_name_mitre-attack" "objects_4_external_references_0_url_https://attack.mitre.org/techniques/T1626" "objects_4_external_references_0_external_id_T1626" "objects_4_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_4_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_4_external_references_1_external_id_APP-22" "objects_4_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_4_x_mitre_attack_spec_version_3.1.0" "objects_4_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_4_spec_version_2.1" "objects_5_modified_2023-09-25T19:53:07.406Z" "objects_5_name_Remote Access Software" "objects_5_description_Adversaries may use legitimate remote access software, such as `VNC`, `TeamViewer`, `AirDroid`, `AirMirror`, etc., to establish an interactive command and control channel to target mobile devices. \n\nRemote access applications may be installed and used post-compromise as an alternate communication channel for redundant access or as a way to establish an interactive remote session with the target device. They may also be used as a component of malware to establish a reverse connection to an adversary-controlled system or service. Installation of remote access tools may also include persistence. " "objects_5_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_5_kill_chain_phases_0_phase_name_command-and-control" "objects_5_x_mitre_deprecated_False" "objects_5_x_mitre_detection_" "objects_5_x_mitre_domains_0_mobile-attack" "objects_5_x_mitre_is_subtechnique_False" "objects_5_x_mitre_platforms_0_Android" "objects_5_x_mitre_platforms_1_iOS" "objects_5_x_mitre_version_1.0" "objects_5_type_attack-pattern" "objects_5_id_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_5_created_2023-09-25T19:53:07.406Z" "objects_5_revoked_False" "objects_5_external_references_0_source_name_mitre-attack" "objects_5_external_references_0_url_https://attack.mitre.org/techniques/T1663" "objects_5_external_references_0_external_id_T1663" "objects_5_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_5_x_mitre_attack_spec_version_3.1.0" "objects_5_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_5_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_5_spec_version_2.1" "objects_6_x_mitre_platforms_0_Android" "objects_6_x_mitre_domains_0_mobile-attack" "objects_6_id_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_6_type_attack-pattern" "objects_6_created_2017-10-25T14:48:08.155Z" "objects_6_revoked_True" "objects_6_external_references_0_source_name_mitre-mobile-attack" "objects_6_external_references_0_url_https://attack.mitre.org/techniques/T1454" "objects_6_external_references_0_external_id_T1454" "objects_6_modified_2022-07-07T14:00:00.188Z" "objects_6_name_Malicious SMS Message" "objects_6_description_Test" "objects_6_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_6_kill_chain_phases_0_phase_name_collection" "objects_6_x_mitre_version_1.0" "objects_6_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_6_x_mitre_is_subtechnique_False" "objects_6_spec_version_2.1" "objects_6_x_mitre_attack_spec_version_2.1.0" "objects_7_x_mitre_platforms_0_Android" "objects_7_x_mitre_platforms_1_iOS" "objects_7_x_mitre_domains_0_mobile-attack" "objects_7_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_7_type_attack-pattern" "objects_7_id_attack-pattern--0c71033e-401e-4b97-9309-7a7c95e43a5d" "objects_7_created_2017-10-25T14:48:18.237Z" "objects_7_x_mitre_version_1.0" "objects_7_external_references_0_source_name_mitre-attack" "objects_7_external_references_0_external_id_T1470" "objects_7_external_references_0_url_https://attack.mitre.org/techniques/T1470" "objects_7_external_references_1_source_name_Elcomsoft-EPPB" "objects_7_external_references_1_url_https://www.elcomsoft.com/eppb.html" "objects_7_external_references_1_description_Elcomsoft. (n.d.). Elcomsoft Phone Breaker. Retrieved December 29, 2016." "objects_7_external_references_2_source_name_Elcomsoft-WhatsApp" "objects_7_external_references_2_url_https://blog.elcomsoft.com/2017/07/extract-and-decrypt-whatsapp-backups-from-icloud/" "objects_7_external_references_2_description_Oleg Afonin. (2017, July 20). Extract and Decrypt WhatsApp Backups from iCloud. Retrieved July 6, 2018." "objects_7_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-0.html" "objects_7_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_7_external_references_3_external_id_ECO-0" "objects_7_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-1.html" "objects_7_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_7_external_references_4_external_id_ECO-1" "objects_7_x_mitre_deprecated_True" "objects_7_revoked_False" "objects_7_description_An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud backup services (e.g. Google's Android backup service or Apple's iCloud) could use that access to obtain sensitive data stored in device backups. For example, the Elcomsoft Phone Breaker product advertises the ability to retrieve iOS backup data from Apple's iCloud (Citation: Elcomsoft-EPPB). Elcomsoft also describes (Citation: Elcomsoft-WhatsApp) obtaining WhatsApp communication histories from backups stored in iCloud." "objects_7_modified_2022-04-06T15:54:11.189Z" "objects_7_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_7_name_Obtain Device Cloud Backups" "objects_7_x_mitre_detection_Google provides the ability for users to view their account activity. Apple iCloud also provides notifications to users of account activity." "objects_7_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_7_kill_chain_phases_0_phase_name_remote-service-effects" "objects_7_x_mitre_is_subtechnique_False" "objects_7_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_7_x_mitre_attack_spec_version_2.1.0" "objects_7_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_7_spec_version_2.1" "objects_8_modified_2023-03-20T18:43:03.218Z" "objects_8_name_Uninstall Malicious Application" "objects_8_description_Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by: \n \n* Abusing device owner permissions to perform silent uninstallation using device owner API calls. \n* Abusing root permissions to delete files from the filesystem. \n* Abusing the accessibility service. This requires sending an intent to the system to request uninstallation, and then abusing the accessibility service to click the proper places on the screen to confirm uninstallation." "objects_8_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_8_kill_chain_phases_0_phase_name_defense-evasion" "objects_8_x_mitre_deprecated_False" "objects_8_x_mitre_detection_Users can see a list of applications that can use accessibility services in the device settings. Application vetting services could look for use of the accessibility service or features that typically require root access." "objects_8_x_mitre_domains_0_mobile-attack" "objects_8_x_mitre_is_subtechnique_True" "objects_8_x_mitre_platforms_0_Android" "objects_8_x_mitre_version_1.1" "objects_8_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_8_type_attack-pattern" "objects_8_id_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_8_created_2022-03-30T19:31:31.855Z" "objects_8_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_8_revoked_False" "objects_8_external_references_0_source_name_mitre-attack" "objects_8_external_references_0_url_https://attack.mitre.org/techniques/T1630/001" "objects_8_external_references_0_external_id_T1630.001" "objects_8_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_8_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-43.html" "objects_8_external_references_1_external_id_APP-43" "objects_8_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_8_x_mitre_attack_spec_version_3.1.0" "objects_8_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_8_spec_version_2.1" "objects_9_modified_2023-03-20T18:42:18.121Z" "objects_9_name_Indicator Removal on Host" "objects_9_description_Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported." "objects_9_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_9_kill_chain_phases_0_phase_name_defense-evasion" "objects_9_x_mitre_deprecated_False" "objects_9_x_mitre_detection_Mobile security products can detect which applications can request device administrator permissions. Users can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. Users can see a list of applications that can use accessibility services in the device settings. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity." "objects_9_x_mitre_domains_0_mobile-attack" "objects_9_x_mitre_is_subtechnique_False" "objects_9_x_mitre_platforms_0_iOS" "objects_9_x_mitre_platforms_1_Android" "objects_9_x_mitre_version_1.1" "objects_9_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_9_type_attack-pattern" "objects_9_id_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_9_created_2022-03-30T19:28:25.541Z" "objects_9_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_9_revoked_False" "objects_9_external_references_0_source_name_mitre-attack" "objects_9_external_references_0_url_https://attack.mitre.org/techniques/T1630" "objects_9_external_references_0_external_id_T1630" "objects_9_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_9_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-43.html" "objects_9_external_references_1_external_id_APP-43" "objects_9_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_9_x_mitre_attack_spec_version_3.1.0" "objects_9_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_9_spec_version_2.1" "objects_10_modified_2023-03-20T18:52:29.947Z" "objects_10_name_Supply Chain Compromise" "objects_10_description_Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.\n\nSupply chain compromise can take place at any stage of the supply chain including:\n\n* Manipulation of development tools\n* Manipulation of a development environment\n* Manipulation of source code repositories (public or private)\n* Manipulation of source code in open-source dependencies\n* Manipulation of software update/distribution mechanisms\n* Compromised/infected system images\n* Replacement of legitimate software with modified versions\n* Sales of modified/counterfeit products to legitimate distributors\n* Shipment interdiction\n\nWhile supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. Targeting may be specific to a desired victim set or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency, specifically with the widespread usage of third-party advertising libraries.(Citation: Grace-Advertisement)(Citation: NowSecure-RemoteCode)" "objects_10_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_10_kill_chain_phases_0_phase_name_initial-access" "objects_10_x_mitre_deprecated_False" "objects_10_x_mitre_detection_Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries." "objects_10_x_mitre_domains_0_mobile-attack" "objects_10_x_mitre_is_subtechnique_False" "objects_10_x_mitre_platforms_0_Android" "objects_10_x_mitre_platforms_1_iOS" "objects_10_x_mitre_version_2.1" "objects_10_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_10_type_attack-pattern" "objects_10_id_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_10_created_2018-10-17T00:14:20.652Z" "objects_10_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_10_revoked_False" "objects_10_external_references_0_source_name_mitre-attack" "objects_10_external_references_0_url_https://attack.mitre.org/techniques/T1474" "objects_10_external_references_0_external_id_T1474" "objects_10_external_references_1_source_name_Grace-Advertisement" "objects_10_external_references_1_description_M. Grace et al. (2012, April 16-18). Unsafe exposure analysis of mobile in-app advertisements. Retrieved December 22, 2016." "objects_10_external_references_1_url_https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/WISEC12_ADRISK.pdf" "objects_10_external_references_2_source_name_NowSecure-RemoteCode" "objects_10_external_references_2_description_Ryan Welton. (2015, June 15). A Pattern for Remote Code Execution using Arbitrary File Writes and MultiDex Applications. Retrieved December 22, 2016." "objects_10_external_references_2_url_https://www.nowsecure.com/blog/2015/06/15/a-pattern-for-remote-code-execution-using-arbitrary-file-writes-and-multidex-applications/" "objects_10_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-6.html" "objects_10_external_references_3_external_id_APP-6" "objects_10_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-0.html" "objects_10_external_references_4_external_id_SPC-0" "objects_10_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-1.html" "objects_10_external_references_5_external_id_SPC-1" "objects_10_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html" "objects_10_external_references_6_external_id_SPC-2" "objects_10_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-3.html" "objects_10_external_references_7_external_id_SPC-3" "objects_10_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-4.html" "objects_10_external_references_8_external_id_SPC-4" "objects_10_external_references_9_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_9_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html" "objects_10_external_references_9_external_id_SPC-5" "objects_10_external_references_10_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_10_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html" "objects_10_external_references_10_external_id_SPC-6" "objects_10_external_references_11_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_11_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html" "objects_10_external_references_11_external_id_SPC-7" "objects_10_external_references_12_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_12_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-8.html" "objects_10_external_references_12_external_id_SPC-8" "objects_10_external_references_13_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_13_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-9.html" "objects_10_external_references_13_external_id_SPC-9" "objects_10_external_references_14_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_14_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-10.html" "objects_10_external_references_14_external_id_SPC-10" "objects_10_external_references_15_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_15_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-11.html" "objects_10_external_references_15_external_id_SPC-11" "objects_10_external_references_16_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_16_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-12.html" "objects_10_external_references_16_external_id_SPC-12" "objects_10_external_references_17_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_17_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-13.html" "objects_10_external_references_17_external_id_SPC-13" "objects_10_external_references_18_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_18_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-14.html" "objects_10_external_references_18_external_id_SPC-14" "objects_10_external_references_19_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_19_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html" "objects_10_external_references_19_external_id_SPC-15" "objects_10_external_references_20_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_20_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html" "objects_10_external_references_20_external_id_SPC-16" "objects_10_external_references_21_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_21_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html" "objects_10_external_references_21_external_id_SPC-17" "objects_10_external_references_22_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_22_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-18.html" "objects_10_external_references_22_external_id_SPC-18" "objects_10_external_references_23_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_23_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-19.html" "objects_10_external_references_23_external_id_SPC-19" "objects_10_external_references_24_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_24_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-20.html" "objects_10_external_references_24_external_id_SPC-20" "objects_10_external_references_25_source_name_NIST Mobile Threat Catalogue" "objects_10_external_references_25_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-21.html" "objects_10_external_references_25_external_id_SPC-21" "objects_10_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_10_x_mitre_attack_spec_version_3.1.0" "objects_10_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_10_spec_version_2.1" "objects_11_modified_2023-08-15T15:06:03.427Z" "objects_11_name_Impersonate SS7 Nodes" "objects_11_description_Adversaries may exploit the lack of authentication in signaling system network nodes to track the to track the location of mobile devices by impersonating a node.(Citation: Engel-SS7)(Citation: Engel-SS7-2008)(Citation: 3GPP-Security)(Citation: Positive-SS7)(Citation: CSRIC5-WG10-FinalReport) \n\n \n\nBy providing the victim\u2019s MSISDN (phone number) and impersonating network internal nodes to query subscriber information from other nodes, adversaries may use data collected from each hop to eventually determine the device\u2019s geographical cell area or nearest cell tower.(Citation: Engel-SS7)" "objects_11_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_11_kill_chain_phases_0_phase_name_collection" "objects_11_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_11_kill_chain_phases_1_phase_name_discovery" "objects_11_x_mitre_deprecated_False" "objects_11_x_mitre_detection_Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation.(Citation: CSRIC-WG1-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members." "objects_11_x_mitre_domains_0_mobile-attack" "objects_11_x_mitre_is_subtechnique_True" "objects_11_x_mitre_platforms_0_Android" "objects_11_x_mitre_platforms_1_iOS" "objects_11_x_mitre_version_1.1" "objects_11_type_attack-pattern" "objects_11_id_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_11_created_2022-04-05T19:49:58.938Z" "objects_11_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_11_revoked_False" "objects_11_external_references_0_source_name_mitre-attack" "objects_11_external_references_0_url_https://attack.mitre.org/techniques/T1430/002" "objects_11_external_references_0_external_id_T1430.002" "objects_11_external_references_1_source_name_3GPP-Security" "objects_11_external_references_1_description_3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016." "objects_11_external_references_1_url_http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf" "objects_11_external_references_2_source_name_CSRIC5-WG10-FinalReport" "objects_11_external_references_2_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_11_external_references_2_url_https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_11_external_references_3_source_name_CSRIC-WG1-FinalReport" "objects_11_external_references_3_description_CSRIC-WG1-FinalReport" "objects_11_external_references_4_source_name_Positive-SS7" "objects_11_external_references_4_description_Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016." "objects_11_external_references_4_url_https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf" "objects_11_external_references_5_source_name_Engel-SS7-2008" "objects_11_external_references_5_description_Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016." "objects_11_external_references_5_url_https://www.youtube.com/watch?v=q0n5ySqbfdI" "objects_11_external_references_6_source_name_Engel-SS7" "objects_11_external_references_6_description_Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016." "objects_11_external_references_6_url_https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf" "objects_11_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_11_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html" "objects_11_external_references_7_external_id_CEL-38" "objects_11_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_11_x_mitre_attack_spec_version_3.1.0" "objects_11_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_11_spec_version_2.1" "objects_12_modified_2023-09-08T18:15:15.902Z" "objects_12_name_Match Legitimate Name or Location" "objects_12_description_Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by giving artifacts the name and icon of a legitimate, trusted application (i.e., Settings), or using a package name that matches legitimate, trusted applications (i.e., `com.google.android.gm`). \n\nAdversaries may also use the same icon of the file or application they are trying to mimic.\n" "objects_12_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_12_kill_chain_phases_0_phase_name_defense-evasion" "objects_12_x_mitre_contributors_0_Ford Qin, Trend Micro" "objects_12_x_mitre_contributors_1_Liran Ravich, CardinalOps" "objects_12_x_mitre_deprecated_False" "objects_12_x_mitre_detection_" "objects_12_x_mitre_domains_0_mobile-attack" "objects_12_x_mitre_is_subtechnique_True" "objects_12_x_mitre_platforms_0_Android" "objects_12_x_mitre_platforms_1_iOS" "objects_12_x_mitre_version_1.0" "objects_12_type_attack-pattern" "objects_12_id_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_12_created_2023-07-12T20:45:14.704Z" "objects_12_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_12_revoked_False" "objects_12_external_references_0_source_name_mitre-attack" "objects_12_external_references_0_url_https://attack.mitre.org/techniques/T1655/001" "objects_12_external_references_0_external_id_T1655.001" "objects_12_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_12_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-14.html" "objects_12_external_references_1_external_id_APP-14" "objects_12_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_12_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_12_external_references_2_external_id_APP-31" "objects_12_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_12_x_mitre_attack_spec_version_3.1.0" "objects_12_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_12_spec_version_2.1" "objects_13_x_mitre_domains_0_mobile-attack" "objects_13_id_attack-pattern--11bd699b-f2c2-4e48-bf46-fb3f8acd9799" "objects_13_type_attack-pattern" "objects_13_created_2017-10-25T14:48:30.462Z" "objects_13_revoked_True" "objects_13_external_references_0_source_name_mitre-mobile-attack" "objects_13_external_references_0_url_https://attack.mitre.org/techniques/T1425" "objects_13_external_references_0_external_id_T1425" "objects_13_modified_2022-07-07T14:00:00.188Z" "objects_13_name_Insecure Third-Party Libraries" "objects_13_x_mitre_version_1.0" "objects_13_x_mitre_is_subtechnique_False" "objects_13_spec_version_2.1" "objects_13_x_mitre_attack_spec_version_2.1.0" "objects_14_modified_2023-03-20T18:56:20.270Z" "objects_14_name_Protected User Data" "objects_14_description_Adversaries may utilize standard operating system APIs to collect data from permission-backed data stores on a device, such as the calendar or contact list. These permissions need to be declared ahead of time. On Android, they must be included in the application\u2019s manifest. On iOS, they must be included in the application\u2019s `Info.plist` file. \n\n \n\nIn almost all cases, the user is required to grant access to the data store that the application is trying to access. In recent OS versions, vendors have introduced additional privacy controls for users, such as the ability to grant permission to an application only while the application is being actively used by the user. \n\n \n\nIf the device has been jailbroken or rooted, an adversary may be able to access [Protected User Data](https://attack.mitre.org/techniques/T1636) without the user\u2019s knowledge or approval. " "objects_14_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_14_kill_chain_phases_0_phase_name_collection" "objects_14_x_mitre_deprecated_False" "objects_14_x_mitre_detection_Users can view permissions granted to an application in device settings. Application vetting services typically flag permissions requested by an application, which can be reviewed by an administrator. Certain dangerous permissions, such as `RECEIVE_SMS`, could receive additional scrutiny." "objects_14_x_mitre_domains_0_mobile-attack" "objects_14_x_mitre_is_subtechnique_False" "objects_14_x_mitre_platforms_0_Android" "objects_14_x_mitre_platforms_1_iOS" "objects_14_x_mitre_version_1.1" "objects_14_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_14_type_attack-pattern" "objects_14_id_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_14_created_2022-04-01T12:36:41.507Z" "objects_14_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_14_revoked_False" "objects_14_external_references_0_source_name_mitre-attack" "objects_14_external_references_0_url_https://attack.mitre.org/techniques/T1636" "objects_14_external_references_0_external_id_T1636" "objects_14_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_14_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_14_external_references_1_external_id_APP-13" "objects_14_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_14_x_mitre_attack_spec_version_3.1.0" "objects_14_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_14_spec_version_2.1" "objects_15_x_mitre_platforms_0_Android" "objects_15_x_mitre_platforms_1_iOS" "objects_15_x_mitre_domains_0_mobile-attack" "objects_15_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_15_type_attack-pattern" "objects_15_id_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_15_created_2022-04-05T20:15:43.636Z" "objects_15_x_mitre_version_1.0" "objects_15_external_references_0_source_name_mitre-attack" "objects_15_external_references_0_external_id_T1521.002" "objects_15_external_references_0_url_https://attack.mitre.org/techniques/T1521/002" "objects_15_x_mitre_deprecated_False" "objects_15_revoked_False" "objects_15_description_Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Asymmetric cryptography, also known as public key cryptography, uses a keypair per party: one public that can be freely distributed, and one private that should not be distributed. Due to how asymmetric algorithms work, the sender encrypts data with the receiver\u2019s public key and the receiver decrypts the data with their private key. This ensures that only the intended recipient can read the encrypted data. Common public key encryption algorithms include RSA, ElGamal, and ECDSA.\n\nFor efficiency, many protocols (including SSL/TLS) use symmetric cryptography once a connection is established, but use asymmetric cryptography to establish or transmit a key. As such, these protocols are classified as [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1521/002)." "objects_15_modified_2022-04-05T20:16:21.324Z" "objects_15_name_Asymmetric Cryptography" "objects_15_x_mitre_detection_Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user." "objects_15_kill_chain_phases_0_phase_name_command-and-control" "objects_15_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_15_x_mitre_is_subtechnique_True" "objects_15_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_15_x_mitre_attack_spec_version_2.1.0" "objects_15_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_15_spec_version_2.1" "objects_16_modified_2023-03-20T18:55:03.477Z" "objects_16_name_Software Discovery" "objects_16_description_Adversaries may attempt to get a listing of applications that are installed on a device. Adversaries may use the information from [Software Discovery](https://attack.mitre.org/techniques/T1418) during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempts specific actions. \n\n \n\nAdversaries may attempt to enumerate applications for a variety of reasons, such as figuring out what security measures are present or to identify the presence of target applications. " "objects_16_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_16_kill_chain_phases_0_phase_name_discovery" "objects_16_x_mitre_deprecated_False" "objects_16_x_mitre_detection_Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it." "objects_16_x_mitre_domains_0_mobile-attack" "objects_16_x_mitre_is_subtechnique_False" "objects_16_x_mitre_platforms_0_Android" "objects_16_x_mitre_platforms_1_iOS" "objects_16_x_mitre_version_2.1" "objects_16_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_16_type_attack-pattern" "objects_16_id_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_16_created_2017-10-25T14:48:28.067Z" "objects_16_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_16_revoked_False" "objects_16_external_references_0_source_name_mitre-attack" "objects_16_external_references_0_url_https://attack.mitre.org/techniques/T1418" "objects_16_external_references_0_external_id_T1418" "objects_16_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_16_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-12.html" "objects_16_external_references_1_external_id_APP-12" "objects_16_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_16_x_mitre_attack_spec_version_3.1.0" "objects_16_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_16_spec_version_2.1" "objects_17_modified_2023-03-20T18:55:23.702Z" "objects_17_name_Process Discovery" "objects_17_description_Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1424) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. \n\n \n\nRecent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the `hidepid` mount feature. Prior to Android 7, applications could utilize the `ps` command or examine the `/proc` directory on the device.(Citation: Android-SELinuxChanges) \n\n \n\nIn iOS, applications have previously been able to use the `sysctl` command to obtain a list of running processes. This functionality has been removed in later iOS versions. " "objects_17_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_17_kill_chain_phases_0_phase_name_discovery" "objects_17_x_mitre_deprecated_False" "objects_17_x_mitre_detection_Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of `ps` or inspection of the `/proc` directory." "objects_17_x_mitre_domains_0_mobile-attack" "objects_17_x_mitre_is_subtechnique_False" "objects_17_x_mitre_platforms_0_Android" "objects_17_x_mitre_platforms_1_iOS" "objects_17_x_mitre_version_2.1" "objects_17_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_17_type_attack-pattern" "objects_17_id_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_17_created_2017-10-25T14:48:33.926Z" "objects_17_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_17_revoked_False" "objects_17_external_references_0_source_name_mitre-attack" "objects_17_external_references_0_url_https://attack.mitre.org/techniques/T1424" "objects_17_external_references_0_external_id_T1424" "objects_17_external_references_1_source_name_Android-SELinuxChanges" "objects_17_external_references_1_description_Various. (2016, March 31). Overly restrictive SELinux filesystem permissions in Android N. Retrieved December 21, 2016." "objects_17_external_references_1_url_https://code.google.com/p/android/issues/detail?id=205565" "objects_17_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_17_x_mitre_attack_spec_version_3.1.0" "objects_17_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_17_spec_version_2.1" "objects_18_modified_2023-03-16T18:32:30.150Z" "objects_18_name_Call Log" "objects_18_description_Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log. \n\n \n\nIf the device has been jailbroken or rooted, an adversary may be able to access the [Call Log](https://attack.mitre.org/techniques/T1636/002) without the user\u2019s knowledge or approval. " "objects_18_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_18_kill_chain_phases_0_phase_name_collection" "objects_18_x_mitre_deprecated_False" "objects_18_x_mitre_detection_On Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary. Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. " "objects_18_x_mitre_domains_0_mobile-attack" "objects_18_x_mitre_is_subtechnique_True" "objects_18_x_mitre_platforms_0_Android" "objects_18_x_mitre_platforms_1_iOS" "objects_18_x_mitre_version_1.1" "objects_18_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_18_type_attack-pattern" "objects_18_id_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_18_created_2022-04-01T13:12:23.522Z" "objects_18_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_18_revoked_False" "objects_18_external_references_0_source_name_mitre-attack" "objects_18_external_references_0_url_https://attack.mitre.org/techniques/T1636/002" "objects_18_external_references_0_external_id_T1636.002" "objects_18_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_18_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_18_external_references_1_external_id_APP-13" "objects_18_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_18_x_mitre_attack_spec_version_3.1.0" "objects_18_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_18_spec_version_2.1" "objects_19_modified_2023-03-20T18:55:33.642Z" "objects_19_name_Security Software Discovery" "objects_19_description_Adversaries may attempt to get a listing of security applications and configurations that are installed on a device. This may include things such as mobile security products. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1418/001) during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempt specific actions. " "objects_19_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_19_kill_chain_phases_0_phase_name_discovery" "objects_19_x_mitre_deprecated_False" "objects_19_x_mitre_detection_Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it." "objects_19_x_mitre_domains_0_mobile-attack" "objects_19_x_mitre_is_subtechnique_True" "objects_19_x_mitre_platforms_0_Android" "objects_19_x_mitre_platforms_1_iOS" "objects_19_x_mitre_version_1.1" "objects_19_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_19_type_attack-pattern" "objects_19_id_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_19_created_2022-03-31T19:50:45.752Z" "objects_19_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_19_revoked_False" "objects_19_external_references_0_source_name_mitre-attack" "objects_19_external_references_0_url_https://attack.mitre.org/techniques/T1418/001" "objects_19_external_references_0_external_id_T1418.001" "objects_19_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_19_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-12.html" "objects_19_external_references_1_external_id_APP-12" "objects_19_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_19_x_mitre_attack_spec_version_3.1.0" "objects_19_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_19_spec_version_2.1" "objects_20_x_mitre_domains_0_mobile-attack" "objects_20_id_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_20_type_attack-pattern" "objects_20_created_2017-10-25T14:48:10.699Z" "objects_20_revoked_True" "objects_20_external_references_0_source_name_mitre-mobile-attack" "objects_20_external_references_0_url_https://attack.mitre.org/techniques/T1434" "objects_20_external_references_0_external_id_T1434" "objects_20_modified_2022-07-07T14:00:00.188Z" "objects_20_name_App Delivered via Email Attachment" "objects_20_x_mitre_version_1.0" "objects_20_x_mitre_is_subtechnique_False" "objects_20_spec_version_2.1" "objects_20_x_mitre_attack_spec_version_2.1.0" "objects_21_modified_2023-03-20T18:57:40.571Z" "objects_21_name_Ptrace System Calls" "objects_21_description_Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. \n\nPtrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (e.g., by using `malloc`) then invoking that memory with `PTRACE_SETREGS` to set the register containing the next instruction to execute. Ptrace system call injection can also be done with `PTRACE_POKETEXT`/`PTRACE_POKEDATA`, which copy data to a specific address in the target process's memory (e.g., the current address of the next instruction).(Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) \n\nPtrace system call injection may not be possible when targeting processes with high-privileges, and on some systems those that are non-child processes.(Citation: BH Linux Inject) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process." "objects_21_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_21_kill_chain_phases_0_phase_name_defense-evasion" "objects_21_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_21_kill_chain_phases_1_phase_name_privilege-escalation" "objects_21_x_mitre_deprecated_False" "objects_21_x_mitre_detection_Application vetting services could look for misuse of dynamic libraries." "objects_21_x_mitre_domains_0_mobile-attack" "objects_21_x_mitre_is_subtechnique_True" "objects_21_x_mitre_platforms_0_Android" "objects_21_x_mitre_platforms_1_iOS" "objects_21_x_mitre_version_1.1" "objects_21_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_21_type_attack-pattern" "objects_21_id_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_21_created_2022-03-30T19:05:17.048Z" "objects_21_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_21_revoked_False" "objects_21_external_references_0_source_name_mitre-attack" "objects_21_external_references_0_url_https://attack.mitre.org/techniques/T1631/001" "objects_21_external_references_0_external_id_T1631.001" "objects_21_external_references_1_source_name_BH Linux Inject" "objects_21_external_references_1_description_Colgan, T. (2015, August 15). Linux-Inject. Retrieved February 21, 2020." "objects_21_external_references_1_url_https://github.com/gaffe23/linux-inject/blob/master/slides_BHArsenal2015.pdf" "objects_21_external_references_2_source_name_Medium Ptrace JUL 2018" "objects_21_external_references_2_description_Jain, S. (2018, July 25). Code injection in running process using ptrace. Retrieved February 21, 2020." "objects_21_external_references_2_url_https://medium.com/@jain.sm/code-injection-in-running-process-using-ptrace-d3ea7191a4be" "objects_21_external_references_3_source_name_PTRACE man" "objects_21_external_references_3_description_Kerrisk, M. (2020, February 9). PTRACE(2) - Linux Programmer's Manual. Retrieved February 21, 2020." "objects_21_external_references_3_url_http://man7.org/linux/man-pages/man2/ptrace.2.html" "objects_21_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_21_x_mitre_attack_spec_version_3.1.0" "objects_21_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_21_spec_version_2.1" "objects_22_modified_2023-03-20T18:59:55.849Z" "objects_22_name_Impair Defenses" "objects_22_description_Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may span both native defenses as well as supplemental capabilities installed by users or mobile endpoint administrators." "objects_22_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_22_kill_chain_phases_0_phase_name_defense-evasion" "objects_22_x_mitre_deprecated_False" "objects_22_x_mitre_detection_Mobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running. Application vetting can detect many techniques associated with impairing device defenses.(Citation: Samsung Knox Mobile Threat Defense)" "objects_22_x_mitre_domains_0_mobile-attack" "objects_22_x_mitre_is_subtechnique_False" "objects_22_x_mitre_platforms_0_Android" "objects_22_x_mitre_version_1.1" "objects_22_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_22_type_attack-pattern" "objects_22_id_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_22_created_2022-04-01T18:42:22.117Z" "objects_22_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_22_revoked_False" "objects_22_external_references_0_source_name_mitre-attack" "objects_22_external_references_0_url_https://attack.mitre.org/techniques/T1629" "objects_22_external_references_0_external_id_T1629" "objects_22_external_references_1_source_name_Samsung Knox Mobile Threat Defense" "objects_22_external_references_1_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_22_external_references_1_url_https://partner.samsungknox.com/mtd" "objects_22_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_22_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_22_external_references_2_external_id_APP-22" "objects_22_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_22_x_mitre_attack_spec_version_3.1.0" "objects_22_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_22_spec_version_2.1" "objects_23_x_mitre_platforms_0_Android" "objects_23_x_mitre_domains_0_mobile-attack" "objects_23_x_mitre_contributors_0_Luk\u00e1\u0161 \u0160tefanko, ESET" "objects_23_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_23_id_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_23_type_attack-pattern" "objects_23_created_2017-10-25T14:48:08.613Z" "objects_23_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_23_external_references_0_source_name_mitre-mobile-attack" "objects_23_external_references_0_external_id_T1453" "objects_23_external_references_0_url_https://attack.mitre.org/techniques/T1453" "objects_23_external_references_1_url_https://www.skycure.com/blog/accessibility-clickjacking/" "objects_23_external_references_1_description_Yair Amit. (2016, March 3). \u201cAccessibility Clickjacking\u201d \u2013 The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016." "objects_23_external_references_1_source_name_Skycure-Accessibility" "objects_23_external_references_2_description_Luk\u00e1\u0161 \u0160tefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019." "objects_23_external_references_2_url_https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/" "objects_23_external_references_2_source_name_android-trojan-steals-paypal-2fa" "objects_23_external_references_3_source_name_banking-trojans-google-play" "objects_23_external_references_3_url_https://www.welivesecurity.com/2018/10/24/banking-trojans-continue-surface-google-play/" "objects_23_external_references_3_description_Luk\u00e1\u0161 \u0160tefanko. (2018, October 24). Banking Trojans continue to surface on Google Play. Retrieved July 11, 2019." "objects_23_modified_2022-07-07T14:00:00.188Z" "objects_23_name_Abuse Accessibility Features" "objects_23_description_**This technique has been deprecated. Please use [Input Capture](https://attack.mitre.org/techniques/T1417), [Input Injection](https://attack.mitre.org/techniques/T1516), and [Input Prompt](https://attack.mitre.org/techniques/T1411) where appropriate.**\n\nA malicious app could abuse Android's accessibility features to capture sensitive data or perform other malicious actions.(Citation: Skycure-Accessibility)\n\nAdversaries may abuse accessibility features on Android to emulate a user's clicks, for example to steal money from a user's bank account.(Citation: android-trojan-steals-paypal-2fa)(Citation: banking-trojans-google-play)\n\nAdversaries may abuse accessibility features on Android devices to evade defenses by repeatedly clicking the \"Back\" button when a targeted app manager or mobile security app is launched, or when strings suggesting uninstallation are detected in the foreground. This effectively prevents the malicious application from being uninstalled.(Citation: android-trojan-steals-paypal-2fa)" "objects_23_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_23_kill_chain_phases_0_phase_name_collection" "objects_23_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_23_kill_chain_phases_1_phase_name_credential-access" "objects_23_kill_chain_phases_2_kill_chain_name_mitre-mobile-attack" "objects_23_kill_chain_phases_2_phase_name_impact" "objects_23_kill_chain_phases_3_kill_chain_name_mitre-mobile-attack" "objects_23_kill_chain_phases_3_phase_name_defense-evasion" "objects_23_x_mitre_deprecated_True" "objects_23_x_mitre_version_2.0" "objects_23_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_23_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_23_x_mitre_is_subtechnique_False" "objects_23_spec_version_2.1" "objects_23_x_mitre_attack_spec_version_2.1.0" "objects_24_modified_2023-03-20T18:51:07.651Z" "objects_24_name_Exploitation of Remote Services" "objects_24_description_Adversaries may exploit remote services of enterprise servers, workstations, or other resources to gain unauthorized access to internal systems once inside of a network. Adversaries may exploit remote services by taking advantage of a mobile device\u2019s access to an internal enterprise network through local connectivity or through a Virtual Private Network (VPN). Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. \n\nAn adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Scanning](https://attack.mitre.org/techniques/T1423) or other Discovery methods. These look for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources.\n\nDepending on the permissions level of the vulnerable remote service, an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1404) as a result of lateral movement exploitation as well. " "objects_24_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_24_kill_chain_phases_0_phase_name_lateral-movement" "objects_24_x_mitre_deprecated_False" "objects_24_x_mitre_detection_Detecting software exploitation initiated by a mobile device may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash.\n\nNetwork traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. \n\nApplication vetting may be able to identify applications that perform Discovery or utilize existing connectivity to remotely access hosts within an internal enterprise network. " "objects_24_x_mitre_domains_0_mobile-attack" "objects_24_x_mitre_is_subtechnique_False" "objects_24_x_mitre_platforms_0_Android" "objects_24_x_mitre_platforms_1_iOS" "objects_24_x_mitre_version_1.2" "objects_24_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_24_type_attack-pattern" "objects_24_id_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_24_created_2017-10-25T14:48:13.259Z" "objects_24_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_24_revoked_False" "objects_24_external_references_0_source_name_mitre-attack" "objects_24_external_references_0_url_https://attack.mitre.org/techniques/T1428" "objects_24_external_references_0_external_id_T1428" "objects_24_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_24_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-32.html" "objects_24_external_references_1_external_id_APP-32" "objects_24_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_24_x_mitre_attack_spec_version_3.1.0" "objects_24_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_24_spec_version_2.1" "objects_25_x_mitre_platforms_0_Android" "objects_25_x_mitre_platforms_1_iOS" "objects_25_x_mitre_domains_0_mobile-attack" "objects_25_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_25_type_attack-pattern" "objects_25_id_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_25_created_2022-04-01T19:06:27.177Z" "objects_25_x_mitre_version_1.0" "objects_25_external_references_0_source_name_mitre-attack" "objects_25_external_references_0_external_id_T1437.001" "objects_25_external_references_0_url_https://attack.mitre.org/techniques/T1437/001" "objects_25_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-29.html" "objects_25_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_25_external_references_1_external_id_APP-29" "objects_25_x_mitre_deprecated_False" "objects_25_revoked_False" "objects_25_description_Adversaries may communicate using application layer protocols associated with web protocols traffic to avoid detection/network filtering by blending in with existing traffic. Commands to remote mobile devices, and often the results of those commands, will be embedded within the protocol traffic between the mobile client and server. \n\nWeb protocols such as HTTP and HTTPS are used for web traffic as well as well as notification services native to mobile messaging services such as Google Cloud Messaging (GCM) and newly, Firebase Cloud Messaging (FCM), (GCM/FCM: two-way communication) and Apple Push Notification Service (APNS; one-way server-to-device). Such notification services leverage HTTP/S via the respective API and are commonly abused on Android and iOS respectively in order blend in with routine device traffic making it difficult for enterprises to inspect. " "objects_25_modified_2022-04-06T13:07:45.661Z" "objects_25_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_25_name_Web Protocols" "objects_25_x_mitre_detection_Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. " "objects_25_kill_chain_phases_0_phase_name_command-and-control" "objects_25_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_25_x_mitre_is_subtechnique_True" "objects_25_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_25_x_mitre_attack_spec_version_2.1.0" "objects_25_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_25_spec_version_2.1" "objects_26_modified_2023-03-20T18:53:52.292Z" "objects_26_name_Steal Application Access Token" "objects_26_description_Adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources. This can occur through social engineering or URI hijacking and typically requires user action to grant access, such as through a system \u201cOpen With\u201d dialogue. \n\nApplication access tokens are used to make authorized API requests on behalf of a user and are commonly used as a way to access resources in cloud-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework used to issue tokens to users for access to systems. An application desiring access to cloud-based services or protected APIs can gain entry through OAuth 2.0 using a variety of authorization protocols. An example of a commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested without requiring user credentials." "objects_26_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_26_kill_chain_phases_0_phase_name_credential-access" "objects_26_x_mitre_deprecated_False" "objects_26_x_mitre_detection_On Android, users may be presented with a popup to select the appropriate application to open a URI in. If the user sees an application they do not recognize, they can remove it. When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)" "objects_26_x_mitre_domains_0_mobile-attack" "objects_26_x_mitre_is_subtechnique_False" "objects_26_x_mitre_platforms_0_Android" "objects_26_x_mitre_platforms_1_iOS" "objects_26_x_mitre_version_1.1" "objects_26_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_26_type_attack-pattern" "objects_26_id_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_26_created_2022-04-01T15:12:50.740Z" "objects_26_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_26_revoked_False" "objects_26_external_references_0_source_name_mitre-attack" "objects_26_external_references_0_url_https://attack.mitre.org/techniques/T1635" "objects_26_external_references_0_external_id_T1635" "objects_26_external_references_1_source_name_Android-AppLinks" "objects_26_external_references_1_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_26_external_references_1_url_https://developer.android.com/training/app-links/index.html" "objects_26_external_references_2_source_name_Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019" "objects_26_external_references_2_description_Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019." "objects_26_external_references_2_url_https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/" "objects_26_external_references_3_source_name_Microsoft - OAuth Code Authorization flow - June 2019" "objects_26_external_references_3_description_Microsoft. (n.d.). Microsoft identity platform and OAuth 2.0 authorization code flow. Retrieved September 12, 2019." "objects_26_external_references_3_url_https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow" "objects_26_external_references_4_source_name_Microsoft Identity Platform Protocols May 2019" "objects_26_external_references_4_description_Microsoft. (n.d.). Retrieved September 12, 2019." "objects_26_external_references_4_url_https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols" "objects_26_external_references_5_source_name_IETF-OAuthNativeApps" "objects_26_external_references_5_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_26_external_references_5_url_https://tools.ietf.org/html/rfc8252" "objects_26_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_26_x_mitre_attack_spec_version_3.1.0" "objects_26_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_26_spec_version_2.1" "objects_27_x_mitre_platforms_0_Android" "objects_27_x_mitre_domains_0_mobile-attack" "objects_27_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_27_type_attack-pattern" "objects_27_id_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_27_created_2022-04-11T20:05:56.069Z" "objects_27_x_mitre_version_1.0" "objects_27_external_references_0_source_name_mitre-attack" "objects_27_external_references_0_external_id_T1628.002" "objects_27_external_references_0_url_https://attack.mitre.org/techniques/T1628/002" "objects_27_x_mitre_deprecated_False" "objects_27_revoked_False" "objects_27_description_Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary\u2019s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. \n\nWhile there are many ways this can be accomplished, one method is by using the device\u2019s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent." "objects_27_modified_2022-04-11T20:05:56.069Z" "objects_27_name_User Evasion" "objects_27_x_mitre_detection_Mobile security products may be able to detect some forms of user evasion. Otherwise, the act of hiding malicious activity could be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_27_kill_chain_phases_0_phase_name_defense-evasion" "objects_27_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_27_x_mitre_is_subtechnique_True" "objects_27_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_27_x_mitre_attack_spec_version_2.1.0" "objects_27_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_27_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_27_spec_version_2.1" "objects_28_modified_2023-03-20T18:37:57.884Z" "objects_28_name_Virtualization/Sandbox Evasion" "objects_28_description_Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors after checking for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware\u2019s behavior to disengage from the victim or conceal the core functions of the payload. They may also search for VME artifacts before dropping further payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1633) during automated discovery to shape follow-on behaviors. \n\nAdversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1633) such as checking for system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. " "objects_28_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_28_kill_chain_phases_0_phase_name_defense-evasion" "objects_28_x_mitre_deprecated_False" "objects_28_x_mitre_detection_Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications." "objects_28_x_mitre_domains_0_mobile-attack" "objects_28_x_mitre_is_subtechnique_False" "objects_28_x_mitre_platforms_0_Android" "objects_28_x_mitre_platforms_1_iOS" "objects_28_x_mitre_version_1.1" "objects_28_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_28_type_attack-pattern" "objects_28_id_attack-pattern--27d18e87-8f32-4be1-b456-39b90454360f" "objects_28_created_2022-03-30T17:51:29.550Z" "objects_28_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_28_revoked_False" "objects_28_external_references_0_source_name_mitre-attack" "objects_28_external_references_0_url_https://attack.mitre.org/techniques/T1633" "objects_28_external_references_0_external_id_T1633" "objects_28_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_28_x_mitre_attack_spec_version_3.1.0" "objects_28_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_28_spec_version_2.1" "objects_29_x_mitre_platforms_0_iOS" "objects_29_x_mitre_domains_0_mobile-attack" "objects_29_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_29_type_attack-pattern" "objects_29_id_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_29_created_2020-06-24T17:33:49.778Z" "objects_29_x_mitre_version_1.0" "objects_29_external_references_0_source_name_mitre-attack" "objects_29_external_references_0_external_id_T1579" "objects_29_external_references_0_url_https://attack.mitre.org/techniques/T1579" "objects_29_external_references_1_source_name_Apple Keychain Services" "objects_29_external_references_1_url_https://developer.apple.com/documentation/security/keychain_services" "objects_29_external_references_1_description_Apple, Inc.. (n.d.). Keychain Services. Retrieved June 24, 2020." "objects_29_external_references_2_source_name_Elcomsoft Decrypt Keychain" "objects_29_external_references_2_url_https://blog.elcomsoft.com/2018/12/six-ways-to-decrypt-iphone-passwords-from-the-keychain/" "objects_29_external_references_2_description_V. Katalov. (2018, December 18). Six Ways to Decrypt iPhone Passwords from the Keychain. Retrieved June 24, 2020." "objects_29_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-11.html" "objects_29_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_29_external_references_3_external_id_AUT-11" "objects_29_x_mitre_deprecated_False" "objects_29_revoked_True" "objects_29_description_Adversaries may collect the keychain storage data from an iOS device to acquire credentials. Keychains are the built-in way for iOS to keep track of users' passwords and credentials for many services and features such as Wi-Fi passwords, websites, secure notes, certificates, private keys, and VPN credentials.\n\nOn the device, the keychain database is stored outside of application sandboxes to prevent unauthorized access to the raw data. Standard iOS APIs allow applications access to their own keychain contained within the database. By utilizing a privilege escalation exploit or existing root access, an adversary can access the entire encrypted database.(Citation: Apple Keychain Services)(Citation: Elcomsoft Decrypt Keychain)" "objects_29_modified_2022-04-01T15:02:43.470Z" "objects_29_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_29_name_Keychain" "objects_29_x_mitre_detection_Mobile security products can potentially detect jailbroken devices and perform further actions as necessary." "objects_29_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_29_kill_chain_phases_0_phase_name_credential-access" "objects_29_x_mitre_is_subtechnique_False" "objects_29_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_29_x_mitre_attack_spec_version_2.1.0" "objects_29_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_29_spec_version_2.1" "objects_30_modified_2023-09-28T15:36:11.282Z" "objects_30_name_Application Versioning" "objects_30_description_An adversary may push an update to a previously benign application to add malicious code. This can be accomplished by pushing an initially benign, functional application to a trusted application store, such as the Google Play Store or the Apple App Store. This allows the adversary to establish a trusted userbase that may grant permissions to the application prior to the introduction of malicious code. Then, an application update could be pushed to introduce malicious code.(Citation: android_app_breaking_bad)\n\nThis technique could also be accomplished by compromising a developer\u2019s account. This would allow an adversary to take advantage of an existing userbase without having to establish the userbase themselves. " "objects_30_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_30_kill_chain_phases_0_phase_name_initial-access" "objects_30_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_30_kill_chain_phases_1_phase_name_defense-evasion" "objects_30_x_mitre_contributors_0_Edward Stevens, BT Security" "objects_30_x_mitre_contributors_1_Adam Lichters" "objects_30_x_mitre_deprecated_False" "objects_30_x_mitre_detection_" "objects_30_x_mitre_domains_0_mobile-attack" "objects_30_x_mitre_is_subtechnique_False" "objects_30_x_mitre_platforms_0_Android" "objects_30_x_mitre_platforms_1_iOS" "objects_30_x_mitre_version_1.0" "objects_30_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_30_type_attack-pattern" "objects_30_id_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_30_created_2023-09-21T22:16:38.002Z" "objects_30_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_30_revoked_False" "objects_30_external_references_0_source_name_mitre-attack" "objects_30_external_references_0_url_https://attack.mitre.org/techniques/T1661" "objects_30_external_references_0_external_id_T1661" "objects_30_external_references_1_source_name_android_app_breaking_bad" "objects_30_external_references_1_description_Stefanko, L. (2023, May 23). Android app breaking bad: From legitimate screen recording to file exfiltration within a year. Retrieved August 28, 2023." "objects_30_external_references_1_url_https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/" "objects_30_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_30_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-20.html" "objects_30_external_references_2_external_id_SPC-20" "objects_30_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_30_x_mitre_attack_spec_version_3.2.0" "objects_30_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_30_spec_version_2.1" "objects_31_x_mitre_platforms_0_Android" "objects_31_x_mitre_domains_0_mobile-attack" "objects_31_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_31_type_attack-pattern" "objects_31_id_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_31_created_2017-10-25T14:48:17.176Z" "objects_31_x_mitre_version_1.0" "objects_31_external_references_0_source_name_mitre-attack" "objects_31_external_references_0_external_id_T1413" "objects_31_external_references_0_url_https://attack.mitre.org/techniques/T1413" "objects_31_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-3.html" "objects_31_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_31_external_references_1_external_id_APP-3" "objects_31_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_31_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_31_external_references_2_external_id_APP-13" "objects_31_x_mitre_deprecated_True" "objects_31_revoked_False" "objects_31_description_On versions of Android prior to 4.1, an adversary may use a malicious application that holds the READ_LOGS permission to obtain private keys, passwords, other credentials, or other sensitive data stored in the device's system log. On Android 4.1 and later, an adversary would need to attempt to perform an operating system privilege escalation attack to be able to access the log." "objects_31_modified_2022-04-06T15:37:34.463Z" "objects_31_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_31_name_Access Sensitive Data in Device Logs" "objects_31_x_mitre_detection_" "objects_31_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_31_kill_chain_phases_0_phase_name_collection" "objects_31_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_31_kill_chain_phases_1_phase_name_credential-access" "objects_31_x_mitre_is_subtechnique_False" "objects_31_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_31_x_mitre_attack_spec_version_2.1.0" "objects_31_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_31_spec_version_2.1" "objects_32_modified_2023-08-07T22:15:34.693Z" "objects_32_name_Command and Scripting Interpreter" "objects_32_description_Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, Android is a UNIX-like OS and includes a basic [Unix Shell](https://attack.mitre.org/techniques/T1623/001) that can be accessed via the Android Debug Bridge (ADB) or Java\u2019s `Runtime` package.\n\nAdversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0027) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells. " "objects_32_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_32_kill_chain_phases_0_phase_name_execution" "objects_32_x_mitre_deprecated_False" "objects_32_x_mitre_detection_Command-line activities can potentially be detected through Mobile Threat Defense integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\n\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)" "objects_32_x_mitre_domains_0_mobile-attack" "objects_32_x_mitre_is_subtechnique_False" "objects_32_x_mitre_platforms_0_Android" "objects_32_x_mitre_platforms_1_iOS" "objects_32_x_mitre_version_1.2" "objects_32_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_32_type_attack-pattern" "objects_32_id_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_32_created_2022-03-30T13:40:37.259Z" "objects_32_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_32_revoked_False" "objects_32_external_references_0_source_name_mitre-attack" "objects_32_external_references_0_url_https://attack.mitre.org/techniques/T1623" "objects_32_external_references_0_external_id_T1623" "objects_32_external_references_1_source_name_Samsung Knox Mobile Threat Defense" "objects_32_external_references_1_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_32_external_references_1_url_https://partner.samsungknox.com/mtd" "objects_32_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_32_x_mitre_attack_spec_version_3.1.0" "objects_32_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_32_spec_version_2.1" "objects_33_modified_2023-03-20T18:40:12.912Z" "objects_33_name_Disable or Modify Tools" "objects_33_description_Adversaries may disable security tools to avoid potential detection of their tools and activities. This can take the form of disabling security software, modifying SELinux configuration, or other methods to interfere with security tools scanning or reporting information. This is typically done by abusing device administrator permissions or using system exploits to gain root access to the device to modify protected system files." "objects_33_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_33_kill_chain_phases_0_phase_name_defense-evasion" "objects_33_x_mitre_deprecated_False" "objects_33_x_mitre_detection_Users can view a list of active device administrators in the device settings." "objects_33_x_mitre_domains_0_mobile-attack" "objects_33_x_mitre_is_subtechnique_True" "objects_33_x_mitre_platforms_0_Android" "objects_33_x_mitre_version_1.1" "objects_33_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_33_type_attack-pattern" "objects_33_id_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_33_created_2022-04-01T18:51:13.963Z" "objects_33_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_33_revoked_False" "objects_33_external_references_0_source_name_mitre-attack" "objects_33_external_references_0_url_https://attack.mitre.org/techniques/T1629/003" "objects_33_external_references_0_external_id_T1629.003" "objects_33_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_33_x_mitre_attack_spec_version_3.1.0" "objects_33_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_33_spec_version_2.1" "objects_34_modified_2023-08-14T16:21:05.728Z" "objects_34_name_Ingress Tool Transfer" "objects_34_description_Adversaries may transfer tools or other files from an external system onto a compromised device to facilitate follow-on actions. Files may be copied from an external adversary-controlled system through the command and control channel or through alternate protocols with another tool such as FTP." "objects_34_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_34_kill_chain_phases_0_phase_name_command-and-control" "objects_34_x_mitre_deprecated_False" "objects_34_x_mitre_detection_Application vetting services could look for connections to unknown domains or IP addresses. Application vetting services may indicate precisely what content was requested during application execution." "objects_34_x_mitre_domains_0_mobile-attack" "objects_34_x_mitre_is_subtechnique_False" "objects_34_x_mitre_platforms_0_Android" "objects_34_x_mitre_platforms_1_iOS" "objects_34_x_mitre_version_2.2" "objects_34_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_34_type_attack-pattern" "objects_34_id_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_34_created_2020-01-21T15:27:30.182Z" "objects_34_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_34_revoked_False" "objects_34_external_references_0_source_name_mitre-attack" "objects_34_external_references_0_url_https://attack.mitre.org/techniques/T1544" "objects_34_external_references_0_external_id_T1544" "objects_34_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_34_x_mitre_attack_spec_version_3.1.0" "objects_34_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_34_spec_version_2.1" "objects_35_modified_2023-08-14T16:19:34.225Z" "objects_35_name_Dynamic Resolution" "objects_35_description_Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. This algorithm can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control." "objects_35_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_35_kill_chain_phases_0_phase_name_command-and-control" "objects_35_x_mitre_deprecated_False" "objects_35_x_mitre_detection_Detecting dynamically generated domains can be challenging due to the number of different Domain Generation Algorithms (DGAs), constantly evolving malware families, and the increasing complexity of the algorithms. There are a myriad of approaches for detecting a pseudo-randomly generated domain name, including using frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more.(Citation: Data Driven Security DGA) Content delivery network (CDN) domains may trigger these detections due to the format of their domain names. In addition to detecting a DGA domain based on the name, a more general approach for detecting a suspicious domain is to check for recently registered names or rarely visited domains." "objects_35_x_mitre_domains_0_mobile-attack" "objects_35_x_mitre_is_subtechnique_False" "objects_35_x_mitre_platforms_0_Android" "objects_35_x_mitre_platforms_1_iOS" "objects_35_x_mitre_version_1.1" "objects_35_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_35_type_attack-pattern" "objects_35_id_attack-pattern--2ccc3d39-9598-4d32-9657-42e1c7095d26" "objects_35_created_2022-04-05T19:57:15.734Z" "objects_35_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_35_revoked_False" "objects_35_external_references_0_source_name_mitre-attack" "objects_35_external_references_0_url_https://attack.mitre.org/techniques/T1637" "objects_35_external_references_0_external_id_T1637" "objects_35_external_references_1_source_name_Data Driven Security DGA" "objects_35_external_references_1_description_Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019." "objects_35_external_references_1_url_https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/" "objects_35_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_35_x_mitre_attack_spec_version_3.1.0" "objects_35_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_35_spec_version_2.1" "objects_36_x_mitre_platforms_0_Android" "objects_36_x_mitre_platforms_1_iOS" "objects_36_x_mitre_domains_0_mobile-attack" "objects_36_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_36_type_attack-pattern" "objects_36_id_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_36_created_2018-10-17T00:14:20.652Z" "objects_36_x_mitre_version_1.1" "objects_36_external_references_0_source_name_mitre-attack" "objects_36_external_references_0_external_id_T1477" "objects_36_external_references_0_url_https://attack.mitre.org/techniques/T1477" "objects_36_external_references_1_source_name_Forbes-iPhoneSMS" "objects_36_external_references_1_url_http://www.forbes.com/2009/07/28/hackers-iphone-apple-technology-security-hackers.html" "objects_36_external_references_1_description_Andy Greenberg. (2009, July 28). How to Hijack 'Every iPhone In The World'. Retrieved December 23, 2016." "objects_36_external_references_2_source_name_Register-BaseStation" "objects_36_external_references_2_url_http://www.theregister.co.uk/2015/11/12/mobile_pwn2own1/" "objects_36_external_references_2_description_D. Pauli. (2015, November 12). Samsung S6 calls open to man-in-the-middle base station snooping. Retrieved December 23, 2016." "objects_36_external_references_3_source_name_ProjectZero-BroadcomWiFi" "objects_36_external_references_3_url_https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html" "objects_36_external_references_3_description_Gal Beniamini. (2017, April 4). Over The Air: Exploiting Broadcom's Wi-Fi Stack. Retrieved November 8, 2018." "objects_36_external_references_4_source_name_Weinmann-Baseband" "objects_36_external_references_4_url_https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf" "objects_36_external_references_4_description_R. Weinmann. (2012, August 6-7). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Retrieved December 23, 2016." "objects_36_external_references_5_source_name_SRLabs-SIMCard" "objects_36_external_references_5_url_https://srlabs.de/bites/rooting-sim-cards/" "objects_36_external_references_5_description_SRLabs. (n.d.). SIM cards are prone to remote hacking. Retrieved December 23, 2016." "objects_36_x_mitre_deprecated_True" "objects_36_revoked_False" "objects_36_description_The mobile device may be targeted for exploitation through its interface to cellular networks or other radio interfaces.\n\n### Baseband Vulnerability Exploitation\n\nA message sent over a radio interface (typically cellular, but potentially Bluetooth, GPS, NFC, Wi-Fi(Citation: ProjectZero-BroadcomWiFi) or other) to the mobile device could exploit a vulnerability in code running on the device(Citation: Register-BaseStation)(Citation: Weinmann-Baseband).\n\n### Malicious SMS Message\n\nAn SMS message could contain content designed to exploit vulnerabilities in the SMS parser on the receiving device(Citation: Forbes-iPhoneSMS). An SMS message could also contain a link to a web site containing malicious content designed to exploit the device web browser. Vulnerable SIM cards may be remotely exploited and reprogrammed via SMS messages(Citation: SRLabs-SIMCard)." "objects_36_modified_2022-04-06T15:42:13.444Z" "objects_36_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_36_name_Exploit via Radio Interfaces" "objects_36_x_mitre_detection_" "objects_36_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_36_kill_chain_phases_0_phase_name_initial-access" "objects_36_x_mitre_is_subtechnique_False" "objects_36_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_36_x_mitre_attack_spec_version_2.1.0" "objects_36_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_36_spec_version_2.1" "objects_37_x_mitre_platforms_0_Android" "objects_37_x_mitre_platforms_1_iOS" "objects_37_x_mitre_domains_0_mobile-attack" "objects_37_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_37_type_attack-pattern" "objects_37_id_attack-pattern--2de38279-043e-47e8-aaad-1b07af6d0790" "objects_37_created_2017-10-25T14:48:26.890Z" "objects_37_x_mitre_version_1.1" "objects_37_external_references_0_source_name_mitre-attack" "objects_37_external_references_0_external_id_T1423" "objects_37_external_references_0_url_https://attack.mitre.org/techniques/T1423" "objects_37_x_mitre_deprecated_False" "objects_37_revoked_False" "objects_37_description_Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans from the mobile device. This technique may take advantage of the mobile device's access to an internal enterprise network either through local connectivity or through a Virtual Private Network (VPN)." "objects_37_modified_2022-04-11T19:12:38.451Z" "objects_37_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_37_name_Network Service Scanning" "objects_37_x_mitre_detection_Network service scanning can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_37_kill_chain_phases_0_phase_name_discovery" "objects_37_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_37_x_mitre_is_subtechnique_False" "objects_37_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_37_x_mitre_attack_spec_version_2.1.0" "objects_37_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_37_spec_version_2.1" "objects_38_x_mitre_platforms_0_Android" "objects_38_x_mitre_domains_0_mobile-attack" "objects_38_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_38_type_attack-pattern" "objects_38_id_attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d" "objects_38_created_2021-09-30T18:18:52.285Z" "objects_38_x_mitre_version_1.0" "objects_38_external_references_0_source_name_mitre-attack" "objects_38_external_references_0_external_id_T1618" "objects_38_external_references_0_url_https://attack.mitre.org/techniques/T1618" "objects_38_x_mitre_deprecated_False" "objects_38_revoked_True" "objects_38_description_Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary\u2019s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. \n\nWhile there are many ways this can be accomplished, one method is by using the device\u2019s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent." "objects_38_modified_2022-04-11T20:06:56.032Z" "objects_38_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_38_name_User Evasion" "objects_38_x_mitre_detection_Mobile security products may be able to detect some forms of user evasion. Otherwise, the act of hiding malicious activity could be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_38_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_38_kill_chain_phases_0_phase_name_defense-evasion" "objects_38_x_mitre_is_subtechnique_False" "objects_38_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_38_x_mitre_attack_spec_version_2.1.0" "objects_38_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_38_spec_version_2.1" "objects_39_modified_2023-08-14T16:41:52.000Z" "objects_39_name_Exfiltration Over C2 Channel" "objects_39_description_Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications." "objects_39_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_39_kill_chain_phases_0_phase_name_exfiltration" "objects_39_x_mitre_deprecated_False" "objects_39_x_mitre_detection_[Exfiltration Over C2 Channel](https://attack.mitre.org/techniques/T1646) can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_39_x_mitre_domains_0_mobile-attack" "objects_39_x_mitre_is_subtechnique_False" "objects_39_x_mitre_platforms_0_Android" "objects_39_x_mitre_platforms_1_iOS" "objects_39_x_mitre_version_1.1" "objects_39_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_39_type_attack-pattern" "objects_39_id_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_39_created_2022-04-01T15:43:45.913Z" "objects_39_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_39_revoked_False" "objects_39_external_references_0_source_name_mitre-attack" "objects_39_external_references_0_url_https://attack.mitre.org/techniques/T1646" "objects_39_external_references_0_external_id_T1646" "objects_39_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_39_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-29.html" "objects_39_external_references_1_external_id_APP-29" "objects_39_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_39_x_mitre_attack_spec_version_3.1.0" "objects_39_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_39_spec_version_2.1" "objects_40_modified_2023-09-08T19:20:13.836Z" "objects_40_name_Exploitation for Privilege Escalation" "objects_40_description_Adversaries may exploit software vulnerabilities in order to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system software, or kernel itself to execute adversary-controlled code. Security constructions, such as permission levels, will often hinder access to information and use of certain techniques. Adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. \n\nWhen initially gaining access to a device, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and applications running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user- level permission to root permissions depending on the component that is vulnerable. " "objects_40_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_40_kill_chain_phases_0_phase_name_privilege-escalation" "objects_40_x_mitre_deprecated_False" "objects_40_x_mitre_detection_Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken. Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities." "objects_40_x_mitre_domains_0_mobile-attack" "objects_40_x_mitre_is_subtechnique_False" "objects_40_x_mitre_platforms_0_Android" "objects_40_x_mitre_platforms_1_iOS" "objects_40_x_mitre_version_2.1" "objects_40_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_40_type_attack-pattern" "objects_40_id_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_40_created_2017-10-25T14:48:29.405Z" "objects_40_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_40_revoked_False" "objects_40_external_references_0_source_name_mitre-attack" "objects_40_external_references_0_url_https://attack.mitre.org/techniques/T1404" "objects_40_external_references_0_external_id_T1404" "objects_40_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_40_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-26.html" "objects_40_external_references_1_external_id_APP-26" "objects_40_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_40_x_mitre_attack_spec_version_3.1.0" "objects_40_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_40_spec_version_2.1" "objects_41_modified_2023-08-10T21:57:52.009Z" "objects_41_name_Call Control" "objects_41_description_Adversaries may make, forward, or block phone calls without user authorization. This could be used for adversary goals such as audio surveillance, blocking or forwarding calls from the device owner, or C2 communication.\n\nSeveral permissions may be used to programmatically control phone calls, including:\n\n* `ANSWER_PHONE_CALLS` - Allows the application to answer incoming phone calls(Citation: Android Permissions)\n* `CALL_PHONE` - Allows the application to initiate a phone call without going through the Dialer interface(Citation: Android Permissions)\n* `PROCESS_OUTGOING_CALLS` - Allows the application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether(Citation: Android Permissions)\n* `MANAGE_OWN_CALLS` - Allows a calling application which manages its own calls through the self-managed `ConnectionService` APIs(Citation: Android Permissions)\n* `BIND_TELECOM_CONNECTION_SERVICE` - Required permission when using a `ConnectionService`(Citation: Android Permissions)\n* `WRITE_CALL_LOG` - Allows an application to write to the device call log, potentially to hide malicious phone calls(Citation: Android Permissions)\n\nWhen granted some of these permissions, an application can make a phone call without opening the dialer first. However, if an application desires to simply redirect the user to the dialer with a phone number filled in, it can launch an Intent using `Intent.ACTION_DIAL`, which requires no specific permissions. This then requires the user to explicitly initiate the call or use some form of [Input Injection](https://attack.mitre.org/techniques/T1516) to programmatically initiate it." "objects_41_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_41_kill_chain_phases_0_phase_name_collection" "objects_41_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_41_kill_chain_phases_1_phase_name_impact" "objects_41_kill_chain_phases_2_kill_chain_name_mitre-mobile-attack" "objects_41_kill_chain_phases_2_phase_name_command-and-control" "objects_41_x_mitre_contributors_0_Gaetan van Diemen, ThreatFabric" "objects_41_x_mitre_deprecated_False" "objects_41_x_mitre_detection_Users can view their default phone app in device settings. Users can review available call logs for irregularities, such as missing or unrecognized calls." "objects_41_x_mitre_domains_0_mobile-attack" "objects_41_x_mitre_is_subtechnique_False" "objects_41_x_mitre_platforms_0_Android" "objects_41_x_mitre_version_1.2" "objects_41_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_41_type_attack-pattern" "objects_41_id_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_41_created_2021-09-20T13:42:20.824Z" "objects_41_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_41_revoked_False" "objects_41_external_references_0_source_name_mitre-attack" "objects_41_external_references_0_url_https://attack.mitre.org/techniques/T1616" "objects_41_external_references_0_external_id_T1616" "objects_41_external_references_1_source_name_Android Permissions" "objects_41_external_references_1_description_Google. (2021, August 11). Manifest.permission. Retrieved September 22, 2021." "objects_41_external_references_1_url_https://developer.android.com/reference/android/Manifest.permission" "objects_41_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_41_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-41.html" "objects_41_external_references_2_external_id_APP-41" "objects_41_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_41_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-42.html" "objects_41_external_references_3_external_id_CEL-42" "objects_41_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_41_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-36.html" "objects_41_external_references_4_external_id_CEL-36" "objects_41_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_41_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-18.html" "objects_41_external_references_5_external_id_CEL-18" "objects_41_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_41_x_mitre_attack_spec_version_3.1.0" "objects_41_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_41_spec_version_2.1" "objects_42_modified_2023-08-14T16:40:40.166Z" "objects_42_name_Exfiltration Over Unencrypted Non-C2 Protocol" "objects_42_description_Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.\n\nAdversaries may opt to obfuscate this data, without the use of encryption, within network protocols that are natively unencrypted (such as HTTP, FTP, or DNS). Adversaries may employ custom or publicly available encoding/compression algorithms (such as base64) or embed data within protocol headers and fields." "objects_42_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_42_kill_chain_phases_0_phase_name_exfiltration" "objects_42_x_mitre_deprecated_False" "objects_42_x_mitre_detection_[Exfiltration Over Unencrypted Non-C2 Protocol](https://attack.mitre.org/techniques/T1639/001)s can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_42_x_mitre_domains_0_mobile-attack" "objects_42_x_mitre_is_subtechnique_True" "objects_42_x_mitre_platforms_0_Android" "objects_42_x_mitre_platforms_1_iOS" "objects_42_x_mitre_version_1.1" "objects_42_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_42_type_attack-pattern" "objects_42_id_attack-pattern--37047267-3e56-453c-833e-d92b68118120" "objects_42_created_2022-04-06T13:22:57.683Z" "objects_42_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_42_revoked_False" "objects_42_external_references_0_source_name_mitre-attack" "objects_42_external_references_0_url_https://attack.mitre.org/techniques/T1639/001" "objects_42_external_references_0_external_id_T1639.001" "objects_42_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_42_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-30.html" "objects_42_external_references_1_external_id_APP-30" "objects_42_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_42_x_mitre_attack_spec_version_3.1.0" "objects_42_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_42_spec_version_2.1" "objects_43_modified_2023-03-16T18:27:42.752Z" "objects_43_name_Broadcast Receivers" "objects_43_description_Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities. \n\nAn intent is a message passed between Android applications or system components. Applications can register to receive broadcast intents at runtime, which are system-wide intents delivered to each app when certain events happen on the device, such as network changes or the user unlocking the screen. Malicious applications can then trigger certain actions within the app based on which broadcast intent was received. \n\nIn addition to Android system intents, malicious applications can register for intents broadcasted by other applications. This allows the malware to respond based on actions in other applications. This behavior typically indicates a more intimate knowledge, or potentially the targeting of specific devices, users, or applications. \n\nIn Android 8 (API level 26), broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest. In most cases, applications that register through the manifest will no longer receive the broadcasts. Now, applications must register context-specific broadcast receivers while the user is actively using the app.(Citation: Android Changes to System Broadcasts) " "objects_43_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_43_kill_chain_phases_0_phase_name_persistence" "objects_43_x_mitre_contributors_0_Alex Hinchliffe, Palo Alto Networks" "objects_43_x_mitre_deprecated_False" "objects_43_x_mitre_detection_Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. " "objects_43_x_mitre_domains_0_mobile-attack" "objects_43_x_mitre_is_subtechnique_True" "objects_43_x_mitre_platforms_0_Android" "objects_43_x_mitre_version_1.1" "objects_43_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_43_type_attack-pattern" "objects_43_id_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_43_created_2022-03-30T14:41:00.672Z" "objects_43_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_43_revoked_False" "objects_43_external_references_0_source_name_mitre-attack" "objects_43_external_references_0_url_https://attack.mitre.org/techniques/T1624/001" "objects_43_external_references_0_external_id_T1624.001" "objects_43_external_references_1_source_name_Android Changes to System Broadcasts" "objects_43_external_references_1_description_Google. (2019, December 27). Broadcasts Overview. Retrieved January 27, 2020." "objects_43_external_references_1_url_https://developer.android.com/guide/components/broadcasts#changes-system-broadcasts" "objects_43_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_43_x_mitre_attack_spec_version_3.1.0" "objects_43_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_43_spec_version_2.1" "objects_44_x_mitre_platforms_0_Android" "objects_44_x_mitre_platforms_1_iOS" "objects_44_x_mitre_domains_0_mobile-attack" "objects_44_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_44_type_attack-pattern" "objects_44_id_attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad" "objects_44_created_2017-10-25T14:48:16.650Z" "objects_44_x_mitre_version_1.0" "objects_44_external_references_0_source_name_mitre-attack" "objects_44_external_references_0_external_id_T1436" "objects_44_external_references_0_url_https://attack.mitre.org/techniques/T1436" "objects_44_x_mitre_deprecated_True" "objects_44_revoked_False" "objects_44_description_Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend with normal network activity to avoid more detailed inspection. \n\nThey may use commonly open ports such as\n\n* TCP:80 (HTTP)\n* TCP:443 (HTTPS)\n* TCP:25 (SMTP)\n* TCP/UDP:53 (DNS)\n\nThey may use the protocol associated with the port or a completely different protocol." "objects_44_modified_2022-04-06T15:40:47.556Z" "objects_44_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_44_name_Commonly Used Port" "objects_44_x_mitre_detection_" "objects_44_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_44_kill_chain_phases_0_phase_name_command-and-control" "objects_44_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_44_kill_chain_phases_1_phase_name_exfiltration" "objects_44_x_mitre_is_subtechnique_False" "objects_44_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_44_x_mitre_attack_spec_version_2.1.0" "objects_44_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_44_spec_version_2.1" "objects_45_x_mitre_platforms_0_Android" "objects_45_x_mitre_platforms_1_iOS" "objects_45_x_mitre_domains_0_mobile-attack" "objects_45_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_45_type_attack-pattern" "objects_45_id_attack-pattern--393e8c12-a416-4575-ba90-19cc85656796" "objects_45_created_2017-10-25T14:48:26.104Z" "objects_45_x_mitre_version_1.1" "objects_45_external_references_0_source_name_mitre-attack" "objects_45_external_references_0_external_id_T1439" "objects_45_external_references_0_url_https://attack.mitre.org/techniques/T1439" "objects_45_external_references_1_source_name_mHealth" "objects_45_external_references_1_url_https://experts.illinois.edu/en/publications/security-concerns-in-android-mhealth-apps" "objects_45_external_references_1_description_D. He et al.. (2014). Security Concerns in Android mHealth Apps. Retrieved December 24, 2016." "objects_45_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-0.html" "objects_45_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_45_external_references_2_external_id_APP-0" "objects_45_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.html" "objects_45_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_45_external_references_3_external_id_APP-1" "objects_45_x_mitre_deprecated_False" "objects_45_revoked_True" "objects_45_description_If network traffic between the mobile device and remote servers is unencrypted or is encrypted in an insecure manner, then an adversary positioned on the network can eavesdrop on communication.(Citation: mHealth)" "objects_45_modified_2022-04-05T20:17:46.147Z" "objects_45_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_45_name_Eavesdrop on Insecure Network Communication" "objects_45_x_mitre_detection_" "objects_45_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_45_kill_chain_phases_0_phase_name_network-effects" "objects_45_x_mitre_is_subtechnique_False" "objects_45_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_45_x_mitre_attack_spec_version_2.1.0" "objects_45_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_45_spec_version_2.1" "objects_46_modified_2023-03-15T16:26:05.050Z" "objects_46_name_Access Notifications" "objects_46_description_Adversaries may collect data within notifications sent by the operating system or other applications. Notifications may contain sensitive data such as one-time authentication codes sent over SMS, email, or other mediums. In the case of Credential Access, adversaries may attempt to intercept one-time code sent to the device. Adversaries can also dismiss notifications to prevent the user from noticing that the notification has arrived and can trigger action buttons contained within notifications.(Citation: ESET 2FA Bypass) " "objects_46_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_46_kill_chain_phases_0_phase_name_collection" "objects_46_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_46_kill_chain_phases_1_phase_name_credential-access" "objects_46_x_mitre_deprecated_False" "objects_46_x_mitre_detection_Application vetting services can look for applications requesting the `BIND_NOTIFICATION_LISTENER_SERVICE` permission in a service declaration. Users can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). " "objects_46_x_mitre_domains_0_mobile-attack" "objects_46_x_mitre_is_subtechnique_False" "objects_46_x_mitre_platforms_0_Android" "objects_46_x_mitre_version_1.2" "objects_46_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_46_type_attack-pattern" "objects_46_id_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_46_created_2019-09-15T15:26:08.183Z" "objects_46_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_46_revoked_False" "objects_46_external_references_0_source_name_mitre-attack" "objects_46_external_references_0_url_https://attack.mitre.org/techniques/T1517" "objects_46_external_references_0_external_id_T1517" "objects_46_external_references_1_source_name_ESET 2FA Bypass" "objects_46_external_references_1_description_Luk\u00e1\u0161 \u0160tefanko. (2019, June 17). Malware sidesteps Google permissions policy with new 2FA bypass technique. Retrieved September 15, 2019." "objects_46_external_references_1_url_https://www.welivesecurity.com/2019/06/17/malware-google-permissions-2fa-bypass/" "objects_46_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_46_x_mitre_attack_spec_version_3.1.0" "objects_46_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_46_spec_version_2.1" "objects_47_x_mitre_platforms_0_Android" "objects_47_x_mitre_platforms_1_iOS" "objects_47_x_mitre_domains_0_mobile-attack" "objects_47_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_47_type_attack-pattern" "objects_47_id_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_47_created_2017-10-25T14:48:14.982Z" "objects_47_x_mitre_version_1.0" "objects_47_external_references_0_source_name_mitre-attack" "objects_47_external_references_0_external_id_T1410" "objects_47_external_references_0_url_https://attack.mitre.org/techniques/T1410" "objects_47_external_references_1_source_name_Skycure-Profiles" "objects_47_external_references_1_url_https://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/" "objects_47_external_references_1_description_Yair Amit. (2013, March 12). Malicious Profiles - The Sleeping Giant of iOS Security. Retrieved December 22, 2016." "objects_47_x_mitre_deprecated_False" "objects_47_revoked_True" "objects_47_description_An adversary may capture network traffic to and from the device to obtain credentials or other sensitive data, or redirect network traffic to flow through an adversary-controlled gateway to do the same.\n\nA malicious app could register itself as a VPN client on Android or iOS to gain access to network packets. However, on both platforms, the user must grant consent to the app to act as a VPN client, and on iOS the app requires a special entitlement that must be granted by Apple.\n\nAlternatively, if a malicious app is able to escalate operating system privileges, it may be able to use those privileges to gain access to network traffic.\n\nAn adversary could redirect network traffic to an adversary-controlled gateway by establishing a VPN connection or by manipulating the device's proxy settings. For example, Skycure (Citation: Skycure-Profiles) describes the ability to redirect network traffic by installing a malicious iOS Configuration Profile.\n\nIf applications encrypt their network traffic, sensitive data may not be accessible to an adversary, depending on the point of capture." "objects_47_modified_2022-04-15T17:52:24.123Z" "objects_47_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_47_name_Network Traffic Capture or Redirection" "objects_47_x_mitre_detection_On both Android and iOS the user must grant consent to an app to act as a VPN. Both platforms also provide visual context to the user in the top status bar when a VPN connection is in place." "objects_47_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_47_kill_chain_phases_0_phase_name_collection" "objects_47_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_47_kill_chain_phases_1_phase_name_credential-access" "objects_47_x_mitre_is_subtechnique_False" "objects_47_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_47_x_mitre_attack_spec_version_2.1.0" "objects_47_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_47_spec_version_2.1" "objects_48_x_mitre_platforms_0_Android" "objects_48_x_mitre_platforms_1_iOS" "objects_48_x_mitre_domains_0_mobile-attack" "objects_48_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_48_type_attack-pattern" "objects_48_id_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_48_created_2017-10-25T14:48:34.407Z" "objects_48_x_mitre_version_2.1" "objects_48_external_references_0_source_name_mitre-attack" "objects_48_external_references_0_external_id_T1411" "objects_48_external_references_0_url_https://attack.mitre.org/techniques/T1411" "objects_48_external_references_1_source_name_Felt-PhishingOnMobileDevices" "objects_48_external_references_1_url_http://w2spconf.com/2011/papers/felt-mobilephishing.pdf" "objects_48_external_references_1_description_A.P. Felt and D. Wagner. (2011, May 26). Phishing on Mobile Devices. Retrieved August 25, 2016." "objects_48_external_references_2_source_name_Android Background" "objects_48_external_references_2_url_https://developer.android.com/guide/components/activities/background-starts" "objects_48_external_references_2_description_Android Developers. (n.d.). Restrictions on starting activities from the background. Retrieved September 18, 2019." "objects_48_external_references_3_source_name_Android-getRunningTasks" "objects_48_external_references_3_url_https://developer.android.com/reference/android/app/ActivityManager.html#getRunningTasks%28int%29" "objects_48_external_references_3_description_Android. (n.d.). ActivityManager getRunningTasks documentation. Retrieved January 19, 2017." "objects_48_external_references_4_source_name_Cloak and Dagger" "objects_48_external_references_4_url_http://cloak-and-dagger.org/" "objects_48_external_references_4_description_Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 18, 2019." "objects_48_external_references_5_source_name_Group IB Gustuff Mar 2019" "objects_48_external_references_5_url_https://www.group-ib.com/blog/gustuff" "objects_48_external_references_5_description_Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named \u00abGustuff\u00bb capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019." "objects_48_external_references_6_source_name_eset-finance" "objects_48_external_references_6_url_https://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-target-around-world/" "objects_48_external_references_6_description_Luk\u00e1\u0161 \u0160tefanko. (2016, July 7). Fake finance apps on Google Play target users from around the world. Retrieved September 24, 2018." "objects_48_external_references_7_source_name_Hassell-ExploitingAndroid" "objects_48_external_references_7_url_https://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf" "objects_48_external_references_7_description_R. Hassell. (2011, October 12-13). Exploiting Androids for Fun and Profit. Retrieved October 10, 2019." "objects_48_external_references_8_source_name_XDA Bubbles" "objects_48_external_references_8_url_https://www.xda-developers.com/android-q-system-alert-window-deprecate-bubbles/" "objects_48_external_references_8_description_Rahman, M.. (2019, May 8). Bubbles in Android Q will fully replace the overlay API in a future Android version. Retrieved September 18, 2019." "objects_48_external_references_9_source_name_NowSecure Android Overlay" "objects_48_external_references_9_url_https://www.nowsecure.com/blog/2017/05/25/android-overlay-malware-system-alert-window-permission/" "objects_48_external_references_9_description_Ramirez, T.. (2017, May 25). \u2018SAW\u2019-ing through the UI: Android overlay malware and the System Alert Window permission explained. Retrieved September 18, 2019." "objects_48_external_references_10_source_name_ThreatFabric Cerberus" "objects_48_external_references_10_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_48_external_references_10_description_ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019." "objects_48_external_references_11_source_name_StackOverflow-getRunningAppProcesses" "objects_48_external_references_11_url_http://stackoverflow.com/questions/30619349/android-5-1-1-and-above-getrunningappprocesses-returns-my-application-packag" "objects_48_external_references_11_description_Various. (n.d.). Android 5.1.1 and above - getRunningAppProcesses() returns my application package only. Retrieved January 19, 2017." "objects_48_external_references_12_source_name_Skycure-Accessibility" "objects_48_external_references_12_url_https://www.skycure.com/blog/accessibility-clickjacking/" "objects_48_external_references_12_description_Yair Amit. (2016, March 3). \u201cAccessibility Clickjacking\u201d \u2013 The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016." "objects_48_external_references_13_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_48_external_references_13_source_name_NIST Mobile Threat Catalogue" "objects_48_external_references_13_external_id_APP-31" "objects_48_x_mitre_deprecated_False" "objects_48_revoked_True" "objects_48_description_The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Adversaries may mimic this functionality to prompt users for sensitive information.\n\nCompared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique\u2019s use.(Citation: Felt-PhishingOnMobileDevices)\n\nSpecific approaches to this technique include:\n\n### Impersonate the identity of a legitimate application\n\nA malicious application could impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and get installed on the device. The malicious app could then prompt the user for sensitive information.(Citation: eset-finance)\n\n### Display a prompt on top of a running legitimate application\n\nA malicious application could display a prompt on top of a running legitimate application to trick users into entering sensitive information into the malicious application rather than the legitimate application. Typically, the malicious application would need to know when the targeted application (and individual activity within the targeted application) is running in the foreground, so that the malicious application knows when to display its prompt. Android 5.0 and 5.1.1, respectively, increased the difficulty of determining the current foreground application through modifications to the `ActivityManager` API.(Citation: Android-getRunningTasks)(Citation: StackOverflow-getRunningAppProcesses). A malicious application can still abuse Android\u2019s accessibility features to determine which application is currently in the foreground.(Citation: ThreatFabric Cerberus) Approaches to display a prompt include:\n\n* A malicious application could start a new activity on top of a running legitimate application.(Citation: Felt-PhishingOnMobileDevices)(Citation: Hassell-ExploitingAndroid) Android 10 places new restrictions on the ability for an application to start a new activity on top of another application, which may make it more difficult for adversaries to utilize this technique.(Citation: Android Background)\n* A malicious application could create an application overlay window on top of a running legitimate application. Applications must hold the `SYSTEM_ALERT_WINDOW` permission to create overlay windows. This permission is handled differently than typical Android permissions, and at least under certain conditions is automatically granted to applications installed from the Google Play Store.(Citation: Cloak and Dagger)(Citation: NowSecure Android Overlay)(Citation: Skycure-Accessibility) The `SYSTEM_ALERT_WINDOW` permission and its associated ability to create application overlay windows are expected to be deprecated in a future release of Android in favor of a new API.(Citation: XDA Bubbles)\n\n### Fake device notifications\n\nA malicious application could send fake device notifications to the user. Clicking on the device notification could trigger the malicious application to display an input prompt.(Citation: Group IB Gustuff Mar 2019)" "objects_48_modified_2022-04-05T19:52:32.190Z" "objects_48_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_48_name_Input Prompt" "objects_48_x_mitre_detection_The user can view and manage which applications hold the SYSTEM_ALERT_WINDOW permission to create overlay windows on top of other apps through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions)." "objects_48_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_48_kill_chain_phases_0_phase_name_credential-access" "objects_48_x_mitre_is_subtechnique_False" "objects_48_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_48_x_mitre_attack_spec_version_2.1.0" "objects_48_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_48_spec_version_2.1" "objects_49_modified_2023-08-14T16:39:22.707Z" "objects_49_name_Exfiltration Over Alternative Protocol" "objects_49_description_Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. \n\nAlternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel. Different protocol channels could also include Web services such as cloud storage. Adversaries may opt to also encrypt and/or obfuscate these alternate channels. " "objects_49_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_49_kill_chain_phases_0_phase_name_exfiltration" "objects_49_x_mitre_deprecated_False" "objects_49_x_mitre_detection_[Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1639)s can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_49_x_mitre_domains_0_mobile-attack" "objects_49_x_mitre_is_subtechnique_False" "objects_49_x_mitre_platforms_0_Android" "objects_49_x_mitre_platforms_1_iOS" "objects_49_x_mitre_version_1.1" "objects_49_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_49_type_attack-pattern" "objects_49_id_attack-pattern--3e091a89-a493-4a6c-8e88-d57be19bb98d" "objects_49_created_2022-04-06T13:19:33.785Z" "objects_49_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_49_revoked_False" "objects_49_external_references_0_source_name_mitre-attack" "objects_49_external_references_0_url_https://attack.mitre.org/techniques/T1639" "objects_49_external_references_0_external_id_T1639" "objects_49_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_49_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-30.html" "objects_49_external_references_1_external_id_APP-30" "objects_49_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_49_x_mitre_attack_spec_version_3.1.0" "objects_49_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_49_spec_version_2.1" "objects_50_x_mitre_domains_0_mobile-attack" "objects_50_id_attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09" "objects_50_type_attack-pattern" "objects_50_created_2017-10-25T14:48:24.069Z" "objects_50_revoked_True" "objects_50_external_references_0_source_name_mitre-mobile-attack" "objects_50_external_references_0_url_https://attack.mitre.org/techniques/T1460" "objects_50_external_references_0_external_id_T1460" "objects_50_modified_2022-07-07T14:00:00.188Z" "objects_50_name_Biometric Spoofing" "objects_50_x_mitre_version_1.0" "objects_50_x_mitre_is_subtechnique_False" "objects_50_spec_version_2.1" "objects_50_x_mitre_attack_spec_version_2.1.0" "objects_51_modified_2023-03-16T18:26:46.043Z" "objects_51_name_Boot or Logon Initialization Scripts" "objects_51_description_Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts are part of the underlying operating system and are not accessible to the user unless the device has been rooted or jailbroken. " "objects_51_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_51_kill_chain_phases_0_phase_name_persistence" "objects_51_x_mitre_deprecated_False" "objects_51_x_mitre_detection_On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. " "objects_51_x_mitre_domains_0_mobile-attack" "objects_51_x_mitre_is_subtechnique_False" "objects_51_x_mitre_platforms_0_Android" "objects_51_x_mitre_platforms_1_iOS" "objects_51_x_mitre_version_2.1" "objects_51_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_51_type_attack-pattern" "objects_51_id_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_51_created_2017-10-25T14:48:31.294Z" "objects_51_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_51_revoked_False" "objects_51_external_references_0_source_name_mitre-attack" "objects_51_external_references_0_url_https://attack.mitre.org/techniques/T1398" "objects_51_external_references_0_external_id_T1398" "objects_51_external_references_1_source_name_Android-VerifiedBoot" "objects_51_external_references_1_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_51_external_references_1_url_https://source.android.com/security/verifiedboot/" "objects_51_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_51_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-26.html" "objects_51_external_references_2_external_id_APP-26" "objects_51_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_51_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_51_external_references_3_external_id_APP-27" "objects_51_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_51_x_mitre_attack_spec_version_3.1.0" "objects_51_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_51_spec_version_2.1" "objects_52_modified_2023-03-20T18:44:26.317Z" "objects_52_name_Execution Guardrails" "objects_52_description_Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary\u2019s campaign. Values an adversary can provide about a target system or environment to use as guardrails may include environment information such as location.(Citation: SWB Exodus March 2019)\n\nGuardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [System Checks](https://attack.mitre.org/techniques/T1633/001). While use of [System Checks](https://attack.mitre.org/techniques/T1633/001) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match." "objects_52_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_52_kill_chain_phases_0_phase_name_defense-evasion" "objects_52_x_mitre_deprecated_False" "objects_52_x_mitre_detection_Detecting the use of guardrails may be difficult depending on the implementation. Users can review which applications have location and sensitive phone information permissions in the operating system\u2019s settings menu. Application vetting services can detect unnecessary and potentially permissions or API calls." "objects_52_x_mitre_domains_0_mobile-attack" "objects_52_x_mitre_is_subtechnique_False" "objects_52_x_mitre_platforms_0_Android" "objects_52_x_mitre_platforms_1_iOS" "objects_52_x_mitre_version_1.1" "objects_52_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_52_type_attack-pattern" "objects_52_id_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_52_created_2022-03-30T20:31:16.624Z" "objects_52_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_52_revoked_False" "objects_52_external_references_0_source_name_mitre-attack" "objects_52_external_references_0_url_https://attack.mitre.org/techniques/T1627" "objects_52_external_references_0_external_id_T1627" "objects_52_external_references_1_source_name_SWB Exodus March 2019" "objects_52_external_references_1_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_52_external_references_1_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_52_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_52_x_mitre_attack_spec_version_3.1.0" "objects_52_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_52_spec_version_2.1" "objects_53_modified_2023-03-20T18:55:51.676Z" "objects_53_name_GUI Input Capture" "objects_53_description_Adversaries may mimic common operating system GUI components to prompt users for sensitive information with a seemingly legitimate prompt. The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique\u2019s use.(Citation: Felt-PhishingOnMobileDevices)\n\nThere are several approaches adversaries may use to mimic this functionality. Adversaries may impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and, when installed on the device, may prompt the user for sensitive information.(Citation: eset-finance) Adversaries may also send fake device notifications to the user that may trigger the display of an input prompt when clicked.(Citation: Group IB Gustuff Mar 2019) \n\nAdditionally, adversaries may display a prompt on top of a running, legitimate application to trick users into entering sensitive information into a malicious application rather than the legitimate application. Typically, adversaries need to know when the targeted application and the individual activity within the targeted application is running in the foreground to display the prompt at the proper time. Adversaries can abuse Android\u2019s accessibility features to determine which application is currently in the foreground.(Citation: ThreatFabric Cerberus) Two known approaches to displaying a prompt include:\n\n* Adversaries start a new activity on top of a running legitimate application.(Citation: Felt-PhishingOnMobileDevices)(Citation: Hassell-ExploitingAndroid) Android 10 places new restrictions on the ability for an application to start a new activity on top of another application, which may make it more difficult for adversaries to utilize this technique.(Citation: Android Background)\n* Adversaries create an application overlay window on top of a running legitimate application. Applications must hold the `SYSTEM_ALERT_WINDOW` permission to create overlay windows. This permission is handled differently than typical Android permissions and, at least under certain conditions, is automatically granted to applications installed from the Google Play Store.(Citation: Cloak and Dagger)(Citation: NowSecure Android Overlay)(Citation: Skycure-Accessibility) The `SYSTEM_ALERT_WINDOW` permission and its associated ability to create application overlay windows are expected to be deprecated in a future release of Android in favor of a new API.(Citation: XDA Bubbles)" "objects_53_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_53_kill_chain_phases_0_phase_name_credential-access" "objects_53_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_53_kill_chain_phases_1_phase_name_collection" "objects_53_x_mitre_deprecated_False" "objects_53_x_mitre_detection_Android users can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). \n\nApplication vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. " "objects_53_x_mitre_domains_0_mobile-attack" "objects_53_x_mitre_is_subtechnique_True" "objects_53_x_mitre_platforms_0_Android" "objects_53_x_mitre_platforms_1_iOS" "objects_53_x_mitre_version_1.1" "objects_53_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_53_type_attack-pattern" "objects_53_id_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_53_created_2022-04-05T19:48:31.195Z" "objects_53_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_53_revoked_False" "objects_53_external_references_0_source_name_mitre-attack" "objects_53_external_references_0_url_https://attack.mitre.org/techniques/T1417/002" "objects_53_external_references_0_external_id_T1417.002" "objects_53_external_references_1_source_name_Felt-PhishingOnMobileDevices" "objects_53_external_references_1_description_A.P. Felt and D. Wagner. (2011, May 26). Phishing on Mobile Devices. Retrieved August 25, 2016." "objects_53_external_references_1_url_http://w2spconf.com/2011/papers/felt-mobilephishing.pdf" "objects_53_external_references_2_source_name_Android Background" "objects_53_external_references_2_description_Android Developers. (n.d.). Restrictions on starting activities from the background. Retrieved September 18, 2019." "objects_53_external_references_2_url_https://developer.android.com/guide/components/activities/background-starts" "objects_53_external_references_3_source_name_Cloak and Dagger" "objects_53_external_references_3_description_Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 18, 2019." "objects_53_external_references_3_url_http://cloak-and-dagger.org/" "objects_53_external_references_4_source_name_Group IB Gustuff Mar 2019" "objects_53_external_references_4_description_Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named \u00abGustuff\u00bb capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019." "objects_53_external_references_4_url_https://www.group-ib.com/blog/gustuff" "objects_53_external_references_5_source_name_eset-finance" "objects_53_external_references_5_description_Luk\u00e1\u0161 \u0160tefanko. (2016, July 7). Fake finance apps on Google Play target users from around the world. Retrieved September 24, 2018." "objects_53_external_references_5_url_https://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-target-around-world/" "objects_53_external_references_6_source_name_Hassell-ExploitingAndroid" "objects_53_external_references_6_description_R. Hassell. (2011, October 12-13). Exploiting Androids for Fun and Profit. Retrieved October 10, 2019." "objects_53_external_references_6_url_https://conference.hitb.org/hitbsecconf2011kul/materials/D1T1%20-%20Riley%20Hassell%20-%20Exploiting%20Androids%20for%20Fun%20and%20Profit.pdf" "objects_53_external_references_7_source_name_XDA Bubbles" "objects_53_external_references_7_description_Rahman, M.. (2019, May 8). Bubbles in Android Q will fully replace the overlay API in a future Android version. Retrieved September 18, 2019." "objects_53_external_references_7_url_https://www.xda-developers.com/android-q-system-alert-window-deprecate-bubbles/" "objects_53_external_references_8_source_name_NowSecure Android Overlay" "objects_53_external_references_8_description_Ramirez, T.. (2017, May 25). \u2018SAW\u2019-ing through the UI: Android overlay malware and the System Alert Window permission explained. Retrieved September 18, 2019." "objects_53_external_references_8_url_https://www.nowsecure.com/blog/2017/05/25/android-overlay-malware-system-alert-window-permission/" "objects_53_external_references_9_source_name_ThreatFabric Cerberus" "objects_53_external_references_9_description_ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019." "objects_53_external_references_9_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_53_external_references_10_source_name_Skycure-Accessibility" "objects_53_external_references_10_description_Yair Amit. (2016, March 3). \u201cAccessibility Clickjacking\u201d \u2013 The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016." "objects_53_external_references_10_url_https://www.skycure.com/blog/accessibility-clickjacking/" "objects_53_external_references_11_source_name_NIST Mobile Threat Catalogue" "objects_53_external_references_11_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_53_external_references_11_external_id_APP-31" "objects_53_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_53_x_mitre_attack_spec_version_3.1.0" "objects_53_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_53_spec_version_2.1" "objects_54_x_mitre_platforms_0_Android" "objects_54_x_mitre_platforms_1_iOS" "objects_54_x_mitre_domains_0_mobile-attack" "objects_54_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_54_type_attack-pattern" "objects_54_id_attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce" "objects_54_created_2017-10-25T14:48:11.535Z" "objects_54_x_mitre_version_1.0" "objects_54_external_references_0_source_name_mitre-attack" "objects_54_external_references_0_external_id_T1432" "objects_54_external_references_0_url_https://attack.mitre.org/techniques/T1432" "objects_54_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_54_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_54_external_references_1_external_id_APP-13" "objects_54_x_mitre_deprecated_False" "objects_54_revoked_True" "objects_54_description_An adversary could call standard operating system APIs from a malicious application to gather contact list (i.e., address book) data, or with escalated privileges could directly access files containing contact list data." "objects_54_modified_2022-04-01T13:19:41.180Z" "objects_54_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_54_name_Access Contact List" "objects_54_x_mitre_detection_On both Android (6.0 and up) and iOS, the user can view which applications have permission to access contact list information through the device settings screen, and the user can choose to revoke the permissions." "objects_54_kill_chain_phases_0_phase_name_collection" "objects_54_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_54_x_mitre_is_subtechnique_False" "objects_54_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_54_x_mitre_attack_spec_version_2.1.0" "objects_54_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_54_spec_version_2.1" "objects_55_modified_2023-03-20T15:20:11.752Z" "objects_55_name_Compromise Client Software Binary" "objects_55_description_Adversaries may modify system software binaries to establish persistent access to devices. System software binaries are used by the underlying operating system and users over adb or terminal emulators. \n\nAdversaries may make modifications to client software binaries to carry out malicious tasks when those binaries are executed. For example, malware may come with a pre-compiled malicious binary intended to overwrite the genuine one on the device. Since these binaries may be routinely executed by the system or user, the adversary can leverage this for persistent access to the device. " "objects_55_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_55_kill_chain_phases_0_phase_name_persistence" "objects_55_x_mitre_deprecated_False" "objects_55_x_mitre_detection_Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android\u2019s SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromised devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. Application vetting services could detect applications trying to modify files in protected parts of the operating system." "objects_55_x_mitre_domains_0_mobile-attack" "objects_55_x_mitre_is_subtechnique_False" "objects_55_x_mitre_platforms_0_Android" "objects_55_x_mitre_platforms_1_iOS" "objects_55_x_mitre_version_1.1" "objects_55_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_55_type_attack-pattern" "objects_55_id_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_55_created_2022-03-30T19:53:27.791Z" "objects_55_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_55_revoked_False" "objects_55_external_references_0_source_name_mitre-attack" "objects_55_external_references_0_url_https://attack.mitre.org/techniques/T1645" "objects_55_external_references_0_external_id_T1645" "objects_55_external_references_1_source_name_Android-VerifiedBoot" "objects_55_external_references_1_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_55_external_references_1_url_https://source.android.com/security/verifiedboot/" "objects_55_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_55_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_55_external_references_2_external_id_APP-27" "objects_55_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_55_x_mitre_attack_spec_version_3.1.0" "objects_55_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_55_spec_version_2.1" "objects_56_modified_2023-03-20T18:54:40.501Z" "objects_56_name_Software Packing" "objects_56_description_Adversaries may perform software packing to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. \n\nUtilities used to perform software packing are called packers. An example packer is FTT. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses." "objects_56_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_56_kill_chain_phases_0_phase_name_defense-evasion" "objects_56_x_mitre_deprecated_False" "objects_56_x_mitre_detection_Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code." "objects_56_x_mitre_domains_0_mobile-attack" "objects_56_x_mitre_is_subtechnique_True" "objects_56_x_mitre_platforms_0_iOS" "objects_56_x_mitre_platforms_1_Android" "objects_56_x_mitre_version_1.1" "objects_56_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_56_type_attack-pattern" "objects_56_id_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_56_created_2022-03-30T19:20:37.864Z" "objects_56_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_56_revoked_False" "objects_56_external_references_0_source_name_mitre-attack" "objects_56_external_references_0_url_https://attack.mitre.org/techniques/T1406/002" "objects_56_external_references_0_external_id_T1406.002" "objects_56_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_56_x_mitre_attack_spec_version_3.1.0" "objects_56_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_56_spec_version_2.1" "objects_57_x_mitre_domains_0_mobile-attack" "objects_57_id_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_57_type_attack-pattern" "objects_57_created_2017-10-25T14:48:16.288Z" "objects_57_revoked_True" "objects_57_external_references_0_source_name_mitre-mobile-attack" "objects_57_external_references_0_url_https://attack.mitre.org/techniques/T1445" "objects_57_external_references_0_external_id_T1445" "objects_57_modified_2022-07-07T14:00:00.188Z" "objects_57_name_Abuse of iOS Enterprise App Signing Key" "objects_57_x_mitre_version_1.0" "objects_57_x_mitre_is_subtechnique_False" "objects_57_spec_version_2.1" "objects_57_x_mitre_attack_spec_version_2.1.0" "objects_58_x_mitre_platforms_0_Android" "objects_58_x_mitre_platforms_1_iOS" "objects_58_x_mitre_domains_0_mobile-attack" "objects_58_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_58_type_attack-pattern" "objects_58_id_attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5" "objects_58_created_2017-10-25T14:48:09.864Z" "objects_58_x_mitre_version_1.1" "objects_58_external_references_0_source_name_mitre-attack" "objects_58_external_references_0_external_id_T1450" "objects_58_external_references_0_url_https://attack.mitre.org/techniques/T1450" "objects_58_external_references_1_source_name_3GPP-Security" "objects_58_external_references_1_url_http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf" "objects_58_external_references_1_description_3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016." "objects_58_external_references_2_source_name_CSRIC5-WG10-FinalReport" "objects_58_external_references_2_url_https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_58_external_references_2_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_58_external_references_3_source_name_CSRIC-WG1-FinalReport" "objects_58_external_references_3_description_CSRIC-WG1-FinalReport" "objects_58_external_references_4_source_name_Positive-SS7" "objects_58_external_references_4_url_https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf" "objects_58_external_references_4_description_Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016." "objects_58_external_references_5_source_name_Engel-SS7-2008" "objects_58_external_references_5_url_https://www.youtube.com/watch?v=q0n5ySqbfdI" "objects_58_external_references_5_description_Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016." "objects_58_external_references_6_source_name_Engel-SS7" "objects_58_external_references_6_url_https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf" "objects_58_external_references_6_description_Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016." "objects_58_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html" "objects_58_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_58_external_references_7_external_id_CEL-38" "objects_58_x_mitre_deprecated_False" "objects_58_revoked_True" "objects_58_description_An adversary could exploit signaling system vulnerabilities to track the location of mobile devices. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport)" "objects_58_modified_2022-04-05T19:54:12.657Z" "objects_58_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_58_name_Exploit SS7 to Track Device Location" "objects_58_x_mitre_detection_Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation.(Citation: CSRIC-WG1-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members." "objects_58_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_58_kill_chain_phases_0_phase_name_network-effects" "objects_58_x_mitre_is_subtechnique_False" "objects_58_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_58_x_mitre_attack_spec_version_2.1.0" "objects_58_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_58_spec_version_2.1" "objects_59_x_mitre_platforms_0_Android" "objects_59_x_mitre_domains_0_mobile-attack" "objects_59_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_59_type_attack-pattern" "objects_59_id_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_59_created_2020-04-28T14:35:37.309Z" "objects_59_x_mitre_version_2.0" "objects_59_external_references_0_source_name_mitre-attack" "objects_59_external_references_0_external_id_T1575" "objects_59_external_references_0_url_https://attack.mitre.org/techniques/T1575" "objects_59_external_references_1_source_name_Google NDK Getting Started" "objects_59_external_references_1_url_https://developer.android.com/ndk/guides" "objects_59_external_references_1_description_Google. (2019, December 27). Getting Started with the NDK. Retrieved April 28, 2020." "objects_59_external_references_2_source_name_MITRE App Vetting Effectiveness" "objects_59_external_references_2_url_https://www.mitre.org/sites/default/files/publications/pr-16-4772-analyzing-effectiveness-mobile-app-vetting-tools-report.pdf" "objects_59_external_references_2_description_M. Peck, C. Northern. (2016, August 22). Analyzing the Effectiveness of App Vetting Tools in the Enterprise. Retrieved April 28, 2020." "objects_59_x_mitre_deprecated_False" "objects_59_revoked_False" "objects_59_description_Adversaries may use Android\u2019s Native Development Kit (NDK) to write native functions that can achieve execution of binaries or functions. Like system calls on a traditional desktop operating system, native code achieves execution on a lower level than normal Android SDK calls.\n\nThe NDK allows developers to write native code in C or C++ that is compiled directly to machine code, avoiding all intermediate languages and steps in compilation that higher level languages, like Java, typically have. The Java Native Interface (JNI) is the component that allows Java functions in the Android app to call functions in a native library.(Citation: Google NDK Getting Started)\n\nAdversaries may also choose to use native functions to execute malicious code since native actions are typically much more difficult to analyze than standard, non-native behaviors.(Citation: MITRE App Vetting Effectiveness)" "objects_59_modified_2022-04-08T15:46:24.495Z" "objects_59_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_59_name_Native API" "objects_59_x_mitre_detection_This is abuse of standard OS-level APIs and are therefore typically undetectable to the end user." "objects_59_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_59_kill_chain_phases_0_phase_name_defense-evasion" "objects_59_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_59_kill_chain_phases_1_phase_name_execution" "objects_59_x_mitre_is_subtechnique_False" "objects_59_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_59_x_mitre_attack_spec_version_2.1.0" "objects_59_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_59_spec_version_2.1" "objects_60_x_mitre_platforms_0_Android" "objects_60_x_mitre_platforms_1_iOS" "objects_60_x_mitre_domains_0_mobile-attack" "objects_60_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_60_type_attack-pattern" "objects_60_id_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_60_created_2018-10-17T00:14:20.652Z" "objects_60_x_mitre_version_1.2" "objects_60_external_references_0_source_name_mitre-attack" "objects_60_external_references_0_external_id_T1476" "objects_60_external_references_0_url_https://attack.mitre.org/techniques/T1476" "objects_60_external_references_1_source_name_IBTimes-ThirdParty" "objects_60_external_references_1_url_https://www.ibtimes.co.uk/danger-lurks-third-party-android-app-stores-1544861" "objects_60_external_references_1_description_A Prasad. (2016, February 19). Danger lurks in third-party Android app stores. Retrieved November 8, 2018." "objects_60_external_references_2_source_name_TrendMicro-RootingMalware" "objects_60_external_references_2_url_https://blog.trendmicro.com/trendlabs-security-intelligence/user-beware-rooting-malware-found-in-3rd-party-app-stores/" "objects_60_external_references_2_description_Jordan Pan. (2016, February 10). User Beware: Rooting Malware Found in 3rd Party App Stores. Retrieved November 8, 2018." "objects_60_external_references_3_source_name_android-trojan-steals-paypal-2fa" "objects_60_external_references_3_url_https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/" "objects_60_external_references_3_description_Luk\u00e1\u0161 \u0160tefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019." "objects_60_external_references_4_source_name_TrendMicro-FlappyBird" "objects_60_external_references_4_url_https://blog.trendmicro.com/trendlabs-security-intelligence/flappy-bird-and-third-party-app-stores/" "objects_60_external_references_4_description_Veo Zhang. (2014, February 18). Flappy Bird and Third-Party App Stores. Retrieved November 8, 2018." "objects_60_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-9.html" "objects_60_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_60_external_references_5_external_id_AUT-9" "objects_60_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-13.html" "objects_60_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_60_external_references_6_external_id_ECO-13" "objects_60_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html" "objects_60_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_60_external_references_7_external_id_ECO-21" "objects_60_x_mitre_deprecated_True" "objects_60_revoked_False" "objects_60_description_Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. This technique describes installing a malicious application on targeted mobile devices without involving an authorized app store (e.g., Google Play Store or Apple App Store). Adversaries may wish to avoid placing malicious applications in an authorized app store due to increased potential risk of detection or other reasons. However, mobile devices often are configured to allow application installation only from an authorized app store which would prevent this technique from working.\n\nDelivery methods for the malicious application include:\n\n* [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) - Including the mobile app package as an attachment to an email message.\n* [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) - Including a link to the mobile app package within an email, text message (e.g. SMS, iMessage, Hangouts, WhatsApp, etc.), web site, QR code, or other means.\n* Third-Party App Store - Installed from a third-party app store (as opposed to an authorized app store that the device implicitly trusts as part of its default behavior), which may not apply the same level of scrutiny to apps as applied by an authorized app store.(Citation: IBTimes-ThirdParty)(Citation: TrendMicro-RootingMalware)(Citation: TrendMicro-FlappyBird)\n\nSome Android malware comes with functionality to install additional applications, either automatically or when the adversary instructs it to.(Citation: android-trojan-steals-paypal-2fa)" "objects_60_modified_2022-04-06T15:41:16.863Z" "objects_60_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_60_name_Deliver Malicious App via Other Means" "objects_60_x_mitre_detection_* An EMM/MDM or mobile threat defense solution may be able to identify the presence of apps installed from sources other than an authorized app store. \n* An EMM/MDM or mobile threat defense solution may be able to identify Android devices configured to allow apps to be installed from \"Unknown Sources\".\n* Enterprise email security solutions can identify the presence of Android or iOS application packages within email messages." "objects_60_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_60_kill_chain_phases_0_phase_name_initial-access" "objects_60_x_mitre_is_subtechnique_False" "objects_60_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_60_x_mitre_attack_spec_version_2.1.0" "objects_60_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_60_spec_version_2.1" "objects_61_x_mitre_platforms_0_Android" "objects_61_x_mitre_platforms_1_iOS" "objects_61_x_mitre_domains_0_mobile-attack" "objects_61_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_61_type_attack-pattern" "objects_61_id_attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067" "objects_61_created_2017-10-25T14:48:07.827Z" "objects_61_x_mitre_version_1.0" "objects_61_external_references_0_source_name_mitre-attack" "objects_61_external_references_0_external_id_T1469" "objects_61_external_references_0_url_https://attack.mitre.org/techniques/T1469" "objects_61_external_references_1_source_name_Honan-Hacking" "objects_61_external_references_1_url_https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/" "objects_61_external_references_1_description_Mat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016." "objects_61_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html" "objects_61_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_61_external_references_2_external_id_ECO-5" "objects_61_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html" "objects_61_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_61_external_references_3_external_id_EMM-7" "objects_61_x_mitre_deprecated_True" "objects_61_revoked_False" "objects_61_description_An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an EMM console could use that access to wipe enrolled devices (Citation: Honan-Hacking)." "objects_61_modified_2022-04-06T15:54:28.187Z" "objects_61_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_61_name_Remotely Wipe Data Without Authorization" "objects_61_x_mitre_detection_Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity." "objects_61_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_61_kill_chain_phases_0_phase_name_remote-service-effects" "objects_61_x_mitre_is_subtechnique_False" "objects_61_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_61_x_mitre_attack_spec_version_2.1.0" "objects_61_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_61_spec_version_2.1" "objects_62_modified_2023-09-28T17:02:58.893Z" "objects_62_name_Exploitation for Client Execution" "objects_62_description_Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to insecure coding practices that can lead to unanticipated behavior. Adversaries may take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility. \n\nAdversaries may use device-based zero-click exploits for code execution. These exploits are powerful because there is no user interaction required for code execution. \n\n### SMS/iMessage Delivery \n\nSMS and iMessage in iOS are common targets through [Drive-By Compromise](https://attack.mitre.org/techniques/T1456), [Phishing](https://attack.mitre.org/techniques/T1660), etc. Adversaries may use embed malicious links, files, etc. in SMS messages or iMessages. Mobile devices may be compromised through one-click exploits, where the victim must interact with a text message, or zero-click exploits, where no user interaction is required. \n\n### AirDrop \n\nUnique to iOS, AirDrop is a network protocol that allows iOS users to transfer files between iOS devices. Before patches from Apple were released, on iOS 13.4 and earlier, adversaries may force the Apple Wireless Direct Link (AWDL) interface to activate, then exploit a buffer overflow to gain access to the device and run as root without interaction from the user. " "objects_62_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_62_kill_chain_phases_0_phase_name_execution" "objects_62_x_mitre_contributors_0_Giorgi Gurgenidze, ISAC" "objects_62_x_mitre_deprecated_False" "objects_62_x_mitre_detection_" "objects_62_x_mitre_domains_0_mobile-attack" "objects_62_x_mitre_is_subtechnique_False" "objects_62_x_mitre_platforms_0_Android" "objects_62_x_mitre_platforms_1_iOS" "objects_62_x_mitre_version_1.0" "objects_62_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_62_type_attack-pattern" "objects_62_id_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_62_created_2023-08-23T22:13:27.313Z" "objects_62_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_62_revoked_False" "objects_62_external_references_0_source_name_mitre-attack" "objects_62_external_references_0_url_https://attack.mitre.org/techniques/T1658" "objects_62_external_references_0_external_id_T1658" "objects_62_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_62_x_mitre_attack_spec_version_3.2.0" "objects_62_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_62_spec_version_2.1" "objects_63_modified_2023-03-20T18:57:14.285Z" "objects_63_name_Proxy Through Victim" "objects_63_description_Adversaries may use a compromised device as a proxy server to the Internet. By utilizing a proxy, adversaries hide the true IP address of their C2 server and associated infrastructure from the destination of the network traffic. This masquerades an adversary\u2019s traffic as legitimate traffic originating from the compromised device, which can evade IP-based restrictions and alerts on certain services, such as bank accounts and social media websites.(Citation: Threat Fabric Exobot)\n\nThe most common type of proxy is a SOCKS proxy. It can typically be implemented using standard OS-level APIs and 3rd party libraries with no indication to the user. On Android, adversaries can use the `Proxy` API to programmatically establish a SOCKS proxy connection, or lower-level APIs to interact directly with raw sockets." "objects_63_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_63_kill_chain_phases_0_phase_name_defense-evasion" "objects_63_x_mitre_deprecated_False" "objects_63_x_mitre_detection_Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise." "objects_63_x_mitre_domains_0_mobile-attack" "objects_63_x_mitre_is_subtechnique_False" "objects_63_x_mitre_platforms_0_Android" "objects_63_x_mitre_version_1.1" "objects_63_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_63_type_attack-pattern" "objects_63_id_attack-pattern--5ca3c7ec-55b2-4587-9376-cf6c96f8047a" "objects_63_created_2020-11-30T14:26:07.728Z" "objects_63_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_63_revoked_False" "objects_63_external_references_0_source_name_mitre-attack" "objects_63_external_references_0_url_https://attack.mitre.org/techniques/T1604" "objects_63_external_references_0_external_id_T1604" "objects_63_external_references_1_source_name_Threat Fabric Exobot" "objects_63_external_references_1_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_63_external_references_1_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_63_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_63_x_mitre_attack_spec_version_3.1.0" "objects_63_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_63_spec_version_2.1" "objects_64_x_mitre_platforms_0_Android" "objects_64_x_mitre_platforms_1_iOS" "objects_64_x_mitre_domains_0_mobile-attack" "objects_64_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_64_type_attack-pattern" "objects_64_id_attack-pattern--60623164-ccd8-4508-a141-b5a34820b3de" "objects_64_created_2019-09-23T13:11:43.694Z" "objects_64_x_mitre_version_1.0" "objects_64_external_references_0_source_name_mitre-attack" "objects_64_external_references_0_external_id_T1520" "objects_64_external_references_0_url_https://attack.mitre.org/techniques/T1520" "objects_64_external_references_1_source_name_Data Driven Security DGA" "objects_64_external_references_1_url_https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/" "objects_64_external_references_1_description_Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019." "objects_64_external_references_2_source_name_securelist rotexy 2018" "objects_64_external_references_2_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_64_external_references_2_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_64_x_mitre_deprecated_False" "objects_64_revoked_True" "objects_64_description_Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1520) (DGAs) to procedurally generate domain names for command and control communication, and other uses such as malicious application distribution.(Citation: securelist rotexy 2018)\n\nDGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions." "objects_64_modified_2022-04-05T20:03:46.788Z" "objects_64_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_64_name_Domain Generation Algorithms" "objects_64_x_mitre_detection_Detecting dynamically generated domains can be challenging due to the number of different DGA algorithms, constantly evolving malware families, and the increasing complexity of the algorithms. There is a myriad of approaches for detecting a pseudo-randomly generated domain name, including using frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more.(Citation: Data Driven Security DGA) CDN domains may trigger these detections due to the format of their domain names. In addition to detecting a DGA domain based on the name, another more general approach for detecting a suspicious domain is to check for recently registered names or for rarely visited domains." "objects_64_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_64_kill_chain_phases_0_phase_name_command-and-control" "objects_64_x_mitre_is_subtechnique_False" "objects_64_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_64_x_mitre_attack_spec_version_2.1.0" "objects_64_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_64_spec_version_2.1" "objects_65_x_mitre_platforms_0_Android" "objects_65_x_mitre_platforms_1_iOS" "objects_65_x_mitre_domains_0_mobile-attack" "objects_65_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_65_type_attack-pattern" "objects_65_id_attack-pattern--62adb627-f647-498e-b4cc-41499361bacb" "objects_65_created_2017-10-25T14:48:20.727Z" "objects_65_x_mitre_version_1.0" "objects_65_external_references_0_source_name_mitre-attack" "objects_65_external_references_0_external_id_T1435" "objects_65_external_references_0_url_https://attack.mitre.org/techniques/T1435" "objects_65_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_65_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_65_external_references_1_external_id_APP-13" "objects_65_x_mitre_deprecated_False" "objects_65_revoked_True" "objects_65_description_An adversary could call standard operating system APIs from a malicious application to gather calendar entry data, or with escalated privileges could directly access files containing calendar data." "objects_65_modified_2022-04-01T12:50:48.453Z" "objects_65_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_65_name_Access Calendar Entries" "objects_65_x_mitre_detection_On both Android (6.0 and up) and iOS, the user can view which applications have permission to access calendar information through the device settings screen, and the user can choose to revoke the permissions." "objects_65_kill_chain_phases_0_phase_name_collection" "objects_65_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_65_x_mitre_is_subtechnique_False" "objects_65_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_65_x_mitre_attack_spec_version_2.1.0" "objects_65_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_65_spec_version_2.1" "objects_66_x_mitre_platforms_0_Android" "objects_66_x_mitre_platforms_1_iOS" "objects_66_x_mitre_domains_0_mobile-attack" "objects_66_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_66_type_attack-pattern" "objects_66_id_attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3" "objects_66_created_2017-10-25T14:48:21.354Z" "objects_66_x_mitre_version_1.1" "objects_66_external_references_0_source_name_mitre-attack" "objects_66_external_references_0_external_id_T1465" "objects_66_external_references_0_url_https://attack.mitre.org/techniques/T1465" "objects_66_external_references_1_source_name_Kaspersky-DarkHotel" "objects_66_external_references_1_url_https://blog.kaspersky.com/darkhotel-apt/6613/" "objects_66_external_references_1_description_Alex Drozhzhin. (2014, November 10). Darkhotel: a spy campaign in luxury Asian hotels. Retrieved December 24, 2016." "objects_66_external_references_2_source_name_NIST-SP800153" "objects_66_external_references_2_url_http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf" "objects_66_external_references_2_description_M. Souppaya and K. Scarfone. (2012, February). NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs). Retrieved December 24, 2016." "objects_66_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html" "objects_66_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_66_external_references_3_external_id_LPN-0" "objects_66_x_mitre_deprecated_False" "objects_66_revoked_True" "objects_66_description_An adversary could set up unauthorized Wi-Fi access points or compromise existing access points and, if the device connects to them, carry out network-based attacks such as eavesdropping on or modifying network communication(Citation: NIST-SP800153)(Citation: Kaspersky-DarkHotel)." "objects_66_modified_2022-04-06T15:51:11.938Z" "objects_66_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_66_name_Rogue Wi-Fi Access Points" "objects_66_x_mitre_detection_" "objects_66_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_66_kill_chain_phases_0_phase_name_network-effects" "objects_66_x_mitre_is_subtechnique_False" "objects_66_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_66_x_mitre_attack_spec_version_2.1.0" "objects_66_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_66_spec_version_2.1" "objects_67_modified_2023-03-20T18:54:25.564Z" "objects_67_name_Foreground Persistence" "objects_67_description_Adversaries may abuse Android's `startForeground()` API method to maintain continuous sensor access. Beginning in Android 9, idle applications running in the background no longer have access to device sensors, such as the camera, microphone, and gyroscope.(Citation: Android-SensorsOverview) Applications can retain sensor access by running in the foreground, using Android\u2019s `startForeground()` API method. This informs the system that the user is actively interacting with the application, and it should not be killed. The only requirement to start a foreground service is showing a persistent notification to the user.(Citation: Android-ForegroundServices)\n\nMalicious applications may abuse the `startForeground()` API method to continue running in the foreground, while presenting a notification to the user pretending to be a genuine application. This would allow unhindered access to the device\u2019s sensors, assuming permission has been previously granted.(Citation: BlackHat Sutter Android Foreground 2019)\n\nMalicious applications may also abuse the `startForeground()` API to inform the Android system that the user is actively interacting with the application, thus preventing it from being killed by the low memory killer.(Citation: TrendMicro-Yellow Camera)" "objects_67_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_67_kill_chain_phases_0_phase_name_defense-evasion" "objects_67_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_67_kill_chain_phases_1_phase_name_persistence" "objects_67_x_mitre_contributors_0_Lorin Wu, Trend Micro" "objects_67_x_mitre_deprecated_False" "objects_67_x_mitre_detection_Users can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong. Applications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found." "objects_67_x_mitre_domains_0_mobile-attack" "objects_67_x_mitre_is_subtechnique_False" "objects_67_x_mitre_platforms_0_Android" "objects_67_x_mitre_version_2.1" "objects_67_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_67_type_attack-pattern" "objects_67_id_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_67_created_2019-11-19T17:32:20.373Z" "objects_67_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_67_revoked_False" "objects_67_external_references_0_source_name_mitre-attack" "objects_67_external_references_0_url_https://attack.mitre.org/techniques/T1541" "objects_67_external_references_0_external_id_T1541" "objects_67_external_references_1_source_name_Android-SensorsOverview" "objects_67_external_references_1_description_Google. (n.d.). Sensors Overview. Retrieved November 19, 2019." "objects_67_external_references_1_url_https://developer.android.com/guide/topics/sensors/sensors_overview#sensors-practices" "objects_67_external_references_2_source_name_Android-ForegroundServices" "objects_67_external_references_2_description_Google. (n.d.). Services overview. Retrieved November 19, 2019." "objects_67_external_references_2_url_https://developer.android.com/guide/components/services.html#Foreground" "objects_67_external_references_3_source_name_TrendMicro-Yellow Camera" "objects_67_external_references_3_description_Song Wang. (2019, October 18). Fake Photo Beautification Apps on Google Play can Read SMS Verification Code to Trigger Wireless Application Protocol (WAP)/Carrier Billing. Retrieved November 19, 2019." "objects_67_external_references_3_url_https://blog.trendmicro.com/trendlabs-security-intelligence/fake-photo-beautification-apps-on-google-play-can-read-sms-verification-code-to-trigger-wireless-application-protocol-wap-carrier-billing/" "objects_67_external_references_4_source_name_BlackHat Sutter Android Foreground 2019" "objects_67_external_references_4_description_Thomas Sutter. (2019, December). Simple Spyware Androids Invisible Foreground Services and How to (Ab)use Them. Retrieved December 26, 2019." "objects_67_external_references_4_url_https://i.blackhat.com/eu-19/Thursday/eu-19-Sutter-Simple-Spyware-Androids-Invisible-Foreground-Services-And-How-To-Abuse-Them.pdf" "objects_67_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_67_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.html" "objects_67_external_references_5_external_id_APP-19" "objects_67_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_67_x_mitre_attack_spec_version_3.1.0" "objects_67_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_67_spec_version_2.1" "objects_68_modified_2023-08-07T17:13:04.396Z" "objects_68_name_Replication Through Removable Media" "objects_68_description_Adversaries may move onto devices by exploiting or copying malware to devices connected via USB. In the case of Lateral Movement, adversaries may utilize the physical connection of a device to a compromised or malicious charging station or PC to bypass application store requirements and install malicious applications directly.(Citation: Lau-Mactans) In the case of Initial Access, adversaries may attempt to exploit the device via the connection to gain access to data stored on the device.(Citation: Krebs-JuiceJacking) Examples of this include: \n \n* Exploiting insecure bootloaders in a Nexus 6 or 6P device over USB and gaining the ability to perform actions including intercepting phone calls, intercepting network traffic, and obtaining the device physical location.(Citation: IBM-NexusUSB) \n* Exploiting weakly-enforced security boundaries in Android devices such as the Google Pixel 2 over USB.(Citation: GoogleProjectZero-OATmeal) \n* Products from Cellebrite and Grayshift purportedly that can exploit some iOS devices using physical access to the data port to unlock the passcode.(Citation: Computerworld-iPhoneCracking) " "objects_68_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_68_kill_chain_phases_0_phase_name_initial-access" "objects_68_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_68_kill_chain_phases_1_phase_name_lateral-movement" "objects_68_x_mitre_deprecated_False" "objects_68_x_mitre_detection_" "objects_68_x_mitre_domains_0_mobile-attack" "objects_68_x_mitre_is_subtechnique_False" "objects_68_x_mitre_platforms_0_Android" "objects_68_x_mitre_platforms_1_iOS" "objects_68_x_mitre_version_2.1" "objects_68_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_68_type_attack-pattern" "objects_68_id_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_68_created_2017-10-25T14:48:23.233Z" "objects_68_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_68_revoked_False" "objects_68_external_references_0_source_name_mitre-attack" "objects_68_external_references_0_url_https://attack.mitre.org/techniques/T1458" "objects_68_external_references_0_external_id_T1458" "objects_68_external_references_1_source_name_Krebs-JuiceJacking" "objects_68_external_references_1_description_Brian Krebs. (2011, August 17). Beware of Juice-Jacking. Retrieved December 23, 2016." "objects_68_external_references_1_url_http://krebsonsecurity.com/2011/08/beware-of-juice-jacking/" "objects_68_external_references_2_source_name_GoogleProjectZero-OATmeal" "objects_68_external_references_2_description_Jann Horn. (2018, September 10). OATmeal on the Universal Cereal Bus: Exploiting Android phones over USB. Retrieved September 18, 2018." "objects_68_external_references_2_url_https://googleprojectzero.blogspot.com/2018/09/oatmeal-on-universal-cereal-bus.html" "objects_68_external_references_3_source_name_Lau-Mactans" "objects_68_external_references_3_description_Lau et al.. (2013). Mactans: Injecting Malware Into iOS Devices Via Malicious Chargers. Retrieved December 23, 2016." "objects_68_external_references_3_url_https://media.blackhat.com/us-13/US-13-Lau-Mactans-Injecting-Malware-into-iOS-Devices-via-Malicious-Chargers-WP.pdf" "objects_68_external_references_4_source_name_Computerworld-iPhoneCracking" "objects_68_external_references_4_description_Lucas Mearian. (2018, May 9). Two vendors now sell iPhone cracking technology \u2013 and police are buying. Retrieved September 21, 2018." "objects_68_external_references_4_url_https://www.computerworld.com/article/3268729/apple-ios/two-vendors-now-sell-iphone-cracking-technology-and-police-are-buying.html" "objects_68_external_references_5_source_name_IBM-NexusUSB" "objects_68_external_references_5_description_Roee Hay. (2017, January 5). Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes. Retrieved January 11, 2017." "objects_68_external_references_5_url_https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/" "objects_68_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_68_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-1.html" "objects_68_external_references_6_external_id_PHY-1" "objects_68_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_68_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html" "objects_68_external_references_7_external_id_PHY-2" "objects_68_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_68_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-6.html" "objects_68_external_references_8_external_id_STA-6" "objects_68_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_68_x_mitre_attack_spec_version_3.1.0" "objects_68_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_68_spec_version_2.1" "objects_69_modified_2023-03-16T13:31:29.924Z" "objects_69_name_Audio Capture" "objects_69_description_Adversaries may capture audio to collect information by leveraging standard operating system APIs of a mobile device. Examples of audio information adversaries may target include user conversations, surroundings, phone calls, or other sensitive information. \n\n \n\nAndroid and iOS, by default, require that applications request device microphone access from the user. \n\n \n\nOn Android devices, applications must hold the `RECORD_AUDIO` permission to access the microphone or the `CAPTURE_AUDIO_OUTPUT` permission to access audio output. Because Android does not allow third-party applications to hold the `CAPTURE_AUDIO_OUTPUT` permission by default, only privileged applications, such as those distributed by Google or the device vendor, can access audio output.(Citation: Android Permissions) However, adversaries may be able to gain this access after successfully elevating their privileges. With the `CAPTURE_AUDIO_OUTPUT` permission, adversaries may pass the `MediaRecorder.AudioSource.VOICE_CALL` constant to `MediaRecorder.setAudioOutput`, allowing capture of both voice call uplink and downlink.(Citation: Manifest.permission) \n\n \n\nOn iOS devices, applications must include the `NSMicrophoneUsageDescription` key in their `Info.plist` file to access the microphone.(Citation: Requesting Auth-Media Capture)" "objects_69_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_69_kill_chain_phases_0_phase_name_collection" "objects_69_x_mitre_deprecated_False" "objects_69_x_mitre_detection_In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\n\n\nIn Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)\n \n\nAndroid applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized. \n\n \n\nIn both Android (6.0 and up) and iOS, users can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. " "objects_69_x_mitre_domains_0_mobile-attack" "objects_69_x_mitre_is_subtechnique_False" "objects_69_x_mitre_platforms_0_Android" "objects_69_x_mitre_platforms_1_iOS" "objects_69_x_mitre_version_3.1" "objects_69_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_69_type_attack-pattern" "objects_69_id_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_69_created_2017-10-25T14:48:12.913Z" "objects_69_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_69_revoked_False" "objects_69_external_references_0_source_name_mitre-attack" "objects_69_external_references_0_url_https://attack.mitre.org/techniques/T1429" "objects_69_external_references_0_external_id_T1429" "objects_69_external_references_1_source_name_Manifest.permission" "objects_69_external_references_1_description_Android Developers. (2022, March 17). Voice Call. Retrieved April 1, 2022." "objects_69_external_references_1_url_https://developer.android.com/reference/android/media/MediaRecorder.AudioSource#VOICE_CALL" "objects_69_external_references_2_source_name_Requesting Auth-Media Capture" "objects_69_external_references_2_description_Apple Developers. (n.d.). Requesting Authorization for Media Capture on iOS. Retrieved April 1, 2022." "objects_69_external_references_2_url_https://developer.apple.com/documentation/avfoundation/cameras_and_media_capture/requesting_authorization_for_media_capture_on_ios" "objects_69_external_references_3_source_name_Android Permissions" "objects_69_external_references_3_description_Google. (2021, August 11). Manifest.permission. Retrieved September 22, 2021." "objects_69_external_references_3_url_https://developer.android.com/reference/android/Manifest.permission" "objects_69_external_references_4_source_name_Android Privacy Indicators" "objects_69_external_references_4_description_Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022." "objects_69_external_references_4_url_https://source.android.com/devices/tech/config/privacy-indicators" "objects_69_external_references_5_source_name_iOS Mic Spyware" "objects_69_external_references_5_description_ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022." "objects_69_external_references_5_url_https://blog.zecops.com/research/how-ios-malware-can-spy-on-users-silently/" "objects_69_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_69_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.html" "objects_69_external_references_6_external_id_APP-19" "objects_69_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_69_x_mitre_attack_spec_version_3.1.0" "objects_69_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_69_spec_version_2.1" "objects_70_modified_2023-03-20T18:59:46.686Z" "objects_70_name_Hijack Execution Flow" "objects_70_description_Adversaries may execute their own malicious payloads by hijacking the way operating systems run applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur over time. \n\nThere are many ways an adversary may hijack the flow of execution. A primary way is by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs or resources, such as file directories, could also be poisoned to include malicious payloads." "objects_70_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_70_kill_chain_phases_0_phase_name_persistence" "objects_70_x_mitre_deprecated_False" "objects_70_x_mitre_detection_Mobile threat defense agents could detect unauthorized operating system modifications by using attestation." "objects_70_x_mitre_domains_0_mobile-attack" "objects_70_x_mitre_is_subtechnique_False" "objects_70_x_mitre_platforms_0_Android" "objects_70_x_mitre_version_1.1" "objects_70_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_70_type_attack-pattern" "objects_70_id_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_70_created_2022-03-30T14:49:18.650Z" "objects_70_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_70_revoked_False" "objects_70_external_references_0_source_name_mitre-attack" "objects_70_external_references_0_url_https://attack.mitre.org/techniques/T1625" "objects_70_external_references_0_external_id_T1625" "objects_70_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_70_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_70_external_references_1_external_id_APP-27" "objects_70_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_70_x_mitre_attack_spec_version_3.1.0" "objects_70_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_70_spec_version_2.1" "objects_71_modified_2023-08-07T22:48:30.418Z" "objects_71_name_Unix Shell" "objects_71_description_Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the underlying command prompts on Android and iOS devices. Unix shells can control every aspect of a system, with certain commands requiring elevated privileges that are only accessible if the device has been rooted or jailbroken. \n\nUnix shells also support scripts that enable sequential execution of commands as well as other typical programming operations such as conditionals and loops. Common uses of shell scripts include long or repetitive tasks, or the need to run the same set of commands on multiple systems. \n\nAdversaries may abuse Unix shells to execute various commands or payloads. Interactive shells may be accessed through command and control channels or during lateral movement such as with SSH. Adversaries may also leverage shell scripts to deliver and execute multiple commands on victims or as part of payloads used for persistence. \n\nIf the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files. " "objects_71_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_71_kill_chain_phases_0_phase_name_execution" "objects_71_x_mitre_deprecated_False" "objects_71_x_mitre_detection_Command-line activities can potentially be detected through Mobile Threat Defense integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\n\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)" "objects_71_x_mitre_domains_0_mobile-attack" "objects_71_x_mitre_is_subtechnique_True" "objects_71_x_mitre_platforms_0_Android" "objects_71_x_mitre_platforms_1_iOS" "objects_71_x_mitre_version_1.2" "objects_71_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_71_type_attack-pattern" "objects_71_id_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_71_created_2022-03-30T13:59:50.479Z" "objects_71_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_71_revoked_False" "objects_71_external_references_0_source_name_mitre-attack" "objects_71_external_references_0_url_https://attack.mitre.org/techniques/T1623/001" "objects_71_external_references_0_external_id_T1623.001" "objects_71_external_references_1_source_name_Samsung Knox Mobile Threat Defense" "objects_71_external_references_1_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_71_external_references_1_url_https://partner.samsungknox.com/mtd" "objects_71_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_71_x_mitre_attack_spec_version_3.1.0" "objects_71_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_71_spec_version_2.1" "objects_72_x_mitre_platforms_0_Android" "objects_72_x_mitre_platforms_1_iOS" "objects_72_x_mitre_domains_0_mobile-attack" "objects_72_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_72_type_attack-pattern" "objects_72_id_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_72_created_2017-10-25T14:48:33.158Z" "objects_72_x_mitre_version_1.2" "objects_72_external_references_0_source_name_mitre-attack" "objects_72_external_references_0_external_id_T1437" "objects_72_external_references_0_url_https://attack.mitre.org/techniques/T1437" "objects_72_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-29.html" "objects_72_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_72_external_references_1_external_id_APP-29" "objects_72_x_mitre_deprecated_False" "objects_72_revoked_False" "objects_72_description_Adversaries may communicate using application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the mobile device, and often the results of those commands, will be embedded within the protocol traffic between the mobile device and server. \n\nAdversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, or DNS." "objects_72_modified_2022-04-19T20:03:51.831Z" "objects_72_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_72_name_Application Layer Protocol" "objects_72_x_mitre_detection_Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_72_kill_chain_phases_0_phase_name_command-and-control" "objects_72_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_72_x_mitre_is_subtechnique_False" "objects_72_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_72_x_mitre_attack_spec_version_2.1.0" "objects_72_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_72_spec_version_2.1" "objects_73_x_mitre_domains_0_mobile-attack" "objects_73_id_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_73_type_attack-pattern" "objects_73_created_2017-10-25T14:48:11.861Z" "objects_73_revoked_True" "objects_73_external_references_0_source_name_mitre-mobile-attack" "objects_73_external_references_0_url_https://attack.mitre.org/techniques/T1431" "objects_73_external_references_0_external_id_T1431" "objects_73_modified_2022-07-07T14:00:00.188Z" "objects_73_name_App Delivered via Web Download" "objects_73_x_mitre_version_1.0" "objects_73_x_mitre_is_subtechnique_False" "objects_73_spec_version_2.1" "objects_73_x_mitre_attack_spec_version_2.1.0" "objects_74_modified_2023-08-08T16:23:41.271Z" "objects_74_name_Download New Code at Runtime" "objects_74_description_Adversaries may download and execute dynamic code not included in the original application package after installation. This technique is primarily used to evade static analysis checks and pre-publication scans in official app stores. In some cases, more advanced dynamic or behavioral analysis techniques could detect this behavior. However, in conjunction with [Execution Guardrails](https://attack.mitre.org/techniques/T1627) techniques, detecting malicious code downloaded after installation could be difficult.\n\nOn Android, dynamic code could include native code, Dalvik code, or JavaScript code that utilizes Android WebView\u2019s `JavascriptInterface` capability. \n\nOn iOS, dynamic code could be downloaded and executed through 3rd party libraries such as JSPatch. (Citation: FireEye-JSPatch) " "objects_74_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_74_kill_chain_phases_0_phase_name_defense-evasion" "objects_74_x_mitre_deprecated_False" "objects_74_x_mitre_detection_Existing network infrastructure may detect network calls to known malicious domains or the transfer of malicious payloads over the network. Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. Application vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities). Unfortunately, this is only a partial mitigation, as additional scrutiny would still need to be applied to applications that use these techniques. These techniques are often used without malicious intent, and applications may employ other techniques to hide their use of these techniques." "objects_74_x_mitre_domains_0_mobile-attack" "objects_74_x_mitre_is_subtechnique_False" "objects_74_x_mitre_platforms_0_Android" "objects_74_x_mitre_platforms_1_iOS" "objects_74_x_mitre_version_1.5" "objects_74_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_74_type_attack-pattern" "objects_74_id_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_74_created_2017-10-25T14:48:14.460Z" "objects_74_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_74_revoked_False" "objects_74_external_references_0_source_name_mitre-attack" "objects_74_external_references_0_url_https://attack.mitre.org/techniques/T1407" "objects_74_external_references_0_external_id_T1407" "objects_74_external_references_1_source_name_FireEye-JSPatch" "objects_74_external_references_1_description_Jing Xie, Zhaofeng Chen, Jimmy Su. (2016, January 27). HOT OR NOT? THE BENEFITS AND RISKS OF IOS REMOTE HOT PATCHING. Retrieved December 9, 2016." "objects_74_external_references_1_url_https://www.fireeye.com/blog/threat-research/2016/01/hot_or_not_the_bene.html" "objects_74_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_74_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.html" "objects_74_external_references_2_external_id_APP-20" "objects_74_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_74_x_mitre_attack_spec_version_3.1.0" "objects_74_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_74_spec_version_2.1" "objects_75_x_mitre_platforms_0_Android" "objects_75_x_mitre_platforms_1_iOS" "objects_75_x_mitre_domains_0_mobile-attack" "objects_75_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_75_type_attack-pattern" "objects_75_id_attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a" "objects_75_created_2017-10-25T14:48:21.023Z" "objects_75_x_mitre_version_1.1" "objects_75_external_references_0_source_name_mitre-attack" "objects_75_external_references_0_external_id_T1468" "objects_75_external_references_0_url_https://attack.mitre.org/techniques/T1468" "objects_75_external_references_1_source_name_Krebs-Location" "objects_75_external_references_1_url_https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/" "objects_75_external_references_1_description_Brian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018." "objects_75_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html" "objects_75_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_75_external_references_2_external_id_ECO-5" "objects_75_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html" "objects_75_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_75_external_references_3_external_id_EMM-7" "objects_75_x_mitre_deprecated_False" "objects_75_revoked_True" "objects_75_description_An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM) / mobile device management (MDM) server console could use that access to track mobile devices.(Citation: Krebs-Location)" "objects_75_modified_2022-04-05T19:40:25.068Z" "objects_75_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_75_name_Remotely Track Device Without Authorization" "objects_75_x_mitre_detection_Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity." "objects_75_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_75_kill_chain_phases_0_phase_name_remote-service-effects" "objects_75_x_mitre_is_subtechnique_False" "objects_75_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_75_x_mitre_attack_spec_version_2.1.0" "objects_75_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_75_spec_version_2.1" "objects_76_modified_2023-03-20T18:51:04.432Z" "objects_76_name_System Checks" "objects_76_description_Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware\u2019s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads. \n\nChecks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. \n\nHardware checks, such as the presence of motion sensors, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices. " "objects_76_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_76_kill_chain_phases_0_phase_name_defense-evasion" "objects_76_x_mitre_deprecated_False" "objects_76_x_mitre_detection_Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications." "objects_76_x_mitre_domains_0_mobile-attack" "objects_76_x_mitre_is_subtechnique_True" "objects_76_x_mitre_platforms_0_Android" "objects_76_x_mitre_platforms_1_iOS" "objects_76_x_mitre_version_1.1" "objects_76_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_76_type_attack-pattern" "objects_76_id_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_76_created_2022-03-30T17:53:35.582Z" "objects_76_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_76_revoked_False" "objects_76_external_references_0_source_name_mitre-attack" "objects_76_external_references_0_url_https://attack.mitre.org/techniques/T1633/001" "objects_76_external_references_0_external_id_T1633.001" "objects_76_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_76_x_mitre_attack_spec_version_3.1.0" "objects_76_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_76_spec_version_2.1" "objects_77_modified_2023-03-20T18:53:16.029Z" "objects_77_name_Stored Application Data" "objects_77_description_Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019) \n\n \n\nDue to mobile OS sandboxing, this technique is only possible in three scenarios: \n\n \n\n* An application stores files in unprotected external storage \n* An application stores files in its internal storage directory with insecure permissions (e.g. 777) \n* The adversary gains root permissions on the device " "objects_77_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_77_kill_chain_phases_0_phase_name_collection" "objects_77_x_mitre_deprecated_False" "objects_77_x_mitre_detection_Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage." "objects_77_x_mitre_domains_0_mobile-attack" "objects_77_x_mitre_is_subtechnique_False" "objects_77_x_mitre_platforms_0_Android" "objects_77_x_mitre_platforms_1_iOS" "objects_77_x_mitre_version_3.1" "objects_77_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_77_type_attack-pattern" "objects_77_id_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_77_created_2017-10-25T14:48:15.402Z" "objects_77_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_77_revoked_False" "objects_77_external_references_0_source_name_mitre-attack" "objects_77_external_references_0_url_https://attack.mitre.org/techniques/T1409" "objects_77_external_references_0_external_id_T1409" "objects_77_external_references_1_source_name_SWB Exodus March 2019" "objects_77_external_references_1_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_77_external_references_1_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_77_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_77_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-0.html" "objects_77_external_references_2_external_id_AUT-0" "objects_77_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_77_x_mitre_attack_spec_version_3.1.0" "objects_77_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_77_spec_version_2.1" "objects_78_modified_2023-03-20T18:57:43.022Z" "objects_78_name_Screen Capture" "objects_78_description_Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015) " "objects_78_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_78_kill_chain_phases_0_phase_name_collection" "objects_78_x_mitre_deprecated_False" "objects_78_x_mitre_detection_The user can view a list of apps with accessibility service privileges in the device settings. Application vetting services can look for the use of the Android `MediaProjectionManager` class, applying extra scrutiny to applications that use the class." "objects_78_x_mitre_domains_0_mobile-attack" "objects_78_x_mitre_is_subtechnique_False" "objects_78_x_mitre_platforms_0_Android" "objects_78_x_mitre_version_1.3" "objects_78_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_78_type_attack-pattern" "objects_78_id_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_78_created_2019-08-08T18:34:14.178Z" "objects_78_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_78_revoked_False" "objects_78_external_references_0_source_name_mitre-attack" "objects_78_external_references_0_url_https://attack.mitre.org/techniques/T1513" "objects_78_external_references_0_external_id_T1513" "objects_78_external_references_1_source_name_Android ScreenCap2 2019" "objects_78_external_references_1_description_Android Developers. (n.d.). Android Debug Bridge (adb). Retrieved August 8, 2019." "objects_78_external_references_1_url_https://developer.android.com/studio/command-line/adb" "objects_78_external_references_2_source_name_Android ScreenCap1 2019" "objects_78_external_references_2_description_Android Developers. (n.d.). Android MediaProjectionManager. Retrieved August 8, 2019." "objects_78_external_references_2_url_https://developer.android.com/reference/android/media/projection/MediaProjectionManager" "objects_78_external_references_3_source_name_Lookout-Monokle" "objects_78_external_references_3_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_78_external_references_3_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_78_external_references_4_source_name_Fortinet screencap July 2019" "objects_78_external_references_4_description_Dario Durando. (2019, July 3). BianLian: A New Wave Emerges. Retrieved September 4, 2019." "objects_78_external_references_4_url_https://www.fortinet.com/blog/threat-research/new-wave-bianlian-malware.html" "objects_78_external_references_5_source_name_Trend Micro ScreenCap July 2015" "objects_78_external_references_5_description_Zhang, V. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved August 8, 2019." "objects_78_external_references_5_url_https://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_78_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_78_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-40.html" "objects_78_external_references_6_external_id_APP-40" "objects_78_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_78_x_mitre_attack_spec_version_3.1.0" "objects_78_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_78_spec_version_2.1" "objects_79_modified_2023-03-20T18:44:26.748Z" "objects_79_name_Transmitted Data Manipulation" "objects_79_description_Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity. By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, or decision making.\n\nManipulation may be possible over a network connection or between system processes where there is an opportunity to deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact.\n\nOne method to achieve [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) is by modifying the contents of the device clipboard. Malicious applications may monitor clipboard activity through the `ClipboardManager.OnPrimaryClipChangedListener` interface on Android to determine when clipboard contents have changed. Listening to clipboard activity, reading clipboard contents, and modifying clipboard contents requires no explicit application permissions and can be performed by applications running in the background. However, this behavior has changed with the release of Android 10.\n\nAdversaries may use [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) to replace text prior to being pasted. For example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control.\n\n[Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) was seen within the Android/Clipper.C trojan. This sample was detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)" "objects_79_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_79_kill_chain_phases_0_phase_name_impact" "objects_79_x_mitre_deprecated_False" "objects_79_x_mitre_detection_Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them." "objects_79_x_mitre_domains_0_mobile-attack" "objects_79_x_mitre_is_subtechnique_True" "objects_79_x_mitre_platforms_0_Android" "objects_79_x_mitre_version_1.1" "objects_79_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_79_type_attack-pattern" "objects_79_id_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_79_created_2022-04-06T13:39:39.779Z" "objects_79_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_79_revoked_False" "objects_79_external_references_0_source_name_mitre-attack" "objects_79_external_references_0_url_https://attack.mitre.org/techniques/T1641/001" "objects_79_external_references_0_external_id_T1641.001" "objects_79_external_references_1_source_name_ESET Clipboard Modification February 2019" "objects_79_external_references_1_description_ESET. (2019, February 11). First clipper malware discovered on Google Play.. Retrieved July 26, 2019." "objects_79_external_references_1_url_https://www.eset.com/uk/about/newsroom/press-releases/first-clipper-malware-discovered-on-google-play-1/" "objects_79_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_79_x_mitre_attack_spec_version_3.1.0" "objects_79_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_79_spec_version_2.1" "objects_80_x_mitre_platforms_0_Android" "objects_80_x_mitre_platforms_1_iOS" "objects_80_x_mitre_domains_0_mobile-attack" "objects_80_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_80_type_attack-pattern" "objects_80_id_attack-pattern--76c12fc8-a4eb-45d6-a3b7-e371a7248f69" "objects_80_created_2017-10-25T14:48:07.460Z" "objects_80_x_mitre_version_1.0" "objects_80_external_references_0_source_name_mitre-attack" "objects_80_external_references_0_external_id_T1452" "objects_80_external_references_0_url_https://attack.mitre.org/techniques/T1452" "objects_80_x_mitre_deprecated_False" "objects_80_revoked_True" "objects_80_description_An adversary could use access to a compromised device's credentials to attempt to manipulate app store rankings or ratings by triggering application downloads or posting fake reviews of applications. This technique likely requires privileged access (a rooted or jailbroken device)." "objects_80_modified_2022-04-06T13:57:24.726Z" "objects_80_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_80_name_Manipulate App Store Rankings or Ratings" "objects_80_x_mitre_detection_" "objects_80_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_80_kill_chain_phases_0_phase_name_impact" "objects_80_x_mitre_is_subtechnique_False" "objects_80_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_80_x_mitre_attack_spec_version_2.1.0" "objects_80_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_80_spec_version_2.1" "objects_81_x_mitre_platforms_0_Android" "objects_81_x_mitre_platforms_1_iOS" "objects_81_x_mitre_domains_0_mobile-attack" "objects_81_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_81_type_attack-pattern" "objects_81_id_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_81_created_2017-10-25T14:48:32.008Z" "objects_81_x_mitre_version_2.0" "objects_81_external_references_0_source_name_mitre-attack" "objects_81_external_references_0_external_id_T1416" "objects_81_external_references_0_url_https://attack.mitre.org/techniques/T1416" "objects_81_external_references_1_source_name_Trend Micro iOS URL Hijacking" "objects_81_external_references_1_url_https://blog.trendmicro.com/trendlabs-security-intelligence/ios-url-scheme-susceptible-to-hijacking/" "objects_81_external_references_1_description_L. Wu, Y. Zhou, M. Li. (2019, July 12). iOS URL Scheme Susceptible to Hijacking. Retrieved September 11, 2020." "objects_81_external_references_2_source_name_IETF-PKCE" "objects_81_external_references_2_url_https://tools.ietf.org/html/rfc7636" "objects_81_external_references_2_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_81_x_mitre_deprecated_False" "objects_81_revoked_True" "objects_81_description_Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data.\n\nApplications regularly register URIs with the operating system to act as a response handler for various actions, such as logging into an app using an external account via single sign-on. This allows redirections to that specific URI to be intercepted by the application. If a malicious application were to register for a URI that was already in use by a genuine application, the malicious application may be able to intercept data intended for the genuine application or perform a phishing attack against the genuine application. Intercepted data may include OAuth authorization codes or tokens that could be used by the malicious application to gain access to resources.(Citation: Trend Micro iOS URL Hijacking)(Citation: IETF-PKCE)" "objects_81_modified_2022-04-01T15:17:21.508Z" "objects_81_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_81_name_URI Hijacking" "objects_81_x_mitre_detection_On Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it." "objects_81_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_81_kill_chain_phases_0_phase_name_credential-access" "objects_81_x_mitre_is_subtechnique_False" "objects_81_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_81_x_mitre_attack_spec_version_2.1.0" "objects_81_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_81_spec_version_2.1" "objects_82_modified_2023-03-20T15:28:54.940Z" "objects_82_name_Compromise Software Dependencies and Development Tools" "objects_82_description_Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency.(Citation: Grace-Advertisement)" "objects_82_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_82_kill_chain_phases_0_phase_name_initial-access" "objects_82_x_mitre_deprecated_False" "objects_82_x_mitre_detection_Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries." "objects_82_x_mitre_domains_0_mobile-attack" "objects_82_x_mitre_is_subtechnique_True" "objects_82_x_mitre_platforms_0_Android" "objects_82_x_mitre_platforms_1_iOS" "objects_82_x_mitre_version_1.1" "objects_82_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_82_type_attack-pattern" "objects_82_id_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_82_created_2022-03-28T19:31:51.978Z" "objects_82_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_82_revoked_False" "objects_82_external_references_0_source_name_mitre-attack" "objects_82_external_references_0_url_https://attack.mitre.org/techniques/T1474/001" "objects_82_external_references_0_external_id_T1474.001" "objects_82_external_references_1_source_name_Grace-Advertisement" "objects_82_external_references_1_description_M. Grace et al. (2012, April 16-18). Unsafe exposure analysis of mobile in-app advertisements. Retrieved December 22, 2016." "objects_82_external_references_1_url_https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/WISEC12_ADRISK.pdf" "objects_82_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-6.html" "objects_82_external_references_2_external_id_APP-6" "objects_82_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-0.html" "objects_82_external_references_3_external_id_SPC-0" "objects_82_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-3.html" "objects_82_external_references_4_external_id_SPC-3" "objects_82_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-9.html" "objects_82_external_references_5_external_id_SPC-9" "objects_82_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-10.html" "objects_82_external_references_6_external_id_SPC-10" "objects_82_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_82_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html" "objects_82_external_references_7_external_id_SPC-15" "objects_82_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_82_x_mitre_attack_spec_version_3.1.0" "objects_82_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_82_spec_version_2.1" "objects_83_x_mitre_platforms_0_Android" "objects_83_x_mitre_platforms_1_iOS" "objects_83_x_mitre_domains_0_mobile-attack" "objects_83_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_83_type_attack-pattern" "objects_83_id_attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b" "objects_83_created_2019-10-02T14:46:43.632Z" "objects_83_x_mitre_version_1.0" "objects_83_external_references_0_source_name_mitre-attack" "objects_83_external_references_0_external_id_T1523" "objects_83_external_references_0_url_https://attack.mitre.org/techniques/T1523" "objects_83_external_references_1_source_name_Sophos Anti-emulation" "objects_83_external_references_1_url_https://news.sophos.com/en-us/2017/04/13/android-malware-anti-emulation-techniques/" "objects_83_external_references_1_description_Chen Yu et al. . (2017, April 13). Android malware anti-emulation techniques. Retrieved October 2, 2019." "objects_83_external_references_2_source_name_Xiao-ZergHelper" "objects_83_external_references_2_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_83_external_references_2_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_83_external_references_3_source_name_Cyberscoop Evade Analysis January 2019" "objects_83_external_references_3_url_https://www.cyberscoop.com/android-malware-motion-detection-trend-micro/" "objects_83_external_references_3_description_Jeff Stone. (2019, January 18). Sneaky motion-detection feature found on Android malware. Retrieved October 2, 2019." "objects_83_external_references_4_source_name_ThreatFabric Cerberus" "objects_83_external_references_4_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_83_external_references_4_description_ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019." "objects_83_external_references_5_source_name_Github Anti-emulator" "objects_83_external_references_5_url_https://github.com/strazzere/anti-emulator" "objects_83_external_references_5_description_Tim Strazzere. (n.d.). Android Anti-Emulator. Retrieved October 2, 2019." "objects_83_external_references_6_source_name_Talos Gustuff Apr 2019" "objects_83_external_references_6_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_83_external_references_6_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_83_x_mitre_deprecated_False" "objects_83_revoked_True" "objects_83_description_Malicious applications may attempt to detect their operating environment prior to fully executing their payloads. These checks are often used to ensure the application is not running within an analysis environment such as a sandbox used for application vetting, security research, or reverse engineering. \nAdversaries may use many different checks such as physical sensors, location, and system properties to fingerprint emulators and sandbox environments.(Citation: Talos Gustuff Apr 2019)(Citation: ThreatFabric Cerberus)(Citation: Xiao-ZergHelper)(Citation: Cyberscoop Evade Analysis January 2019) Adversaries may access `android.os.SystemProperties` via Java reflection to obtain specific system information.(Citation: Github Anti-emulator) Standard values such as phone number, IMEI, IMSI, device IDs, and device drivers may be checked against default signatures of common sandboxes.(Citation: Sophos Anti-emulation)\n" "objects_83_modified_2022-03-30T17:54:56.590Z" "objects_83_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_83_name_Evade Analysis Environment" "objects_83_x_mitre_detection_Analysis Environment avoidance capabilities can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_83_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_83_kill_chain_phases_0_phase_name_defense-evasion" "objects_83_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_83_kill_chain_phases_1_phase_name_discovery" "objects_83_x_mitre_is_subtechnique_False" "objects_83_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_83_x_mitre_attack_spec_version_2.1.0" "objects_83_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_83_spec_version_2.1" "objects_84_modified_2023-03-20T18:43:49.443Z" "objects_84_name_URI Hijacking" "objects_84_description_Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data. \n\nApplications regularly register URIs with the operating system to act as a response handler for various actions, such as logging into an app using an external account via single sign-on. This allows redirections to that specific URI to be intercepted by the application. If an adversary were to register for a URI that was already in use by a genuine application, the adversary may be able to intercept data intended for the genuine application or perform a phishing attack against the genuine application. Intercepted data may include OAuth authorization codes or tokens that could be used by the adversary to gain access to protected resources.(Citation: Trend Micro iOS URL Hijacking)(Citation: IETF-PKCE) " "objects_84_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_84_kill_chain_phases_0_phase_name_credential-access" "objects_84_x_mitre_contributors_0_Leo Zhang, Trend Micro" "objects_84_x_mitre_contributors_1_Steven Du, Trend Micro" "objects_84_x_mitre_deprecated_False" "objects_84_x_mitre_detection_On Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it. When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)" "objects_84_x_mitre_domains_0_mobile-attack" "objects_84_x_mitre_is_subtechnique_True" "objects_84_x_mitre_platforms_0_Android" "objects_84_x_mitre_platforms_1_iOS" "objects_84_x_mitre_version_1.1" "objects_84_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_84_type_attack-pattern" "objects_84_id_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_84_created_2022-04-01T15:15:35.640Z" "objects_84_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_84_revoked_False" "objects_84_external_references_0_source_name_mitre-attack" "objects_84_external_references_0_url_https://attack.mitre.org/techniques/T1635/001" "objects_84_external_references_0_external_id_T1635.001" "objects_84_external_references_1_source_name_Android-AppLinks" "objects_84_external_references_1_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_84_external_references_1_url_https://developer.android.com/training/app-links/index.html" "objects_84_external_references_2_source_name_Trend Micro iOS URL Hijacking" "objects_84_external_references_2_description_L. Wu, Y. Zhou, M. Li. (2019, July 12). iOS URL Scheme Susceptible to Hijacking. Retrieved September 11, 2020." "objects_84_external_references_2_url_https://blog.trendmicro.com/trendlabs-security-intelligence/ios-url-scheme-susceptible-to-hijacking/" "objects_84_external_references_3_source_name_IETF-PKCE" "objects_84_external_references_3_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_84_external_references_3_url_https://tools.ietf.org/html/rfc7636" "objects_84_external_references_4_source_name_IETF-OAuthNativeApps" "objects_84_external_references_4_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_84_external_references_4_url_https://tools.ietf.org/html/rfc8252" "objects_84_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_84_x_mitre_attack_spec_version_3.1.0" "objects_84_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_84_spec_version_2.1" "objects_85_modified_2023-03-20T18:52:52.097Z" "objects_85_name_Subvert Trust Controls" "objects_85_description_Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted applications. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features include: an app being allowed to run because it is signed by a valid code signing certificate; an OS prompt alerting the user that an app came from an untrusted source; or getting an indication that you are about to connect to an untrusted site. The method adversaries use will depend on the specific mechanism they seek to subvert. " "objects_85_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_85_kill_chain_phases_0_phase_name_defense-evasion" "objects_85_x_mitre_deprecated_False" "objects_85_x_mitre_detection_On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. \n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies." "objects_85_x_mitre_domains_0_mobile-attack" "objects_85_x_mitre_is_subtechnique_False" "objects_85_x_mitre_platforms_0_Android" "objects_85_x_mitre_platforms_1_iOS" "objects_85_x_mitre_version_1.1" "objects_85_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_85_type_attack-pattern" "objects_85_id_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_85_created_2022-03-30T18:05:46.795Z" "objects_85_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_85_revoked_False" "objects_85_external_references_0_source_name_mitre-attack" "objects_85_external_references_0_url_https://attack.mitre.org/techniques/T1632" "objects_85_external_references_0_external_id_T1632" "objects_85_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_85_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.html" "objects_85_external_references_1_external_id_STA-7" "objects_85_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_85_x_mitre_attack_spec_version_3.1.0" "objects_85_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_85_spec_version_2.1" "objects_86_x_mitre_platforms_0_Android" "objects_86_x_mitre_platforms_1_iOS" "objects_86_x_mitre_domains_0_mobile-attack" "objects_86_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_86_type_attack-pattern" "objects_86_id_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_86_created_2017-10-25T14:48:11.116Z" "objects_86_x_mitre_version_1.1" "objects_86_external_references_0_source_name_mitre-attack" "objects_86_external_references_0_external_id_T1433" "objects_86_external_references_0_url_https://attack.mitre.org/techniques/T1433" "objects_86_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_86_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_86_external_references_1_external_id_APP-13" "objects_86_x_mitre_deprecated_False" "objects_86_revoked_True" "objects_86_description_On Android, an adversary could call standard operating system APIs from a malicious application to gather call log data, or with escalated privileges could directly access files containing call log data.\n\nOn iOS, applications do not have access to the call log, so privilege escalation would be required in order to access the data." "objects_86_modified_2022-04-01T13:14:43.174Z" "objects_86_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_86_name_Access Call Log" "objects_86_x_mitre_detection_On Android 6.0 and up, the user can view which applications have permission to access call log information through the device settings screen, and the user can choose to revoke the permissions." "objects_86_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_86_kill_chain_phases_0_phase_name_collection" "objects_86_x_mitre_is_subtechnique_False" "objects_86_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_86_x_mitre_attack_spec_version_2.1.0" "objects_86_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_86_spec_version_2.1" "objects_87_x_mitre_platforms_0_Android" "objects_87_x_mitre_platforms_1_iOS" "objects_87_x_mitre_domains_0_mobile-attack" "objects_87_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_87_type_attack-pattern" "objects_87_id_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_87_created_2020-09-11T15:04:14.532Z" "objects_87_x_mitre_version_1.0" "objects_87_external_references_0_source_name_mitre-attack" "objects_87_external_references_0_external_id_T1581" "objects_87_external_references_0_url_https://attack.mitre.org/techniques/T1581" "objects_87_external_references_1_source_name_Lookout eSurv" "objects_87_external_references_1_url_https://blog.lookout.com/esurv-research" "objects_87_external_references_1_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_87_external_references_2_source_name_Apple Location Services" "objects_87_external_references_2_url_https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services" "objects_87_external_references_2_description_Apple. (n.d.). Requesting Authorization for Location Services. Retrieved September 11, 2020." "objects_87_external_references_3_source_name_Android Geofencing API" "objects_87_external_references_3_url_https://developer.android.com/training/location/geofencing" "objects_87_external_references_3_description_Google. (n.d.). Create and monitor geofences. Retrieved September 11, 2020." "objects_87_x_mitre_deprecated_False" "objects_87_revoked_True" "objects_87_description_Adversaries may use a device\u2019s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv)\n\n[Geofencing](https://attack.mitre.org/techniques/T1581) is accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device\u2019s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements.\n\nOne method to accomplish [Geofencing](https://attack.mitre.org/techniques/T1581) on Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other [Geofencing](https://attack.mitre.org/techniques/T1581) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include \u201cAllow only while using the app\u201d, which will effectively prohibit background location collection.(Citation: Android Geofencing API)\n\nSimilarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call `requestWhenInUseAuthorization()` or `requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device\u2019s location, including one-time use and only when the application is running in the foreground.(Citation: Apple Location Services)\n\n[Geofencing](https://attack.mitre.org/techniques/T1581) can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific [Input Prompt](https://attack.mitre.org/techniques/T1411)s and/or advertisements." "objects_87_modified_2022-03-30T20:43:31.244Z" "objects_87_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_87_name_Geofencing" "objects_87_x_mitre_detection_Users can review which applications have location permissions in the operating system\u2019s settings menu. On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background." "objects_87_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_87_kill_chain_phases_0_phase_name_defense-evasion" "objects_87_x_mitre_is_subtechnique_False" "objects_87_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_87_x_mitre_attack_spec_version_2.1.0" "objects_87_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_87_spec_version_2.1" "objects_88_x_mitre_platforms_0_Android" "objects_88_x_mitre_domains_0_mobile-attack" "objects_88_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_88_type_attack-pattern" "objects_88_id_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_88_created_2017-10-25T14:48:29.774Z" "objects_88_x_mitre_version_2.0" "objects_88_external_references_0_source_name_mitre-attack" "objects_88_external_references_0_external_id_T1401" "objects_88_external_references_0_url_https://attack.mitre.org/techniques/T1401" "objects_88_external_references_1_source_name_Android DeviceAdminInfo" "objects_88_external_references_1_url_https://developer.android.com/reference/android/app/admin/DeviceAdminInfo" "objects_88_external_references_1_description_Google. (n.d.). DeviceAdminInfo. Retrieved November 20, 2020." "objects_88_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_88_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_88_external_references_2_external_id_APP-22" "objects_88_x_mitre_deprecated_False" "objects_88_revoked_True" "objects_88_description_Adversaries may request device administrator permissions to perform malicious actions.\n\nBy abusing the device administration API, adversaries can perform several nefarious actions, such as resetting the device\u2019s password for [Device Lockout](https://attack.mitre.org/techniques/T1446), factory resetting the device to [Delete Device Data](https://attack.mitre.org/techniques/T1447) and any traces of the malware, disabling all of the device\u2019s cameras, or make it more difficult to uninstall the app.(Citation: Android DeviceAdminInfo)\n\nDevice administrators must be approved by the user at runtime, with a system popup showing which of the actions have been requested by the app. In conjunction with other techniques, such as [Input Injection](https://attack.mitre.org/techniques/T1516), an app can programmatically grant itself administrator permissions without any user input." "objects_88_modified_2022-04-01T16:52:36.965Z" "objects_88_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_88_name_Device Administrator Permissions" "objects_88_x_mitre_detection_Users can see when an app requests device administrator permissions. Users can also view which apps have device administrator permissions in the settings menu." "objects_88_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_88_kill_chain_phases_0_phase_name_privilege-escalation" "objects_88_x_mitre_is_subtechnique_False" "objects_88_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_88_x_mitre_attack_spec_version_2.1.0" "objects_88_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_88_spec_version_2.1" "objects_89_x_mitre_domains_0_mobile-attack" "objects_89_id_attack-pattern--831e3269-da49-48ac-94dc-948008e8fd16" "objects_89_type_attack-pattern" "objects_89_created_2017-10-25T14:48:34.830Z" "objects_89_revoked_True" "objects_89_external_references_0_source_name_mitre-mobile-attack" "objects_89_external_references_0_url_https://attack.mitre.org/techniques/T1443" "objects_89_external_references_0_external_id_T1443" "objects_89_modified_2022-07-07T14:00:00.188Z" "objects_89_name_Remotely Install Application" "objects_89_x_mitre_version_1.0" "objects_89_x_mitre_is_subtechnique_False" "objects_89_spec_version_2.1" "objects_89_x_mitre_attack_spec_version_2.1.0" "objects_90_modified_2023-03-20T18:45:39.362Z" "objects_90_name_Keychain" "objects_90_description_Adversaries may collect keychain data from an iOS device to acquire credentials. Keychains are the built-in way for iOS to keep track of users' passwords and credentials for many services and features such as Wi-Fi passwords, websites, secure notes, certificates, private keys, and VPN credentials. \n\nOn the device, the keychain database is stored outside of application sandboxes to prevent unauthorized access to the raw data. Standard iOS APIs allow applications access to their own keychain contained within the database. By utilizing a privilege escalation exploit or existing root access, adversaries can access the entire encrypted database.(Citation: Apple Keychain Services)(Citation: Elcomsoft Decrypt Keychain) " "objects_90_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_90_kill_chain_phases_0_phase_name_credential-access" "objects_90_x_mitre_deprecated_False" "objects_90_x_mitre_detection_Mobile security products can potentially detect jailbroken devices. Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations." "objects_90_x_mitre_domains_0_mobile-attack" "objects_90_x_mitre_is_subtechnique_True" "objects_90_x_mitre_platforms_0_iOS" "objects_90_x_mitre_version_1.1" "objects_90_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_90_type_attack-pattern" "objects_90_id_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_90_created_2022-04-01T15:01:32.169Z" "objects_90_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_90_revoked_False" "objects_90_external_references_0_source_name_mitre-attack" "objects_90_external_references_0_url_https://attack.mitre.org/techniques/T1634/001" "objects_90_external_references_0_external_id_T1634.001" "objects_90_external_references_1_source_name_Apple Keychain Services" "objects_90_external_references_1_description_Apple, Inc.. (n.d.). Keychain Services. Retrieved June 24, 2020." "objects_90_external_references_1_url_https://developer.apple.com/documentation/security/keychain_services" "objects_90_external_references_2_source_name_Elcomsoft Decrypt Keychain" "objects_90_external_references_2_description_V. Katalov. (2018, December 18). Six Ways to Decrypt iPhone Passwords from the Keychain. Retrieved June 24, 2020." "objects_90_external_references_2_url_https://blog.elcomsoft.com/2018/12/six-ways-to-decrypt-iphone-passwords-from-the-keychain/" "objects_90_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_90_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-11.html" "objects_90_external_references_3_external_id_AUT-11" "objects_90_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_90_x_mitre_attack_spec_version_3.1.0" "objects_90_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_90_spec_version_2.1" "objects_91_x_mitre_platforms_0_Android" "objects_91_x_mitre_domains_0_mobile-attack" "objects_91_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_91_type_attack-pattern" "objects_91_id_attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6" "objects_91_created_2017-10-25T14:48:29.092Z" "objects_91_x_mitre_version_1.1" "objects_91_external_references_0_source_name_mitre-attack" "objects_91_external_references_0_external_id_T1403" "objects_91_external_references_0_url_https://attack.mitre.org/techniques/T1403" "objects_91_external_references_1_source_name_Sabanal-ART" "objects_91_external_references_1_url_https://www.blackhat.com/docs/asia-15/materials/asia-15-Sabanal-Hiding-Behind-ART-wp.pdf" "objects_91_external_references_1_description_Paul Sabanal. (2015). Hiding Behind ART. Retrieved December 21, 2016." "objects_91_x_mitre_deprecated_True" "objects_91_revoked_False" "objects_91_description_ART (the Android Runtime) compiles optimized code on the device itself to improve performance. An adversary may be able to use escalated privileges to modify the cached code in order to hide malicious behavior. Since the code is compiled on the device, it may not receive the same level of integrity checks that are provided to code running in the system partition.(Citation: Sabanal-ART)" "objects_91_modified_2022-04-06T15:46:29.338Z" "objects_91_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_91_name_Modify Cached Executable Code" "objects_91_x_mitre_detection_Modifications to cached executable code can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversary behavior." "objects_91_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_91_kill_chain_phases_0_phase_name_persistence" "objects_91_x_mitre_is_subtechnique_False" "objects_91_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_91_x_mitre_attack_spec_version_2.1.0" "objects_91_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_91_spec_version_2.1" "objects_92_x_mitre_platforms_0_Android" "objects_92_x_mitre_domains_0_mobile-attack" "objects_92_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_92_id_attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05" "objects_92_type_attack-pattern" "objects_92_created_2017-10-25T14:48:28.456Z" "objects_92_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_92_revoked_True" "objects_92_external_references_0_external_id_T1419" "objects_92_external_references_0_url_https://attack.mitre.org/techniques/T1419" "objects_92_external_references_0_source_name_mitre-mobile-attack" "objects_92_external_references_1_url_https://developer.android.com/reference/android/os/Build" "objects_92_external_references_1_description_Android. (n.d.). Build. Retrieved December 21, 2016." "objects_92_external_references_1_source_name_Android-Build" "objects_92_modified_2022-07-07T14:00:00.188Z" "objects_92_name_Device Type Discovery" "objects_92_description_On Android, device type information is accessible to apps through the android.os.Build class (Citation: Android-Build). Device information could be used to target privilege escalation exploits." "objects_92_kill_chain_phases_0_phase_name_discovery" "objects_92_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_92_x_mitre_version_1.0" "objects_92_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_92_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_92_x_mitre_is_subtechnique_False" "objects_92_spec_version_2.1" "objects_92_x_mitre_attack_spec_version_2.1.0" "objects_93_x_mitre_platforms_0_Android" "objects_93_x_mitre_domains_0_mobile-attack" "objects_93_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_93_type_attack-pattern" "objects_93_id_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_93_created_2020-05-04T13:49:34.706Z" "objects_93_x_mitre_version_1.0" "objects_93_external_references_0_source_name_mitre-attack" "objects_93_external_references_0_external_id_T1576" "objects_93_external_references_0_url_https://attack.mitre.org/techniques/T1576" "objects_93_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-43.html" "objects_93_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_93_external_references_1_external_id_APP-43" "objects_93_x_mitre_deprecated_False" "objects_93_revoked_True" "objects_93_description_Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by:\n\n* Abusing device owner permissions to perform silent uninstallation using device owner API calls.\n* Abusing root permissions to delete files from the filesystem.\n* Abusing the accessibility service. This requires an intent be sent to the system to request uninstallation, and then abusing the accessibility service to click the proper places on the screen to confirm uninstallation." "objects_93_modified_2022-03-30T19:34:09.371Z" "objects_93_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_93_name_Uninstall Malicious Application" "objects_93_x_mitre_detection_" "objects_93_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_93_kill_chain_phases_0_phase_name_defense-evasion" "objects_93_x_mitre_is_subtechnique_False" "objects_93_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_93_x_mitre_attack_spec_version_2.1.0" "objects_93_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_93_spec_version_2.1" "objects_94_x_mitre_platforms_0_Android" "objects_94_x_mitre_domains_0_mobile-attack" "objects_94_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_94_type_attack-pattern" "objects_94_id_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_94_created_2017-10-25T14:48:31.694Z" "objects_94_x_mitre_version_2.1" "objects_94_external_references_0_source_name_mitre-attack" "objects_94_external_references_0_external_id_T1447" "objects_94_external_references_0_url_https://attack.mitre.org/techniques/T1447" "objects_94_external_references_1_source_name_Android DevicePolicyManager 2019" "objects_94_external_references_1_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html" "objects_94_external_references_1_description_Android Developers. (n.d.). DevicePolicyManager. Retrieved September 22, 2019." "objects_94_x_mitre_deprecated_False" "objects_94_revoked_True" "objects_94_description_Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location. (Citation: Android DevicePolicyManager 2019)\n\nStored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact." "objects_94_modified_2022-03-30T19:50:37.727Z" "objects_94_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_94_name_Delete Device Data" "objects_94_x_mitre_detection_Mobile security products can detect which applications can request device administrator permissions. Users can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing." "objects_94_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_94_kill_chain_phases_0_phase_name_impact" "objects_94_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_94_kill_chain_phases_1_phase_name_defense-evasion" "objects_94_x_mitre_is_subtechnique_False" "objects_94_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_94_x_mitre_attack_spec_version_2.1.0" "objects_94_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_94_spec_version_2.1" "objects_95_x_mitre_platforms_0_Android" "objects_95_x_mitre_domains_0_mobile-attack" "objects_95_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_95_type_attack-pattern" "objects_95_id_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_95_created_2017-10-25T14:48:09.082Z" "objects_95_x_mitre_version_2.0" "objects_95_external_references_0_source_name_mitre-attack" "objects_95_external_references_0_external_id_T1448" "objects_95_external_references_0_url_https://attack.mitre.org/techniques/T1448" "objects_95_external_references_1_source_name_Google Bread" "objects_95_external_references_1_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_95_external_references_1_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_95_external_references_2_source_name_AndroidSecurity2014" "objects_95_external_references_2_url_https://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2014_Report_Final.pdf" "objects_95_external_references_2_description_Google. (2014). Android Security 2014 Year in Review. Retrieved December 12, 2016." "objects_95_x_mitre_deprecated_False" "objects_95_revoked_True" "objects_95_description_A malicious app may trigger fraudulent charges on a victim\u2019s carrier billing statement in several different ways, including SMS toll fraud and SMS shortcodes that make purchases.\n\nPerforming SMS fraud relies heavily upon the fact that, when making SMS purchases, the carriers perform device verification but not user verification. This allows adversaries to make purchases on behalf of the user, with little or no user interaction.(Citation: Google Bread)\n\nMalicious applications may also perform toll billing, which occurs when carriers provide payment endpoints over a web page. The application connects to the web page over cellular data so the carrier can directly verify the number, or the application must retrieve a code sent via SMS and enter it into the web page.(Citation: Google Bread)\n\nOn iOS, apps cannot send SMS messages.\n\nOn Android, apps must hold the `SEND_SMS` permission to send SMS messages. Additionally, Android version 4.2 and above has mitigations against this threat by requiring user consent before allowing SMS messages to be sent to premium numbers (Citation: AndroidSecurity2014)." "objects_95_modified_2022-04-06T13:57:38.841Z" "objects_95_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_95_name_Carrier Billing Fraud" "objects_95_x_mitre_detection_Starting with Android 4.2 the user is prompted and must provide consent before applications can send SMS messages to premium numbers.(Citation: AndroidSecurity2014)\n\nOn Android 6.0 and up, the user can view which applications have permission to send SMS messages through the device settings screen, and the user can choose to revoke the permissions." "objects_95_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_95_kill_chain_phases_0_phase_name_impact" "objects_95_x_mitre_is_subtechnique_False" "objects_95_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_95_x_mitre_attack_spec_version_2.1.0" "objects_95_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_95_spec_version_2.1" "objects_96_x_mitre_platforms_0_iOS" "objects_96_x_mitre_domains_0_mobile-attack" "objects_96_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_96_id_attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e" "objects_96_type_attack-pattern" "objects_96_created_2017-10-25T14:48:17.533Z" "objects_96_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_96_revoked_True" "objects_96_external_references_0_source_name_mitre-mobile-attack" "objects_96_external_references_0_url_https://attack.mitre.org/techniques/T1415" "objects_96_external_references_0_external_id_T1415" "objects_96_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-10.html" "objects_96_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_96_external_references_1_external_id_AUT-10" "objects_96_external_references_2_source_name_FireEye-Masque2" "objects_96_external_references_2_description_Hui Xue, Tao Wei, Yulong Zhang, Song Jin, Zhaofeng Chen. (2015, February 19). IOS MASQUE ATTACK REVIVED: BYPASSING PROMPT FOR TRUST AND APP URL SCHEME HIJACKING. Retrieved December 21, 2016." "objects_96_external_references_2_url_https://www.fireeye.com/blog/threat-research/2015/02/ios_masque_attackre.html" "objects_96_external_references_3_source_name_Dhanjani-URLScheme" "objects_96_external_references_3_description_Nitesh Dhanjani. (2010, November 8). Insecure Handling of URL Schemes in Apple\u2019s iOS. Retrieved December 21, 2016." "objects_96_external_references_3_url_http://www.dhanjani.com/blog/2010/11/insecure-handling-of-url-schemes-in-apples-ios.html" "objects_96_external_references_4_source_name_IETF-PKCE" "objects_96_external_references_4_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_96_external_references_4_url_https://tools.ietf.org/html/rfc7636" "objects_96_external_references_5_source_name_MobileIron-XARA" "objects_96_external_references_5_description_Michael T. Raggo. (2015, October 1). iOS URL Scheme Hijacking (XARA) Attack Analysis and Countermeasures. Retrieved December 21, 2016." "objects_96_external_references_5_url_https://www.mobileiron.com/en/smartwork-blog/ios-url-scheme-hijacking-xara-attack-analysis-and-countermeasures" "objects_96_modified_2022-07-07T14:00:00.188Z" "objects_96_name_URL Scheme Hijacking" "objects_96_description_An iOS application may be able to maliciously claim a URL scheme, allowing it to intercept calls that are meant for a different application(Citation: FireEye-Masque2)(Citation: Dhanjani-URLScheme). This technique, for example, could be used to capture OAuth authorization codes(Citation: IETF-PKCE) or to phish user credentials(Citation: MobileIron-XARA)." "objects_96_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_96_kill_chain_phases_0_phase_name_credential-access" "objects_96_x_mitre_version_1.1" "objects_96_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_96_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_96_x_mitre_is_subtechnique_False" "objects_96_spec_version_2.1" "objects_96_x_mitre_attack_spec_version_2.1.0" "objects_97_modified_2023-08-14T16:34:55.968Z" "objects_97_name_Bidirectional Communication" "objects_97_description_Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to and receiving output from a compromised system. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems can then send the output from those commands back over that Web service channel. The return traffic may occur in a variety of ways, depending on the Web service being utilized. For example, the return traffic may take the form of the compromised system posting a comment on a forum, issuing a pull request to development project, updating a document hosted on a Web service, or by sending a Tweet. \n\n \n\nPopular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. " "objects_97_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_97_kill_chain_phases_0_phase_name_command-and-control" "objects_97_x_mitre_deprecated_False" "objects_97_x_mitre_detection_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_97_x_mitre_domains_0_mobile-attack" "objects_97_x_mitre_is_subtechnique_True" "objects_97_x_mitre_platforms_0_Android" "objects_97_x_mitre_platforms_1_iOS" "objects_97_x_mitre_version_1.2" "objects_97_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_97_type_attack-pattern" "objects_97_id_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_97_created_2022-04-06T15:47:06.071Z" "objects_97_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_97_revoked_False" "objects_97_external_references_0_source_name_mitre-attack" "objects_97_external_references_0_url_https://attack.mitre.org/techniques/T1481/002" "objects_97_external_references_0_external_id_T1481.002" "objects_97_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_97_x_mitre_attack_spec_version_3.1.0" "objects_97_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_97_spec_version_2.1" "objects_98_modified_2023-09-08T19:21:40.736Z" "objects_98_name_Non-Standard Port" "objects_98_description_Adversaries may generate network traffic using a protocol and port pairing that are typically not associated. For example, HTTPS over port 8088 or port 587 as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data." "objects_98_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_98_kill_chain_phases_0_phase_name_command-and-control" "objects_98_x_mitre_deprecated_False" "objects_98_x_mitre_detection_Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. Many properly configured firewalls may also naturally block command and control traffic over non-standard ports." "objects_98_x_mitre_domains_0_mobile-attack" "objects_98_x_mitre_is_subtechnique_False" "objects_98_x_mitre_platforms_0_Android" "objects_98_x_mitre_platforms_1_iOS" "objects_98_x_mitre_version_2.1" "objects_98_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_98_type_attack-pattern" "objects_98_id_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_98_created_2019-08-01T13:44:09.368Z" "objects_98_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_98_revoked_False" "objects_98_external_references_0_source_name_mitre-attack" "objects_98_external_references_0_url_https://attack.mitre.org/techniques/T1509" "objects_98_external_references_0_external_id_T1509" "objects_98_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_98_x_mitre_attack_spec_version_3.1.0" "objects_98_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_98_spec_version_2.1" "objects_99_modified_2023-03-20T15:32:37.109Z" "objects_99_name_Compromise Software Supply Chain" "objects_99_description_Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version." "objects_99_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_99_kill_chain_phases_0_phase_name_initial-access" "objects_99_x_mitre_deprecated_False" "objects_99_x_mitre_detection_Application vetting services can detect malicious code in applications. System partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition." "objects_99_x_mitre_domains_0_mobile-attack" "objects_99_x_mitre_is_subtechnique_True" "objects_99_x_mitre_platforms_0_Android" "objects_99_x_mitre_platforms_1_iOS" "objects_99_x_mitre_version_1.1" "objects_99_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_99_type_attack-pattern" "objects_99_id_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_99_created_2022-03-28T19:25:17.596Z" "objects_99_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_99_revoked_False" "objects_99_external_references_0_source_name_mitre-attack" "objects_99_external_references_0_url_https://attack.mitre.org/techniques/T1474/003" "objects_99_external_references_0_external_id_T1474.003" "objects_99_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_99_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-4.html" "objects_99_external_references_1_external_id_SPC-4" "objects_99_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_99_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-11.html" "objects_99_external_references_2_external_id_SPC-11" "objects_99_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_99_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-12.html" "objects_99_external_references_3_external_id_SPC-12" "objects_99_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_99_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-18.html" "objects_99_external_references_4_external_id_SPC-18" "objects_99_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_99_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-20.html" "objects_99_external_references_5_external_id_SPC-20" "objects_99_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_99_x_mitre_attack_spec_version_3.1.0" "objects_99_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_99_spec_version_2.1" "objects_100_modified_2023-08-14T16:33:56.861Z" "objects_100_name_Dead Drop Resolver" "objects_100_description_Adversaries may use an existing, legitimate external Web service to host information that points to additional command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. \n\n \n\nPopular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. \n\n \n\nUse of a dead drop resolver may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed). " "objects_100_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_100_kill_chain_phases_0_phase_name_command-and-control" "objects_100_x_mitre_deprecated_False" "objects_100_x_mitre_detection_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. " "objects_100_x_mitre_domains_0_mobile-attack" "objects_100_x_mitre_is_subtechnique_True" "objects_100_x_mitre_platforms_0_Android" "objects_100_x_mitre_platforms_1_iOS" "objects_100_x_mitre_version_1.2" "objects_100_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_100_type_attack-pattern" "objects_100_id_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_100_created_2022-04-06T15:41:03.914Z" "objects_100_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_100_revoked_False" "objects_100_external_references_0_source_name_mitre-attack" "objects_100_external_references_0_url_https://attack.mitre.org/techniques/T1481/001" "objects_100_external_references_0_external_id_T1481.001" "objects_100_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_100_x_mitre_attack_spec_version_3.1.0" "objects_100_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_100_spec_version_2.1" "objects_101_modified_2023-03-20T18:50:21.363Z" "objects_101_name_Location Tracking" "objects_101_description_Adversaries may track a device\u2019s physical location through use of standard operating system APIs via malicious or exploited applications on the compromised device. \n\n \n\nOn Android, applications holding the `ACCESS_COAURSE_LOCATION` or `ACCESS_FINE_LOCATION` permissions provide access to the device\u2019s physical location. On Android 10 and up, declaration of the `ACCESS_BACKGROUND_LOCATION` permission in an application\u2019s manifest will allow applications to request location access even when the application is running in the background.(Citation: Android Request Location Permissions) Some adversaries have utilized integration of Baidu map services to retrieve geographical location once the location access permissions had been obtained.(Citation: PaloAlto-SpyDealer)(Citation: Palo Alto HenBox) \n\n \n\nOn iOS, applications must include the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file depending on the extent of requested access to location information.(Citation: Apple Requesting Authorization for Location Services) On iOS 8.0 and up, applications call `requestWhenInUseAuthorization()` to request access to location information when the application is in use or `requestAlwaysAuthorization()` to request access to location information regardless of whether the application is in use. With elevated privileges, an adversary may be able to access location data without explicit user consent with the `com.apple.locationd.preauthorized` entitlement key.(Citation: Google Project Zero Insomnia)" "objects_101_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_101_kill_chain_phases_0_phase_name_collection" "objects_101_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_101_kill_chain_phases_1_phase_name_discovery" "objects_101_x_mitre_deprecated_False" "objects_101_x_mitre_detection_Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \n\n \n\nIn both Android (6.0 and up) and iOS, users can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. " "objects_101_x_mitre_domains_0_mobile-attack" "objects_101_x_mitre_is_subtechnique_False" "objects_101_x_mitre_platforms_0_Android" "objects_101_x_mitre_platforms_1_iOS" "objects_101_x_mitre_version_1.2" "objects_101_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_101_type_attack-pattern" "objects_101_id_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_101_created_2017-10-25T14:48:12.267Z" "objects_101_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_101_revoked_False" "objects_101_external_references_0_source_name_mitre-attack" "objects_101_external_references_0_url_https://attack.mitre.org/techniques/T1430" "objects_101_external_references_0_external_id_T1430" "objects_101_external_references_1_source_name_Palo Alto HenBox" "objects_101_external_references_1_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_101_external_references_1_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_101_external_references_2_source_name_Android Request Location Permissions" "objects_101_external_references_2_description_Android Developers. (2022, March 24). Request Location Permissions. Retrieved April 1, 2022." "objects_101_external_references_2_url_https://developer.android.com/training/location/permissions" "objects_101_external_references_3_source_name_Apple Requesting Authorization for Location Services" "objects_101_external_references_3_description_Apple Developers. (n.d.). Requesting Authorization for Location Services. Retrieved April 1, 2022." "objects_101_external_references_3_url_https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services" "objects_101_external_references_4_source_name_Google Project Zero Insomnia" "objects_101_external_references_4_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_101_external_references_4_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_101_external_references_5_source_name_PaloAlto-SpyDealer" "objects_101_external_references_5_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_101_external_references_5_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_101_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_101_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html" "objects_101_external_references_6_external_id_APP-24" "objects_101_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_101_x_mitre_attack_spec_version_3.1.0" "objects_101_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_101_spec_version_2.1" "objects_102_modified_2023-03-20T15:56:34.537Z" "objects_102_name_Device Administrator Permissions" "objects_102_description_Adversaries may abuse Android\u2019s device administration API to obtain a higher degree of control over the device. By abusing the API, adversaries can perform several nefarious actions, such as resetting the device\u2019s password for [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642), factory resetting the device for [File Deletion](https://attack.mitre.org/techniques/T1630/002) and to delete any traces of the malware, disabling all the device\u2019s cameras, or to make it more difficult to uninstall the app.\n\nDevice administrators must be approved by the user at runtime, with a system popup showing which actions have been requested by the app. In conjunction with other techniques, such as [Input Injection](https://attack.mitre.org/techniques/T1516), an app can programmatically grant itself administrator permissions without any user input." "objects_102_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_102_kill_chain_phases_0_phase_name_privilege-escalation" "objects_102_x_mitre_deprecated_False" "objects_102_x_mitre_detection_Users are prompted for approval when an application requests device administrator permissions. Users can see which applications are registered as device administrators in the device settings. Application vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\u2019s manifest. This indicates it can prompt the user for device administrator permissions." "objects_102_x_mitre_domains_0_mobile-attack" "objects_102_x_mitre_is_subtechnique_True" "objects_102_x_mitre_platforms_0_Android" "objects_102_x_mitre_version_1.1" "objects_102_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_102_type_attack-pattern" "objects_102_id_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_102_created_2022-04-01T15:59:05.830Z" "objects_102_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_102_revoked_False" "objects_102_external_references_0_source_name_mitre-attack" "objects_102_external_references_0_url_https://attack.mitre.org/techniques/T1626/001" "objects_102_external_references_0_external_id_T1626.001" "objects_102_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_102_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_102_external_references_1_external_id_APP-22" "objects_102_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_102_x_mitre_attack_spec_version_3.1.0" "objects_102_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_102_spec_version_2.1" "objects_103_x_mitre_platforms_0_Android" "objects_103_x_mitre_platforms_1_iOS" "objects_103_x_mitre_domains_0_mobile-attack" "objects_103_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_103_type_attack-pattern" "objects_103_id_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_103_created_2017-10-25T14:48:17.886Z" "objects_103_x_mitre_version_2.0" "objects_103_external_references_0_source_name_mitre-attack" "objects_103_external_references_0_external_id_T1446" "objects_103_external_references_0_url_https://attack.mitre.org/techniques/T1446" "objects_103_external_references_1_source_name_Xiao-KeyRaider" "objects_103_external_references_1_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_103_external_references_1_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_103_external_references_2_source_name_Android resetPassword" "objects_103_external_references_2_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#resetPassword(java.lang.String,%20int)" "objects_103_external_references_2_description_Google. (n.d.). DevicePolicyManager. Retrieved October 1, 2019." "objects_103_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-28.html" "objects_103_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_103_external_references_3_external_id_APP-28" "objects_103_x_mitre_deprecated_False" "objects_103_revoked_True" "objects_103_description_An adversary may seek to lock the legitimate user out of the device, for example to inhibit user interaction or to obtain a ransom payment.\n\nOn Android versions prior to 7, apps can abuse Device Administrator access to reset the device lock passcode to prevent the user from unlocking the device. After Android 7, only device or profile owners (e.g. MDMs) can reset the device\u2019s passcode.(Citation: Android resetPassword)\n\nOn iOS devices, this technique does not work because mobile device management servers can only remove the screen lock passcode, they cannot set a new passcode. However, on jailbroken devices, malware has been discovered that can lock the user out of the device.(Citation: Xiao-KeyRaider)" "objects_103_modified_2022-04-01T18:49:51.039Z" "objects_103_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_103_name_Device Lockout" "objects_103_x_mitre_detection_On Android, users can review which applications have device administrator access in the device settings, and revoke permission where appropriate." "objects_103_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_103_kill_chain_phases_0_phase_name_impact" "objects_103_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_103_kill_chain_phases_1_phase_name_defense-evasion" "objects_103_x_mitre_is_subtechnique_False" "objects_103_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_103_x_mitre_attack_spec_version_2.1.0" "objects_103_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_103_spec_version_2.1" "objects_104_modified_2023-03-20T18:58:20.113Z" "objects_104_name_Remote Device Management Services" "objects_104_description_An adversary may use access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM)/mobile device management (MDM) server console to track the location of mobile devices managed by the service.(Citation: Krebs-Location) " "objects_104_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_104_kill_chain_phases_0_phase_name_collection" "objects_104_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_104_kill_chain_phases_1_phase_name_discovery" "objects_104_x_mitre_deprecated_False" "objects_104_x_mitre_detection_Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. " "objects_104_x_mitre_domains_0_mobile-attack" "objects_104_x_mitre_is_subtechnique_True" "objects_104_x_mitre_platforms_0_Android" "objects_104_x_mitre_platforms_1_iOS" "objects_104_x_mitre_version_1.1" "objects_104_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_104_type_attack-pattern" "objects_104_id_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_104_created_2022-04-05T19:37:15.984Z" "objects_104_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_104_revoked_False" "objects_104_external_references_0_source_name_mitre-attack" "objects_104_external_references_0_url_https://attack.mitre.org/techniques/T1430/001" "objects_104_external_references_0_external_id_T1430.001" "objects_104_external_references_1_source_name_Krebs-Location" "objects_104_external_references_1_description_Brian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018." "objects_104_external_references_1_url_https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/" "objects_104_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_104_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html" "objects_104_external_references_2_external_id_ECO-5" "objects_104_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_104_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html" "objects_104_external_references_3_external_id_EMM-7" "objects_104_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_104_x_mitre_attack_spec_version_3.1.0" "objects_104_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_104_spec_version_2.1" "objects_105_modified_2023-09-27T21:09:27.288Z" "objects_105_name_Data Destruction" "objects_105_description_Adversaries may destroy data and files on specific devices or in large numbers to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives. \n\nTo achieve data destruction, adversaries may use the `pm uninstall` command to uninstall packages or the `rm` command to remove specific files. For example, adversaries may first use `pm uninstall` to uninstall non-system apps, and then use `rm (-f) ` to delete specific files, further hiding malicious activity.(Citation: rootnik_rooting_tool)(Citation: abuse_native_linux_tools)" "objects_105_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_105_kill_chain_phases_0_phase_name_impact" "objects_105_x_mitre_contributors_0_Liran Ravich, CardinalOps" "objects_105_x_mitre_deprecated_False" "objects_105_x_mitre_detection_" "objects_105_x_mitre_domains_0_mobile-attack" "objects_105_x_mitre_is_subtechnique_False" "objects_105_x_mitre_platforms_0_Android" "objects_105_x_mitre_version_1.0" "objects_105_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_105_type_attack-pattern" "objects_105_id_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_105_created_2023-09-22T19:09:15.698Z" "objects_105_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_105_revoked_False" "objects_105_external_references_0_source_name_mitre-attack" "objects_105_external_references_0_url_https://attack.mitre.org/techniques/T1662" "objects_105_external_references_0_external_id_T1662" "objects_105_external_references_1_source_name_rootnik_rooting_tool" "objects_105_external_references_1_description_Hu, W., et al. (2015, December 4). Rootnik Android Trojan Abuses Commercial Rooting Tool and Steals Private Information. Retrieved September 26, 2023." "objects_105_external_references_1_url_https://unit42.paloaltonetworks.com/rootnik-android-trojan-abuses-commercial-rooting-tool-and-steals-private-information/" "objects_105_external_references_2_source_name_abuse_native_linux_tools" "objects_105_external_references_2_description_Surana, N., et al. (2022, September 8). How Malicious Actors Abuse Native Linux Tools in Attacks. Retrieved September 26, 2023." "objects_105_external_references_2_url_https://www.trendmicro.com/en_za/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html" "objects_105_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_105_x_mitre_attack_spec_version_3.2.0" "objects_105_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_105_spec_version_2.1" "objects_106_x_mitre_platforms_0_Android" "objects_106_x_mitre_domains_0_mobile-attack" "objects_106_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_106_type_attack-pattern" "objects_106_id_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_106_created_2017-10-25T14:48:13.625Z" "objects_106_x_mitre_version_1.1" "objects_106_external_references_0_source_name_mitre-attack" "objects_106_external_references_0_external_id_T1427" "objects_106_external_references_0_url_https://attack.mitre.org/techniques/T1427" "objects_106_external_references_1_source_name_ArsTechnica-PoisonTap" "objects_106_external_references_1_url_http://arstechnica.com/security/2016/11/meet-poisontap-the-5-tool-that-ransacks-password-protected-computers/" "objects_106_external_references_1_description_Dan Goodin. (2016, November 16). Meet PoisonTap, the $5 tool that ransacks password-protected computers. Retrieved December 22, 2016." "objects_106_external_references_2_source_name_Wang-ExploitingUSB" "objects_106_external_references_2_url_http://dl.acm.org/citation.cfm?id=1920314" "objects_106_external_references_2_description_Z. Wang and A. Stavrou. (2010, December 6-10). Exploiting smart-phone USB connectivity for fun and profit. Retrieved December 22, 2016." "objects_106_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html" "objects_106_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_106_external_references_3_external_id_PHY-2" "objects_106_x_mitre_deprecated_True" "objects_106_revoked_False" "objects_106_description_With escalated privileges, an adversary could program the mobile device to impersonate USB devices such as input devices (keyboard and mouse), storage devices, and/or networking devices in order to attack a physically connected PC(Citation: Wang-ExploitingUSB)(Citation: ArsTechnica-PoisonTap) This technique has been demonstrated on Android. We are unaware of any demonstrations on iOS." "objects_106_modified_2022-04-06T15:39:14.695Z" "objects_106_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_106_name_Attack PC via USB Connection" "objects_106_x_mitre_detection_" "objects_106_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_106_kill_chain_phases_0_phase_name_lateral-movement" "objects_106_x_mitre_is_subtechnique_False" "objects_106_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_106_x_mitre_attack_spec_version_2.1.0" "objects_106_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_106_spec_version_2.1" "objects_107_x_mitre_domains_0_mobile-attack" "objects_107_id_attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881" "objects_107_type_attack-pattern" "objects_107_created_2017-10-25T14:48:05.928Z" "objects_107_revoked_True" "objects_107_external_references_0_source_name_mitre-mobile-attack" "objects_107_external_references_0_url_https://attack.mitre.org/techniques/T1441" "objects_107_external_references_0_external_id_T1441" "objects_107_modified_2022-07-07T14:00:00.188Z" "objects_107_name_Stolen Developer Credentials or Signing Keys" "objects_107_x_mitre_version_1.0" "objects_107_x_mitre_is_subtechnique_False" "objects_107_spec_version_2.1" "objects_107_x_mitre_attack_spec_version_2.1.0" "objects_108_x_mitre_platforms_0_Android" "objects_108_x_mitre_platforms_1_iOS" "objects_108_x_mitre_domains_0_mobile-attack" "objects_108_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_108_type_attack-pattern" "objects_108_id_attack-pattern--a5de0540-73e7-4c67-96da-4143afedc7ed" "objects_108_created_2017-10-25T14:48:22.296Z" "objects_108_x_mitre_version_1.1" "objects_108_external_references_0_source_name_mitre-attack" "objects_108_external_references_0_external_id_T1467" "objects_108_external_references_0_url_https://attack.mitre.org/techniques/T1467" "objects_108_external_references_1_source_name_Computerworld-Femtocell" "objects_108_external_references_1_url_http://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.html" "objects_108_external_references_1_description_Jaikumar Vijayan. (2013, August 1). Researchers exploit cellular tech flaws to intercept phone calls. Retrieved December 24, 2016." "objects_108_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html" "objects_108_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_108_external_references_2_external_id_CEL-7" "objects_108_x_mitre_deprecated_False" "objects_108_revoked_True" "objects_108_description_An adversary could set up a rogue cellular base station and then use it to eavesdrop on or manipulate cellular device communication. A compromised cellular femtocell could be used to carry out this technique(Citation: Computerworld-Femtocell)." "objects_108_modified_2022-04-06T15:52:41.578Z" "objects_108_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_108_name_Rogue Cellular Base Station" "objects_108_x_mitre_detection_" "objects_108_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_108_kill_chain_phases_0_phase_name_network-effects" "objects_108_x_mitre_is_subtechnique_False" "objects_108_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_108_x_mitre_attack_spec_version_2.1.0" "objects_108_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_108_spec_version_2.1" "objects_109_x_mitre_platforms_0_Android" "objects_109_x_mitre_platforms_1_iOS" "objects_109_x_mitre_domains_0_mobile-attack" "objects_109_x_mitre_contributors_0_Karim Hasanen, @_karimhasanen" "objects_109_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_109_type_attack-pattern" "objects_109_id_attack-pattern--a64a820a-cb21-471f-920c-506a2ff04fa5" "objects_109_created_2017-10-25T14:48:20.329Z" "objects_109_x_mitre_version_1.2" "objects_109_external_references_0_source_name_mitre-attack" "objects_109_external_references_0_external_id_T1451" "objects_109_external_references_0_url_https://attack.mitre.org/techniques/T1451" "objects_109_external_references_1_source_name_Betanews-Simswap" "objects_109_external_references_1_url_http://betanews.com/2016/02/12/everything-you-need-to-know-about-sim-swap-scams/" "objects_109_external_references_1_description_Alex Cambell. (2016, February 12). Everything you need to know about SIM swap scams. Retrieved December 12, 2016." "objects_109_external_references_2_source_name_Krebs-SimSwap" "objects_109_external_references_2_url_https://krebsonsecurity.com/2018/05/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account/" "objects_109_external_references_2_description_Brian Krebs. (2018, May 18). T-Mobile Employee Made Unauthorized \u2018SIM Swap\u2019 to Steal Instagram Account. Retrieved November 8, 2018." "objects_109_external_references_3_source_name_TechCrunch-SimSwap" "objects_109_external_references_3_url_https://techcrunch.com/2017/08/23/i-was-hacked/" "objects_109_external_references_3_description_John Biggs. (2017, August 23). I was hacked. Retrieved November 8, 2018." "objects_109_external_references_4_source_name_Motherboard-Simswap2" "objects_109_external_references_4_url_https://motherboard.vice.com/en_us/article/3ky5a5/criminals-recruit-telecom-employees-sim-swapping-port-out-scam" "objects_109_external_references_4_description_Lorenzo Franceschi-Bicchierai. (2018, August 3). How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards. Retrieved August 11, 2018." "objects_109_external_references_5_source_name_Motherboard-Simswap1" "objects_109_external_references_5_url_https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin" "objects_109_external_references_5_description_Lorenzo Franceschi-Bicchierai. (2018, July 17). The SIM Hijackers. Retrieved August 11, 2018." "objects_109_external_references_6_source_name_Guardian-Simswap" "objects_109_external_references_6_url_https://www.theguardian.com/money/2016/apr/16/sim-swap-fraud-mobile-banking-fraudsters" "objects_109_external_references_6_description_Miles Brignall. (2016, April 16). Sim-swap fraud claims another mobile banking victim. Retrieved December 12, 2016." "objects_109_external_references_7_source_name_NYGov-Simswap" "objects_109_external_references_7_url_http://www.dos.ny.gov/consumerprotection/scams/att-sim.html" "objects_109_external_references_7_description_New York Department of State. (2016, February 12). AT&T SIM-Card Switch Scam. Retrieved August 23, 2016." "objects_109_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-22.html" "objects_109_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_109_external_references_8_external_id_STA-22" "objects_109_x_mitre_deprecated_True" "objects_109_revoked_False" "objects_109_description_An adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider attacks performed by trusted employees) to issue a new SIM card and associate it with an existing phone number and account.(Citation: NYGov-Simswap)(Citation: Motherboard-Simswap2) The adversary could then obtain SMS messages or hijack phone calls intended for someone else.(Citation: Betanews-Simswap)\n\nOne use case is intercepting authentication messages or phone calls to obtain illicit access to online banking or other online accounts, as many online services allow account password resets by sending an authentication code over SMS to a phone number associated with the account.(Citation: Guardian-Simswap)(Citation: Motherboard-Simswap1)(Citation: Krebs-SimSwap)(Citation: TechCrunch-SimSwap)" "objects_109_modified_2022-04-06T15:53:54.872Z" "objects_109_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_109_name_SIM Card Swap" "objects_109_x_mitre_detection_" "objects_109_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_109_kill_chain_phases_0_phase_name_network-effects" "objects_109_x_mitre_is_subtechnique_False" "objects_109_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_109_x_mitre_attack_spec_version_2.1.0" "objects_109_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_109_spec_version_2.1" "objects_110_modified_2023-03-20T18:44:36.145Z" "objects_110_name_Input Capture" "objects_110_description_Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal device usage, users often provide credentials to various locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. [Keylogging](https://attack.mitre.org/techniques/T1417/001)) or rely on deceiving the user into providing input into what they believe to be a genuine application prompt (e.g. [GUI Input Capture](https://attack.mitre.org/techniques/T1417/002))." "objects_110_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_110_kill_chain_phases_0_phase_name_collection" "objects_110_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_110_kill_chain_phases_1_phase_name_credential-access" "objects_110_x_mitre_deprecated_False" "objects_110_x_mitre_detection_Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay. Users can view and manage installed third-party keyboards." "objects_110_x_mitre_domains_0_mobile-attack" "objects_110_x_mitre_is_subtechnique_False" "objects_110_x_mitre_platforms_0_Android" "objects_110_x_mitre_platforms_1_iOS" "objects_110_x_mitre_version_2.3" "objects_110_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_110_type_attack-pattern" "objects_110_id_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_110_created_2017-10-25T14:48:27.660Z" "objects_110_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_110_revoked_False" "objects_110_external_references_0_source_name_mitre-attack" "objects_110_external_references_0_url_https://attack.mitre.org/techniques/T1417" "objects_110_external_references_0_external_id_T1417" "objects_110_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_110_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_110_external_references_1_external_id_APP-31" "objects_110_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_110_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-13.html" "objects_110_external_references_2_external_id_AUT-13" "objects_110_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_110_x_mitre_attack_spec_version_3.1.0" "objects_110_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_110_spec_version_2.1" "objects_111_modified_2023-03-20T18:57:17.144Z" "objects_111_name_Generate Traffic from Victim" "objects_111_description_Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well.\n\nIf done via SMS messages, Android apps must hold the `SEND_SMS` permission. Additionally, sending an SMS message requires user consent if the recipient is a premium number. Applications cannot send SMS messages on iOS" "objects_111_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_111_kill_chain_phases_0_phase_name_impact" "objects_111_x_mitre_deprecated_False" "objects_111_x_mitre_detection_On Android, users can review which applications can use premium SMS features in the \u201cSpecial access\u201d page within application settings. Application vetting services can detect when applications request the `SEND_SMS` permission, which should be infrequently used." "objects_111_x_mitre_domains_0_mobile-attack" "objects_111_x_mitre_is_subtechnique_False" "objects_111_x_mitre_platforms_0_Android" "objects_111_x_mitre_platforms_1_iOS" "objects_111_x_mitre_version_1.1" "objects_111_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_111_type_attack-pattern" "objects_111_id_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_111_created_2022-04-06T13:55:14.390Z" "objects_111_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_111_revoked_False" "objects_111_external_references_0_source_name_mitre-attack" "objects_111_external_references_0_url_https://attack.mitre.org/techniques/T1643" "objects_111_external_references_0_external_id_T1643" "objects_111_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_111_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-16.html" "objects_111_external_references_1_external_id_APP-16" "objects_111_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_111_x_mitre_attack_spec_version_3.1.0" "objects_111_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_111_spec_version_2.1" "objects_112_modified_2023-03-20T18:18:29.556Z" "objects_112_name_Disguise Root/Jailbreak Indicators" "objects_112_description_An adversary could use knowledge of the techniques used by security software to evade detection.(Citation: Brodie)(Citation: Tan) For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed \"su\" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection.(Citation: Rastogi)" "objects_112_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_112_kill_chain_phases_0_phase_name_defense-evasion" "objects_112_x_mitre_deprecated_False" "objects_112_x_mitre_detection_Mobile security products can use attestation to detect compromised devices." "objects_112_x_mitre_domains_0_mobile-attack" "objects_112_x_mitre_is_subtechnique_True" "objects_112_x_mitre_platforms_0_Android" "objects_112_x_mitre_platforms_1_iOS" "objects_112_x_mitre_version_1.1" "objects_112_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_112_type_attack-pattern" "objects_112_id_attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9" "objects_112_created_2022-04-08T16:29:30.087Z" "objects_112_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_112_revoked_False" "objects_112_external_references_0_source_name_mitre-attack" "objects_112_external_references_0_url_https://attack.mitre.org/techniques/T1630/003" "objects_112_external_references_0_external_id_T1630.003" "objects_112_external_references_1_source_name_Brodie" "objects_112_external_references_1_description_Daniel Brodie. (2016). Practical Attacks against Mobile Device Management (MDM). Retrieved December 21, 2016." "objects_112_external_references_1_url_https://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-wp.pdf" "objects_112_external_references_2_source_name_Rastogi" "objects_112_external_references_2_description_Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. (2013, May). DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks. Retrieved December 9, 2016." "objects_112_external_references_2_url_http://pages.cs.wisc.edu/~vrastogi/static/papers/rcj13b.pdf" "objects_112_external_references_3_source_name_Tan" "objects_112_external_references_3_description_Vincent Tan. (2016, August). BAD FOR ENTERPRISE: ATTACKING BYOD ENTERPRISE MOBILE SECURITY SOLUTIONS. Retrieved February 4, 2017." "objects_112_external_references_3_url_http://www.blackhat.com/us-16/briefings.html#bad-for-enterprise-attacking-byod-enterprise-mobile-security-solutions" "objects_112_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_112_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-5.html" "objects_112_external_references_4_external_id_EMM-5" "objects_112_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_112_x_mitre_attack_spec_version_3.1.0" "objects_112_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_112_spec_version_2.1" "objects_113_x_mitre_platforms_0_Android" "objects_113_x_mitre_platforms_1_iOS" "objects_113_x_mitre_domains_0_mobile-attack" "objects_113_x_mitre_contributors_0_Alex Hinchliffe, Palo Alto Networks" "objects_113_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_113_type_attack-pattern" "objects_113_id_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_113_created_2017-10-25T14:48:35.247Z" "objects_113_x_mitre_version_2.1" "objects_113_external_references_0_source_name_mitre-attack" "objects_113_external_references_0_external_id_T1444" "objects_113_external_references_0_url_https://attack.mitre.org/techniques/T1444" "objects_113_external_references_1_source_name_Palo Alto HenBox" "objects_113_external_references_1_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_113_external_references_1_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_113_external_references_2_source_name_Zhou" "objects_113_external_references_2_url_http://ieeexplore.ieee.org/document/6234407" "objects_113_external_references_2_description_Yajin Zhou and Xuxian Jiang. (2012, May). Dissecting Android Malware: Characterization and Evolution. Retrieved December 9, 2016." "objects_113_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_113_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_113_external_references_3_external_id_APP-31" "objects_113_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-14.html" "objects_113_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_113_external_references_4_external_id_APP-14" "objects_113_x_mitre_deprecated_True" "objects_113_revoked_False" "objects_113_description_An adversary could distribute developed malware by masquerading the malware as a legitimate application. This can be done in two different ways: by embedding the malware in a legitimate application, or by pretending to be a legitimate application.\n\nEmbedding the malware in a legitimate application is done by downloading the application, disassembling it, adding the malicious code, and then re-assembling it.(Citation: Zhou) The app would appear to be the original app, but would contain additional malicious functionality. The adversary could then publish the malicious application to app stores or use another delivery method.\n\nPretending to be a legitimate application relies heavily on lack of scrutinization by the user. Typically, a malicious app pretending to be a legitimate one will have many similar details as the legitimate one, such as name, icon, and description.(Citation: Palo Alto HenBox)\n\nMalicious applications may also masquerade as legitimate applications when requesting access to the accessibility service in order to appear as legitimate to the user, increasing the likelihood that the access will be granted." "objects_113_modified_2022-04-06T15:45:52.558Z" "objects_113_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_113_name_Masquerade as Legitimate Application" "objects_113_x_mitre_detection_Users can detect malicious applications by watching for nuances that could indicate the application is not the intended one when it is being installed." "objects_113_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_113_kill_chain_phases_0_phase_name_initial-access" "objects_113_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_113_kill_chain_phases_1_phase_name_defense-evasion" "objects_113_x_mitre_is_subtechnique_False" "objects_113_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_113_x_mitre_attack_spec_version_2.1.0" "objects_113_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_113_spec_version_2.1" "objects_114_x_mitre_domains_0_mobile-attack" "objects_114_id_attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431" "objects_114_type_attack-pattern" "objects_114_created_2017-10-25T14:48:19.682Z" "objects_114_revoked_True" "objects_114_external_references_0_source_name_mitre-mobile-attack" "objects_114_external_references_0_url_https://attack.mitre.org/techniques/T1457" "objects_114_external_references_0_external_id_T1457" "objects_114_modified_2022-07-07T14:00:00.188Z" "objects_114_name_Malicious Media Content" "objects_114_x_mitre_version_1.0" "objects_114_x_mitre_is_subtechnique_False" "objects_114_spec_version_2.1" "objects_114_x_mitre_attack_spec_version_2.1.0" "objects_115_modified_2023-03-16T18:28:28.234Z" "objects_115_name_Calendar Entries" "objects_115_description_Adversaries may utilize standard operating system APIs to gather calendar entry data. On Android, this can be accomplished using the Calendar Content Provider. On iOS, this can be accomplished using the `EventKit` framework. \n\n \n\nIf the device has been jailbroken or rooted, an adversary may be able to access [Calendar Entries](https://attack.mitre.org/techniques/T1636/001) without the user\u2019s knowledge or approval. " "objects_115_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_115_kill_chain_phases_0_phase_name_collection" "objects_115_x_mitre_deprecated_False" "objects_115_x_mitre_detection_On both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. Application vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. " "objects_115_x_mitre_domains_0_mobile-attack" "objects_115_x_mitre_is_subtechnique_True" "objects_115_x_mitre_platforms_0_Android" "objects_115_x_mitre_platforms_1_iOS" "objects_115_x_mitre_version_1.1" "objects_115_type_attack-pattern" "objects_115_id_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_115_created_2022-04-01T12:48:27.021Z" "objects_115_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_115_revoked_False" "objects_115_external_references_0_source_name_mitre-attack" "objects_115_external_references_0_url_https://attack.mitre.org/techniques/T1636/001" "objects_115_external_references_0_external_id_T1636.001" "objects_115_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_115_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_115_external_references_1_external_id_APP-13" "objects_115_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_115_x_mitre_attack_spec_version_3.1.0" "objects_115_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_115_spec_version_2.1" "objects_116_modified_2023-03-20T18:52:24.758Z" "objects_116_name_File Deletion" "objects_116_description_Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location.(Citation: Android DevicePolicyManager 2019) \n\nStored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact." "objects_116_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_116_kill_chain_phases_0_phase_name_defense-evasion" "objects_116_x_mitre_deprecated_False" "objects_116_x_mitre_detection_Mobile security products can detect which applications can request device administrator permissions. Users can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. Application vetting services could be extra scrutinous of applications that request device administrator permissions." "objects_116_x_mitre_domains_0_mobile-attack" "objects_116_x_mitre_is_subtechnique_True" "objects_116_x_mitre_platforms_0_Android" "objects_116_x_mitre_version_1.1" "objects_116_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_116_type_attack-pattern" "objects_116_id_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_116_created_2022-03-30T19:36:09.691Z" "objects_116_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_116_revoked_False" "objects_116_external_references_0_source_name_mitre-attack" "objects_116_external_references_0_url_https://attack.mitre.org/techniques/T1630/002" "objects_116_external_references_0_external_id_T1630.002" "objects_116_external_references_1_source_name_Android DevicePolicyManager 2019" "objects_116_external_references_1_description_Android Developers. (n.d.). DevicePolicyManager. Retrieved September 22, 2019." "objects_116_external_references_1_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html" "objects_116_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_116_x_mitre_attack_spec_version_3.1.0" "objects_116_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_116_spec_version_2.1" "objects_117_modified_2023-03-20T18:39:10.201Z" "objects_117_name_Device Lockout" "objects_117_description_An adversary may seek to inhibit user interaction by locking the legitimate user out of the device. This is typically accomplished by requesting device administrator permissions and then locking the screen using `DevicePolicyManager.lockNow()`. Other novel techniques for locking the user out of the device have been observed, such as showing a persistent overlay, using carefully crafted \u201ccall\u201d notification screens, and locking HTML pages in the foreground. These techniques can be very difficult to get around, and typically require booting the device into safe mode to uninstall the malware.(Citation: Microsoft MalLockerB)(Citation: Talos GPlayed)(Citation: securelist rotexy 2018)\n\nPrior to Android 7, device administrators were able to reset the device lock passcode to prevent the user from unlocking the device. The release of Android 7 introduced updates that only allow device or profile owners (e.g. MDMs) to reset the device\u2019s passcode.(Citation: Android resetPassword)" "objects_117_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_117_kill_chain_phases_0_phase_name_defense-evasion" "objects_117_x_mitre_deprecated_False" "objects_117_x_mitre_detection_Users can view a list of device administrators in device settings and revoke permission where appropriate. Applications that request device administrator permissions should be scrutinized further for malicious behavior." "objects_117_x_mitre_domains_0_mobile-attack" "objects_117_x_mitre_is_subtechnique_True" "objects_117_x_mitre_platforms_0_Android" "objects_117_x_mitre_version_1.1" "objects_117_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_117_type_attack-pattern" "objects_117_id_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_117_created_2022-04-01T18:49:03.892Z" "objects_117_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_117_revoked_False" "objects_117_external_references_0_source_name_mitre-attack" "objects_117_external_references_0_url_https://attack.mitre.org/techniques/T1629/002" "objects_117_external_references_0_external_id_T1629.002" "objects_117_external_references_1_source_name_Microsoft MalLockerB" "objects_117_external_references_1_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_117_external_references_1_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_117_external_references_2_source_name_Android resetPassword" "objects_117_external_references_2_description_Google. (n.d.). DevicePolicyManager. Retrieved October 1, 2019." "objects_117_external_references_2_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#resetPassword(java.lang.String,%20int)" "objects_117_external_references_3_source_name_securelist rotexy 2018" "objects_117_external_references_3_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_117_external_references_3_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_117_external_references_4_source_name_Talos GPlayed" "objects_117_external_references_4_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_117_external_references_4_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_117_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_117_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_117_external_references_5_external_id_APP-22" "objects_117_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_117_x_mitre_attack_spec_version_3.1.0" "objects_117_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_117_spec_version_2.1" "objects_118_modified_2023-03-20T18:48:39.936Z" "objects_118_name_Keylogging" "objects_118_description_Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them.\n\nSome methods of keylogging include:\n\n* Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested.\n* Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. \n*Additional methods of keylogging may be possible if root access is available. \n" "objects_118_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_118_kill_chain_phases_0_phase_name_collection" "objects_118_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_118_kill_chain_phases_1_phase_name_credential-access" "objects_118_x_mitre_deprecated_False" "objects_118_x_mitre_detection_On Android, users can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, users can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. \n\nApplication vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, users can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions." "objects_118_x_mitre_domains_0_mobile-attack" "objects_118_x_mitre_is_subtechnique_True" "objects_118_x_mitre_platforms_0_Android" "objects_118_x_mitre_platforms_1_iOS" "objects_118_x_mitre_version_1.1" "objects_118_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_118_type_attack-pattern" "objects_118_id_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_118_created_2022-04-05T19:45:03.000Z" "objects_118_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_118_revoked_False" "objects_118_external_references_0_source_name_mitre-attack" "objects_118_external_references_0_url_https://attack.mitre.org/techniques/T1417/001" "objects_118_external_references_0_external_id_T1417.001" "objects_118_external_references_1_source_name_Zeltser-Keyboard" "objects_118_external_references_1_description_Lenny Zeltser. (2016, July 30). Security of Third-Party Keyboard Apps on Mobile Devices. Retrieved December 21, 2016." "objects_118_external_references_1_url_https://zeltser.com/third-party-keyboards-security/" "objects_118_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_118_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-13.html" "objects_118_external_references_2_external_id_AUT-13" "objects_118_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_118_x_mitre_attack_spec_version_3.1.0" "objects_118_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_118_spec_version_2.1" "objects_119_modified_2023-03-20T18:58:57.001Z" "objects_119_name_SMS Control" "objects_119_description_Adversaries may delete, alter, or send SMS messages without user authorization. This could be used to hide C2 SMS messages, spread malware, or various external effects.\n\nThis can be accomplished by requesting the `RECEIVE_SMS` or `SEND_SMS` permissions depending on what the malware is attempting to do. If the app is set as the default SMS handler on the device, the `SMS_DELIVER` broadcast intent can be registered, which allows the app to write to the SMS content provider. The content provider directly modifies the messaging database on the device, which could allow malicious applications with this ability to insert, modify, or delete arbitrary messages on the device.(Citation: SMS KitKat)(Citation: Android SmsProvider)" "objects_119_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_119_kill_chain_phases_0_phase_name_impact" "objects_119_x_mitre_deprecated_False" "objects_119_x_mitre_detection_Users can view the default SMS handler in system settings." "objects_119_x_mitre_domains_0_mobile-attack" "objects_119_x_mitre_is_subtechnique_False" "objects_119_x_mitre_platforms_0_Android" "objects_119_x_mitre_version_1.1" "objects_119_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_119_type_attack-pattern" "objects_119_id_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_119_created_2020-09-11T15:14:33.730Z" "objects_119_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_119_revoked_False" "objects_119_external_references_0_source_name_mitre-attack" "objects_119_external_references_0_url_https://attack.mitre.org/techniques/T1582" "objects_119_external_references_0_external_id_T1582" "objects_119_external_references_1_source_name_Android SmsProvider" "objects_119_external_references_1_description_Google. (n.d.). SmsProvider.java. Retrieved September 11, 2020." "objects_119_external_references_1_url_https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/7e7c274/src/com/android/providers/telephony/SmsProvider.java" "objects_119_external_references_2_source_name_SMS KitKat" "objects_119_external_references_2_description_S.Main, D. Braun. (2013, October 14). Getting Your SMS Apps Ready for KitKat. Retrieved September 11, 2020." "objects_119_external_references_2_url_https://android-developers.googleblog.com/2013/10/getting-your-sms-apps-ready-for-kitkat.html" "objects_119_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_119_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-16.html" "objects_119_external_references_3_external_id_APP-16" "objects_119_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_119_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-41.html" "objects_119_external_references_4_external_id_CEL-41" "objects_119_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_119_x_mitre_attack_spec_version_3.1.0" "objects_119_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_119_spec_version_2.1" "objects_120_x_mitre_platforms_0_Android" "objects_120_x_mitre_platforms_1_iOS" "objects_120_x_mitre_domains_0_mobile-attack" "objects_120_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_120_type_attack-pattern" "objects_120_id_attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6" "objects_120_created_2017-10-25T14:48:14.003Z" "objects_120_x_mitre_version_1.1" "objects_120_external_references_0_source_name_mitre-attack" "objects_120_external_references_0_external_id_T1408" "objects_120_external_references_0_url_https://attack.mitre.org/techniques/T1408" "objects_120_external_references_1_source_name_Brodie" "objects_120_external_references_1_url_https://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-wp.pdf" "objects_120_external_references_1_description_Daniel Brodie. (2016). Practical Attacks against Mobile Device Management (MDM). Retrieved December 21, 2016." "objects_120_external_references_2_source_name_Rastogi" "objects_120_external_references_2_url_http://pages.cs.wisc.edu/~vrastogi/static/papers/rcj13b.pdf" "objects_120_external_references_2_description_Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. (2013, May). DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks. Retrieved December 9, 2016." "objects_120_external_references_3_source_name_Tan" "objects_120_external_references_3_url_http://www.blackhat.com/us-16/briefings.html#bad-for-enterprise-attacking-byod-enterprise-mobile-security-solutions" "objects_120_external_references_3_description_Vincent Tan. (2016, August). BAD FOR ENTERPRISE: ATTACKING BYOD ENTERPRISE MOBILE SECURITY SOLUTIONS. Retrieved February 4, 2017." "objects_120_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-5.html" "objects_120_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_120_external_references_4_external_id_EMM-5" "objects_120_x_mitre_deprecated_False" "objects_120_revoked_True" "objects_120_description_An adversary could use knowledge of the techniques used by security software to evade detection(Citation: Brodie)(Citation: Tan). For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed \"su\" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection(Citation: Rastogi)." "objects_120_modified_2022-04-08T16:29:55.321Z" "objects_120_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_120_name_Disguise Root/Jailbreak Indicators" "objects_120_x_mitre_detection_" "objects_120_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_120_kill_chain_phases_0_phase_name_defense-evasion" "objects_120_x_mitre_is_subtechnique_False" "objects_120_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_120_x_mitre_attack_spec_version_2.1.0" "objects_120_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_120_spec_version_2.1" "objects_121_x_mitre_platforms_0_Android" "objects_121_x_mitre_platforms_1_iOS" "objects_121_x_mitre_domains_0_mobile-attack" "objects_121_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_121_type_attack-pattern" "objects_121_id_attack-pattern--b3c2e5de-0941-4b57-ba61-af029eb5517a" "objects_121_created_2017-10-25T14:48:27.307Z" "objects_121_x_mitre_version_2.0" "objects_121_external_references_0_source_name_mitre-attack" "objects_121_external_references_0_external_id_T1438" "objects_121_external_references_0_url_https://attack.mitre.org/techniques/T1438" "objects_121_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-30.html" "objects_121_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_121_external_references_1_external_id_APP-30" "objects_121_x_mitre_deprecated_False" "objects_121_revoked_True" "objects_121_description_Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a standard Internet connection, the exfiltration may occur, for example, via Bluetooth, or another radio frequency (RF) channel. \n\nAdversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network. " "objects_121_modified_2022-04-18T19:46:02.529Z" "objects_121_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_121_name_Exfiltration Over Other Network Medium" "objects_121_x_mitre_detection_Exfiltration over other network mediums can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_121_kill_chain_phases_0_phase_name_command-and-control" "objects_121_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_121_x_mitre_is_subtechnique_False" "objects_121_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_121_x_mitre_attack_spec_version_2.1.0" "objects_121_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_121_spec_version_2.1" "objects_122_x_mitre_domains_0_mobile-attack" "objects_122_id_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_122_type_attack-pattern" "objects_122_created_2017-10-25T14:48:26.473Z" "objects_122_revoked_True" "objects_122_external_references_0_source_name_mitre-mobile-attack" "objects_122_external_references_0_url_https://attack.mitre.org/techniques/T1440" "objects_122_external_references_0_external_id_T1440" "objects_122_modified_2022-07-07T14:00:00.188Z" "objects_122_name_Detect App Analysis Environment" "objects_122_x_mitre_version_1.0" "objects_122_x_mitre_is_subtechnique_False" "objects_122_spec_version_2.1" "objects_122_x_mitre_attack_spec_version_2.1.0" "objects_123_modified_2023-03-20T18:55:54.442Z" "objects_123_name_Process Injection" "objects_123_description_Adversaries may inject code into processes in order to evade process-based defenses or even elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. \n\nBoth Android and iOS have no legitimate way to achieve process injection. The only way this is possible is by abusing existing root access or exploiting a vulnerability." "objects_123_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_123_kill_chain_phases_0_phase_name_defense-evasion" "objects_123_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_123_kill_chain_phases_1_phase_name_privilege-escalation" "objects_123_x_mitre_deprecated_False" "objects_123_x_mitre_detection_Application vetting services could look for misuse of dynamic libraries." "objects_123_x_mitre_domains_0_mobile-attack" "objects_123_x_mitre_is_subtechnique_False" "objects_123_x_mitre_platforms_0_Android" "objects_123_x_mitre_platforms_1_iOS" "objects_123_x_mitre_version_1.1" "objects_123_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_123_type_attack-pattern" "objects_123_id_attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff" "objects_123_created_2022-03-30T18:50:43.393Z" "objects_123_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_123_revoked_False" "objects_123_external_references_0_source_name_mitre-attack" "objects_123_external_references_0_url_https://attack.mitre.org/techniques/T1631" "objects_123_external_references_0_external_id_T1631" "objects_123_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_123_x_mitre_attack_spec_version_3.1.0" "objects_123_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_123_spec_version_2.1" "objects_124_x_mitre_domains_0_mobile-attack" "objects_124_id_attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc" "objects_124_type_attack-pattern" "objects_124_created_2017-10-25T14:48:24.905Z" "objects_124_revoked_True" "objects_124_external_references_0_source_name_mitre-mobile-attack" "objects_124_external_references_0_url_https://attack.mitre.org/techniques/T1462" "objects_124_external_references_0_external_id_T1462" "objects_124_modified_2022-07-07T14:00:00.188Z" "objects_124_name_Malicious Software Development Tools" "objects_124_x_mitre_version_1.0" "objects_124_x_mitre_is_subtechnique_False" "objects_124_spec_version_2.1" "objects_124_x_mitre_attack_spec_version_2.1.0" "objects_125_x_mitre_platforms_0_Android" "objects_125_x_mitre_platforms_1_iOS" "objects_125_x_mitre_domains_0_mobile-attack" "objects_125_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_125_type_attack-pattern" "objects_125_id_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_125_created_2022-04-05T20:14:17.310Z" "objects_125_x_mitre_version_1.0" "objects_125_external_references_0_source_name_mitre-attack" "objects_125_external_references_0_external_id_T1521.001" "objects_125_external_references_0_url_https://attack.mitre.org/techniques/T1521/001" "objects_125_x_mitre_deprecated_False" "objects_125_revoked_False" "objects_125_description_Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encryption and ciphertext decryption. Common symmetric encryption algorithms include AES, Blowfish, and RC4." "objects_125_modified_2022-04-05T20:14:17.310Z" "objects_125_name_Symmetric Cryptography" "objects_125_x_mitre_detection_Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user." "objects_125_kill_chain_phases_0_phase_name_command-and-control" "objects_125_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_125_x_mitre_is_subtechnique_True" "objects_125_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_125_x_mitre_attack_spec_version_2.1.0" "objects_125_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_125_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_125_spec_version_2.1" "objects_126_x_mitre_platforms_0_Android" "objects_126_x_mitre_domains_0_mobile-attack" "objects_126_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_126_type_attack-pattern" "objects_126_id_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_126_created_2017-10-25T14:48:30.127Z" "objects_126_x_mitre_version_2.0" "objects_126_external_references_0_source_name_mitre-attack" "objects_126_external_references_0_external_id_T1402" "objects_126_external_references_0_url_https://attack.mitre.org/techniques/T1402" "objects_126_external_references_1_source_name_Android Changes to System Broadcasts" "objects_126_external_references_1_url_https://developer.android.com/guide/components/broadcasts#changes-system-broadcasts" "objects_126_external_references_1_description_Google. (2019, December 27). Broadcasts Overview. Retrieved January 27, 2020." "objects_126_x_mitre_deprecated_False" "objects_126_revoked_True" "objects_126_description_An intent is a message passed between Android application or system components. Applications can register to receive broadcast intents at runtime, which are system-wide intents delivered to each app when certain events happen on the device, such as network changes or the user unlocking the screen. Malicious applications can then trigger certain actions within the app based on which broadcast intent was received.\n\nFurther, malicious applications can register for intents broadcasted by other applications in addition to the Android system itself. This allows the malware to respond based on actions in other applications. This behavior typically indicates a more intimate knowledge, or potentially the targeting of specific devices, users, or applications.\n\nIn Android 8 (API level 26), broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest. In most cases, applications that register through the manifest will no longer receive the broadcasts. Now, applications must register context-specific broadcast receivers while the user is actively using the app.(Citation: Android Changes to System Broadcasts)" "objects_126_modified_2022-03-30T14:43:46.019Z" "objects_126_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_126_name_Broadcast Receivers" "objects_126_x_mitre_detection_Broadcast intent receivers are part of standard OS-level APIs and are therefore typically undetectable to the end user." "objects_126_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_126_kill_chain_phases_0_phase_name_persistence" "objects_126_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_126_kill_chain_phases_1_phase_name_execution" "objects_126_x_mitre_is_subtechnique_False" "objects_126_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_126_x_mitre_attack_spec_version_2.1.0" "objects_126_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_126_spec_version_2.1" "objects_127_modified_2023-03-20T15:21:12.603Z" "objects_127_name_Compromise Hardware Supply Chain" "objects_127_description_Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. " "objects_127_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_127_kill_chain_phases_0_phase_name_initial-access" "objects_127_x_mitre_deprecated_False" "objects_127_x_mitre_detection_Integrity checking mechanisms can potentially detect unauthorized hardware modifications." "objects_127_x_mitre_domains_0_mobile-attack" "objects_127_x_mitre_is_subtechnique_True" "objects_127_x_mitre_platforms_0_Android" "objects_127_x_mitre_platforms_1_iOS" "objects_127_x_mitre_version_1.1" "objects_127_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_127_type_attack-pattern" "objects_127_id_attack-pattern--c08366bb-8d11-4921-853f-f0a3b6a2a1da" "objects_127_created_2022-03-28T19:30:15.556Z" "objects_127_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_127_revoked_False" "objects_127_external_references_0_source_name_mitre-attack" "objects_127_external_references_0_url_https://attack.mitre.org/techniques/T1474/002" "objects_127_external_references_0_external_id_T1474.002" "objects_127_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-1.html" "objects_127_external_references_1_external_id_SPC-1" "objects_127_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html" "objects_127_external_references_2_external_id_SPC-2" "objects_127_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-4.html" "objects_127_external_references_3_external_id_SPC-4" "objects_127_external_references_4_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_4_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html" "objects_127_external_references_4_external_id_SPC-5" "objects_127_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html" "objects_127_external_references_5_external_id_SPC-6" "objects_127_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html" "objects_127_external_references_6_external_id_SPC-7" "objects_127_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-8.html" "objects_127_external_references_7_external_id_SPC-8" "objects_127_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-13.html" "objects_127_external_references_8_external_id_SPC-13" "objects_127_external_references_9_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_9_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html" "objects_127_external_references_9_external_id_SPC-16" "objects_127_external_references_10_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_10_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html" "objects_127_external_references_10_external_id_SPC-17" "objects_127_external_references_11_source_name_NIST Mobile Threat Catalogue" "objects_127_external_references_11_url_https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-21.html" "objects_127_external_references_11_external_id_SPC-21" "objects_127_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_127_x_mitre_attack_spec_version_3.1.0" "objects_127_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_127_spec_version_2.1" "objects_128_modified_2023-03-16T18:33:20.042Z" "objects_128_name_Clipboard Data" "objects_128_description_Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl-Clipboard) \n\n \n\nOn Android, applications can use the `ClipboardManager.OnPrimaryClipChangedListener()` API to register as a listener and monitor the clipboard for changes. However, starting in Android 10, this can only be used if the application is in the foreground, or is set as the device\u2019s default input method editor (IME).(Citation: Github Capture Clipboard 2019)(Citation: Android 10 Privacy Changes) \n\n \n\nOn iOS, this can be accomplished by accessing the `UIPasteboard.general.string` field. However, starting in iOS 14, upon accessing the clipboard, the user will be shown a system notification if the accessed text originated in a different application. For example, if the user copies the text of an iMessage from the Messages application, the notification will read \u201capplication_name has pasted from Messages\u201d when the text was pasted in a different application.(Citation: UIPPasteboard)" "objects_128_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_128_kill_chain_phases_0_phase_name_collection" "objects_128_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_128_kill_chain_phases_1_phase_name_credential-access" "objects_128_x_mitre_deprecated_False" "objects_128_x_mitre_detection_Application vetting services could detect usage of standard clipboard APIs." "objects_128_x_mitre_domains_0_mobile-attack" "objects_128_x_mitre_is_subtechnique_False" "objects_128_x_mitre_platforms_0_Android" "objects_128_x_mitre_platforms_1_iOS" "objects_128_x_mitre_version_3.1" "objects_128_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_128_type_attack-pattern" "objects_128_id_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_128_created_2017-10-25T14:48:19.996Z" "objects_128_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_128_revoked_False" "objects_128_external_references_0_source_name_mitre-attack" "objects_128_external_references_0_url_https://attack.mitre.org/techniques/T1414" "objects_128_external_references_0_external_id_T1414" "objects_128_external_references_1_source_name_Android 10 Privacy Changes" "objects_128_external_references_1_description_Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019." "objects_128_external_references_1_url_https://developer.android.com/about/versions/10/privacy/changes#clipboard-data" "objects_128_external_references_2_source_name_UIPPasteboard" "objects_128_external_references_2_description_Apple Developer. (n.d.). UIPasteboard. Retrieved April 1, 2022." "objects_128_external_references_2_url_https://developer.apple.com/documentation/uikit/uipasteboard" "objects_128_external_references_3_source_name_Fahl-Clipboard" "objects_128_external_references_3_description_Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved August 27, 2019." "objects_128_external_references_3_url_http://saschafahl.de/static/paper/pwmanagers2013.pdf" "objects_128_external_references_4_source_name_Github Capture Clipboard 2019" "objects_128_external_references_4_description_Pearce, G. (, January). Retrieved August 8, 2019." "objects_128_external_references_4_url_https://github.com/grepx/android-clipboard-security" "objects_128_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_128_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-35.html" "objects_128_external_references_5_external_id_APP-35" "objects_128_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_128_x_mitre_attack_spec_version_3.1.0" "objects_128_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_128_spec_version_2.1" "objects_129_x_mitre_platforms_0_Android" "objects_129_x_mitre_platforms_1_iOS" "objects_129_x_mitre_domains_0_mobile-attack" "objects_129_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_129_type_attack-pattern" "objects_129_id_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_129_created_2017-10-25T14:48:30.890Z" "objects_129_x_mitre_version_1.2" "objects_129_external_references_0_source_name_mitre-attack" "objects_129_external_references_0_external_id_T1400" "objects_129_external_references_0_url_https://attack.mitre.org/techniques/T1400" "objects_129_external_references_1_source_name_Android-VerifiedBoot" "objects_129_external_references_1_url_https://source.android.com/security/verifiedboot/" "objects_129_external_references_1_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_129_external_references_2_source_name_Apple-iOSSecurityGuide" "objects_129_external_references_2_url_https://www.apple.com/business/docs/iOS_Security_Guide.pdf" "objects_129_external_references_2_description_Apple. (2016, May). iOS Security. Retrieved December 21, 2016." "objects_129_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_129_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_129_external_references_3_external_id_APP-27" "objects_129_x_mitre_deprecated_False" "objects_129_revoked_True" "objects_129_description_If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device system partition, where it may persist after device resets and may not be easily removed by the device user.\n\nMany Android devices provide the ability to unlock the bootloader for development purposes. An unlocked bootloader may provide the ability for an adversary to modify the system partition. Even if the bootloader is locked, it may be possible for an adversary to escalate privileges and then modify the system partition." "objects_129_modified_2022-03-30T15:18:21.242Z" "objects_129_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_129_name_Modify System Partition" "objects_129_x_mitre_detection_Android devices with the Verified Boot capability (Citation: Android-VerifiedBoot) perform cryptographic checks of the integrity of the system partition.\n\nThe Android SafetyNet API's remote attestation capability could potentially be used to identify and respond to compromised devices.\n\nSamsung KNOX also provides a remote attestation capability on supported Samsung Android devices.\n\niOS devices will fail to boot or fail to allow device activation if unauthorized modifications are detected.(Citation: Apple-iOSSecurityGuide)" "objects_129_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_129_kill_chain_phases_0_phase_name_defense-evasion" "objects_129_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_129_kill_chain_phases_1_phase_name_persistence" "objects_129_kill_chain_phases_2_kill_chain_name_mitre-mobile-attack" "objects_129_kill_chain_phases_2_phase_name_impact" "objects_129_x_mitre_is_subtechnique_False" "objects_129_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_129_x_mitre_attack_spec_version_2.1.0" "objects_129_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_129_spec_version_2.1" "objects_130_modified_2023-03-20T15:55:32.497Z" "objects_130_name_Data Manipulation" "objects_130_description_Adversaries may insert, delete, or alter data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.\n\nThe type of modification and the impact it will have depends on the target application, process, and the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact." "objects_130_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_130_kill_chain_phases_0_phase_name_impact" "objects_130_x_mitre_deprecated_False" "objects_130_x_mitre_detection_Application vetting services could look for use of standard APIs (e.g. the clipboard API) that could indicate data manipulation is occurring." "objects_130_x_mitre_domains_0_mobile-attack" "objects_130_x_mitre_is_subtechnique_False" "objects_130_x_mitre_platforms_0_Android" "objects_130_x_mitre_version_1.1" "objects_130_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_130_type_attack-pattern" "objects_130_id_attack-pattern--c548d8c4-a0a3-4a24-bb79-2a84abbc7b36" "objects_130_created_2022-04-06T13:34:46.021Z" "objects_130_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_130_revoked_False" "objects_130_external_references_0_source_name_mitre-attack" "objects_130_external_references_0_url_https://attack.mitre.org/techniques/T1641" "objects_130_external_references_0_external_id_T1641" "objects_130_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_130_x_mitre_attack_spec_version_3.1.0" "objects_130_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_130_spec_version_2.1" "objects_131_modified_2023-03-20T18:58:33.873Z" "objects_131_name_SMS Messages" "objects_131_description_Adversaries may utilize standard operating system APIs to gather SMS messages. On Android, this can be accomplished using the SMS Content Provider. iOS provides no standard API to access SMS messages. \n\nIf the device has been jailbroken or rooted, an adversary may be able to access [SMS Messages](https://attack.mitre.org/techniques/T1636/004) without the user\u2019s knowledge or approval. " "objects_131_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_131_kill_chain_phases_0_phase_name_collection" "objects_131_x_mitre_deprecated_False" "objects_131_x_mitre_detection_On Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary. Application vetting services could look for `android.permission.READ_SMS` in an Android application\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. " "objects_131_x_mitre_domains_0_mobile-attack" "objects_131_x_mitre_is_subtechnique_True" "objects_131_x_mitre_platforms_0_Android" "objects_131_x_mitre_platforms_1_iOS" "objects_131_x_mitre_version_1.1" "objects_131_type_attack-pattern" "objects_131_id_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_131_created_2022-04-01T13:25:30.923Z" "objects_131_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_131_revoked_False" "objects_131_external_references_0_source_name_mitre-attack" "objects_131_external_references_0_url_https://attack.mitre.org/techniques/T1636/004" "objects_131_external_references_0_external_id_T1636.004" "objects_131_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_131_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_131_external_references_1_external_id_APP-13" "objects_131_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_131_x_mitre_attack_spec_version_3.1.0" "objects_131_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_131_spec_version_2.1" "objects_132_modified_2023-08-14T16:31:37.317Z" "objects_132_name_Web Service" "objects_132_description_Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. \n\n \n\nUse of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed). \n\n " "objects_132_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_132_kill_chain_phases_0_phase_name_command-and-control" "objects_132_x_mitre_deprecated_False" "objects_132_x_mitre_detection_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_132_x_mitre_domains_0_mobile-attack" "objects_132_x_mitre_is_subtechnique_False" "objects_132_x_mitre_platforms_0_Android" "objects_132_x_mitre_platforms_1_iOS" "objects_132_x_mitre_version_1.3" "objects_132_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_132_type_attack-pattern" "objects_132_id_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_132_created_2019-02-01T17:29:43.503Z" "objects_132_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_132_revoked_False" "objects_132_external_references_0_source_name_mitre-attack" "objects_132_external_references_0_url_https://attack.mitre.org/techniques/T1481" "objects_132_external_references_0_external_id_T1481" "objects_132_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_132_x_mitre_attack_spec_version_3.1.0" "objects_132_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_132_spec_version_2.1" "objects_133_modified_2023-09-08T19:20:51.220Z" "objects_133_name_System Runtime API Hijacking" "objects_133_description_Adversaries may execute their own malicious payloads by hijacking the way an operating system runs applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur at later points in time. \n\n\nOn Android, adversaries may overwrite the standard OS API library with a malicious alternative to hook into core functions to achieve persistence. By doing this, the adversary\u2019s code will be executed every time the overwritten API function is called by an app on the infected device." "objects_133_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_133_kill_chain_phases_0_phase_name_persistence" "objects_133_x_mitre_deprecated_False" "objects_133_x_mitre_detection_Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. " "objects_133_x_mitre_domains_0_mobile-attack" "objects_133_x_mitre_is_subtechnique_True" "objects_133_x_mitre_platforms_0_Android" "objects_133_x_mitre_version_1.1" "objects_133_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_133_type_attack-pattern" "objects_133_id_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_133_created_2022-03-30T15:07:51.646Z" "objects_133_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_133_revoked_False" "objects_133_external_references_0_source_name_mitre-attack" "objects_133_external_references_0_url_https://attack.mitre.org/techniques/T1625/001" "objects_133_external_references_0_external_id_T1625.001" "objects_133_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_133_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_133_external_references_1_external_id_APP-27" "objects_133_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_133_x_mitre_attack_spec_version_3.1.0" "objects_133_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_133_spec_version_2.1" "objects_134_x_mitre_domains_0_mobile-attack" "objects_134_id_attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f" "objects_134_type_attack-pattern" "objects_134_created_2017-10-25T14:48:07.149Z" "objects_134_revoked_True" "objects_134_external_references_0_source_name_mitre-mobile-attack" "objects_134_external_references_0_url_https://attack.mitre.org/techniques/T1455" "objects_134_external_references_0_external_id_T1455" "objects_134_modified_2022-07-07T14:00:00.188Z" "objects_134_name_Exploit Baseband Vulnerability" "objects_134_x_mitre_version_1.0" "objects_134_x_mitre_is_subtechnique_False" "objects_134_spec_version_2.1" "objects_134_x_mitre_attack_spec_version_2.1.0" "objects_135_modified_2023-09-08T19:19:37.927Z" "objects_135_name_Credentials from Password Store" "objects_135_description_Adversaries may search common password storage locations to obtain user credentials. Passwords can be stored in several places on a device, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users to manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information." "objects_135_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_135_kill_chain_phases_0_phase_name_credential-access" "objects_135_x_mitre_deprecated_False" "objects_135_x_mitre_detection_Mobile security products can potentially detect jailbroken devices. Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations." "objects_135_x_mitre_domains_0_mobile-attack" "objects_135_x_mitre_is_subtechnique_False" "objects_135_x_mitre_platforms_0_iOS" "objects_135_x_mitre_version_1.1" "objects_135_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_135_type_attack-pattern" "objects_135_id_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_135_created_2022-04-01T14:55:10.494Z" "objects_135_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_135_revoked_False" "objects_135_external_references_0_source_name_mitre-attack" "objects_135_external_references_0_url_https://attack.mitre.org/techniques/T1634" "objects_135_external_references_0_external_id_T1634" "objects_135_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_135_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-11.html" "objects_135_external_references_1_external_id_AUT-11" "objects_135_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_135_x_mitre_attack_spec_version_3.1.0" "objects_135_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_135_spec_version_2.1" "objects_136_modified_2022-10-24T15:09:07.609Z" "objects_136_name_Hooking" "objects_136_description_Adversaries may utilize hooking to hide the presence of artifacts associated with their behaviors to evade detection. Hooking can be used to modify return values or data structures of system APIs and function calls. This process typically involves using 3rd party root frameworks, such as Xposed or Magisk, with either a system exploit or pre-existing root access. By including custom modules for root frameworks, adversaries can hook system APIs and alter the return value and/or system data structures to alter functionality/visibility of various aspects of the system." "objects_136_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_136_kill_chain_phases_0_phase_name_defense-evasion" "objects_136_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_136_x_mitre_detection_Hooking can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_136_x_mitre_platforms_0_Android" "objects_136_x_mitre_domains_0_mobile-attack" "objects_136_x_mitre_version_1.0" "objects_136_x_mitre_contributors_0_J\u00f6rg Abraham, EclecticIQ" "objects_136_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_136_type_attack-pattern" "objects_136_id_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_136_created_2021-09-24T14:47:34.182Z" "objects_136_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_136_external_references_0_source_name_mitre-attack" "objects_136_external_references_0_url_https://attack.mitre.org/techniques/T1617" "objects_136_external_references_0_external_id_T1617" "objects_136_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_136_x_mitre_attack_spec_version_2.1.0" "objects_136_x_mitre_is_subtechnique_False" "objects_136_spec_version_2.1" "objects_137_x_mitre_platforms_0_Android" "objects_137_x_mitre_platforms_1_iOS" "objects_137_x_mitre_domains_0_mobile-attack" "objects_137_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_137_type_attack-pattern" "objects_137_id_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_137_created_2018-10-17T00:14:20.652Z" "objects_137_x_mitre_version_1.0" "objects_137_external_references_0_source_name_mitre-attack" "objects_137_external_references_0_external_id_T1478" "objects_137_external_references_0_url_https://attack.mitre.org/techniques/T1478" "objects_137_external_references_1_source_name_Talos-MDM" "objects_137_external_references_1_url_https://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html" "objects_137_external_references_1_description_Warren Mercer, Paul Rascagneres, Andrew Williams. (2018, July 12). Advanced Mobile Malware Campaign in India uses Malicious MDM. Retrieved September 24, 2018." "objects_137_external_references_2_source_name_Symantec-iOSProfile" "objects_137_external_references_2_url_https://www.symantec.com/connect/blogs/malicious-profiles-sleeping-giant-ios-security" "objects_137_external_references_2_description_Yair Amit. (2013, March 12). Malicious Profiles \u2013 The Sleeping Giant of iOS Security. Retrieved September 24, 2018." "objects_137_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.html" "objects_137_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_137_external_references_3_external_id_STA-7" "objects_137_x_mitre_deprecated_False" "objects_137_revoked_True" "objects_137_description_An adversary could attempt to install insecure or malicious configuration settings on the mobile device, through means such as phishing emails or text messages either directly containing the configuration settings as an attachment, or containing a web link to the configuration settings. The device user may be tricked into installing the configuration settings through social engineering techniques (Citation: Symantec-iOSProfile).\n\nFor example, an unwanted Certification Authority (CA) certificate could be placed in the device's trusted certificate store, increasing the device's susceptibility to adversary-in-the-middle network attacks seeking to eavesdrop on or manipulate the device's network communication ([Eavesdrop on Insecure Network Communication](https://attack.mitre.org/techniques/T1439) and [Manipulate Device Communication](https://attack.mitre.org/techniques/T1463)).\n\nOn iOS, malicious Configuration Profiles could contain unwanted Certification Authority (CA) certificates or other insecure settings such as unwanted proxy server or VPN settings to route the device's network traffic through an adversary's system. The device could also potentially be enrolled into a malicious Mobile Device Management (MDM) system (Citation: Talos-MDM)." "objects_137_modified_2022-03-30T18:18:15.903Z" "objects_137_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_137_name_Install Insecure or Malicious Configuration" "objects_137_x_mitre_detection_On Android, the user can view trusted CA certificates through the device settings and look for unexpected certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies.\n\nOn iOS, the user can view installed Configuration Profiles through the device settings and look for unexpected profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies." "objects_137_kill_chain_phases_0_phase_name_defense-evasion" "objects_137_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_137_kill_chain_phases_1_phase_name_initial-access" "objects_137_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_137_x_mitre_is_subtechnique_False" "objects_137_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_137_x_mitre_attack_spec_version_2.1.0" "objects_137_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_137_spec_version_2.1" "objects_138_modified_2023-03-20T18:53:35.087Z" "objects_138_name_File and Directory Discovery" "objects_138_description_Adversaries may enumerate files and directories or search in specific device locations for desired information within a filesystem. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1420) during automated discovery to shape follow-on behaviors, including deciding if the adversary should fully infect the target and/or attempt specific actions. \n\nOn Android, Linux file permissions and SELinux policies typically stringently restrict what can be accessed by apps without taking advantage of a privilege escalation exploit. The contents of the external storage directory are generally visible, which could present concerns if sensitive data is inappropriately stored there. iOS's security architecture generally restricts the ability to perform any type of [File and Directory Discovery](https://attack.mitre.org/techniques/T1420) without use of escalated privileges. " "objects_138_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_138_kill_chain_phases_0_phase_name_discovery" "objects_138_x_mitre_deprecated_False" "objects_138_x_mitre_detection_On Android, users are presented with a permissions popup when an application requests access to external device storage." "objects_138_x_mitre_domains_0_mobile-attack" "objects_138_x_mitre_is_subtechnique_False" "objects_138_x_mitre_platforms_0_Android" "objects_138_x_mitre_platforms_1_iOS" "objects_138_x_mitre_version_1.2" "objects_138_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_138_type_attack-pattern" "objects_138_id_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_138_created_2017-10-25T14:48:21.965Z" "objects_138_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_138_revoked_False" "objects_138_external_references_0_source_name_mitre-attack" "objects_138_external_references_0_url_https://attack.mitre.org/techniques/T1420" "objects_138_external_references_0_external_id_T1420" "objects_138_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_138_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-41.html" "objects_138_external_references_1_external_id_STA-41" "objects_138_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_138_x_mitre_attack_spec_version_3.1.0" "objects_138_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_138_spec_version_2.1" "objects_139_modified_2023-08-09T14:38:34.859Z" "objects_139_name_Obfuscated Files or Information" "objects_139_description_Adversaries may attempt to make a payload or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the device or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \n \nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Portions of files can also be encoded to hide the plaintext strings that would otherwise help defenders with discovery. Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Microsoft MalLockerB) " "objects_139_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_139_kill_chain_phases_0_phase_name_defense-evasion" "objects_139_x_mitre_deprecated_False" "objects_139_x_mitre_detection_Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code." "objects_139_x_mitre_domains_0_mobile-attack" "objects_139_x_mitre_is_subtechnique_False" "objects_139_x_mitre_platforms_0_Android" "objects_139_x_mitre_platforms_1_iOS" "objects_139_x_mitre_version_3.1" "objects_139_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_139_type_attack-pattern" "objects_139_id_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_139_created_2017-10-25T14:48:32.328Z" "objects_139_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_139_revoked_False" "objects_139_external_references_0_source_name_mitre-attack" "objects_139_external_references_0_url_https://attack.mitre.org/techniques/T1406" "objects_139_external_references_0_external_id_T1406" "objects_139_external_references_1_source_name_Microsoft MalLockerB" "objects_139_external_references_1_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_139_external_references_1_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_139_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_139_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html" "objects_139_external_references_2_external_id_APP-21" "objects_139_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_139_x_mitre_attack_spec_version_3.1.0" "objects_139_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_139_spec_version_2.1" "objects_140_modified_2023-08-08T22:50:32.775Z" "objects_140_name_Input Injection" "objects_140_description_A malicious application can inject input to the user interface to mimic user interaction through the abuse of Android's accessibility APIs.\n\n[Input Injection](https://attack.mitre.org/techniques/T1516) can be achieved using any of the following methods:\n\n* Mimicking user clicks on the screen, for example to steal money from a user's PayPal account.(Citation: android-trojan-steals-paypal-2fa)\n* Injecting global actions, such as `GLOBAL_ACTION_BACK` (programatically mimicking a physical back button press), to trigger actions on behalf of the user.(Citation: Talos Gustuff Apr 2019)\n* Inserting input into text fields on behalf of the user. This method is used legitimately to auto-fill text fields by applications such as password managers.(Citation: bitwarden autofill logins)" "objects_140_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_140_kill_chain_phases_0_phase_name_defense-evasion" "objects_140_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_140_kill_chain_phases_1_phase_name_impact" "objects_140_x_mitre_contributors_0_Luk\u00e1\u0161 \u0160tefanko, ESET" "objects_140_x_mitre_deprecated_False" "objects_140_x_mitre_detection_Users can view applications that have registered accessibility services in the accessibility menu within the device settings." "objects_140_x_mitre_domains_0_mobile-attack" "objects_140_x_mitre_is_subtechnique_False" "objects_140_x_mitre_platforms_0_Android" "objects_140_x_mitre_version_1.2" "objects_140_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_140_type_attack-pattern" "objects_140_id_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_140_created_2019-09-15T15:26:22.356Z" "objects_140_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_140_revoked_False" "objects_140_external_references_0_source_name_mitre-attack" "objects_140_external_references_0_url_https://attack.mitre.org/techniques/T1516" "objects_140_external_references_0_external_id_T1516" "objects_140_external_references_1_source_name_bitwarden autofill logins" "objects_140_external_references_1_description_Bitwarden. (n.d.). Auto-fill logins on Android . Retrieved September 15, 2019." "objects_140_external_references_1_url_https://help.bitwarden.com/article/auto-fill-android/" "objects_140_external_references_2_source_name_android-trojan-steals-paypal-2fa" "objects_140_external_references_2_description_Luk\u00e1\u0161 \u0160tefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019." "objects_140_external_references_2_url_https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/" "objects_140_external_references_3_source_name_Talos Gustuff Apr 2019" "objects_140_external_references_3_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_140_external_references_3_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_140_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_140_x_mitre_attack_spec_version_3.1.0" "objects_140_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_140_spec_version_2.1" "objects_141_modified_2023-03-20T18:51:23.109Z" "objects_141_name_Network Denial of Service" "objects_141_description_Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth that services rely on, or by jamming the signal going to or coming from devices. \n\nA Network DoS will occur when an adversary is able to jam radio signals (e.g. Wi-Fi, cellular, GPS) around a device to prevent it from communicating. For example, to jam cellular signal, an adversary may use a handheld signal jammer, which jam devices within the jammer\u2019s operational range.(Citation: NIST-SP800187) \n\nUsage of cellular jamming has been documented in several arrests reported in the news.(Citation: CNET-Celljammer)(Citation: NYTimes-Celljam)(Citation: Digitaltrends-Celljam)(Citation: Arstechnica-Celljam)" "objects_141_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_141_kill_chain_phases_0_phase_name_impact" "objects_141_x_mitre_deprecated_False" "objects_141_x_mitre_detection_Unexpected loss of radio signal could indicate that a device is being actively jammed." "objects_141_x_mitre_domains_0_mobile-attack" "objects_141_x_mitre_is_subtechnique_False" "objects_141_x_mitre_platforms_0_Android" "objects_141_x_mitre_platforms_1_iOS" "objects_141_x_mitre_version_1.3" "objects_141_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_141_type_attack-pattern" "objects_141_id_attack-pattern--d2e112dc-f6d4-488d-b8df-ecbfb57a0a2d" "objects_141_created_2017-10-25T14:48:25.740Z" "objects_141_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_141_revoked_False" "objects_141_external_references_0_source_name_mitre-attack" "objects_141_external_references_0_url_https://attack.mitre.org/techniques/T1464" "objects_141_external_references_0_external_id_T1464" "objects_141_external_references_1_source_name_CNET-Celljammer" "objects_141_external_references_1_description_Chris Matyszczyk. (2014, May 1). FCC: Man used device to jam drivers' cell phone calls. Retrieved November 8, 2018." "objects_141_external_references_1_url_https://www.cnet.com/news/man-put-cell-phone-jammer-in-car-to-stop-driver-calls-fcc-says/" "objects_141_external_references_2_source_name_Arstechnica-Celljam" "objects_141_external_references_2_description_David Kravets. (2016, March 10). Man accused of jamming passengers\u2019 cell phones on Chicago subway. Retrieved November 8, 2018." "objects_141_external_references_2_url_https://arstechnica.com/tech-policy/2016/03/man-accused-of-jamming-passengers-cell-phones-on-chicago-subway/" "objects_141_external_references_3_source_name_NIST-SP800187" "objects_141_external_references_3_description_Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017." "objects_141_external_references_3_url_http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf" "objects_141_external_references_4_source_name_NYTimes-Celljam" "objects_141_external_references_4_description_Matt Richtel. (2007, November 4). Devices Enforce Silence of Cellphones, Illegally. Retrieved November 8, 2018." "objects_141_external_references_4_url_https://www.nytimes.com/2007/11/04/technology/04jammer.html" "objects_141_external_references_5_source_name_Digitaltrends-Celljam" "objects_141_external_references_5_description_Trevor Mogg. (2015, June 5). Florida teacher punished after signal-jamming his students\u2019 cell phones. Retrieved November 8, 2018." "objects_141_external_references_5_url_https://www.digitaltrends.com/mobile/florida-teacher-punished-after-signal-jamming-his-students-cell-phones/" "objects_141_external_references_6_source_name_NIST Mobile Threat Catalogue" "objects_141_external_references_6_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html" "objects_141_external_references_6_external_id_CEL-7" "objects_141_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_141_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-8.html" "objects_141_external_references_7_external_id_CEL-8" "objects_141_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_141_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-5.html" "objects_141_external_references_8_external_id_LPN-5" "objects_141_external_references_9_source_name_NIST Mobile Threat Catalogue" "objects_141_external_references_9_url_https://pages.nist.gov/mobile-threat-catalogue/gps-threats/GPS-0.html" "objects_141_external_references_9_external_id_GPS-0" "objects_141_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_141_x_mitre_attack_spec_version_3.1.0" "objects_141_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_141_spec_version_2.1" "objects_142_modified_2022-10-24T15:09:07.609Z" "objects_142_name_Compromise Application Executable" "objects_142_description_Adversaries may modify applications installed on a device to establish persistent access to a victim. These malicious modifications can be used to make legitimate applications carry out adversary tasks when these applications are in use.\n\nThere are multiple ways an adversary can inject malicious code into applications. One method is by taking advantages of device vulnerabilities, the most well-known being Janus, an Android vulnerability that allows adversaries to add extra bytes to APK (application) and DEX (executable) files without affecting the file's signature. By being able to add arbitrary bytes to valid applications, attackers can seamlessly inject code into genuine executables without the user's knowledge.(Citation: Guardsquare Janus)\n\nAdversaries may also rebuild applications to include malicious modifications. This can be achieved by decompiling the genuine application, merging it with the malicious code, and recompiling it.(Citation: CheckPoint Agent Smith)\n\nAdversaries may also take action to conceal modifications to application executables and bypass user consent. These actions include altering modifications to appear as an update or exploiting vulnerabilities that allow activities of the malicious application to run inside a system application.(Citation: CheckPoint Agent Smith)" "objects_142_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_142_kill_chain_phases_0_phase_name_persistence" "objects_142_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_142_x_mitre_detection_This behavior is seamless to the user and is typically undetectable." "objects_142_x_mitre_platforms_0_Android" "objects_142_x_mitre_domains_0_mobile-attack" "objects_142_x_mitre_version_1.0" "objects_142_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_142_type_attack-pattern" "objects_142_id_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_142_created_2020-05-07T15:24:49.068Z" "objects_142_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_142_external_references_0_source_name_mitre-attack" "objects_142_external_references_0_url_https://attack.mitre.org/techniques/T1577" "objects_142_external_references_0_external_id_T1577" "objects_142_external_references_1_source_name_Guardsquare Janus" "objects_142_external_references_1_description_Guarsquare. (2017, November 13). New Android vulnerability allows attackers to modify apps without affecting their signatures. Retrieved May 7, 2020." "objects_142_external_references_1_url_https://www.guardsquare.com/en/blog/new-android-vulnerability-allows-attackers-modify-apps-without-affecting-their-signatures" "objects_142_external_references_2_source_name_CheckPoint Agent Smith" "objects_142_external_references_2_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_142_external_references_2_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_142_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_142_x_mitre_attack_spec_version_2.1.0" "objects_142_x_mitre_is_subtechnique_False" "objects_142_spec_version_2.1" "objects_143_modified_2023-03-20T18:43:46.177Z" "objects_143_name_Event Triggered Execution" "objects_143_description_Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities. \n\nAdversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via automatically and repeatedly executing malicious code. After gaining access to a victim\u2019s system, adversaries may create or modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked. " "objects_143_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_143_kill_chain_phases_0_phase_name_persistence" "objects_143_x_mitre_deprecated_False" "objects_143_x_mitre_detection_Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. " "objects_143_x_mitre_domains_0_mobile-attack" "objects_143_x_mitre_is_subtechnique_False" "objects_143_x_mitre_platforms_0_Android" "objects_143_x_mitre_version_1.1" "objects_143_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_143_type_attack-pattern" "objects_143_id_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_143_created_2022-03-30T14:25:41.721Z" "objects_143_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_143_revoked_False" "objects_143_external_references_0_source_name_mitre-attack" "objects_143_external_references_0_url_https://attack.mitre.org/techniques/T1624" "objects_143_external_references_0_external_id_T1624" "objects_143_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_143_x_mitre_attack_spec_version_3.1.0" "objects_143_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_143_spec_version_2.1" "objects_144_modified_2023-03-20T18:50:32.697Z" "objects_144_name_System Network Configuration Discovery" "objects_144_description_Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of operating systems they access or through information discovery of remote systems. \n\n \n\nOn Android, details of onboard network interfaces are accessible to apps through the `java.net.NetworkInterface` class.(Citation: NetworkInterface) Previously, the Android `TelephonyManager` class could be used to gather telephony-related device identifiers, information such as the IMSI, IMEI, and phone number. However, starting with Android 10, only preloaded, carrier, the default SMS, or device and profile owner applications can access the telephony-related device identifiers.(Citation: TelephonyManager) \n\n \n\nOn iOS, gathering network configuration information is not possible without root access. \n\n \n\nAdversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1422) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next. " "objects_144_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_144_kill_chain_phases_0_phase_name_discovery" "objects_144_x_mitre_deprecated_False" "objects_144_x_mitre_detection_Application vetting services could look for usage of the `READ_PRIVILEGED_PHONE_STATE` Android permission. This could indicate that non-system apps are attempting to access information that they do not have access to." "objects_144_x_mitre_domains_0_mobile-attack" "objects_144_x_mitre_is_subtechnique_False" "objects_144_x_mitre_platforms_0_Android" "objects_144_x_mitre_platforms_1_iOS" "objects_144_x_mitre_version_2.3" "objects_144_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_144_type_attack-pattern" "objects_144_id_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_144_created_2017-10-25T14:48:32.740Z" "objects_144_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_144_revoked_False" "objects_144_external_references_0_source_name_mitre-attack" "objects_144_external_references_0_url_https://attack.mitre.org/techniques/T1422" "objects_144_external_references_0_external_id_T1422" "objects_144_external_references_1_source_name_NetworkInterface" "objects_144_external_references_1_description_Android. (n.d.). NetworkInterface. Retrieved December 21, 2016." "objects_144_external_references_1_url_https://developer.android.com/reference/java/net/NetworkInterface.html" "objects_144_external_references_2_source_name_TelephonyManager" "objects_144_external_references_2_description_Android. (n.d.). TelephonyManager. Retrieved December 21, 2016." "objects_144_external_references_2_url_https://developer.android.com/reference/android/telephony/TelephonyManager.html" "objects_144_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_144_x_mitre_attack_spec_version_3.1.0" "objects_144_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_144_spec_version_2.1" "objects_145_x_mitre_platforms_0_Android" "objects_145_x_mitre_platforms_1_iOS" "objects_145_x_mitre_domains_0_mobile-attack" "objects_145_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_145_type_attack-pattern" "objects_145_id_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_145_created_2017-10-25T14:48:25.322Z" "objects_145_x_mitre_version_1.1" "objects_145_external_references_0_source_name_mitre-attack" "objects_145_external_references_0_external_id_T1463" "objects_145_external_references_0_url_https://attack.mitre.org/techniques/T1463" "objects_145_external_references_1_source_name_FireEye-SSL" "objects_145_external_references_1_url_https://www.fireeye.com/blog/threat-research/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html" "objects_145_external_references_1_description_Adrian Mettler, Yulong Zhang, Vishwanath Raman. (2014, August 20). SSL VULNERABILITIES: WHO LISTENS WHEN ANDROID APPLICATIONS TALK?. Retrieved December 24, 2016." "objects_145_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.html" "objects_145_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_145_external_references_2_external_id_APP-1" "objects_145_x_mitre_deprecated_False" "objects_145_revoked_True" "objects_145_description_If network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on the network may be able to manipulate network communication without being detected. For example, FireEye researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport Layer Security (TLS) implementation vulnerability potentially opening the applications' network traffic to adversary-in-the-middle attacks (Citation: FireEye-SSL)." "objects_145_modified_2022-04-06T15:44:48.421Z" "objects_145_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_145_name_Manipulate Device Communication" "objects_145_x_mitre_detection_" "objects_145_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_145_kill_chain_phases_0_phase_name_network-effects" "objects_145_x_mitre_is_subtechnique_False" "objects_145_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_145_x_mitre_attack_spec_version_2.1.0" "objects_145_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_145_spec_version_2.1" "objects_146_modified_2023-03-20T18:38:27.848Z" "objects_146_name_Video Capture" "objects_146_description_An adversary can leverage a device\u2019s cameras to gather information by capturing video recordings. Images may also be captured, potentially in specified intervals, in lieu of video files. \n\n \n\nMalware or scripts may interact with the device cameras through an available API provided by the operating system. Video or image files may be written to disk and exfiltrated later. This technique differs from [Screen Capture](https://attack.mitre.org/techniques/T1513) due to use of the device\u2019s cameras for video recording rather than capturing the victim\u2019s screen. \n\n \n\nIn Android, an application must hold the `android.permission.CAMERA` permission to access the cameras. In iOS, applications must include the `NSCameraUsageDescription` key in the `Info.plist` file. In both cases, the user must grant permission to the requesting application to use the camera. If the device has been rooted or jailbroken, an adversary may be able to access the camera without knowledge of the user. " "objects_146_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_146_kill_chain_phases_0_phase_name_collection" "objects_146_x_mitre_deprecated_False" "objects_146_x_mitre_detection_The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions. During the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. " "objects_146_x_mitre_domains_0_mobile-attack" "objects_146_x_mitre_is_subtechnique_False" "objects_146_x_mitre_platforms_0_Android" "objects_146_x_mitre_platforms_1_iOS" "objects_146_x_mitre_version_2.1" "objects_146_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_146_type_attack-pattern" "objects_146_id_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_146_created_2019-08-09T16:14:58.254Z" "objects_146_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_146_revoked_False" "objects_146_external_references_0_source_name_mitre-attack" "objects_146_external_references_0_url_https://attack.mitre.org/techniques/T1512" "objects_146_external_references_0_external_id_T1512" "objects_146_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_146_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.html" "objects_146_external_references_1_external_id_APP-19" "objects_146_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_146_x_mitre_attack_spec_version_3.1.0" "objects_146_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_146_spec_version_2.1" "objects_147_modified_2023-08-14T16:35:55.739Z" "objects_147_name_One-Way Communication" "objects_147_description_Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to a compromised system without receiving return output. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response. \n\n \n\nPopular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. " "objects_147_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_147_kill_chain_phases_0_phase_name_command-and-control" "objects_147_x_mitre_deprecated_False" "objects_147_x_mitre_detection_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_147_x_mitre_domains_0_mobile-attack" "objects_147_x_mitre_is_subtechnique_True" "objects_147_x_mitre_platforms_0_Android" "objects_147_x_mitre_platforms_1_iOS" "objects_147_x_mitre_version_1.2" "objects_147_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_147_type_attack-pattern" "objects_147_id_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_147_created_2022-04-06T15:52:07.711Z" "objects_147_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_147_revoked_False" "objects_147_external_references_0_source_name_mitre-attack" "objects_147_external_references_0_url_https://attack.mitre.org/techniques/T1481/003" "objects_147_external_references_0_external_id_T1481.003" "objects_147_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_147_x_mitre_attack_spec_version_3.1.0" "objects_147_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_147_spec_version_2.1" "objects_148_x_mitre_platforms_0_Android" "objects_148_x_mitre_platforms_1_iOS" "objects_148_x_mitre_domains_0_mobile-attack" "objects_148_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_148_type_attack-pattern" "objects_148_id_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_148_created_2018-10-17T00:14:20.652Z" "objects_148_x_mitre_version_1.1" "objects_148_external_references_0_source_name_mitre-attack" "objects_148_external_references_0_external_id_T1475" "objects_148_external_references_0_url_https://attack.mitre.org/techniques/T1475" "objects_148_external_references_1_source_name_Oberheide-Bouncer" "objects_148_external_references_1_url_https://jon.oberheide.org/files/summercon12-bouncer.pdf" "objects_148_external_references_1_description_Jon Oberheide and Charlie Miller. (2012). Dissecting the Android Bouncer. Retrieved December 12, 2016." "objects_148_external_references_2_source_name_Oberheide-RemoteInstall" "objects_148_external_references_2_url_https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/" "objects_148_external_references_2_description_Jon Oberheide. (2010, June 25). Remote Kill and Install on Google Android. Retrieved December 12, 2016." "objects_148_external_references_3_source_name_Percoco-Bouncer" "objects_148_external_references_3_url_https://media.blackhat.com/bh-us-12/Briefings/Percoco/BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf" "objects_148_external_references_3_description_Nicholas J. Percoco and Sean Schulte. (2012). Adventures in BouncerLand. Retrieved December 12, 2016." "objects_148_external_references_4_source_name_Konoth" "objects_148_external_references_4_url_http://www.vvdveen.com/publications/BAndroid.pdf" "objects_148_external_references_4_description_Radhesh Krishnan Konoth, Victor van der Veen, and Herbert Bos. (n.d.). How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Retrieved December 12, 2016." "objects_148_external_references_5_source_name_Petsas" "objects_148_external_references_5_url_http://dl.acm.org/citation.cfm?id=2592796" "objects_148_external_references_5_description_Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. (2014, April). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware. Retrieved December 12, 2016." "objects_148_external_references_6_source_name_Wang" "objects_148_external_references_6_url_https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei" "objects_148_external_references_6_description_Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. Retrieved December 9, 2016." "objects_148_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-4.html" "objects_148_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_7_external_id_ECO-4" "objects_148_external_references_8_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-16.html" "objects_148_external_references_8_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_8_external_id_ECO-16" "objects_148_external_references_9_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-17.html" "objects_148_external_references_9_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_9_external_id_ECO-17" "objects_148_external_references_10_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.html" "objects_148_external_references_10_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_10_external_id_APP-20" "objects_148_external_references_11_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html" "objects_148_external_references_11_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_11_external_id_APP-21" "objects_148_external_references_12_url_https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-22.html" "objects_148_external_references_12_source_name_NIST Mobile Threat Catalogue" "objects_148_external_references_12_external_id_ECO-22" "objects_148_x_mitre_deprecated_True" "objects_148_revoked_False" "objects_148_description_Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. Mobile devices often are configured to allow application installation only from an authorized app store (e.g., Google Play Store or Apple App Store). An adversary may seek to place a malicious application in an authorized app store, enabling the application to be installed onto targeted devices.\n\nApp stores typically require developer registration and use vetting techniques to identify malicious applications. Adversaries may use these techniques against app store defenses:\n\n* [Download New Code at Runtime](https://attack.mitre.org/techniques/T1407)\n* [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1406)\n\nAdversaries may also seek to evade vetting by placing code in a malicious application to detect whether it is running in an app analysis environment and, if so, avoid performing malicious actions while under analysis. (Citation: Petsas) (Citation: Oberheide-Bouncer) (Citation: Percoco-Bouncer) (Citation: Wang)\n\nAdversaries may also use fake identities, payment cards, etc., to create developer accounts to publish malicious applications to app stores. (Citation: Oberheide-Bouncer)\n\nAdversaries may also use control of a target's Google account to use the Google Play Store's remote installation capability to install apps onto the Android devices associated with the Google account. (Citation: Oberheide-RemoteInstall) (Citation: Konoth) (Only applications that are available for download through the Google Play Store can be remotely installed using this technique.)" "objects_148_modified_2022-04-06T15:41:33.827Z" "objects_148_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_148_name_Deliver Malicious App via Authorized App Store" "objects_148_x_mitre_detection_* An EMM/MDM or mobile threat defense solution can identify the presence of unwanted or known insecure or malicious apps on devices.\n* Developers can scan (or have a third party scan on their behalf) the app stores for presence of unauthorized apps that were submitted using the developer's identity." "objects_148_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_148_kill_chain_phases_0_phase_name_initial-access" "objects_148_x_mitre_is_subtechnique_False" "objects_148_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_148_x_mitre_attack_spec_version_2.1.0" "objects_148_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_148_spec_version_2.1" "objects_149_modified_2023-03-20T15:55:09.397Z" "objects_149_name_Data Encrypted for Impact" "objects_149_description_An adversary may encrypt files stored on a mobile device to prevent the user from accessing them. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted." "objects_149_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_149_kill_chain_phases_0_phase_name_impact" "objects_149_x_mitre_deprecated_False" "objects_149_x_mitre_detection_Application vetting services may be able to detect if an application attempts to encrypt files, although this may be benign behavior." "objects_149_x_mitre_domains_0_mobile-attack" "objects_149_x_mitre_is_subtechnique_False" "objects_149_x_mitre_platforms_0_Android" "objects_149_x_mitre_version_3.2" "objects_149_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_149_type_attack-pattern" "objects_149_id_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_149_created_2017-10-25T14:48:10.285Z" "objects_149_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_149_revoked_False" "objects_149_external_references_0_source_name_mitre-attack" "objects_149_external_references_0_url_https://attack.mitre.org/techniques/T1471" "objects_149_external_references_0_external_id_T1471" "objects_149_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_149_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-28.html" "objects_149_external_references_1_external_id_APP-28" "objects_149_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_149_x_mitre_attack_spec_version_3.1.0" "objects_149_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_149_spec_version_2.1" "objects_150_modified_2023-09-28T15:38:41.106Z" "objects_150_name_Prevent Application Removal" "objects_150_description_Adversaries may abuse the Android device administration API to prevent the user from uninstalling a target application. In earlier versions of Android, device administrator applications needed their administration capabilities explicitly deactivated by the user before the application could be uninstalled. This was later updated so the user could deactivate and uninstall the administrator application in one step.\n\nAdversaries may also abuse the device accessibility APIs to prevent removal. This set of APIs allows the application to perform certain actions on behalf of the user and programmatically determine what is being shown on the screen. The malicious application could monitor the device screen for certain modals (e.g., the confirmation modal to uninstall an application) and inject screen input or a back button tap to close the modal. For example, Android's `performGlobalAction(int)` API could be utilized to prevent the user from removing the malicious application from the device after installation. If the user wants to uninstall the malicious application, two cases may occur, both preventing the user from removing the application.\n\n* Case 1: If the integer argument passed to the API call is `2` or `GLOBAL_ACTION_HOME`, the malicious application may direct the user to the home screen from settings screen \n\n* Case 2: If the integer argument passed to the API call is `1` or `GLOBAL_ACTION_BACK`, the malicious application may emulate the back press event " "objects_150_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_150_kill_chain_phases_0_phase_name_defense-evasion" "objects_150_x_mitre_contributors_0_Shankar Raman, Gen Digital and Abhinand, Amrita University" "objects_150_x_mitre_deprecated_False" "objects_150_x_mitre_detection_Users can view a list of device administrators and applications that have registered accessibility services in device settings. Users can typically visually see when an action happens that they did not initiate and can subsequently review installed applications for any out of place or unknown ones. Applications that register an accessibility service or request device administrator permissions should be scrutinized further for malicious behavior." "objects_150_x_mitre_domains_0_mobile-attack" "objects_150_x_mitre_is_subtechnique_True" "objects_150_x_mitre_platforms_0_Android" "objects_150_x_mitre_version_1.2" "objects_150_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_150_type_attack-pattern" "objects_150_id_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_150_created_2022-04-01T18:44:32.808Z" "objects_150_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_150_revoked_False" "objects_150_external_references_0_source_name_mitre-attack" "objects_150_external_references_0_url_https://attack.mitre.org/techniques/T1629/001" "objects_150_external_references_0_external_id_T1629.001" "objects_150_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_150_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html" "objects_150_external_references_1_external_id_APP-22" "objects_150_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_150_x_mitre_attack_spec_version_3.2.0" "objects_150_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_150_spec_version_2.1" "objects_151_x_mitre_platforms_0_Android" "objects_151_x_mitre_domains_0_mobile-attack" "objects_151_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_151_type_attack-pattern" "objects_151_id_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_151_created_2017-10-25T14:48:33.574Z" "objects_151_x_mitre_version_2.1" "objects_151_external_references_0_source_name_mitre-attack" "objects_151_external_references_0_external_id_T1421" "objects_151_external_references_0_url_https://attack.mitre.org/techniques/T1421" "objects_151_x_mitre_deprecated_False" "objects_151_revoked_False" "objects_151_description_Adversaries may attempt to get a listing of network connections to or from the compromised device they are currently accessing or from remote systems by querying for information over the network. \n\n \n\nThis is typically accomplished by utilizing device APIs to collect information about nearby networks, such as Wi-Fi, Bluetooth, and cellular tower connections. On Android, this can be done by querying the respective APIs: \n\n \n\n* `WifiInfo` for information about the current Wi-Fi connection, as well as nearby Wi-Fi networks. Querying the `WiFiInfo` API requires the application to hold the `ACCESS_FINE_LOCATION` permission. \n\n* `BluetoothAdapter` for information about Bluetooth devices, which also requires the application to hold several permissions granted by the user at runtime. \n\n* For Android versions prior to Q, applications can use the `TelephonyManager.getNeighboringCellInfo()` method. For Q and later, applications can use the `TelephonyManager.getAllCellInfo()` method. Both methods require the application hold the `ACCESS_FINE_LOCATION` permission." "objects_151_modified_2022-03-31T16:31:12.821Z" "objects_151_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_151_name_System Network Connections Discovery" "objects_151_x_mitre_detection_System Network Connections Discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_151_kill_chain_phases_0_phase_name_discovery" "objects_151_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_151_x_mitre_is_subtechnique_False" "objects_151_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_151_x_mitre_attack_spec_version_2.1.0" "objects_151_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_151_spec_version_2.1" "objects_152_modified_2023-09-29T19:45:39.608Z" "objects_152_name_Phishing" "objects_152_description_Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as \u201cspearphishing\u201d. Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.\n\nMobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. \n\nMobile devices are a particularly attractive target for adversaries executing phishing campaigns. Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as: \n\n- SMS messages: Adversaries may send SMS messages (known as \u201csmishing\u201d) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device.\n- Quick Response (QR) Codes: Adversaries may use QR codes (known as \u201cquishing\u201d) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user\u2019s desktop computer to their mobile device.\n- Phone Calls: Adversaries may call victims (known as \u201cvishing\u201d) to persuade them to perform an action, such as providing login credentials or navigating to a malicious website. This could also be used as a technique to perform the initial access on a mobile device, but then pivot to a computer/other network by having the victim perform an action on a desktop computer.\n" "objects_152_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_152_kill_chain_phases_0_phase_name_initial-access" "objects_152_x_mitre_contributors_0_Vijay Lalwani" "objects_152_x_mitre_contributors_1_Will Thomas, Equinix" "objects_152_x_mitre_contributors_2_Adam Mashinchi" "objects_152_x_mitre_contributors_3_Sam Seabrook, Duke Energy" "objects_152_x_mitre_contributors_4_Naveen Devaraja, bolttech" "objects_152_x_mitre_contributors_5_Brian Donohue" "objects_152_x_mitre_deprecated_False" "objects_152_x_mitre_detection_" "objects_152_x_mitre_domains_0_mobile-attack" "objects_152_x_mitre_is_subtechnique_False" "objects_152_x_mitre_platforms_0_Android" "objects_152_x_mitre_platforms_1_iOS" "objects_152_x_mitre_version_1.0" "objects_152_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_152_type_attack-pattern" "objects_152_id_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_152_created_2023-09-21T19:35:15.552Z" "objects_152_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_152_revoked_False" "objects_152_external_references_0_source_name_mitre-attack" "objects_152_external_references_0_url_https://attack.mitre.org/techniques/T1660" "objects_152_external_references_0_external_id_T1660" "objects_152_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_152_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-9.html" "objects_152_external_references_1_external_id_AUT-9" "objects_152_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_152_x_mitre_attack_spec_version_3.2.0" "objects_152_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_152_spec_version_2.1" "objects_153_modified_2023-10-16T16:23:05.146Z" "objects_153_name_Lockscreen Bypass" "objects_153_description_An adversary with physical access to a mobile device may seek to bypass the device\u2019s lockscreen. Several methods exist to accomplish this, including:\n\n* Biometric spoofing: If biometric authentication is used, an adversary could attempt to spoof a mobile device\u2019s biometric authentication mechanism. Both iOS and Android partly mitigate this attack by requiring the device\u2019s passcode rather than biometrics to unlock the device after every device restart, and after a set or random amount of time.(Citation: SRLabs-Fingerprint)(Citation: TheSun-FaceID)\n* Unlock code bypass: An adversary could attempt to brute-force or otherwise guess the lockscreen passcode (typically a PIN or password), including physically observing (\u201cshoulder surfing\u201d) the device owner\u2019s use of the lockscreen passcode. Mobile OS vendors partly mitigate this by implementing incremental backoff timers after a set number of failed unlock attempts, as well as a configurable full device wipe after several failed unlock attempts.\n* Vulnerability exploit: Techniques have been periodically demonstrated that exploit mobile devices to bypass the lockscreen. The vulnerabilities are generally patched by the device or OS vendor once disclosed.(Citation: Wired-AndroidBypass)(Citation: Kaspersky-iOSBypass)\n" "objects_153_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_153_kill_chain_phases_0_phase_name_initial-access" "objects_153_x_mitre_deprecated_False" "objects_153_x_mitre_detection_Users can see if someone is watching them type in their device passcode." "objects_153_x_mitre_domains_0_mobile-attack" "objects_153_x_mitre_is_subtechnique_False" "objects_153_x_mitre_platforms_0_Android" "objects_153_x_mitre_platforms_1_iOS" "objects_153_x_mitre_version_1.3" "objects_153_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_153_type_attack-pattern" "objects_153_id_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_153_created_2017-10-25T14:48:24.488Z" "objects_153_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_153_revoked_False" "objects_153_external_references_0_source_name_mitre-attack" "objects_153_external_references_0_url_https://attack.mitre.org/techniques/T1461" "objects_153_external_references_0_external_id_T1461" "objects_153_external_references_1_source_name_Wired-AndroidBypass" "objects_153_external_references_1_description_Andy Greenberg. (2015, September 15). Hack Brief: Emergency Number Hack Bypasses Android Lock Screens. Retrieved December 23, 2016." "objects_153_external_references_1_url_https://www.wired.com/2015/09/hack-brief-new-emergency-number-hack-easily-bypasses-android-lock-screens/" "objects_153_external_references_2_source_name_Kaspersky-iOSBypass" "objects_153_external_references_2_description_Chris Brook. (2016, November 17). iOS 10 Passcode Bypass Can Access Photos, Contacts. Retrieved December 23, 2016." "objects_153_external_references_2_url_https://threatpost.com/ios-10-passcode-bypass-can-access-photos-contacts/122033/" "objects_153_external_references_3_source_name_TheSun-FaceID" "objects_153_external_references_3_description_Sean Keach. (2018, February 15). Brit mates BREAK Apple\u2019s face unlock and vow to never buy iPhone again. Retrieved September 18, 2018." "objects_153_external_references_3_url_https://www.thesun.co.uk/tech/5584082/iphone-x-face-unlock-tricked-broken/" "objects_153_external_references_4_source_name_SRLabs-Fingerprint" "objects_153_external_references_4_description_SRLabs. (n.d.). Fingerprints are not fit for secure device unlocking. Retrieved December 23, 2016." "objects_153_external_references_4_url_https://srlabs.de/bites/spoofing-fingerprints/" "objects_153_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_153_x_mitre_attack_spec_version_3.2.0" "objects_153_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_153_spec_version_2.1" "objects_154_x_mitre_platforms_0_Android" "objects_154_x_mitre_platforms_1_iOS" "objects_154_x_mitre_domains_0_mobile-attack" "objects_154_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_154_type_attack-pattern" "objects_154_id_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_154_created_2020-12-16T20:16:07.673Z" "objects_154_x_mitre_version_1.0" "objects_154_external_references_0_source_name_mitre-attack" "objects_154_external_references_0_external_id_T1605" "objects_154_external_references_0_url_https://attack.mitre.org/techniques/T1605" "objects_154_x_mitre_deprecated_False" "objects_154_revoked_True" "objects_154_description_Adversaries may use built-in command-line interfaces to interact with the device and execute commands. Android provides a bash shell that can be interacted with over the Android Debug Bridge (ADB) or programmatically using Java\u2019s `Runtime` package. On iOS, adversaries can interact with the underlying runtime shell if the device has been jailbroken.\n\nIf the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files." "objects_154_modified_2022-03-30T14:00:45.099Z" "objects_154_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_154_name_Command-Line Interface" "objects_154_x_mitre_detection_Command-Line Interface execution can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_154_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_154_kill_chain_phases_0_phase_name_execution" "objects_154_x_mitre_is_subtechnique_False" "objects_154_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_154_x_mitre_attack_spec_version_2.1.0" "objects_154_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_154_spec_version_2.1" "objects_155_modified_2023-03-20T15:40:11.937Z" "objects_155_name_Contact List" "objects_155_description_Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the `Contacts` framework. \n\n \n\nIf the device has been jailbroken or rooted, an adversary may be able to access the [Contact List](https://attack.mitre.org/techniques/T1636/003) without the user\u2019s knowledge or approval. " "objects_155_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_155_kill_chain_phases_0_phase_name_collection" "objects_155_x_mitre_deprecated_False" "objects_155_x_mitre_detection_On both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it." "objects_155_x_mitre_domains_0_mobile-attack" "objects_155_x_mitre_is_subtechnique_True" "objects_155_x_mitre_platforms_0_iOS" "objects_155_x_mitre_platforms_1_Android" "objects_155_x_mitre_version_1.1" "objects_155_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_155_type_attack-pattern" "objects_155_id_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_155_created_2022-04-01T13:17:52.740Z" "objects_155_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_155_revoked_False" "objects_155_external_references_0_source_name_mitre-attack" "objects_155_external_references_0_url_https://attack.mitre.org/techniques/T1636/003" "objects_155_external_references_0_external_id_T1636.003" "objects_155_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_155_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html" "objects_155_external_references_1_external_id_APP-13" "objects_155_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_155_x_mitre_attack_spec_version_3.1.0" "objects_155_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_155_spec_version_2.1" "objects_156_x_mitre_platforms_0_Android" "objects_156_x_mitre_platforms_1_iOS" "objects_156_x_mitre_domains_0_mobile-attack" "objects_156_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_156_type_attack-pattern" "objects_156_id_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_156_created_2019-10-10T15:12:42.790Z" "objects_156_x_mitre_version_1.1" "objects_156_external_references_0_source_name_mitre-attack" "objects_156_external_references_0_external_id_T1533" "objects_156_external_references_0_url_https://attack.mitre.org/techniques/T1533" "objects_156_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-41.html" "objects_156_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_156_external_references_1_external_id_STA-41" "objects_156_x_mitre_deprecated_False" "objects_156_revoked_False" "objects_156_description_Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration. \n\n \n\nAccess to local system data, which includes information stored by the operating system, often requires escalated privileges. Examples of local system data include authentication tokens, the device keyboard cache, Wi-Fi passwords, and photos. On Android, adversaries may also attempt to access files from external storage which may require additional storage-related permissions. \n\n " "objects_156_modified_2022-04-01T16:53:27.576Z" "objects_156_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_156_name_Data from Local System" "objects_156_x_mitre_detection_Accessing data from the local system can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_156_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_156_kill_chain_phases_0_phase_name_collection" "objects_156_x_mitre_is_subtechnique_False" "objects_156_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_156_x_mitre_attack_spec_version_2.1.0" "objects_156_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_156_spec_version_2.1" "objects_157_modified_2023-03-15T16:34:51.917Z" "objects_157_name_Account Access Removal" "objects_157_description_Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts. " "objects_157_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_157_kill_chain_phases_0_phase_name_impact" "objects_157_x_mitre_deprecated_False" "objects_157_x_mitre_detection_Application vetting services could closely scrutinize applications that request Device Administrator permissions." "objects_157_x_mitre_domains_0_mobile-attack" "objects_157_x_mitre_is_subtechnique_False" "objects_157_x_mitre_platforms_0_Android" "objects_157_x_mitre_version_1.1" "objects_157_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_157_type_attack-pattern" "objects_157_id_attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2" "objects_157_created_2022-04-06T13:29:47.590Z" "objects_157_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_157_revoked_False" "objects_157_external_references_0_source_name_mitre-attack" "objects_157_external_references_0_url_https://attack.mitre.org/techniques/T1640" "objects_157_external_references_0_external_id_T1640" "objects_157_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_157_x_mitre_attack_spec_version_3.1.0" "objects_157_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_157_spec_version_2.1" "objects_158_x_mitre_platforms_0_Android" "objects_158_x_mitre_platforms_1_iOS" "objects_158_x_mitre_domains_0_mobile-attack" "objects_158_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_158_type_attack-pattern" "objects_158_id_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_158_created_2017-10-25T14:48:19.265Z" "objects_158_x_mitre_version_1.2" "objects_158_external_references_0_source_name_mitre-attack" "objects_158_external_references_0_external_id_T1426" "objects_158_external_references_0_url_https://attack.mitre.org/techniques/T1426" "objects_158_external_references_1_source_name_Android-Build" "objects_158_external_references_1_url_https://developer.android.com/reference/android/os/Build" "objects_158_external_references_1_description_Android. (n.d.). Build. Retrieved December 21, 2016." "objects_158_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-12.html" "objects_158_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_158_external_references_2_external_id_APP-12" "objects_158_x_mitre_deprecated_False" "objects_158_revoked_False" "objects_158_description_Adversaries may attempt to get detailed information about a device\u2019s operating system and hardware, including versions, patches, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1426) during automated discovery to shape follow-on behaviors, including whether or not to fully infects the target and/or attempts specific actions. \n\n \n\nOn Android, much of this information is programmatically accessible to applications through the `android.os.Build` class. (Citation: Android-Build) iOS is much more restrictive with what information is visible to applications. Typically, applications will only be able to query the device model and which version of iOS it is running. " "objects_158_modified_2022-04-11T19:21:34.776Z" "objects_158_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_158_name_System Information Discovery" "objects_158_x_mitre_detection_System information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_158_kill_chain_phases_0_phase_name_discovery" "objects_158_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_158_x_mitre_is_subtechnique_False" "objects_158_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_158_x_mitre_attack_spec_version_2.1.0" "objects_158_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_158_spec_version_2.1" "objects_159_x_mitre_domains_0_mobile-attack" "objects_159_id_attack-pattern--e30cc912-7ea1-4683-9219-543b86cbdec9" "objects_159_type_attack-pattern" "objects_159_created_2017-10-25T14:48:28.786Z" "objects_159_revoked_True" "objects_159_external_references_0_source_name_mitre-mobile-attack" "objects_159_external_references_0_url_https://attack.mitre.org/techniques/T1442" "objects_159_external_references_0_external_id_T1442" "objects_159_modified_2022-07-07T14:00:00.188Z" "objects_159_name_Fake Developer Accounts" "objects_159_x_mitre_version_1.0" "objects_159_x_mitre_is_subtechnique_False" "objects_159_spec_version_2.1" "objects_159_x_mitre_attack_spec_version_2.1.0" "objects_160_x_mitre_platforms_0_Android" "objects_160_x_mitre_domains_0_mobile-attack" "objects_160_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_160_type_attack-pattern" "objects_160_id_attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb" "objects_160_created_2019-07-26T14:15:31.451Z" "objects_160_x_mitre_version_1.0" "objects_160_external_references_0_source_name_mitre-attack" "objects_160_external_references_0_external_id_T1510" "objects_160_external_references_0_url_https://attack.mitre.org/techniques/T1510" "objects_160_external_references_1_source_name_Android 10 Privacy Changes" "objects_160_external_references_1_url_https://developer.android.com/about/versions/10/privacy/changes#clipboard-data" "objects_160_external_references_1_description_Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019." "objects_160_external_references_2_source_name_Dr.Webb Clipboard Modification origin August 2018" "objects_160_external_references_2_url_https://vms.drweb.com/virus/?i=17517750" "objects_160_external_references_2_description_Dr.Webb. (2018, August 8). Android.Clipper.1.origin. Retrieved July 26, 2019." "objects_160_external_references_3_source_name_Dr.Webb Clipboard Modification origin2 August 2018" "objects_160_external_references_3_url_https://vms.drweb.com/virus/?i=17517761" "objects_160_external_references_3_description_Dr.Webb. (2018, August 8). Android.Clipper.2.origin. Retrieved July 26, 2019." "objects_160_external_references_4_source_name_ESET Clipboard Modification February 2019" "objects_160_external_references_4_url_https://www.eset.com/uk/about/newsroom/press-releases/first-clipper-malware-discovered-on-google-play-1/" "objects_160_external_references_4_description_ESET. (2019, February 11). First clipper malware discovered on Google Play.. Retrieved July 26, 2019." "objects_160_external_references_5_source_name_Welivesecurity Clipboard Modification February 2019" "objects_160_external_references_5_url_https://www.welivesecurity.com/2019/02/08/first-clipper-malware-google-play/" "objects_160_external_references_5_description_Luk\u00e1\u0161 \u0160tefanko. (2019, February 8). First clipper malware discovered on Google Play. Retrieved July 26, 2019." "objects_160_external_references_6_source_name_Syracuse Clipboard Modification 2014" "objects_160_external_references_6_url_http://www.cis.syr.edu/~wedu/Research/paper/clipboard_attack_dimva2014.pdf" "objects_160_external_references_6_description_Zhang, X; Du, W. (2014, January). Attacks on Android Clipboard. Retrieved July 26, 2019." "objects_160_x_mitre_deprecated_False" "objects_160_revoked_True" "objects_160_description_Adversaries may abuse clipboard functionality to intercept and replace information in the Android device clipboard.(Citation: ESET Clipboard Modification February 2019)(Citation: Welivesecurity Clipboard Modification February 2019)(Citation: Syracuse Clipboard Modification 2014) Malicious applications may monitor the clipboard activity through the ClipboardManager.OnPrimaryClipChangedListener interface on Android to determine when the clipboard contents have changed.(Citation: Dr.Webb Clipboard Modification origin2 August 2018)(Citation: Dr.Webb Clipboard Modification origin August 2018) Listening to clipboard activity, reading the clipboard contents, and modifying the clipboard contents requires no explicit application permissions and can be performed by applications running in the background, however, this behavior has changed with the release of Android 10.(Citation: Android 10 Privacy Changes)\n\nAdversaries may use [Clipboard Modification](https://attack.mitre.org/techniques/T1510) to replace text prior to being pasted, for example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control.\n\n[Clipboard Modification](https://attack.mitre.org/techniques/T1510) had been seen within the Android/Clipper.C trojan. This sample had been detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)" "objects_160_modified_2022-04-06T13:41:17.512Z" "objects_160_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_160_name_Clipboard Modification" "objects_160_x_mitre_detection_Modifying clipboard content can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior." "objects_160_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_160_kill_chain_phases_0_phase_name_impact" "objects_160_x_mitre_is_subtechnique_False" "objects_160_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_160_x_mitre_attack_spec_version_2.1.0" "objects_160_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_160_spec_version_2.1" "objects_161_x_mitre_platforms_0_Android" "objects_161_x_mitre_platforms_1_iOS" "objects_161_x_mitre_domains_0_mobile-attack" "objects_161_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_161_type_attack-pattern" "objects_161_id_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_161_created_2019-10-10T15:00:44.181Z" "objects_161_x_mitre_version_2.0" "objects_161_external_references_0_source_name_mitre-attack" "objects_161_external_references_0_external_id_T1532" "objects_161_external_references_0_url_https://attack.mitre.org/techniques/T1532" "objects_161_x_mitre_deprecated_False" "objects_161_revoked_False" "objects_161_description_Adversaries may compress and/or encrypt data that is collected prior to exfiltration. Compressing data can help to obfuscate its contents and minimize use of network resources. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender. \n\n \n\nBoth compression and encryption are done prior to exfiltration, and can be performed using a utility, programming library, or custom algorithm. " "objects_161_modified_2022-04-01T15:01:02.140Z" "objects_161_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_161_name_Archive Collected Data" "objects_161_x_mitre_detection_Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user." "objects_161_kill_chain_phases_0_phase_name_collection" "objects_161_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_161_x_mitre_is_subtechnique_False" "objects_161_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_161_x_mitre_attack_spec_version_2.1.0" "objects_161_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_161_spec_version_2.1" "objects_162_modified_2023-03-20T18:58:14.240Z" "objects_162_name_Geofencing" "objects_162_description_Adversaries may use a device\u2019s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv)\n\n[Geofencing](https://attack.mitre.org/techniques/T1627/001)\u202fis accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device\u2019s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements. \n\nOne method to accomplish\u202f[Geofencing](https://attack.mitre.org/techniques/T1627/001)\u202fon Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other\u202f[Geofencing](https://attack.mitre.org/techniques/T1627/001) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include \"Allow only while using the app\", which will effectively prohibit background location collection. \n\nSimilarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call\u202f`requestWhenInUseAuthorization()`\u202for\u202f`requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device\u2019s location, including one-time use and only when the application is running in the foreground. \n\n[Geofencing](https://attack.mitre.org/techniques/T1627/001)\u202fcan be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific input prompts and/or advertisements." "objects_162_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_162_kill_chain_phases_0_phase_name_defense-evasion" "objects_162_x_mitre_deprecated_False" "objects_162_x_mitre_detection_Users can review which applications have location permissions in the operating system\u2019s settings menu. On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background. Application vetting services can detect unnecessary and potentially abused location permissions or API calls." "objects_162_x_mitre_domains_0_mobile-attack" "objects_162_x_mitre_is_subtechnique_True" "objects_162_x_mitre_platforms_0_Android" "objects_162_x_mitre_platforms_1_iOS" "objects_162_x_mitre_version_1.1" "objects_162_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_162_type_attack-pattern" "objects_162_id_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_162_created_2022-03-30T20:36:03.177Z" "objects_162_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_162_revoked_False" "objects_162_external_references_0_source_name_mitre-attack" "objects_162_external_references_0_url_https://attack.mitre.org/techniques/T1627/001" "objects_162_external_references_0_external_id_T1627.001" "objects_162_external_references_1_source_name_Lookout eSurv" "objects_162_external_references_1_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_162_external_references_1_url_https://blog.lookout.com/esurv-research" "objects_162_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_162_x_mitre_attack_spec_version_3.1.0" "objects_162_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_162_spec_version_2.1" "objects_163_x_mitre_platforms_0_Android" "objects_163_x_mitre_domains_0_mobile-attack" "objects_163_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_163_type_attack-pattern" "objects_163_id_attack-pattern--e4c347e9-fb91-4bc5-83b8-391e389131e2" "objects_163_created_2019-07-10T15:18:16.753Z" "objects_163_x_mitre_version_1.0" "objects_163_external_references_0_source_name_mitre-attack" "objects_163_external_references_0_external_id_T1507" "objects_163_external_references_0_url_https://attack.mitre.org/techniques/T1507" "objects_163_x_mitre_deprecated_False" "objects_163_revoked_True" "objects_163_description_Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth." "objects_163_modified_2022-03-31T16:33:55.068Z" "objects_163_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_163_name_Network Information Discovery" "objects_163_x_mitre_detection_" "objects_163_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_163_kill_chain_phases_0_phase_name_collection" "objects_163_x_mitre_is_subtechnique_False" "objects_163_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_163_x_mitre_attack_spec_version_2.1.0" "objects_163_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_163_spec_version_2.1" "objects_164_x_mitre_platforms_0_Android" "objects_164_x_mitre_platforms_1_iOS" "objects_164_x_mitre_domains_0_mobile-attack" "objects_164_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_164_type_attack-pattern" "objects_164_id_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_164_created_2017-10-25T14:48:15.920Z" "objects_164_x_mitre_version_1.1" "objects_164_external_references_0_source_name_mitre-attack" "objects_164_external_references_0_external_id_T1412" "objects_164_external_references_0_url_https://attack.mitre.org/techniques/T1412" "objects_164_x_mitre_deprecated_False" "objects_164_revoked_True" "objects_164_description_A malicious application could capture sensitive data sent via SMS, including authentication credentials. SMS is frequently used to transmit codes used for multi-factor authentication.\n\nOn Android, a malicious application must request and obtain permission (either at app install time or run time) in order to receive SMS messages. Alternatively, a malicious application could attempt to perform an operating system privilege escalation attack to bypass the permission requirement.\n\nOn iOS, applications cannot access SMS messages in normal operation, so an adversary would need to attempt to perform an operating system privilege escalation attack to potentially be able to access SMS messages." "objects_164_modified_2022-04-01T13:27:29.880Z" "objects_164_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_164_name_Capture SMS Messages" "objects_164_x_mitre_detection_On Android, the user can view which applications have permission to access SMS messages through the device settings, and the user can choose to revoke the permission." "objects_164_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_164_kill_chain_phases_0_phase_name_collection" "objects_164_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_164_kill_chain_phases_1_phase_name_credential-access" "objects_164_x_mitre_is_subtechnique_False" "objects_164_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_164_x_mitre_attack_spec_version_2.1.0" "objects_164_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_164_spec_version_2.1" "objects_165_modified_2023-03-20T18:41:56.376Z" "objects_165_name_Endpoint Denial of Service" "objects_165_description_Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.\n\nOn Android versions prior to 7, apps can abuse Device Administrator access to reset the device lock passcode, preventing the user from unlocking the device. After Android 7, only device or profile owners (e.g. MDMs) can reset the device\u2019s passcode.(Citation: Android resetPassword)\n\nOn iOS devices, this technique does not work because mobile device management servers can only remove the screen lock passcode; they cannot set a new passcode. However, on jailbroken devices, malware has been discovered that can lock the user out of the device.(Citation: Xiao-KeyRaider)" "objects_165_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_165_kill_chain_phases_0_phase_name_impact" "objects_165_x_mitre_deprecated_False" "objects_165_x_mitre_detection_On Android, users can review which applications have Device Administrator access in the device settings and revoke permission where appropriate. Application vetting services can detect and closely scrutinize applications that utilize Device Administrator access." "objects_165_x_mitre_domains_0_mobile-attack" "objects_165_x_mitre_is_subtechnique_False" "objects_165_x_mitre_platforms_0_Android" "objects_165_x_mitre_platforms_1_iOS" "objects_165_x_mitre_version_1.1" "objects_165_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_165_type_attack-pattern" "objects_165_id_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_165_created_2022-04-06T13:52:05.619Z" "objects_165_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_165_revoked_False" "objects_165_external_references_0_source_name_mitre-attack" "objects_165_external_references_0_url_https://attack.mitre.org/techniques/T1642" "objects_165_external_references_0_external_id_T1642" "objects_165_external_references_1_source_name_Xiao-KeyRaider" "objects_165_external_references_1_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_165_external_references_1_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_165_external_references_2_source_name_Android resetPassword" "objects_165_external_references_2_description_Google. (n.d.). DevicePolicyManager. Retrieved October 1, 2019." "objects_165_external_references_2_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#resetPassword(java.lang.String,%20int)" "objects_165_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_165_x_mitre_attack_spec_version_3.1.0" "objects_165_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_165_spec_version_2.1" "objects_166_modified_2023-03-20T18:53:59.025Z" "objects_166_name_Out of Band Data" "objects_166_description_Adversaries may communicate with compromised devices using out of band data streams. This could be done for a variety of reasons, including evading network traffic monitoring, as a backup method of command and control, or for data exfiltration if the device is not connected to any Internet-providing networks (i.e. cellular or Wi-Fi). Several out of band data streams exist, such as SMS messages, NFC, and Bluetooth. \n\n \n\nOn Android, applications can read push notifications to capture content from SMS messages, or other out of band data streams. This requires that the user manually grant notification access to the application via the settings menu. However, the application could launch an Intent to take the user directly there. \n\n \n\nOn iOS, there is no way to programmatically read push notifications. " "objects_166_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_166_kill_chain_phases_0_phase_name_command-and-control" "objects_166_x_mitre_deprecated_False" "objects_166_x_mitre_detection_If a user sees a notification with text they do not recognize, they should review their list of installed applications." "objects_166_x_mitre_domains_0_mobile-attack" "objects_166_x_mitre_is_subtechnique_False" "objects_166_x_mitre_platforms_0_Android" "objects_166_x_mitre_platforms_1_iOS" "objects_166_x_mitre_version_2.1" "objects_166_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_166_type_attack-pattern" "objects_166_id_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_166_created_2022-04-06T15:27:34.300Z" "objects_166_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_166_revoked_False" "objects_166_external_references_0_source_name_mitre-attack" "objects_166_external_references_0_url_https://attack.mitre.org/techniques/T1644" "objects_166_external_references_0_external_id_T1644" "objects_166_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_166_x_mitre_attack_spec_version_3.1.0" "objects_166_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_166_spec_version_2.1" "objects_167_x_mitre_platforms_0_Android" "objects_167_x_mitre_platforms_1_iOS" "objects_167_x_mitre_domains_0_mobile-attack" "objects_167_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_167_type_attack-pattern" "objects_167_id_attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84" "objects_167_created_2019-10-01T14:18:47.762Z" "objects_167_x_mitre_version_2.0" "objects_167_external_references_0_source_name_mitre-attack" "objects_167_external_references_0_external_id_T1521" "objects_167_external_references_0_url_https://attack.mitre.org/techniques/T1521" "objects_167_x_mitre_deprecated_False" "objects_167_revoked_False" "objects_167_description_Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if necessary secret keys are encoded and/or generated within malware samples/configuration files." "objects_167_modified_2022-04-05T20:11:35.852Z" "objects_167_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_167_name_Encrypted Channel" "objects_167_x_mitre_detection_Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user." "objects_167_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_167_kill_chain_phases_0_phase_name_command-and-control" "objects_167_x_mitre_is_subtechnique_False" "objects_167_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_167_x_mitre_attack_spec_version_2.1.0" "objects_167_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_167_spec_version_2.1" "objects_168_x_mitre_platforms_0_Android" "objects_168_x_mitre_domains_0_mobile-attack" "objects_168_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_168_type_attack-pattern" "objects_168_id_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_168_created_2017-10-25T14:48:22.716Z" "objects_168_x_mitre_version_1.0" "objects_168_external_references_0_source_name_mitre-attack" "objects_168_external_references_0_external_id_T1405" "objects_168_external_references_0_url_https://attack.mitre.org/techniques/T1405" "objects_168_external_references_1_source_name_EkbergTEE" "objects_168_external_references_1_url_https://usmile.at/symposium/program/2015/ekberg" "objects_168_external_references_1_description_Jan-Erik Ekberg. (2015, September 10). Android and trusted execution environments. Retrieved December 9, 2016." "objects_168_external_references_2_source_name_Thomas-TrustZone" "objects_168_external_references_2_url_https://usmile.at/symposium/program/2015/thomas-holmes" "objects_168_external_references_2_description_Josh Thomas and Charles Holmes. (2015, September). An infestation of dragons: Exploring vulnerabilities in the ARM TrustZone architecture. Retrieved December 9, 2016." "objects_168_external_references_3_source_name_QualcommKeyMaster" "objects_168_external_references_3_url_https://bits-please.blogspot.in/2016/06/extracting-qualcomms-keymaster-keys.html" "objects_168_external_references_3_description_laginimaineb. (2016, June). Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption. Retrieved December 9, 2016." "objects_168_external_references_4_source_name_laginimaineb-TEE" "objects_168_external_references_4_url_http://bits-please.blogspot.co.il/2016/05/war-of-worlds-hijacking-linux-kernel.html" "objects_168_external_references_4_description_laginimaineb. (2016, May). War of the Worlds - Hijacking the Linux Kernel from QSEE. Retrieved December 21, 2016." "objects_168_external_references_5_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_168_external_references_5_source_name_NIST Mobile Threat Catalogue" "objects_168_external_references_5_external_id_APP-27" "objects_168_x_mitre_deprecated_True" "objects_168_revoked_False" "objects_168_description_A malicious app or other attack vector could be used to exploit vulnerabilities in code running within the Trusted Execution Environment (TEE) (Citation: Thomas-TrustZone). The adversary could then obtain privileges held by the TEE potentially including the ability to access cryptographic keys or other sensitive data (Citation: QualcommKeyMaster). Escalated operating system privileges may be first required in order to have the ability to attack the TEE (Citation: EkbergTEE). If not, privileges within the TEE can potentially be used to exploit the operating system (Citation: laginimaineb-TEE)." "objects_168_modified_2022-04-06T15:41:57.666Z" "objects_168_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_168_name_Exploit TEE Vulnerability" "objects_168_x_mitre_detection_" "objects_168_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_168_kill_chain_phases_0_phase_name_credential-access" "objects_168_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_168_kill_chain_phases_1_phase_name_privilege-escalation" "objects_168_x_mitre_is_subtechnique_False" "objects_168_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_168_x_mitre_attack_spec_version_2.1.0" "objects_168_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_168_spec_version_2.1" "objects_169_modified_2023-03-20T18:51:29.931Z" "objects_169_name_Suppress Application Icon" "objects_169_description_A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions. \n\nThis behavior has been seen in the BankBot/Spy Banker family of malware.(Citation: android-trojan-steals-paypal-2fa)(Citation: sunny-stolen-credentials)(Citation: bankbot-spybanker) \n\nBeginning in Android 10, changes were introduced to inhibit malicious applications\u2019 ability to hide their icon. If an app is a system app, requests no permissions, or does not have a launcher activity, the application\u2019s icon will be fully hidden. Further, if the device is fully managed or the application is in a work profile, the icon will be fully hidden. Otherwise, a synthesized activity is shown, which is a launcher icon that represents the app\u2019s details page in the system settings. If the user clicks the synthesized activity in the launcher, they are taken to the application\u2019s details page in the system settings.(Citation: Android 10 Limitations to Hiding App Icons)(Citation: LauncherApps getActivityList)" "objects_169_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_169_kill_chain_phases_0_phase_name_defense-evasion" "objects_169_x_mitre_contributors_0_Emily Ratliff, IBM" "objects_169_x_mitre_deprecated_False" "objects_169_x_mitre_detection_The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application\u2019s icon, they should inspect the application to ensure it is genuine. Application vetting services could potentially detect the usage of APIs intended for suppressing the application\u2019s icon." "objects_169_x_mitre_domains_0_mobile-attack" "objects_169_x_mitre_is_subtechnique_True" "objects_169_x_mitre_platforms_0_Android" "objects_169_x_mitre_version_1.1" "objects_169_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_169_type_attack-pattern" "objects_169_id_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_169_created_2022-03-30T20:06:22.194Z" "objects_169_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_169_revoked_False" "objects_169_external_references_0_source_name_mitre-attack" "objects_169_external_references_0_url_https://attack.mitre.org/techniques/T1628/001" "objects_169_external_references_0_external_id_T1628.001" "objects_169_external_references_1_source_name_Android 10 Limitations to Hiding App Icons" "objects_169_external_references_1_description_Android. (n.d.). Android 10 Release Notes: Limitations to hiding app icons. Retrieved March 30, 2022." "objects_169_external_references_1_url_https://source.android.com/setup/start/android-10-release#limitations_to_hiding_app_icons" "objects_169_external_references_2_source_name_LauncherApps getActivityList" "objects_169_external_references_2_description_Android. (n.d.). LauncherApps: getActivityList. Retrieved March 30, 2022." "objects_169_external_references_2_url_https://developer.android.com/reference/kotlin/android/content/pm/LauncherApps#getactivitylist" "objects_169_external_references_3_source_name_sunny-stolen-credentials" "objects_169_external_references_3_description_Luk\u00e1\u0161 \u0160tefanko. (2017, February 22). Sunny with a chance of stolen credentials: Malicious weather app found on Google Play. Retrieved July 11, 2019." "objects_169_external_references_3_url_https://www.welivesecurity.com/2017/02/22/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play/" "objects_169_external_references_4_source_name_android-trojan-steals-paypal-2fa" "objects_169_external_references_4_description_Luk\u00e1\u0161 \u0160tefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019." "objects_169_external_references_4_url_https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/" "objects_169_external_references_5_source_name_bankbot-spybanker" "objects_169_external_references_5_description_NJCCIC. (2017, March 2). BankBot/Spy Banker. Retrieved July 11, 2019." "objects_169_external_references_5_url_https://www.cyber.nj.gov/threat-profiles/android-malware-variants/bankbot-spybanker" "objects_169_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_169_x_mitre_attack_spec_version_3.1.0" "objects_169_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_169_spec_version_2.1" "objects_170_x_mitre_platforms_0_Android" "objects_170_x_mitre_domains_0_mobile-attack" "objects_170_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_170_type_attack-pattern" "objects_170_id_attack-pattern--f1c3d071-0c24-483d-aca0-e8b8496ce468" "objects_170_created_2017-10-25T14:48:18.583Z" "objects_170_x_mitre_version_1.1" "objects_170_external_references_0_source_name_mitre-attack" "objects_170_external_references_0_external_id_T1399" "objects_170_external_references_0_url_https://attack.mitre.org/techniques/T1399" "objects_170_external_references_1_source_name_Apple-iOSSecurityGuide" "objects_170_external_references_1_url_https://www.apple.com/business/docs/iOS_Security_Guide.pdf" "objects_170_external_references_1_description_Apple. (2016, May). iOS Security. Retrieved December 21, 2016." "objects_170_external_references_2_source_name_Roth-Rootkits" "objects_170_external_references_2_url_https://hackinparis.com/data/slides/2013/Slidesthomasroth.pdf" "objects_170_external_references_2_description_Thomas Roth. (2013). Next generation mobile rootkits. Retrieved December 21, 2016." "objects_170_external_references_3_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html" "objects_170_external_references_3_source_name_NIST Mobile Threat Catalogue" "objects_170_external_references_3_external_id_APP-27" "objects_170_x_mitre_deprecated_True" "objects_170_revoked_False" "objects_170_description_If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device's Trusted Execution Environment (TEE) or other similar isolated execution environment where the code can evade detection, may persist after device resets, and may not be removable by the device user. Running code within the TEE may provide an adversary with the ability to monitor or tamper with overall device behavior.(Citation: Roth-Rootkits)" "objects_170_modified_2022-04-06T15:48:41.647Z" "objects_170_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_170_name_Modify Trusted Execution Environment" "objects_170_x_mitre_detection_Devices may perform cryptographic integrity checks of code running within the TEE at boot time.\n\niOS devices will fail to boot if the software running within the Secure Enclave does not pass signature verification.(Citation: Apple-iOSSecurityGuide)" "objects_170_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_170_kill_chain_phases_0_phase_name_defense-evasion" "objects_170_kill_chain_phases_1_kill_chain_name_mitre-mobile-attack" "objects_170_kill_chain_phases_1_phase_name_persistence" "objects_170_x_mitre_is_subtechnique_False" "objects_170_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_170_x_mitre_attack_spec_version_2.1.0" "objects_170_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_170_spec_version_2.1" "objects_171_x_mitre_domains_0_mobile-attack" "objects_171_id_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_171_type_attack-pattern" "objects_171_created_2017-10-25T14:48:23.652Z" "objects_171_revoked_True" "objects_171_external_references_0_source_name_mitre-mobile-attack" "objects_171_external_references_0_url_https://attack.mitre.org/techniques/T1459" "objects_171_external_references_0_external_id_T1459" "objects_171_modified_2022-07-07T14:00:00.188Z" "objects_171_name_Device Unlock Code Guessing or Brute Force" "objects_171_x_mitre_version_1.0" "objects_171_x_mitre_is_subtechnique_False" "objects_171_spec_version_2.1" "objects_171_x_mitre_attack_spec_version_2.1.0" "objects_172_x_mitre_platforms_0_Android" "objects_172_x_mitre_platforms_1_iOS" "objects_172_x_mitre_domains_0_mobile-attack" "objects_172_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_172_type_attack-pattern" "objects_172_id_attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34" "objects_172_created_2017-10-25T14:48:21.667Z" "objects_172_x_mitre_version_1.1" "objects_172_external_references_0_source_name_mitre-attack" "objects_172_external_references_0_external_id_T1466" "objects_172_external_references_0_url_https://attack.mitre.org/techniques/T1466" "objects_172_external_references_1_source_name_NIST-SP800187" "objects_172_external_references_1_url_http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf" "objects_172_external_references_1_description_Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017." "objects_172_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html" "objects_172_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_172_external_references_2_external_id_CEL-3" "objects_172_x_mitre_deprecated_False" "objects_172_revoked_True" "objects_172_description_An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by newer protocols such as LTE and only allowing older protocols such as GSM to communicate(Citation: NIST-SP800187). Use of less secure protocols may make communication easier to eavesdrop upon or manipulate." "objects_172_modified_2022-04-06T15:50:42.480Z" "objects_172_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_172_name_Downgrade to Insecure Protocols" "objects_172_x_mitre_detection_" "objects_172_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_172_kill_chain_phases_0_phase_name_network-effects" "objects_172_x_mitre_is_subtechnique_False" "objects_172_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_172_x_mitre_attack_spec_version_2.1.0" "objects_172_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_172_spec_version_2.1" "objects_173_modified_2023-09-08T18:14:46.081Z" "objects_173_name_Masquerading" "objects_173_description_Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.\n\nRenaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655)\n" "objects_173_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_173_kill_chain_phases_0_phase_name_defense-evasion" "objects_173_x_mitre_deprecated_False" "objects_173_x_mitre_detection_\n" "objects_173_x_mitre_domains_0_mobile-attack" "objects_173_x_mitre_is_subtechnique_False" "objects_173_x_mitre_platforms_0_Android" "objects_173_x_mitre_platforms_1_iOS" "objects_173_x_mitre_version_1.0" "objects_173_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_173_type_attack-pattern" "objects_173_id_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_173_created_2023-07-12T20:29:48.758Z" "objects_173_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_173_revoked_False" "objects_173_external_references_0_source_name_mitre-attack" "objects_173_external_references_0_url_https://attack.mitre.org/techniques/T1655" "objects_173_external_references_0_external_id_T1655" "objects_173_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_173_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-14.html" "objects_173_external_references_1_external_id_APP-14" "objects_173_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_173_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html" "objects_173_external_references_2_external_id_APP-31" "objects_173_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_173_x_mitre_attack_spec_version_3.1.0" "objects_173_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_173_spec_version_2.1" "objects_174_x_mitre_platforms_0_Android" "objects_174_x_mitre_platforms_1_iOS" "objects_174_x_mitre_domains_0_mobile-attack" "objects_174_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_174_type_attack-pattern" "objects_174_id_attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf" "objects_174_created_2017-10-25T14:48:18.937Z" "objects_174_x_mitre_version_1.0" "objects_174_external_references_0_source_name_mitre-attack" "objects_174_external_references_0_external_id_T1472" "objects_174_external_references_0_url_https://attack.mitre.org/techniques/T1472" "objects_174_x_mitre_deprecated_False" "objects_174_revoked_True" "objects_174_description_An adversary could seek to generate fraudulent advertising revenue from mobile devices, for example by triggering automatic clicks of advertising links without user involvement." "objects_174_modified_2022-04-06T13:57:49.177Z" "objects_174_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_174_name_Generate Fraudulent Advertising Revenue" "objects_174_x_mitre_detection_" "objects_174_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_174_kill_chain_phases_0_phase_name_impact" "objects_174_x_mitre_is_subtechnique_False" "objects_174_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_174_x_mitre_attack_spec_version_2.1.0" "objects_174_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_174_spec_version_2.1" "objects_175_x_mitre_domains_0_mobile-attack" "objects_175_id_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_175_type_attack-pattern" "objects_175_created_2017-10-25T14:48:09.446Z" "objects_175_revoked_True" "objects_175_external_references_0_source_name_mitre-mobile-attack" "objects_175_external_references_0_url_https://attack.mitre.org/techniques/T1473" "objects_175_external_references_0_external_id_T1473" "objects_175_modified_2022-07-07T14:00:00.188Z" "objects_175_name_Malicious or Vulnerable Built-in Device Functionality" "objects_175_x_mitre_version_1.0" "objects_175_x_mitre_is_subtechnique_False" "objects_175_spec_version_2.1" "objects_175_x_mitre_attack_spec_version_2.1.0" "objects_176_x_mitre_platforms_0_Android" "objects_176_x_mitre_domains_0_mobile-attack" "objects_176_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_176_type_attack-pattern" "objects_176_id_attack-pattern--fa801609-ca8e-415e-815e-65f3826ff4df" "objects_176_created_2022-03-30T19:19:23.777Z" "objects_176_x_mitre_version_1.0" "objects_176_external_references_0_source_name_mitre-attack" "objects_176_external_references_0_external_id_T1406.001" "objects_176_external_references_0_url_https://attack.mitre.org/techniques/T1406/001" "objects_176_x_mitre_deprecated_False" "objects_176_revoked_False" "objects_176_description_Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files." "objects_176_modified_2022-04-21T17:30:16.229Z" "objects_176_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_176_name_Steganography" "objects_176_x_mitre_detection_Detection of steganography is difficult unless detectable artifacts with a known signature are left behind by the obfuscation process. Look for strings are other signatures left in system artifacts related to decoding steganography." "objects_176_kill_chain_phases_0_phase_name_defense-evasion" "objects_176_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_176_x_mitre_is_subtechnique_True" "objects_176_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_176_x_mitre_attack_spec_version_2.1.0" "objects_176_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_176_spec_version_2.1" "objects_177_x_mitre_platforms_0_Android" "objects_177_x_mitre_platforms_1_iOS" "objects_177_x_mitre_domains_0_mobile-attack" "objects_177_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_177_type_attack-pattern" "objects_177_id_attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d" "objects_177_created_2017-10-25T14:48:06.524Z" "objects_177_x_mitre_version_1.2" "objects_177_external_references_0_source_name_mitre-attack" "objects_177_external_references_0_external_id_T1449" "objects_177_external_references_0_url_https://attack.mitre.org/techniques/T1449" "objects_177_external_references_1_source_name_3GPP-Security" "objects_177_external_references_1_url_http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf" "objects_177_external_references_1_description_3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016." "objects_177_external_references_2_source_name_CSRIC5-WG10-FinalReport" "objects_177_external_references_2_url_https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_177_external_references_2_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_177_external_references_3_source_name_TheRegister-SS7" "objects_177_external_references_3_url_https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/" "objects_177_external_references_3_description_Iain Thomson. (2017, May 3). After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts. Retrieved November 8, 2018." "objects_177_external_references_4_source_name_Positive-SS7" "objects_177_external_references_4_url_https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf" "objects_177_external_references_4_description_Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016." "objects_177_external_references_5_source_name_Engel-SS7-2008" "objects_177_external_references_5_url_https://www.youtube.com/watch?v=q0n5ySqbfdI" "objects_177_external_references_5_description_Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016." "objects_177_external_references_6_source_name_Engel-SS7" "objects_177_external_references_6_url_https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf" "objects_177_external_references_6_description_Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016." "objects_177_external_references_7_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-37.html" "objects_177_external_references_7_source_name_NIST Mobile Threat Catalogue" "objects_177_external_references_7_external_id_CEL-37" "objects_177_x_mitre_deprecated_True" "objects_177_revoked_False" "objects_177_description_An adversary could exploit signaling system vulnerabilities to redirect calls or text messages (SMS) to a phone number under the attacker's control. The adversary could then act as an adversary-in-the-middle to intercept or manipulate the communication. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport) Interception of SMS messages could enable adversaries to obtain authentication codes used for multi-factor authentication(Citation: TheRegister-SS7)." "objects_177_modified_2022-04-06T15:53:27.032Z" "objects_177_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_177_name_Exploit SS7 to Redirect Phone Calls/SMS" "objects_177_x_mitre_detection_Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation as described by the Communications, Security, Reliability, and Interoperability Council (CSRIC). (Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members." "objects_177_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_177_kill_chain_phases_0_phase_name_network-effects" "objects_177_x_mitre_is_subtechnique_False" "objects_177_x_mitre_tactic_type_0_Without Adversary Device Access" "objects_177_x_mitre_attack_spec_version_2.1.0" "objects_177_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_177_spec_version_2.1" "objects_178_modified_2023-03-20T18:59:57.485Z" "objects_178_name_Hide Artifacts" "objects_178_description_Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application\u2019s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection." "objects_178_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_178_kill_chain_phases_0_phase_name_defense-evasion" "objects_178_x_mitre_deprecated_False" "objects_178_x_mitre_detection_The user can examine the list of all installed applications in the device settings. Application vetting services could potentially detect the usage of APIs intended for artifact hiding." "objects_178_x_mitre_domains_0_mobile-attack" "objects_178_x_mitre_is_subtechnique_False" "objects_178_x_mitre_platforms_0_Android" "objects_178_x_mitre_version_1.1" "objects_178_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_178_type_attack-pattern" "objects_178_id_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_178_created_2022-03-30T20:00:12.654Z" "objects_178_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_178_revoked_False" "objects_178_external_references_0_source_name_mitre-attack" "objects_178_external_references_0_url_https://attack.mitre.org/techniques/T1628" "objects_178_external_references_0_external_id_T1628" "objects_178_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_178_x_mitre_attack_spec_version_3.1.0" "objects_178_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_178_spec_version_2.1" "objects_179_modified_2023-03-16T18:37:55.822Z" "objects_179_name_Code Signing Policy Modification" "objects_179_description_Adversaries may modify code signing policies to enable execution of applications signed with unofficial or unknown keys. Code signing provides a level of authenticity on an app from a developer, guaranteeing that the program has not been tampered with and comes from an official source. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on a device. \n\nMobile devices generally enable these security controls by default, such as preventing the installation of unknown applications on Android. Adversaries may modify these policies in a number of ways, including [Input Injection](https://attack.mitre.org/techniques/T1516) or malicious configuration profiles." "objects_179_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_179_kill_chain_phases_0_phase_name_defense-evasion" "objects_179_x_mitre_deprecated_False" "objects_179_x_mitre_detection_On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications.\n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies." "objects_179_x_mitre_domains_0_mobile-attack" "objects_179_x_mitre_is_subtechnique_True" "objects_179_x_mitre_platforms_0_Android" "objects_179_x_mitre_platforms_1_iOS" "objects_179_x_mitre_version_1.1" "objects_179_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_179_type_attack-pattern" "objects_179_id_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_179_created_2022-03-30T18:13:26.003Z" "objects_179_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_179_revoked_False" "objects_179_external_references_0_source_name_mitre-attack" "objects_179_external_references_0_url_https://attack.mitre.org/techniques/T1632/001" "objects_179_external_references_0_external_id_T1632.001" "objects_179_external_references_1_source_name_NIST Mobile Threat Catalogue" "objects_179_external_references_1_url_https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.html" "objects_179_external_references_1_external_id_STA-7" "objects_179_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_179_x_mitre_attack_spec_version_3.1.0" "objects_179_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_179_spec_version_2.1" "objects_180_modified_2023-08-14T16:19:54.832Z" "objects_180_name_Domain Generation Algorithms" "objects_180_description_Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1637/001) (DGAs) to procedurally generate domain names for uses such as command and control communication or malicious application distribution.(Citation: securelist rotexy 2018)\n\nDGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there could potentially be thousands of domains that malware can check for instructions." "objects_180_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_180_kill_chain_phases_0_phase_name_command-and-control" "objects_180_x_mitre_deprecated_False" "objects_180_x_mitre_detection_Detecting dynamically generated domains can be challenging due to the number of different DGA algorithms, constantly evolving malware families, and the increasing complexity of the algorithms. There are a myriad of approaches for detecting a pseudo-randomly generated domain name, including using frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more.(Citation: Data Driven Security DGA) CDN domains may trigger these detections due to the format of their domain names. In addition to detecting a DGA domain based on the name, a more general approach for detecting a suspicious domain is to check for recently registered names " "objects_180_x_mitre_domains_0_mobile-attack" "objects_180_x_mitre_is_subtechnique_True" "objects_180_x_mitre_platforms_0_Android" "objects_180_x_mitre_platforms_1_iOS" "objects_180_x_mitre_version_1.1" "objects_180_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_180_type_attack-pattern" "objects_180_id_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_180_created_2022-04-05T19:59:03.161Z" "objects_180_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_180_revoked_False" "objects_180_external_references_0_source_name_mitre-attack" "objects_180_external_references_0_url_https://attack.mitre.org/techniques/T1637/001" "objects_180_external_references_0_external_id_T1637.001" "objects_180_external_references_1_source_name_Data Driven Security DGA" "objects_180_external_references_1_description_Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019." "objects_180_external_references_1_url_https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/" "objects_180_external_references_2_source_name_securelist rotexy 2018" "objects_180_external_references_2_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_180_external_references_2_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_180_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_180_x_mitre_attack_spec_version_3.1.0" "objects_180_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_180_spec_version_2.1" "objects_181_modified_2023-08-07T17:12:07.620Z" "objects_181_name_Drive-By Compromise" "objects_181_description_Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring an [Application Access Token](https://attack.mitre.org/techniques/T1550/001).\n\nMultiple ways of delivering exploit code to a browser exist, including:\n\n* A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting.\n* Malicious ads are paid for and served through legitimate ad providers.\n* Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content).\n\nOften the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Lookout-StealthMango)\n\nTypical drive-by compromise process:\n\n1. A user visits a website that is used to host the adversary controlled content.\n2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version. \n * The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes.\n3. Upon finding a vulnerable version, exploit code is delivered to the browser.\n4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place.\n * In some cases a second visit to the website after the initial scan is required before exploit code is delivered." "objects_181_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_181_kill_chain_phases_0_phase_name_initial-access" "objects_181_x_mitre_deprecated_False" "objects_181_x_mitre_detection_Mobile security products can often alert the user if their device is vulnerable to known exploits." "objects_181_x_mitre_domains_0_mobile-attack" "objects_181_x_mitre_is_subtechnique_False" "objects_181_x_mitre_platforms_0_Android" "objects_181_x_mitre_platforms_1_iOS" "objects_181_x_mitre_version_2.2" "objects_181_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_181_type_attack-pattern" "objects_181_id_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_181_created_2017-10-25T14:48:06.822Z" "objects_181_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_181_revoked_False" "objects_181_external_references_0_source_name_mitre-attack" "objects_181_external_references_0_url_https://attack.mitre.org/techniques/T1456" "objects_181_external_references_0_external_id_T1456" "objects_181_external_references_1_source_name_Lookout-StealthMango" "objects_181_external_references_1_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_181_external_references_1_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_181_external_references_2_source_name_NIST Mobile Threat Catalogue" "objects_181_external_references_2_url_https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-22.html" "objects_181_external_references_2_external_id_CEL-22" "objects_181_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_181_x_mitre_attack_spec_version_3.1.0" "objects_181_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_181_spec_version_2.1" "objects_182_x_mitre_platforms_0_Android" "objects_182_x_mitre_domains_0_mobile-attack" "objects_182_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_182_type_attack-pattern" "objects_182_id_attack-pattern--fd658820-cbba-4c95-8ac9-0fac6b1099e2" "objects_182_created_2019-07-11T18:09:42.039Z" "objects_182_x_mitre_version_1.1" "objects_182_external_references_0_source_name_mitre-attack" "objects_182_external_references_0_external_id_T1508" "objects_182_external_references_0_url_https://attack.mitre.org/techniques/T1508" "objects_182_external_references_1_source_name_sunny-stolen-credentials" "objects_182_external_references_1_url_https://www.welivesecurity.com/2017/02/22/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play/" "objects_182_external_references_1_description_Luk\u00e1\u0161 \u0160tefanko. (2017, February 22). Sunny with a chance of stolen credentials: Malicious weather app found on Google Play. Retrieved July 11, 2019." "objects_182_external_references_2_source_name_android-trojan-steals-paypal-2fa" "objects_182_external_references_2_url_https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/" "objects_182_external_references_2_description_Luk\u00e1\u0161 \u0160tefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019." "objects_182_external_references_3_source_name_bankbot-spybanker" "objects_182_external_references_3_url_https://www.cyber.nj.gov/threat-profiles/android-malware-variants/bankbot-spybanker" "objects_182_external_references_3_description_NJCCIC. (2017, March 2). BankBot/Spy Banker. Retrieved July 11, 2019." "objects_182_x_mitre_deprecated_False" "objects_182_revoked_True" "objects_182_description_A malicious application could suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed, and to make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions.\n\nThis behavior has been seen in the BankBot/Spy Banker family of malware.(Citation: android-trojan-steals-paypal-2fa)(Citation: sunny-stolen-credentials)(Citation: bankbot-spybanker)" "objects_182_modified_2022-03-30T20:07:33.279Z" "objects_182_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_182_name_Suppress Application Icon" "objects_182_x_mitre_detection_The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings." "objects_182_kill_chain_phases_0_kill_chain_name_mitre-mobile-attack" "objects_182_kill_chain_phases_0_phase_name_defense-evasion" "objects_182_x_mitre_is_subtechnique_False" "objects_182_x_mitre_tactic_type_0_Post-Adversary Device Access" "objects_182_x_mitre_attack_spec_version_2.1.0" "objects_182_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_182_spec_version_2.1" "objects_183_modified_2022-11-08T14:00:00.188Z" "objects_183_name_Operation Dust Storm" "objects_183_description_[Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) was a long-standing persistent cyber espionage campaign that targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. By 2015, the [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors shifted from government and defense-related intelligence targets to Japanese companies or Japanese subdivisions of larger foreign organizations supporting Japan's critical infrastructure, including electricity generation, oil and natural gas, finance, transportation, and construction.(Citation: Cylance Dust Storm)\n\n[Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors also began to use Android backdoors in their operations by 2015, with all identified victims at the time residing in Japan or South Korea.(Citation: Cylance Dust Storm)" "objects_183_aliases_0_Operation Dust Storm" "objects_183_first_seen_2010-01-01T07:00:00.000Z" "objects_183_last_seen_2016-02-01T06:00:00.000Z" "objects_183_x_mitre_first_seen_citation_(Citation: Cylance Dust Storm)" "objects_183_x_mitre_last_seen_citation_(Citation: Cylance Dust Storm)" "objects_183_x_mitre_deprecated_False" "objects_183_x_mitre_version_1.0" "objects_183_type_campaign" "objects_183_id_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_183_created_2022-09-29T20:00:38.136Z" "objects_183_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_183_revoked_False" "objects_183_external_references_0_source_name_mitre-attack" "objects_183_external_references_0_url_https://attack.mitre.org/campaigns/C0016" "objects_183_external_references_0_external_id_C0016" "objects_183_external_references_1_source_name_Cylance Dust Storm" "objects_183_external_references_1_description_Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021." "objects_183_external_references_1_url_https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf" "objects_183_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_183_x_mitre_attack_spec_version_3.0.0" "objects_183_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_183_x_mitre_domains_0_enterprise-attack" "objects_183_x_mitre_domains_1_mobile-attack" "objects_183_spec_version_2.1" "objects_184_x_mitre_domains_0_mobile-attack" "objects_184_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_184_id_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_184_type_course-of-action" "objects_184_created_2017-10-25T14:48:51.657Z" "objects_184_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_184_external_references_0_source_name_mitre-attack" "objects_184_external_references_0_url_https://attack.mitre.org/mitigations/M1006" "objects_184_external_references_0_external_id_M1006" "objects_184_modified_2019-07-19T17:44:53.176Z" "objects_184_name_Use Recent OS Version" "objects_184_description_New mobile operating system versions bring not only patches against discovered vulnerabilities but also often bring security architecture improvements that provide resilience against potential vulnerabilities or weaknesses that have not yet been discovered. They may also bring improvements that block use of observed adversary techniques." "objects_184_x_mitre_version_1.0" "objects_184_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_184_spec_version_2.1" "objects_184_x_mitre_attack_spec_version_2.1.0" "objects_185_x_mitre_domains_0_mobile-attack" "objects_185_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_185_type_course-of-action" "objects_185_id_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_185_created_2019-10-18T12:49:58.924Z" "objects_185_x_mitre_version_1.0" "objects_185_external_references_0_source_name_mitre-attack" "objects_185_external_references_0_external_id_M1005" "objects_185_external_references_0_url_https://attack.mitre.org/mitigations/M1005" "objects_185_x_mitre_deprecated_True" "objects_185_revoked_False" "objects_185_description_Enterprises can vet applications for exploitable vulnerabilities or unwanted (privacy-invasive or malicious) behaviors. Enterprises can inspect applications themselves or use a third-party service.\n\nEnterprises may impose policies to only allow pre-approved applications to be installed on their devices or may impose policies to block use of specific applications known to have issues. In Bring Your Own Device (BYOD) environments, enterprises may only be able to impose these policies over an enterprise-managed portion of the device.\n\nApplication Vetting is not a complete mitigation. Techniques such as [Evade Analysis Environment](https://attack.mitre.org/techniques/T1523) exist that can enable adversaries to bypass vetting." "objects_185_modified_2022-04-06T14:47:46.019Z" "objects_185_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_185_name_Application Vetting" "objects_185_x_mitre_attack_spec_version_2.1.0" "objects_185_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_185_spec_version_2.1" "objects_186_modified_2023-09-27T20:18:19.004Z" "objects_186_name_Application Developer Guidance" "objects_186_description_This mitigation describes any guidance or training given to developers of applications to avoid introducing security weaknesses that an adversary may be able to take advantage of." "objects_186_x_mitre_deprecated_False" "objects_186_x_mitre_domains_0_enterprise-attack" "objects_186_x_mitre_domains_1_mobile-attack" "objects_186_x_mitre_version_1.1" "objects_186_type_course-of-action" "objects_186_id_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_186_created_2017-10-25T14:48:53.732Z" "objects_186_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_186_revoked_False" "objects_186_external_references_0_source_name_mitre-attack" "objects_186_external_references_0_url_https://attack.mitre.org/mitigations/M1013" "objects_186_external_references_0_external_id_M1013" "objects_186_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_186_x_mitre_attack_spec_version_3.2.0" "objects_186_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_186_spec_version_2.1" "objects_187_x_mitre_domains_0_mobile-attack" "objects_187_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_187_id_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_187_type_course-of-action" "objects_187_created_2017-10-25T14:48:53.318Z" "objects_187_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_187_external_references_0_source_name_mitre-attack" "objects_187_external_references_0_url_https://attack.mitre.org/mitigations/M1012" "objects_187_external_references_0_external_id_M1012" "objects_187_modified_2022-07-07T14:00:00.188Z" "objects_187_name_Enterprise Policy" "objects_187_description_An enterprise mobility management (EMM), also known as mobile device management (MDM), system can be used to provision policies to mobile devices to control aspects of their allowed behavior." "objects_187_x_mitre_version_1.0" "objects_187_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_187_spec_version_2.1" "objects_187_x_mitre_attack_spec_version_2.1.0" "objects_188_x_mitre_domains_0_mobile-attack" "objects_188_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_188_id_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_188_type_course-of-action" "objects_188_created_2019-10-18T12:53:03.508Z" "objects_188_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_188_external_references_0_source_name_mitre-attack" "objects_188_external_references_0_external_id_M1011" "objects_188_external_references_0_url_https://attack.mitre.org/mitigations/M1011" "objects_188_modified_2019-10-18T15:51:48.318Z" "objects_188_name_User Guidance" "objects_188_description_Describes any guidance or training given to users to set particular configuration settings or avoid specific potentially risky behaviors." "objects_188_x_mitre_version_1.0" "objects_188_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_188_spec_version_2.1" "objects_188_x_mitre_attack_spec_version_2.1.0" "objects_189_modified_2023-09-21T19:36:08.280Z" "objects_189_name_Antivirus/Antimalware" "objects_189_description_Mobile security products, such as Mobile Threat Defense (MTD), offer various device-based mitigations against certain behaviors." "objects_189_x_mitre_deprecated_False" "objects_189_x_mitre_domains_0_mobile-attack" "objects_189_x_mitre_version_1.0" "objects_189_type_course-of-action" "objects_189_id_course-of-action--78671282-26aa-486c-a7a5-5921e1616b58" "objects_189_created_2023-09-21T19:36:08.280Z" "objects_189_revoked_False" "objects_189_external_references_0_source_name_mitre-attack" "objects_189_external_references_0_url_https://attack.mitre.org/mitigations/M1058" "objects_189_external_references_0_external_id_M1058" "objects_189_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_189_x_mitre_attack_spec_version_3.1.0" "objects_189_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_189_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_189_spec_version_2.1" "objects_190_x_mitre_domains_0_mobile-attack" "objects_190_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_190_id_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_190_type_course-of-action" "objects_190_created_2017-10-25T14:48:52.270Z" "objects_190_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_190_external_references_0_source_name_mitre-attack" "objects_190_external_references_0_url_https://attack.mitre.org/mitigations/M1004" "objects_190_external_references_0_external_id_M1004" "objects_190_modified_2019-07-19T17:44:53.176Z" "objects_190_name_System Partition Integrity" "objects_190_description_Ensure that Android devices being used include and enable the Verified Boot capability, which cryptographically ensures the integrity of the system partition." "objects_190_x_mitre_version_1.0" "objects_190_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_190_spec_version_2.1" "objects_190_x_mitre_attack_spec_version_2.1.0" "objects_191_x_mitre_domains_0_mobile-attack" "objects_191_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_191_id_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_191_type_course-of-action" "objects_191_created_2017-10-25T14:48:50.769Z" "objects_191_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_191_external_references_0_source_name_mitre-attack" "objects_191_external_references_0_url_https://attack.mitre.org/mitigations/M1009" "objects_191_external_references_0_external_id_M1009" "objects_191_external_references_1_source_name_TechCrunch-ATS" "objects_191_external_references_1_description_Kate Conger. (2016, June 14). Apple will require HTTPS connections for iOS apps by the end of 2016. Retrieved December 19, 2016." "objects_191_external_references_1_url_https://techcrunch.com/2016/06/14/apple-will-require-https-connections-for-ios-apps-by-the-end-of-2016/" "objects_191_external_references_2_source_name_Android-NetworkSecurityConfig" "objects_191_external_references_2_description_Google. (n.d.). Network Security Configuration. Retrieved December 19, 2016." "objects_191_external_references_2_url_https://developer.android.com/training/articles/security-config.html" "objects_191_modified_2019-07-19T17:44:53.176Z" "objects_191_name_Encrypt Network Traffic" "objects_191_description_Application developers should encrypt all of their application network traffic using the Transport Layer Security (TLS) protocol to ensure protection of sensitive data and deter network-based attacks. If desired, application developers could perform message-based encryption of data before passing it for TLS encryption.\n\niOS's App Transport Security feature can be used to help ensure that all application network traffic is appropriately protected. Apple intends to mandate use of App Transport Security (Citation: TechCrunch-ATS) for all apps in the Apple App Store unless appropriate justification is given.\n\nAndroid's Network Security Configuration feature similarly can be used by app developers to help ensure that all of their application network traffic is appropriately protected (Citation: Android-NetworkSecurityConfig).\n\nUse of Virtual Private Network (VPN) tunnels, e.g. using the IPsec protocol, can help mitigate some types of network attacks as well." "objects_191_x_mitre_version_1.0" "objects_191_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_191_spec_version_2.1" "objects_191_x_mitre_attack_spec_version_2.1.0" "objects_192_x_mitre_domains_0_mobile-attack" "objects_192_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_192_id_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_192_type_course-of-action" "objects_192_created_2017-10-25T14:48:49.554Z" "objects_192_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_192_external_references_0_source_name_mitre-attack" "objects_192_external_references_0_url_https://attack.mitre.org/mitigations/M1003" "objects_192_external_references_0_external_id_M1003" "objects_192_modified_2019-07-19T17:44:53.176Z" "objects_192_name_Lock Bootloader" "objects_192_description_On devices that provide the capability to unlock the bootloader (hence allowing any operating system code to be flashed onto the device), perform periodic checks to ensure that the bootloader is locked." "objects_192_x_mitre_version_1.0" "objects_192_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_192_spec_version_2.1" "objects_192_x_mitre_attack_spec_version_2.1.0" "objects_193_x_mitre_domains_0_mobile-attack" "objects_193_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_193_id_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_193_type_course-of-action" "objects_193_created_2019-10-18T12:51:36.488Z" "objects_193_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_193_external_references_0_source_name_mitre-attack" "objects_193_external_references_0_external_id_M1001" "objects_193_external_references_0_url_https://attack.mitre.org/mitigations/M1001" "objects_193_modified_2019-10-18T14:56:15.631Z" "objects_193_name_Security Updates" "objects_193_description_Install security updates in response to discovered vulnerabilities.\n\nPurchase devices with a vendor and/or mobile carrier commitment to provide security updates in a prompt manner for a set period of time.\n\nDecommission devices that will no longer receive security updates.\n\nLimit or block access to enterprise resources from devices that have not installed recent security updates.\n\nOn Android devices, access can be controlled based on each device's security patch level. On iOS devices, access can be controlled based on the iOS version." "objects_193_x_mitre_version_1.0" "objects_193_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_193_spec_version_2.1" "objects_193_x_mitre_attack_spec_version_2.1.0" "objects_194_x_mitre_domains_0_mobile-attack" "objects_194_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_194_id_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_194_type_course-of-action" "objects_194_created_2017-10-25T14:48:52.601Z" "objects_194_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_194_external_references_0_source_name_mitre-attack" "objects_194_external_references_0_url_https://attack.mitre.org/mitigations/M1010" "objects_194_external_references_0_external_id_M1010" "objects_194_modified_2019-07-19T17:44:53.176Z" "objects_194_name_Deploy Compromised Device Detection Method" "objects_194_description_A variety of methods exist that can be used to enable enterprises to identify compromised (e.g. rooted/jailbroken) devices, whether using security mechanisms built directly into the device, third-party mobile security applications, enterprise mobility management (EMM)/mobile device management (MDM) capabilities, or other methods. Some methods may be trivial to evade while others may be more sophisticated." "objects_194_x_mitre_version_1.0" "objects_194_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_194_spec_version_2.1" "objects_194_x_mitre_attack_spec_version_2.1.0" "objects_195_modified_2023-08-15T15:06:03.428Z" "objects_195_name_Interconnection Filtering" "objects_195_description_In order to mitigate Signaling System 7 (SS7) exploitation, the Communications, Security, Reliability, and Interoperability Council (CSRIC) describes filtering interconnections between network operators to block inappropriate requests (Citation: CSRIC5-WG10-FinalReport)." "objects_195_x_mitre_deprecated_False" "objects_195_x_mitre_domains_0_mobile-attack" "objects_195_x_mitre_version_1.0" "objects_195_type_course-of-action" "objects_195_id_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_195_created_2017-10-25T14:48:50.181Z" "objects_195_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_195_revoked_False" "objects_195_external_references_0_source_name_mitre-attack" "objects_195_external_references_0_url_https://attack.mitre.org/mitigations/M1014" "objects_195_external_references_0_external_id_M1014" "objects_195_external_references_1_source_name_CSRIC5-WG10-FinalReport" "objects_195_external_references_1_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_195_external_references_1_url_https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_195_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_195_x_mitre_attack_spec_version_3.1.0" "objects_195_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_195_spec_version_2.1" "objects_196_x_mitre_domains_0_mobile-attack" "objects_196_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_196_type_course-of-action" "objects_196_id_course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9" "objects_196_created_2017-10-25T14:48:51.365Z" "objects_196_x_mitre_version_1.0" "objects_196_external_references_0_source_name_mitre-attack" "objects_196_external_references_0_external_id_M1007" "objects_196_external_references_0_url_https://attack.mitre.org/mitigations/M1007" "objects_196_x_mitre_deprecated_True" "objects_196_revoked_False" "objects_196_description_Warn device users not to accept requests to grant Device Administrator access to applications without good reason.\n\nAdditionally, application vetting should include a check on whether the application requests Device Administrator access. Applications that do request Device Administrator access should be carefully scrutinized and only allowed to be used if a valid reason exists." "objects_196_modified_2022-04-06T14:47:19.714Z" "objects_196_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_196_name_Caution with Device Administrator Access" "objects_196_x_mitre_attack_spec_version_2.1.0" "objects_196_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_196_spec_version_2.1" "objects_197_x_mitre_domains_0_mobile-attack" "objects_197_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_197_id_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_197_type_course-of-action" "objects_197_created_2019-10-18T12:50:35.335Z" "objects_197_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_197_external_references_0_source_name_mitre-attack" "objects_197_external_references_0_external_id_M1002" "objects_197_external_references_0_url_https://attack.mitre.org/mitigations/M1002" "objects_197_modified_2019-10-18T14:52:53.019Z" "objects_197_name_Attestation" "objects_197_description_Enable remote attestation capabilities when available (such as Android SafetyNet or Samsung Knox TIMA Attestation) and prohibit devices that fail the attestation from accessing enterprise resources." "objects_197_x_mitre_version_1.0" "objects_197_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_197_spec_version_2.1" "objects_197_x_mitre_attack_spec_version_2.1.0" "objects_198_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_198_id_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_198_type_identity" "objects_198_identity_class_organization" "objects_198_created_2017-06-01T00:00:00.000Z" "objects_198_modified_2017-06-01T00:00:00.000Z" "objects_198_name_The MITRE Corporation" "objects_198_spec_version_2.1" "objects_198_x_mitre_attack_spec_version_2.1.0" "objects_198_x_mitre_domains_0_mobile-attack" "objects_198_x_mitre_version_1.0" "objects_199_aliases_0_Bouncing Golf" "objects_199_x_mitre_domains_0_mobile-attack" "objects_199_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_199_id_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_199_type_intrusion-set" "objects_199_created_2020-01-27T16:55:39.688Z" "objects_199_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_199_external_references_0_external_id_G0097" "objects_199_external_references_0_source_name_mitre-attack" "objects_199_external_references_0_url_https://attack.mitre.org/groups/G0097" "objects_199_external_references_1_source_name_Trend Micro Bouncing Golf 2019" "objects_199_external_references_1_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_199_external_references_1_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_199_modified_2020-03-26T20:58:44.722Z" "objects_199_name_Bouncing Golf" "objects_199_description_[Bouncing Golf](https://attack.mitre.org/groups/G0097) is a cyberespionage campaign targeting Middle Eastern countries.(Citation: Trend Micro Bouncing Golf 2019)" "objects_199_x_mitre_version_1.0" "objects_199_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_199_spec_version_2.1" "objects_199_x_mitre_attack_spec_version_2.1.0" "objects_200_modified_2023-10-06T14:13:06.011Z" "objects_200_name_Sandworm Team" "objects_200_description_[Sandworm Team](https://attack.mitre.org/groups/G0034) is a destructive threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) Main Center for Special Technologies (GTsST) military unit 74455.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020) This group has been active since at least 2009.(Citation: iSIGHT Sandworm 2014)(Citation: CrowdStrike VOODOO BEAR)(Citation: USDOJ Sandworm Feb 2020)(Citation: NCSC Sandworm Feb 2020)\n\nIn October 2020, the US indicted six GRU Unit 74455 officers associated with [Sandworm Team](https://attack.mitre.org/groups/G0034) for the following cyber operations: the 2015 and 2016 attacks against Ukrainian electrical companies and government organizations, the 2017 worldwide [NotPetya](https://attack.mitre.org/software/S0368) attack, targeting of the 2017 French presidential campaign, the 2018 [Olympic Destroyer](https://attack.mitre.org/software/S0365) attack against the Winter Olympic Games, the 2018 operation against the Organisation for the Prohibition of Chemical Weapons, and attacks against the country of Georgia in 2018 and 2019.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020) Some of these were conducted with the assistance of GRU Unit 26165, which is also referred to as [APT28](https://attack.mitre.org/groups/G0007).(Citation: US District Court Indictment GRU Oct 2018)" "objects_200_aliases_0_Sandworm Team" "objects_200_aliases_1_ELECTRUM" "objects_200_aliases_2_Telebots" "objects_200_aliases_3_IRON VIKING" "objects_200_aliases_4_BlackEnergy (Group)" "objects_200_aliases_5_Quedagh" "objects_200_aliases_6_Voodoo Bear" "objects_200_aliases_7_IRIDIUM" "objects_200_x_mitre_deprecated_False" "objects_200_x_mitre_version_3.1" "objects_200_x_mitre_contributors_0_Dragos Threat Intelligence" "objects_200_type_intrusion-set" "objects_200_id_intrusion-set--381fcf73-60f6-4ab2-9991-6af3cbc35192" "objects_200_created_2017-05-31T21:32:04.588Z" "objects_200_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_200_revoked_False" "objects_200_external_references_0_source_name_mitre-attack" "objects_200_external_references_0_url_https://attack.mitre.org/groups/G0034" "objects_200_external_references_0_external_id_G0034" "objects_200_external_references_1_source_name_Voodoo Bear" "objects_200_external_references_1_description_(Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_2_source_name_ELECTRUM" "objects_200_external_references_2_description_(Citation: Dragos ELECTRUM)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_3_source_name_Sandworm Team" "objects_200_external_references_3_description_(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_4_source_name_Quedagh" "objects_200_external_references_4_description_(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_5_source_name_IRIDIUM" "objects_200_external_references_5_description_(Citation: Microsoft Prestige ransomware October 2022)" "objects_200_external_references_6_source_name_BlackEnergy (Group)" "objects_200_external_references_6_description_(Citation: NCSC Sandworm Feb 2020)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_7_source_name_Telebots" "objects_200_external_references_7_description_(Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_8_source_name_IRON VIKING" "objects_200_external_references_8_description_(Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)" "objects_200_external_references_9_source_name_US District Court Indictment GRU Oct 2018" "objects_200_external_references_9_description_Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020." "objects_200_external_references_9_url_https://www.justice.gov/opa/page/file/1098481/download" "objects_200_external_references_10_source_name_Dragos ELECTRUM" "objects_200_external_references_10_description_Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020." "objects_200_external_references_10_url_https://www.dragos.com/resource/electrum/" "objects_200_external_references_11_source_name_F-Secure BlackEnergy 2014" "objects_200_external_references_11_description_F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016." "objects_200_external_references_11_url_https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf" "objects_200_external_references_12_source_name_iSIGHT Sandworm 2014" "objects_200_external_references_12_description_Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017." "objects_200_external_references_12_url_https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.html" "objects_200_external_references_13_source_name_CrowdStrike VOODOO BEAR" "objects_200_external_references_13_description_Meyers, A. (2018, January 19). Meet CrowdStrike\u2019s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018." "objects_200_external_references_13_url_https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/" "objects_200_external_references_14_source_name_Microsoft Prestige ransomware October 2022" "objects_200_external_references_14_description_MSTIC. (2022, October 14). New \u201cPrestige\u201d ransomware impacts organizations in Ukraine and Poland. Retrieved January 19, 2023." "objects_200_external_references_14_url_https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/" "objects_200_external_references_15_source_name_InfoSecurity Sandworm Oct 2014" "objects_200_external_references_15_description_Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian \u2018Sandworm\u2019 Hackers. Retrieved October 6, 2017." "objects_200_external_references_15_url_https://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/" "objects_200_external_references_16_source_name_NCSC Sandworm Feb 2020" "objects_200_external_references_16_description_NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020." "objects_200_external_references_16_url_https://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisory" "objects_200_external_references_17_source_name_USDOJ Sandworm Feb 2020" "objects_200_external_references_17_description_Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020." "objects_200_external_references_17_url_https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.html" "objects_200_external_references_18_source_name_US District Court Indictment GRU Unit 74455 October 2020" "objects_200_external_references_18_description_Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020." "objects_200_external_references_18_url_https://www.justice.gov/opa/press-release/file/1328521/download" "objects_200_external_references_19_source_name_Secureworks IRON VIKING " "objects_200_external_references_19_description_Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020." "objects_200_external_references_19_url_https://www.secureworks.com/research/threat-profiles/iron-viking" "objects_200_external_references_20_source_name_UK NCSC Olympic Attacks October 2020" "objects_200_external_references_20_description_UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020." "objects_200_external_references_20_url_https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games" "objects_200_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_200_x_mitre_domains_0_enterprise-attack" "objects_200_x_mitre_domains_1_ics-attack" "objects_200_x_mitre_domains_2_mobile-attack" "objects_200_x_mitre_attack_spec_version_3.2.0" "objects_200_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_200_spec_version_2.1" "objects_201_modified_2023-09-22T20:43:16.504Z" "objects_201_name_Confucius" "objects_201_description_[Confucius](https://attack.mitre.org/groups/G0142) is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between [Confucius](https://attack.mitre.org/groups/G0142) and [Patchwork](https://attack.mitre.org/groups/G0040), particularly in their respective custom malware code and targets.(Citation: TrendMicro Confucius APT Feb 2018)(Citation: TrendMicro Confucius APT Aug 2021)(Citation: Uptycs Confucius APT Jan 2021)" "objects_201_aliases_0_Confucius" "objects_201_aliases_1_Confucius APT" "objects_201_x_mitre_deprecated_False" "objects_201_x_mitre_version_1.1" "objects_201_type_intrusion-set" "objects_201_id_intrusion-set--6eded342-33e5-4451-b6b2-e1c62863129f" "objects_201_created_2021-12-26T23:11:39.442Z" "objects_201_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_201_revoked_False" "objects_201_external_references_0_source_name_mitre-attack" "objects_201_external_references_0_url_https://attack.mitre.org/groups/G0142" "objects_201_external_references_0_external_id_G0142" "objects_201_external_references_1_source_name_TrendMicro Confucius APT Feb 2018" "objects_201_external_references_1_description_Lunghi, D and Horejsi, J. (2018, February 13). Deciphering Confucius: A Look at the Group's Cyberespionage Operations. Retrieved December 26, 2021." "objects_201_external_references_1_url_https://www.trendmicro.com/en_us/research/18/b/deciphering-confucius-cyberespionage-operations.html" "objects_201_external_references_2_source_name_TrendMicro Confucius APT Aug 2021" "objects_201_external_references_2_description_Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021." "objects_201_external_references_2_url_https://www.trendmicro.com/en_us/research/21/h/confucius-uses-pegasus-spyware-related-lures-to-target-pakistani.html" "objects_201_external_references_3_source_name_Uptycs Confucius APT Jan 2021" "objects_201_external_references_3_description_Uptycs Threat Research Team. (2021, January 12). Confucius APT deploys Warzone RAT. Retrieved December 17, 2021." "objects_201_external_references_3_url_https://www.uptycs.com/blog/confucius-apt-deploys-warzone-rat" "objects_201_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_201_x_mitre_domains_0_enterprise-attack" "objects_201_x_mitre_domains_1_mobile-attack" "objects_201_x_mitre_attack_spec_version_3.1.0" "objects_201_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_201_spec_version_2.1" "objects_202_modified_2023-09-26T14:34:08.342Z" "objects_202_name_MoustachedBouncer" "objects_202_description_[MoustachedBouncer](https://attack.mitre.org/groups/G1019) is a cyberespionage group that has been active since at least 2014 targeting foreign embassies in Belarus.(Citation: MoustachedBouncer ESET August 2023)" "objects_202_aliases_0_MoustachedBouncer" "objects_202_x_mitre_deprecated_False" "objects_202_x_mitre_version_1.0" "objects_202_type_intrusion-set" "objects_202_id_intrusion-set--7251b44b-6072-476c-b8d9-a6e32c355b28" "objects_202_created_2023-09-25T18:11:05.672Z" "objects_202_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_202_revoked_False" "objects_202_external_references_0_source_name_mitre-attack" "objects_202_external_references_0_url_https://attack.mitre.org/groups/G1019" "objects_202_external_references_0_external_id_G1019" "objects_202_external_references_1_source_name_MoustachedBouncer ESET August 2023" "objects_202_external_references_1_description_Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 25, 2023." "objects_202_external_references_1_url_https://www.welivesecurity.com/en/eset-research/moustachedbouncer-espionage-against-foreign-diplomats-in-belarus/" "objects_202_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_202_x_mitre_domains_0_enterprise-attack" "objects_202_x_mitre_domains_1_mobile-attack" "objects_202_x_mitre_attack_spec_version_3.1.0" "objects_202_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_202_spec_version_2.1" "objects_203_aliases_0_Dark Caracal" "objects_203_x_mitre_domains_0_enterprise-attack" "objects_203_x_mitre_domains_1_mobile-attack" "objects_203_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_203_id_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_203_type_intrusion-set" "objects_203_created_2018-10-17T00:14:20.652Z" "objects_203_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_203_external_references_0_source_name_mitre-attack" "objects_203_external_references_0_url_https://attack.mitre.org/groups/G0070" "objects_203_external_references_0_external_id_G0070" "objects_203_external_references_1_source_name_Dark Caracal" "objects_203_external_references_1_description_(Citation: Lookout Dark Caracal Jan 2018)" "objects_203_external_references_2_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_203_external_references_2_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_203_external_references_2_source_name_Lookout Dark Caracal Jan 2018" "objects_203_modified_2022-10-25T14:00:00.188Z" "objects_203_name_Dark Caracal" "objects_203_description_[Dark Caracal](https://attack.mitre.org/groups/G0070) is threat group that has been attributed to the Lebanese General Directorate of General Security (GDGS) and has operated since at least 2012. (Citation: Lookout Dark Caracal Jan 2018)" "objects_203_x_mitre_version_1.3" "objects_203_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_203_spec_version_2.1" "objects_203_x_mitre_attack_spec_version_2.1.0" "objects_204_aliases_0_Windshift" "objects_204_aliases_1_Bahamut" "objects_204_x_mitre_domains_0_enterprise-attack" "objects_204_x_mitre_domains_1_mobile-attack" "objects_204_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_204_id_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_204_type_intrusion-set" "objects_204_created_2020-06-25T17:16:39.168Z" "objects_204_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_204_external_references_0_external_id_G0112" "objects_204_external_references_0_source_name_mitre-attack" "objects_204_external_references_0_url_https://attack.mitre.org/groups/G0112" "objects_204_external_references_1_source_name_Bahamut" "objects_204_external_references_1_description_(Citation: SANS Windshift August 2018)" "objects_204_external_references_2_source_name_SANS Windshift August 2018" "objects_204_external_references_2_url_https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1554718868.pdf" "objects_204_external_references_2_description_Karim, T. (2018, August). TRAILS OF WINDSHIFT. Retrieved June 25, 2020." "objects_204_external_references_3_source_name_objective-see windtail1 dec 2018" "objects_204_external_references_3_url_https://objective-see.com/blog/blog_0x3B.html" "objects_204_external_references_3_description_Wardle, Patrick. (2018, December 20). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 1). Retrieved October 3, 2019." "objects_204_external_references_4_source_name_objective-see windtail2 jan 2019" "objects_204_external_references_4_url_https://objective-see.com/blog/blog_0x3D.html" "objects_204_external_references_4_description_Wardle, Patrick. (2019, January 15). Middle East Cyber-Espionage analyzing WindShift's implant: OSX.WindTail (part 2). Retrieved October 3, 2019." "objects_204_modified_2022-10-25T14:00:00.188Z" "objects_204_name_Windshift" "objects_204_description_[Windshift](https://attack.mitre.org/groups/G0112) is a threat group that has been active since at least 2017, targeting specific individuals for surveillance in government departments and critical infrastructure across the Middle East.(Citation: SANS Windshift August 2018)(Citation: objective-see windtail1 dec 2018)(Citation: objective-see windtail2 jan 2019)" "objects_204_x_mitre_version_1.1" "objects_204_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_204_spec_version_2.1" "objects_204_x_mitre_attack_spec_version_2.1.0" "objects_205_modified_2023-03-26T17:51:20.401Z" "objects_205_name_APT28" "objects_205_description_[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019)\n\n[APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election. (Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). " "objects_205_aliases_0_APT28" "objects_205_aliases_1_IRON TWILIGHT" "objects_205_aliases_2_SNAKEMACKEREL" "objects_205_aliases_3_Swallowtail" "objects_205_aliases_4_Group 74" "objects_205_aliases_5_Sednit" "objects_205_aliases_6_Sofacy" "objects_205_aliases_7_Pawn Storm" "objects_205_aliases_8_Fancy Bear" "objects_205_aliases_9_STRONTIUM" "objects_205_aliases_10_Tsar Team" "objects_205_aliases_11_Threat Group-4127" "objects_205_aliases_12_TG-4127" "objects_205_x_mitre_deprecated_False" "objects_205_x_mitre_version_4.0" "objects_205_x_mitre_contributors_0_S\u00e9bastien Ruel, CGI" "objects_205_x_mitre_contributors_1_Drew Church, Splunk" "objects_205_x_mitre_contributors_2_Emily Ratliff, IBM" "objects_205_x_mitre_contributors_3_Richard Gold, Digital Shadows" "objects_205_type_intrusion-set" "objects_205_id_intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c" "objects_205_created_2017-05-31T21:31:48.664Z" "objects_205_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_205_revoked_False" "objects_205_external_references_0_source_name_mitre-attack" "objects_205_external_references_0_url_https://attack.mitre.org/groups/G0007" "objects_205_external_references_0_external_id_G0007" "objects_205_external_references_1_source_name_SNAKEMACKEREL" "objects_205_external_references_1_description_(Citation: Accenture SNAKEMACKEREL Nov 2018)" "objects_205_external_references_2_source_name_Fancy Bear" "objects_205_external_references_2_description_(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)" "objects_205_external_references_3_source_name_Tsar Team" "objects_205_external_references_3_description_(Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)" "objects_205_external_references_4_source_name_APT28" "objects_205_external_references_4_description_(Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)" "objects_205_external_references_5_source_name_STRONTIUM" "objects_205_external_references_5_description_(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)" "objects_205_external_references_6_source_name_IRON TWILIGHT" "objects_205_external_references_6_description_(Citation: Secureworks IRON TWILIGHT Profile)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)" "objects_205_external_references_7_source_name_Threat Group-4127" "objects_205_external_references_7_description_(Citation: SecureWorks TG-4127)" "objects_205_external_references_8_source_name_TG-4127" "objects_205_external_references_8_description_(Citation: SecureWorks TG-4127)" "objects_205_external_references_9_source_name_Pawn Storm" "objects_205_external_references_9_description_(Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) " "objects_205_external_references_10_source_name_Swallowtail" "objects_205_external_references_10_description_(Citation: Symantec APT28 Oct 2018)" "objects_205_external_references_11_source_name_Group 74" "objects_205_external_references_11_description_(Citation: Talos Seduploader Oct 2017)" "objects_205_external_references_12_source_name_Accenture SNAKEMACKEREL Nov 2018" "objects_205_external_references_12_description_Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019." "objects_205_external_references_12_url_https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50" "objects_205_external_references_13_source_name_Crowdstrike DNC June 2016" "objects_205_external_references_13_description_Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016." "objects_205_external_references_13_url_https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/" "objects_205_external_references_14_source_name_US District Court Indictment GRU Oct 2018" "objects_205_external_references_14_description_Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020." "objects_205_external_references_14_url_https://www.justice.gov/opa/page/file/1098481/download" "objects_205_external_references_15_source_name_GRIZZLY STEPPE JAR" "objects_205_external_references_15_description_Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE \u2013 Russian Malicious Cyber Activity. Retrieved January 11, 2017." "objects_205_external_references_15_url_https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf" "objects_205_external_references_16_source_name_ESET Zebrocy May 2019" "objects_205_external_references_16_description_ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019." "objects_205_external_references_16_url_https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/" "objects_205_external_references_17_source_name_ESET Sednit Part 3" "objects_205_external_references_17_description_ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016." "objects_205_external_references_17_url_http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf" "objects_205_external_references_18_source_name_Sofacy DealersChoice" "objects_205_external_references_18_description_Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018." "objects_205_external_references_18_url_https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/" "objects_205_external_references_19_source_name_FireEye APT28 January 2017" "objects_205_external_references_19_description_FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017." "objects_205_external_references_19_url_https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" "objects_205_external_references_20_source_name_FireEye APT28" "objects_205_external_references_20_description_FireEye. (2015). APT28: A WINDOW INTO RUSSIA\u2019S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015." "objects_205_external_references_20_url_https://web.archive.org/web/20151022204649/https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf" "objects_205_external_references_21_source_name_Ars Technica GRU indictment Jul 2018" "objects_205_external_references_21_description_Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018." "objects_205_external_references_21_url_https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/" "objects_205_external_references_22_source_name_TrendMicro Pawn Storm Dec 2020" "objects_205_external_references_22_description_Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm\u2019s Lack of Sophistication as a Strategy. Retrieved January 13, 2021." "objects_205_external_references_22_url_https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html" "objects_205_external_references_23_source_name_Securelist Sofacy Feb 2018" "objects_205_external_references_23_description_Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018." "objects_205_external_references_23_url_https://securelist.com/a-slice-of-2017-sofacy-activity/83930/" "objects_205_external_references_24_source_name_Kaspersky Sofacy" "objects_205_external_references_24_description_Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015." "objects_205_external_references_24_url_https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/" "objects_205_external_references_25_source_name_Palo Alto Sofacy 06-2018" "objects_205_external_references_25_description_Lee, B., Falcone, R. (2018, June 06). Sofacy Group\u2019s Parallel Attacks. Retrieved June 18, 2018." "objects_205_external_references_25_url_https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/" "objects_205_external_references_26_source_name_Talos Seduploader Oct 2017" "objects_205_external_references_26_description_Mercer, W., et al. (2017, October 22). \"Cyber Conflict\" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018." "objects_205_external_references_26_url_https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html" "objects_205_external_references_27_source_name_Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020" "objects_205_external_references_27_description_Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020." "objects_205_external_references_27_url_https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/" "objects_205_external_references_28_source_name_Microsoft STRONTIUM Aug 2019" "objects_205_external_references_28_description_MSRC Team. (2019, August 5). Corporate IoT \u2013 a path to intrusion. Retrieved August 16, 2019." "objects_205_external_references_28_url_https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/" "objects_205_external_references_29_source_name_DOJ GRU Indictment Jul 2018" "objects_205_external_references_29_description_Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018." "objects_205_external_references_29_url_https://www.justice.gov/file/1080281/download" "objects_205_external_references_30_source_name_Cybersecurity Advisory GRU Brute Force Campaign July 2021" "objects_205_external_references_30_description_NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021." "objects_205_external_references_30_url_https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF" "objects_205_external_references_31_source_name_NSA/FBI Drovorub August 2020" "objects_205_external_references_31_description_NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020." "objects_205_external_references_31_url_https://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF" "objects_205_external_references_32_source_name_SecureWorks TG-4127" "objects_205_external_references_32_description_SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016." "objects_205_external_references_32_url_https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign" "objects_205_external_references_33_source_name_Secureworks IRON TWILIGHT Active Measures March 2017" "objects_205_external_references_33_description_Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022." "objects_205_external_references_33_url_https://www.secureworks.com/research/iron-twilight-supports-active-measures" "objects_205_external_references_34_source_name_Secureworks IRON TWILIGHT Profile" "objects_205_external_references_34_description_Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022." "objects_205_external_references_34_url_https://www.secureworks.com/research/threat-profiles/iron-twilight" "objects_205_external_references_35_source_name_Symantec APT28 Oct 2018" "objects_205_external_references_35_description_Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018." "objects_205_external_references_35_url_https://www.symantec.com/blogs/election-security/apt28-espionage-military-government" "objects_205_external_references_36_source_name_Sednit" "objects_205_external_references_36_description_This designation has been used in reporting both to refer to the threat group and its associated malware [JHUHUGIT](https://attack.mitre.org/software/S0044).(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)" "objects_205_external_references_37_source_name_Sofacy" "objects_205_external_references_37_description_This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)" "objects_205_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_205_x_mitre_domains_0_enterprise-attack" "objects_205_x_mitre_domains_1_mobile-attack" "objects_205_x_mitre_attack_spec_version_3.1.0" "objects_205_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_205_spec_version_2.1" "objects_206_modified_2022-10-17T19:51:56.531Z" "objects_206_name_Earth Lusca" "objects_206_description_[Earth Lusca](https://attack.mitre.org/groups/G1006) is a suspected China-based cyber espionage group that has been active since at least April 2019. [Earth Lusca](https://attack.mitre.org/groups/G1006) has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some [Earth Lusca](https://attack.mitre.org/groups/G1006) operations may be financially motivated.(Citation: TrendMicro EarthLusca 2022)\n\n[Earth Lusca](https://attack.mitre.org/groups/G1006) has used malware commonly used by other Chinese threat groups, including [APT41](https://attack.mitre.org/groups/G0096) and the [Winnti Group](https://attack.mitre.org/groups/G0044) cluster, however security researchers assess [Earth Lusca](https://attack.mitre.org/groups/G1006)'s techniques and infrastructure are separate.(Citation: TrendMicro EarthLusca 2022)" "objects_206_aliases_0_Earth Lusca" "objects_206_aliases_1_TAG-22" "objects_206_x_mitre_deprecated_False" "objects_206_x_mitre_version_1.0" "objects_206_type_intrusion-set" "objects_206_id_intrusion-set--cc613a49-9bfa-4e22-98d1-15ffbb03f034" "objects_206_created_2022-07-01T20:12:30.184Z" "objects_206_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_206_revoked_False" "objects_206_external_references_0_source_name_mitre-attack" "objects_206_external_references_0_url_https://attack.mitre.org/groups/G1006" "objects_206_external_references_0_external_id_G1006" "objects_206_external_references_1_source_name_TAG-22" "objects_206_external_references_1_description_(Citation: Recorded Future TAG-22 July 2021)" "objects_206_external_references_2_source_name_TrendMicro EarthLusca 2022" "objects_206_external_references_2_description_Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca\u2019s Operations. Retrieved July 1, 2022." "objects_206_external_references_2_url_https://www.trendmicro.com/content/dam/trendmicro/global/en/research/22/a/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf" "objects_206_external_references_3_source_name_Recorded Future TAG-22 July 2021" "objects_206_external_references_3_description_INSIKT GROUP. (2021, July 8). Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling. Retrieved September 2, 2022." "objects_206_external_references_3_url_https://www.recordedfuture.com/chinese-group-tag-22-targets-nepal-philippines-taiwan" "objects_206_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_206_x_mitre_domains_0_enterprise-attack" "objects_206_x_mitre_domains_1_mobile-attack" "objects_206_x_mitre_attack_spec_version_2.1.0" "objects_206_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_206_spec_version_2.1" "objects_207_x_mitre_platforms_0_Android" "objects_207_x_mitre_domains_0_mobile-attack" "objects_207_x_mitre_aliases_0_CarbonSteal" "objects_207_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_207_id_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_207_type_malware" "objects_207_created_2020-11-10T16:50:38.917Z" "objects_207_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_207_external_references_0_external_id_S0529" "objects_207_external_references_0_source_name_mitre-attack" "objects_207_external_references_0_url_https://attack.mitre.org/software/S0529" "objects_207_external_references_1_source_name_Lookout Uyghur Campaign" "objects_207_external_references_1_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_207_external_references_1_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_207_modified_2021-09-20T13:54:19.819Z" "objects_207_name_CarbonSteal" "objects_207_description_[CarbonSteal](https://attack.mitre.org/software/S0529) is one of a family of four surveillanceware tools that share a common C2 infrastructure. [CarbonSteal](https://attack.mitre.org/software/S0529) primarily deals with audio surveillance. (Citation: Lookout Uyghur Campaign)" "objects_207_x_mitre_version_1.1" "objects_207_x_mitre_attack_spec_version_2.1.0" "objects_207_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_207_spec_version_2.1" "objects_207_is_family_True" "objects_208_x_mitre_platforms_0_Android" "objects_208_x_mitre_domains_0_mobile-attack" "objects_208_x_mitre_contributors_0_Aviran Hazum, Check Point" "objects_208_x_mitre_contributors_1_Sergey Persikov, Check Point" "objects_208_x_mitre_aliases_0_Cerberus" "objects_208_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_208_id_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_208_type_malware" "objects_208_created_2020-06-26T15:32:24.569Z" "objects_208_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_208_external_references_0_external_id_S0480" "objects_208_external_references_0_source_name_mitre-attack" "objects_208_external_references_0_url_https://attack.mitre.org/software/S0480" "objects_208_external_references_1_source_name_Threat Fabric Cerberus" "objects_208_external_references_1_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_208_external_references_1_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_208_modified_2020-09-11T15:43:49.079Z" "objects_208_name_Cerberus" "objects_208_description_[Cerberus](https://attack.mitre.org/software/S0480) is a banking trojan whose usage can be rented on underground forums and marketplaces. Prior to being available to rent, the authors of [Cerberus](https://attack.mitre.org/software/S0480) claim was used in private operations for two years.(Citation: Threat Fabric Cerberus)" "objects_208_x_mitre_version_1.1" "objects_208_x_mitre_attack_spec_version_2.1.0" "objects_208_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_208_spec_version_2.1" "objects_208_is_family_True" "objects_209_x_mitre_platforms_0_Android" "objects_209_x_mitre_domains_0_mobile-attack" "objects_209_x_mitre_aliases_0_DroidJack" "objects_209_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_209_type_malware" "objects_209_id_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_209_created_2017-10-25T14:48:40.571Z" "objects_209_x_mitre_version_1.2" "objects_209_external_references_0_source_name_mitre-attack" "objects_209_external_references_0_external_id_S0320" "objects_209_external_references_0_url_https://attack.mitre.org/software/S0320" "objects_209_external_references_1_source_name_DroidJack" "objects_209_external_references_1_description_(Citation: Zscaler-SuperMarioRun) (Citation: Proofpoint-Droidjack)" "objects_209_external_references_2_source_name_Proofpoint-Droidjack" "objects_209_external_references_2_url_https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app" "objects_209_external_references_2_description_Proofpoint. (2016, July 7). DroidJack Uses Side-Load\u2026It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017." "objects_209_external_references_3_source_name_Zscaler-SuperMarioRun" "objects_209_external_references_3_url_https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat" "objects_209_external_references_3_description_Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." "objects_209_x_mitre_deprecated_False" "objects_209_revoked_False" "objects_209_description_[DroidJack](https://attack.mitre.org/software/S0320) is an Android remote access tool that has been observed posing as legitimate applications including the Super Mario Run and Pokemon GO games. (Citation: Zscaler-SuperMarioRun) (Citation: Proofpoint-Droidjack)" "objects_209_modified_2022-05-20T17:13:16.506Z" "objects_209_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_209_name_DroidJack" "objects_209_x_mitre_attack_spec_version_2.1.0" "objects_209_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_209_spec_version_2.1" "objects_209_is_family_True" "objects_210_x_mitre_platforms_0_Android" "objects_210_x_mitre_domains_0_mobile-attack" "objects_210_x_mitre_aliases_0_Rotexy" "objects_210_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_210_id_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_210_type_malware" "objects_210_created_2019-09-23T13:36:07.816Z" "objects_210_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_210_external_references_0_external_id_S0411" "objects_210_external_references_0_source_name_mitre-attack" "objects_210_external_references_0_url_https://attack.mitre.org/software/S0411" "objects_210_external_references_1_source_name_securelist rotexy 2018" "objects_210_external_references_1_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_210_external_references_1_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_210_modified_2020-09-11T15:53:38.216Z" "objects_210_name_Rotexy" "objects_210_description_[Rotexy](https://attack.mitre.org/software/S0411) is an Android banking malware that has evolved over several years. It was originally an SMS spyware Trojan first spotted in October 2014, and since then has evolved to contain more features, including ransomware functionality.(Citation: securelist rotexy 2018)" "objects_210_x_mitre_version_1.1" "objects_210_x_mitre_attack_spec_version_2.1.0" "objects_210_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_210_spec_version_2.1" "objects_210_is_family_True" "objects_211_modified_2022-10-24T15:09:07.609Z" "objects_211_name_Stealth Mango" "objects_211_description_[Stealth Mango](https://attack.mitre.org/software/S0328) is Android malware that has reportedly been used to successfully compromise the mobile devices of government officials, members of the military, medical professionals, and civilians. The iOS malware known as [Tangelo](https://attack.mitre.org/software/S0329) is believed to be from the same developer. (Citation: Lookout-StealthMango)" "objects_211_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_211_x_mitre_platforms_0_Android" "objects_211_x_mitre_domains_0_mobile-attack" "objects_211_x_mitre_version_1.3" "objects_211_x_mitre_attack_spec_version_2.1.0" "objects_211_x_mitre_aliases_0_Stealth Mango" "objects_211_type_malware" "objects_211_id_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_211_created_2018-10-17T00:14:20.652Z" "objects_211_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_211_external_references_0_source_name_mitre-attack" "objects_211_external_references_0_url_https://attack.mitre.org/software/S0328" "objects_211_external_references_0_external_id_S0328" "objects_211_external_references_1_source_name_Stealth Mango" "objects_211_external_references_1_description_(Citation: Lookout-StealthMango)" "objects_211_external_references_2_source_name_Lookout-StealthMango" "objects_211_external_references_2_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_211_external_references_2_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_211_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_211_spec_version_2.1" "objects_211_is_family_True" "objects_212_modified_2022-10-24T15:09:07.609Z" "objects_212_name_Allwinner" "objects_212_description_[Allwinner](https://attack.mitre.org/software/S0319) is a company that supplies processors used in Android tablets and other devices. A Linux kernel distributed by [Allwinner](https://attack.mitre.org/software/S0319) for use on these devices reportedly contained a backdoor. (Citation: HackerNews-Allwinner)" "objects_212_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_212_x_mitre_domains_0_mobile-attack" "objects_212_x_mitre_version_1.0" "objects_212_x_mitre_attack_spec_version_2.1.0" "objects_212_type_malware" "objects_212_id_malware--08784a9d-09e9-4dce-a839-9612398214e8" "objects_212_created_2018-10-17T00:14:20.652Z" "objects_212_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_212_external_references_0_source_name_mitre-attack" "objects_212_external_references_0_url_https://attack.mitre.org/software/S0319" "objects_212_external_references_0_external_id_S0319" "objects_212_external_references_1_source_name_Allwinner" "objects_212_external_references_1_description_(Citation: HackerNews-Allwinner)" "objects_212_external_references_2_source_name_HackerNews-Allwinner" "objects_212_external_references_2_description_Mohit Kumar. (2016, May 11). Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker. Retrieved September 18, 2018." "objects_212_external_references_2_url_https://thehackernews.com/2016/05/android-kernal-exploit.html" "objects_212_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_212_spec_version_2.1" "objects_212_is_family_True" "objects_213_x_mitre_domains_0_mobile-attack" "objects_213_x_mitre_aliases_0_GoldenEagle" "objects_213_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_213_id_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_213_type_malware" "objects_213_created_2020-12-24T22:04:27.667Z" "objects_213_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_213_external_references_0_external_id_S0551" "objects_213_external_references_0_source_name_mitre-attack" "objects_213_external_references_0_url_https://attack.mitre.org/software/S0551" "objects_213_external_references_1_source_name_Lookout Uyghur Campaign" "objects_213_external_references_1_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_213_external_references_1_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_213_modified_2021-03-25T16:20:28.165Z" "objects_213_name_GoldenEagle" "objects_213_description_[GoldenEagle](https://attack.mitre.org/software/S0551) is a piece of Android malware that has been used in targeting of Uyghurs, Muslims, Tibetans, individuals in Turkey, and individuals in China. Samples have been found as early as 2012.(Citation: Lookout Uyghur Campaign)" "objects_213_x_mitre_version_1.0" "objects_213_x_mitre_attack_spec_version_2.1.0" "objects_213_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_213_spec_version_2.1" "objects_213_is_family_True" "objects_214_modified_2023-04-21T18:53:30.817Z" "objects_214_name_Bread" "objects_214_description_[Bread](https://attack.mitre.org/software/S0432) was a large-scale billing fraud malware family known for employing many different cloaking and obfuscation techniques in an attempt to continuously evade Google Play Store\u2019s malware detection. 1,700 unique Bread apps were detected and removed from the Google Play Store before being downloaded by users.(Citation: Google Bread)" "objects_214_x_mitre_platforms_0_Android" "objects_214_x_mitre_deprecated_False" "objects_214_x_mitre_domains_0_mobile-attack" "objects_214_x_mitre_version_1.2" "objects_214_x_mitre_contributors_0_Sergey Persikov, Check Point" "objects_214_x_mitre_contributors_1_Jonathan Shimonovich, Check Point" "objects_214_x_mitre_contributors_2_Aviran Hazum, Check Point" "objects_214_x_mitre_aliases_0_Bread" "objects_214_x_mitre_aliases_1_Joker" "objects_214_type_malware" "objects_214_id_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_214_created_2020-05-04T14:04:55.823Z" "objects_214_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_214_revoked_False" "objects_214_external_references_0_source_name_mitre-attack" "objects_214_external_references_0_url_https://attack.mitre.org/software/S0432" "objects_214_external_references_0_external_id_S0432" "objects_214_external_references_1_source_name_Joker" "objects_214_external_references_1_description_(Citation: Google Bread)" "objects_214_external_references_2_source_name_Google Bread" "objects_214_external_references_2_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_214_external_references_2_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_214_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_214_x_mitre_attack_spec_version_3.1.0" "objects_214_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_214_spec_version_2.1" "objects_214_is_family_True" "objects_215_modified_2023-10-07T21:29:43.845Z" "objects_215_name_Hornbill" "objects_215_description_[Hornbill](https://attack.mitre.org/software/S1077) is one of two mobile malware families known to be used by the APT [Confucius](https://attack.mitre.org/groups/G0142). Analysis suggests that [Hornbill](https://attack.mitre.org/software/S1077) was first active in early 2018. While [Hornbill](https://attack.mitre.org/software/S1077) and [Sunbird](https://attack.mitre.org/software/S1082) overlap in core capabilities, [Hornbill](https://attack.mitre.org/software/S1077) has tools and behaviors suggesting more passive reconnaissance.(Citation: lookout_hornbill_sunbird_0221)" "objects_215_x_mitre_platforms_0_Android" "objects_215_x_mitre_deprecated_False" "objects_215_x_mitre_domains_0_mobile-attack" "objects_215_x_mitre_version_1.0" "objects_215_x_mitre_aliases_0_Hornbill" "objects_215_type_malware" "objects_215_id_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_215_created_2023-06-09T19:07:18.101Z" "objects_215_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_215_revoked_False" "objects_215_external_references_0_source_name_mitre-attack" "objects_215_external_references_0_url_https://attack.mitre.org/software/S1077" "objects_215_external_references_0_external_id_S1077" "objects_215_external_references_1_source_name_lookout_hornbill_sunbird_0221" "objects_215_external_references_1_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_215_external_references_1_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_215_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_215_x_mitre_attack_spec_version_3.2.0" "objects_215_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_215_spec_version_2.1" "objects_215_is_family_True" "objects_216_modified_2022-10-24T15:09:07.609Z" "objects_216_name_Judy" "objects_216_description_[Judy](https://attack.mitre.org/software/S0325) is auto-clicking adware that was distributed through multiple apps in the Google Play Store. (Citation: CheckPoint-Judy)" "objects_216_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_216_x_mitre_domains_0_mobile-attack" "objects_216_x_mitre_version_1.0" "objects_216_x_mitre_attack_spec_version_2.1.0" "objects_216_type_malware" "objects_216_id_malware--172444ab-97fc-4d94-b142-179452bfb760" "objects_216_created_2018-10-17T00:14:20.652Z" "objects_216_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_216_external_references_0_source_name_mitre-attack" "objects_216_external_references_0_url_https://attack.mitre.org/software/S0325" "objects_216_external_references_0_external_id_S0325" "objects_216_external_references_1_source_name_Judy" "objects_216_external_references_1_description_(Citation: CheckPoint-Judy)" "objects_216_external_references_2_source_name_CheckPoint-Judy" "objects_216_external_references_2_description_CheckPoint. (2017, May 25). The Judy Malware: Possibly the largest malware campaign found on Google Play. Retrieved September 18, 2018." "objects_216_external_references_2_url_https://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/" "objects_216_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_216_spec_version_2.1" "objects_216_is_family_True" "objects_217_modified_2022-10-24T15:09:07.609Z" "objects_217_name_OldBoot" "objects_217_description_[OldBoot](https://attack.mitre.org/software/S0285) is an Android malware family. (Citation: HackerNews-OldBoot)" "objects_217_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_217_x_mitre_domains_0_mobile-attack" "objects_217_x_mitre_version_1.0" "objects_217_x_mitre_attack_spec_version_2.1.0" "objects_217_type_malware" "objects_217_id_malware--2074b2ad-612e-4758-adce-7901c1b49bbc" "objects_217_created_2017-10-25T14:48:45.155Z" "objects_217_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_217_external_references_0_source_name_mitre-attack" "objects_217_external_references_0_url_https://attack.mitre.org/software/S0285" "objects_217_external_references_0_external_id_S0285" "objects_217_external_references_1_source_name_OldBoot" "objects_217_external_references_1_description_(Citation: HackerNews-OldBoot)" "objects_217_external_references_2_source_name_HackerNews-OldBoot" "objects_217_external_references_2_description_Sudhir K Bansal. (2014, January 28). First widely distributed Android bootkit Malware infects more than 350,000 Devices. Retrieved December 21, 2016." "objects_217_external_references_2_url_http://thehackernews.com/2014/01/first-widely-distributed-android.html" "objects_217_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_217_spec_version_2.1" "objects_217_is_family_True" "objects_218_modified_2022-10-24T15:09:07.609Z" "objects_218_name_Gooligan" "objects_218_description_[Gooligan](https://attack.mitre.org/software/S0290) is a malware family that runs privilege escalation exploits on Android devices and then uses its escalated privileges to steal authentication tokens that can be used to access data from many Google applications. [Gooligan](https://attack.mitre.org/software/S0290) has been described as part of the Ghost Push Android malware family. (Citation: Gooligan Citation) (Citation: Ludwig-GhostPush) (Citation: Lookout-Gooligan)" "objects_218_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_218_x_mitre_platforms_0_Android" "objects_218_x_mitre_domains_0_mobile-attack" "objects_218_x_mitre_version_1.2" "objects_218_x_mitre_attack_spec_version_2.1.0" "objects_218_x_mitre_aliases_0_Gooligan" "objects_218_x_mitre_aliases_1_Ghost Push" "objects_218_type_malware" "objects_218_id_malware--20d56cd6-8dff-4871-9889-d32d254816de" "objects_218_created_2017-10-25T14:48:43.242Z" "objects_218_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_218_external_references_0_source_name_mitre-attack" "objects_218_external_references_0_url_https://attack.mitre.org/software/S0290" "objects_218_external_references_0_external_id_S0290" "objects_218_external_references_1_source_name_Gooligan" "objects_218_external_references_1_description_(Citation: Gooligan Citation) (Citation: Ludwig-GhostPush) (Citation: Lookout-Gooligan)" "objects_218_external_references_2_source_name_Ghost Push" "objects_218_external_references_2_description_Gooligan has been described as being part of the Ghost Push Android malware family. (Citation: Ludwig-GhostPush) (Citation: Lookout-Gooligan)" "objects_218_external_references_3_source_name_Gooligan Citation" "objects_218_external_references_3_description_Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016." "objects_218_external_references_3_url_http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/" "objects_218_external_references_4_source_name_Ludwig-GhostPush" "objects_218_external_references_4_description_Adrian Ludwig. (2016, November 29). The fight against Ghost Push continues. Retrieved December 12, 2016." "objects_218_external_references_4_url_https://plus.google.com/+AdrianLudwig/posts/GXzJ8vaAFsi" "objects_218_external_references_5_source_name_Lookout-Gooligan" "objects_218_external_references_5_description_Lookout. (2016, December 1). Ghost Push and Gooligan: One and the same. Retrieved December 12, 2016." "objects_218_external_references_5_url_https://blog.lookout.com/blog/2016/12/01/ghost-push-gooligan/" "objects_218_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_218_spec_version_2.1" "objects_218_is_family_True" "objects_219_modified_2022-10-24T15:09:07.609Z" "objects_219_name_SpyNote RAT" "objects_219_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) (Remote Access Trojan) is a family of malicious Android apps. The [SpyNote RAT](https://attack.mitre.org/software/S0305) builder tool can be used to develop malicious apps with the malware's functionality. (Citation: Zscaler-SpyNote)" "objects_219_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_219_x_mitre_platforms_0_Android" "objects_219_x_mitre_domains_0_mobile-attack" "objects_219_x_mitre_version_1.2" "objects_219_x_mitre_attack_spec_version_2.1.0" "objects_219_x_mitre_aliases_0_SpyNote RAT" "objects_219_type_malware" "objects_219_id_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_219_created_2017-10-25T14:48:45.794Z" "objects_219_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_219_external_references_0_source_name_mitre-attack" "objects_219_external_references_0_url_https://attack.mitre.org/software/S0305" "objects_219_external_references_0_external_id_S0305" "objects_219_external_references_1_source_name_SpyNote RAT" "objects_219_external_references_1_description_(Citation: Zscaler-SpyNote)" "objects_219_external_references_2_source_name_Zscaler-SpyNote" "objects_219_external_references_2_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_219_external_references_2_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_219_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_219_spec_version_2.1" "objects_219_is_family_True" "objects_220_x_mitre_platforms_0_Android" "objects_220_x_mitre_domains_0_mobile-attack" "objects_220_x_mitre_contributors_0_Ohad Mana, Check Point" "objects_220_x_mitre_contributors_1_Aviran Hazum, Check Point" "objects_220_x_mitre_contributors_2_Sergey Persikov, Check Point" "objects_220_x_mitre_aliases_0_TrickMo" "objects_220_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_220_id_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_220_type_malware" "objects_220_created_2020-04-24T17:46:31.111Z" "objects_220_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_220_external_references_0_external_id_S0427" "objects_220_external_references_0_source_name_mitre-attack" "objects_220_external_references_0_url_https://attack.mitre.org/software/S0427" "objects_220_external_references_1_source_name_SecurityIntelligence TrickMo" "objects_220_external_references_1_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_220_external_references_1_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_220_modified_2020-09-11T15:57:37.561Z" "objects_220_name_TrickMo" "objects_220_description_[TrickMo](https://attack.mitre.org/software/S0427) a 2FA bypass mobile banking trojan, most likely being distributed by [TrickBot](https://attack.mitre.org/software/S0266). [TrickMo](https://attack.mitre.org/software/S0427) has been primarily targeting users located in Germany.(Citation: SecurityIntelligence TrickMo)\n\n[TrickMo](https://attack.mitre.org/software/S0427) is designed to steal transaction authorization numbers (TANs), which are typically used as one-time passwords.(Citation: SecurityIntelligence TrickMo) " "objects_220_x_mitre_version_1.1" "objects_220_x_mitre_attack_spec_version_2.1.0" "objects_220_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_220_spec_version_2.1" "objects_220_is_family_True" "objects_221_x_mitre_platforms_0_iOS" "objects_221_x_mitre_domains_0_mobile-attack" "objects_221_x_mitre_aliases_0_INSOMNIA" "objects_221_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_221_id_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_221_type_malware" "objects_221_created_2020-06-02T14:32:31.461Z" "objects_221_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_221_external_references_0_external_id_S0463" "objects_221_external_references_0_source_name_mitre-attack" "objects_221_external_references_0_url_https://attack.mitre.org/software/S0463" "objects_221_external_references_1_source_name_Volexity Insomnia" "objects_221_external_references_1_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_221_external_references_1_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_221_modified_2020-06-24T18:24:35.433Z" "objects_221_name_INSOMNIA" "objects_221_description_[INSOMNIA](https://attack.mitre.org/software/S0463) is spyware that has been used by the group Evil Eye.(Citation: Volexity Insomnia)" "objects_221_x_mitre_version_1.0" "objects_221_x_mitre_attack_spec_version_2.1.0" "objects_221_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_221_spec_version_2.1" "objects_221_is_family_True" "objects_222_x_mitre_platforms_0_Android" "objects_222_x_mitre_domains_0_mobile-attack" "objects_222_x_mitre_aliases_0_Dvmap" "objects_222_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_222_id_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_222_type_malware" "objects_222_created_2019-12-10T16:07:40.664Z" "objects_222_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_222_external_references_0_external_id_S0420" "objects_222_external_references_0_source_name_mitre-attack" "objects_222_external_references_0_url_https://attack.mitre.org/software/S0420" "objects_222_external_references_1_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_222_external_references_1_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_222_external_references_1_source_name_SecureList DVMap June 2017" "objects_222_modified_2020-01-22T22:17:23.015Z" "objects_222_name_Dvmap" "objects_222_description_[Dvmap](https://attack.mitre.org/software/S0420) is rooting malware that injects malicious code into system runtime libraries. It is credited with being the first malware that performs this type of code injection.(Citation: SecureList DVMap June 2017)" "objects_222_x_mitre_version_1.0" "objects_222_x_mitre_attack_spec_version_2.1.0" "objects_222_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_222_spec_version_2.1" "objects_222_is_family_True" "objects_223_x_mitre_platforms_0_Android" "objects_223_x_mitre_domains_0_mobile-attack" "objects_223_x_mitre_aliases_0_Zen" "objects_223_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_223_id_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_223_type_malware" "objects_223_created_2020-07-27T14:14:56.729Z" "objects_223_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_223_external_references_0_external_id_S0494" "objects_223_external_references_0_source_name_mitre-attack" "objects_223_external_references_0_url_https://attack.mitre.org/software/S0494" "objects_223_external_references_1_source_name_Google Security Zen" "objects_223_external_references_1_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_223_external_references_1_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_223_modified_2020-08-11T14:23:15.002Z" "objects_223_name_Zen" "objects_223_description_[Zen](https://attack.mitre.org/software/S0494) is Android malware that was first seen in 2013.(Citation: Google Security Zen)" "objects_223_x_mitre_version_1.0" "objects_223_x_mitre_attack_spec_version_2.1.0" "objects_223_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_223_spec_version_2.1" "objects_223_is_family_True" "objects_224_modified_2022-10-24T15:09:07.609Z" "objects_224_name_NotCompatible" "objects_224_description_[NotCompatible](https://attack.mitre.org/software/S0299) is an Android malware family that was used between at least 2014 and 2016. It has multiple variants that have become more sophisticated over time. (Citation: Lookout-NotCompatible)" "objects_224_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_224_x_mitre_domains_0_mobile-attack" "objects_224_x_mitre_version_1.0" "objects_224_x_mitre_attack_spec_version_2.1.0" "objects_224_type_malware" "objects_224_id_malware--23040c15-e7d8-47b5-8c16-8fd3e0e297fe" "objects_224_created_2017-10-25T14:48:36.707Z" "objects_224_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_224_external_references_0_source_name_mitre-attack" "objects_224_external_references_0_url_https://attack.mitre.org/software/S0299" "objects_224_external_references_0_external_id_S0299" "objects_224_external_references_1_source_name_NotCompatible" "objects_224_external_references_1_description_(Citation: Lookout-NotCompatible)" "objects_224_external_references_2_source_name_Lookout-NotCompatible" "objects_224_external_references_2_description_Tim Strazzere. (2014, November 19). The new NotCompatible: Sophisticated and evasive threat harbors the potential to compromise enterprise networks. Retrieved December 22, 2016." "objects_224_external_references_2_url_https://blog.lookout.com/blog/2014/11/19/notcompatible/" "objects_224_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_224_spec_version_2.1" "objects_224_is_family_True" "objects_225_modified_2022-10-24T15:09:07.609Z" "objects_225_name_XLoader for Android" "objects_225_description_[XLoader for Android](https://attack.mitre.org/software/S0318) is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.(Citation: TrendMicro-XLoader-FakeSpy)(Citation: TrendMicro-XLoader) It is tracked separately from the [XLoader for iOS](https://attack.mitre.org/software/S0490)." "objects_225_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_225_x_mitre_platforms_0_Android" "objects_225_x_mitre_domains_0_mobile-attack" "objects_225_x_mitre_version_2.0" "objects_225_x_mitre_attack_spec_version_2.1.0" "objects_225_x_mitre_aliases_0_XLoader for Android" "objects_225_type_malware" "objects_225_id_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_225_created_2018-10-17T00:14:20.652Z" "objects_225_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_225_external_references_0_source_name_mitre-attack" "objects_225_external_references_0_url_https://attack.mitre.org/software/S0318" "objects_225_external_references_0_external_id_S0318" "objects_225_external_references_1_source_name_XLoader for Android" "objects_225_external_references_1_description_(Citation: TrendMicro-XLoader)" "objects_225_external_references_2_source_name_TrendMicro-XLoader-FakeSpy" "objects_225_external_references_2_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_225_external_references_2_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_225_external_references_3_source_name_TrendMicro-XLoader" "objects_225_external_references_3_description_Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018." "objects_225_external_references_3_url_https://blog.trendmicro.com/trendlabs-security-intelligence/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing/" "objects_225_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_225_spec_version_2.1" "objects_225_is_family_True" "objects_226_modified_2022-10-24T15:09:07.609Z" "objects_226_name_Trojan-SMS.AndroidOS.FakeInst.a" "objects_226_description_[Trojan-SMS.AndroidOS.FakeInst.a](https://attack.mitre.org/software/S0306) is Android malware. (Citation: Kaspersky-MobileMalware)" "objects_226_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_226_x_mitre_domains_0_mobile-attack" "objects_226_x_mitre_version_1.0" "objects_226_x_mitre_attack_spec_version_2.1.0" "objects_226_type_malware" "objects_226_id_malware--28e39395-91e7-4f02-b694-5e079c964da9" "objects_226_created_2017-10-25T14:48:46.107Z" "objects_226_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_226_external_references_0_source_name_mitre-attack" "objects_226_external_references_0_url_https://attack.mitre.org/software/S0306" "objects_226_external_references_0_external_id_S0306" "objects_226_external_references_1_source_name_Trojan-SMS.AndroidOS.FakeInst.a" "objects_226_external_references_1_description_(Citation: Kaspersky-MobileMalware)" "objects_226_external_references_2_source_name_Kaspersky-MobileMalware" "objects_226_external_references_2_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_226_external_references_2_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_226_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_226_spec_version_2.1" "objects_226_is_family_True" "objects_227_x_mitre_platforms_0_iOS" "objects_227_x_mitre_domains_0_mobile-attack" "objects_227_x_mitre_aliases_0_XLoader for iOS" "objects_227_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_227_id_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_227_type_malware" "objects_227_created_2020-07-20T13:58:53.422Z" "objects_227_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_227_external_references_0_external_id_S0490" "objects_227_external_references_0_source_name_mitre-attack" "objects_227_external_references_0_url_https://attack.mitre.org/software/S0490" "objects_227_external_references_1_source_name_TrendMicro-XLoader-FakeSpy" "objects_227_external_references_1_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_227_external_references_1_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_227_modified_2021-12-07T14:46:08.852Z" "objects_227_name_XLoader for iOS" "objects_227_description_[XLoader for iOS](https://attack.mitre.org/software/S0490) is a malicious iOS application that is capable of gathering system information.(Citation: TrendMicro-XLoader-FakeSpy) It is tracked separately from the [XLoader for Android](https://attack.mitre.org/software/S0318)." "objects_227_x_mitre_version_1.1" "objects_227_x_mitre_attack_spec_version_2.1.0" "objects_227_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_227_spec_version_2.1" "objects_227_is_family_True" "objects_228_modified_2023-04-13T22:33:55.061Z" "objects_228_name_AbstractEmu" "objects_228_description_[AbstractEmu](https://attack.mitre.org/software/S1061) is mobile malware that was first seen in Google Play and other third-party stores in October 2021. It was discovered in 19 Android applications, of which at least 7 abused known Android exploits for obtaining root permissions. [AbstractEmu](https://attack.mitre.org/software/S1061) was observed primarily impacting users in the United States, however victims are believed to be across a total of 17 countries.(Citation: lookout_abstractemu_1021)" "objects_228_x_mitre_platforms_0_Android" "objects_228_x_mitre_deprecated_False" "objects_228_x_mitre_domains_0_mobile-attack" "objects_228_x_mitre_version_1.0" "objects_228_x_mitre_aliases_0_AbstractEmu" "objects_228_type_malware" "objects_228_id_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_228_created_2023-02-06T18:48:41.442Z" "objects_228_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_228_revoked_False" "objects_228_external_references_0_source_name_mitre-attack" "objects_228_external_references_0_url_https://attack.mitre.org/software/S1061" "objects_228_external_references_0_external_id_S1061" "objects_228_external_references_1_source_name_lookout_abstractemu_1021" "objects_228_external_references_1_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_228_external_references_1_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_228_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_228_x_mitre_attack_spec_version_3.1.0" "objects_228_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_228_spec_version_2.1" "objects_228_is_family_True" "objects_229_modified_2023-09-26T13:30:33.039Z" "objects_229_name_Chameleon" "objects_229_description_[Chameleon](https://attack.mitre.org/software/S1083) is an Android banking trojan that can leverage Android\u2019s Accessibility Services to perform malicious activities. Believed to have been first active in January 2023, [Chameleon](https://attack.mitre.org/software/S1083) has been observed targeting users in Australia and Poland by masquerading as official apps.(Citation: cyble_chameleon_0423)" "objects_229_x_mitre_platforms_0_Android" "objects_229_x_mitre_deprecated_False" "objects_229_x_mitre_domains_0_mobile-attack" "objects_229_x_mitre_version_1.0" "objects_229_x_mitre_contributors_0_Yasuhito Kawanishi, NEC Corporation" "objects_229_x_mitre_contributors_1_Manikantan Srinivasan, NEC Corporation India" "objects_229_x_mitre_contributors_2_Pooja Natarajan, NEC Corporation India" "objects_229_x_mitre_aliases_0_Chameleon" "objects_229_type_malware" "objects_229_id_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_229_created_2023-08-16T16:30:44.598Z" "objects_229_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_229_revoked_False" "objects_229_external_references_0_source_name_mitre-attack" "objects_229_external_references_0_url_https://attack.mitre.org/software/S1083" "objects_229_external_references_0_external_id_S1083" "objects_229_external_references_1_source_name_cyble_chameleon_0423" "objects_229_external_references_1_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_229_external_references_1_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_229_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_229_x_mitre_attack_spec_version_3.1.0" "objects_229_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_229_spec_version_2.1" "objects_229_is_family_True" "objects_230_x_mitre_platforms_0_Android" "objects_230_x_mitre_domains_0_mobile-attack" "objects_230_x_mitre_aliases_0_Exodus" "objects_230_x_mitre_aliases_1_Exodus One" "objects_230_x_mitre_aliases_2_Exodus Two" "objects_230_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_230_id_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_230_type_malware" "objects_230_created_2019-09-03T19:45:47.826Z" "objects_230_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_230_external_references_0_external_id_S0405" "objects_230_external_references_0_source_name_mitre-attack" "objects_230_external_references_0_url_https://attack.mitre.org/software/S0405" "objects_230_external_references_1_source_name_Exodus One" "objects_230_external_references_1_description_(Citation: SWB Exodus March 2019)" "objects_230_external_references_2_source_name_Exodus Two" "objects_230_external_references_2_description_(Citation: SWB Exodus March 2019)" "objects_230_external_references_3_source_name_SWB Exodus March 2019" "objects_230_external_references_3_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_230_external_references_3_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_230_modified_2019-10-14T17:15:52.191Z" "objects_230_name_Exodus" "objects_230_description_[Exodus](https://attack.mitre.org/software/S0405) is Android spyware deployed in two distinct stages named Exodus One (dropper) and Exodus Two (payload).(Citation: SWB Exodus March 2019)" "objects_230_x_mitre_version_1.0" "objects_230_x_mitre_attack_spec_version_2.1.0" "objects_230_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_230_spec_version_2.1" "objects_230_is_family_True" "objects_231_modified_2022-10-24T15:09:07.609Z" "objects_231_name_Dendroid" "objects_231_description_[Dendroid](https://attack.mitre.org/software/S0301) is an Android remote access tool (RAT) primarily targeting Western countries. The RAT was available for purchase for $300 and came bundled with a utility to inject the RAT into legitimate applications.(Citation: Lookout-Dendroid)" "objects_231_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_231_x_mitre_platforms_0_Android" "objects_231_x_mitre_domains_0_mobile-attack" "objects_231_x_mitre_version_2.0" "objects_231_x_mitre_attack_spec_version_2.1.0" "objects_231_x_mitre_aliases_0_Dendroid" "objects_231_type_malware" "objects_231_id_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_231_created_2017-10-25T14:48:37.438Z" "objects_231_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_231_external_references_0_source_name_mitre-attack" "objects_231_external_references_0_url_https://attack.mitre.org/software/S0301" "objects_231_external_references_0_external_id_S0301" "objects_231_external_references_1_source_name_Dendroid" "objects_231_external_references_1_description_(Citation: Lookout-Dendroid)" "objects_231_external_references_2_source_name_Lookout-Dendroid" "objects_231_external_references_2_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_231_external_references_2_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_231_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_231_spec_version_2.1" "objects_231_is_family_True" "objects_232_modified_2022-10-24T15:09:07.609Z" "objects_232_name_WireLurker" "objects_232_description_[WireLurker](https://attack.mitre.org/software/S0312) is a family of macOS malware that targets iOS devices connected over USB. (Citation: PaloAlto-WireLurker)" "objects_232_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_232_x_mitre_domains_0_mobile-attack" "objects_232_x_mitre_version_1.0" "objects_232_x_mitre_attack_spec_version_2.1.0" "objects_232_type_malware" "objects_232_id_malware--326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb" "objects_232_created_2017-10-25T14:48:37.020Z" "objects_232_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_232_external_references_0_source_name_mitre-attack" "objects_232_external_references_0_url_https://attack.mitre.org/software/S0312" "objects_232_external_references_0_external_id_S0312" "objects_232_external_references_1_source_name_WireLurker" "objects_232_external_references_1_description_Claud Xiao. (n.d.). WireLurker: A New Era in iOS and OS X Malware. Retrieved July 10, 2017." "objects_232_external_references_1_url_https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf" "objects_232_external_references_2_source_name_PaloAlto-WireLurker" "objects_232_external_references_2_description_Claud Xiao. (2014, November 5). WireLurker: A New Era in OS X and iOS Malware. Retrieved January 24, 2017." "objects_232_external_references_2_url_https://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware/" "objects_232_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_232_spec_version_2.1" "objects_232_is_family_True" "objects_233_x_mitre_platforms_0_Android" "objects_233_x_mitre_domains_0_mobile-attack" "objects_233_x_mitre_aliases_0_Desert Scorpion" "objects_233_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_233_id_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_233_type_malware" "objects_233_created_2020-09-11T14:54:16.188Z" "objects_233_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_233_external_references_0_external_id_S0505" "objects_233_external_references_0_source_name_mitre-attack" "objects_233_external_references_0_url_https://attack.mitre.org/software/S0505" "objects_233_external_references_1_source_name_Lookout Desert Scorpion" "objects_233_external_references_1_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_233_external_references_1_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_233_modified_2021-04-19T17:11:50.159Z" "objects_233_name_Desert Scorpion" "objects_233_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) is surveillanceware that has targeted the Middle East, specifically individuals located in Palestine. [Desert Scorpion](https://attack.mitre.org/software/S0505) is suspected to have been operated by the threat actor APT-C-23.(Citation: Lookout Desert Scorpion) " "objects_233_x_mitre_version_1.1" "objects_233_x_mitre_attack_spec_version_2.1.0" "objects_233_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_233_spec_version_2.1" "objects_233_is_family_True" "objects_234_modified_2022-10-24T15:09:07.609Z" "objects_234_name_Pegasus for iOS" "objects_234_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) is the iOS version of malware that has reportedly been linked to the NSO Group. It has been advertised and sold to target high-value victims. (Citation: Lookout-Pegasus) (Citation: PegasusCitizenLab) The Android version is tracked separately under [Pegasus for Android](https://attack.mitre.org/software/S0316)." "objects_234_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_234_x_mitre_platforms_0_iOS" "objects_234_x_mitre_domains_0_mobile-attack" "objects_234_x_mitre_version_1.1" "objects_234_x_mitre_attack_spec_version_2.1.0" "objects_234_x_mitre_aliases_0_Pegasus for iOS" "objects_234_type_malware" "objects_234_id_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_234_created_2017-10-25T14:48:44.238Z" "objects_234_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_234_external_references_0_source_name_mitre-attack" "objects_234_external_references_0_url_https://attack.mitre.org/software/S0289" "objects_234_external_references_0_external_id_S0289" "objects_234_external_references_1_source_name_Pegasus for iOS" "objects_234_external_references_1_description_(Citation: Lookout-Pegasus) (Citation: PegasusCitizenLab)" "objects_234_external_references_2_source_name_Lookout-Pegasus" "objects_234_external_references_2_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_234_external_references_2_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_234_external_references_3_source_name_PegasusCitizenLab" "objects_234_external_references_3_description_Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group\u2019s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016." "objects_234_external_references_3_url_https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/" "objects_234_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_234_spec_version_2.1" "objects_234_is_family_True" "objects_235_modified_2022-10-24T15:09:07.609Z" "objects_235_name_Tangelo" "objects_235_description_[Tangelo](https://attack.mitre.org/software/S0329) is iOS malware that is believed to be from the same developers as the [Stealth Mango](https://attack.mitre.org/software/S0328) Android malware. It is not a mobile application, but rather a Debian package that can only run on jailbroken iOS devices. (Citation: Lookout-StealthMango)" "objects_235_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_235_x_mitre_platforms_0_iOS" "objects_235_x_mitre_domains_0_mobile-attack" "objects_235_x_mitre_version_1.2" "objects_235_x_mitre_attack_spec_version_2.1.0" "objects_235_x_mitre_aliases_0_Tangelo" "objects_235_type_malware" "objects_235_id_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_235_created_2018-10-17T00:14:20.652Z" "objects_235_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_235_external_references_0_source_name_mitre-attack" "objects_235_external_references_0_url_https://attack.mitre.org/software/S0329" "objects_235_external_references_0_external_id_S0329" "objects_235_external_references_1_source_name_Tangelo" "objects_235_external_references_1_description_(Citation: Lookout-StealthMango)" "objects_235_external_references_2_source_name_Lookout-StealthMango" "objects_235_external_references_2_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_235_external_references_2_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_235_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_235_spec_version_2.1" "objects_235_is_family_True" "objects_236_modified_2022-10-24T15:09:07.609Z" "objects_236_name_RCSAndroid" "objects_236_description_[RCSAndroid](https://attack.mitre.org/software/S0295) is Android malware. (Citation: TrendMicro-RCSAndroid)" "objects_236_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_236_x_mitre_platforms_0_Android" "objects_236_x_mitre_domains_0_mobile-attack" "objects_236_x_mitre_version_1.2" "objects_236_x_mitre_attack_spec_version_2.1.0" "objects_236_x_mitre_aliases_0_RCSAndroid" "objects_236_type_malware" "objects_236_id_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_236_created_2017-10-25T14:48:38.274Z" "objects_236_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_236_external_references_0_source_name_mitre-attack" "objects_236_external_references_0_url_https://attack.mitre.org/software/S0295" "objects_236_external_references_0_external_id_S0295" "objects_236_external_references_1_source_name_RCSAndroid" "objects_236_external_references_1_description_(Citation: TrendMicro-RCSAndroid)" "objects_236_external_references_2_source_name_TrendMicro-RCSAndroid" "objects_236_external_references_2_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_236_external_references_2_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_236_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_236_spec_version_2.1" "objects_236_is_family_True" "objects_237_x_mitre_platforms_0_Android" "objects_237_x_mitre_domains_0_mobile-attack" "objects_237_x_mitre_aliases_0_Corona Updates" "objects_237_x_mitre_aliases_1_Wabi Music" "objects_237_x_mitre_aliases_2_Concipit1248" "objects_237_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_237_id_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_237_type_malware" "objects_237_created_2020-04-24T15:06:32.870Z" "objects_237_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_237_external_references_0_external_id_S0425" "objects_237_external_references_0_source_name_mitre-attack" "objects_237_external_references_0_url_https://attack.mitre.org/software/S0425" "objects_237_external_references_1_source_name_Wabi Music" "objects_237_external_references_1_description_(Citation: TrendMicro Coronavirus Updates)" "objects_237_external_references_2_source_name_Concipit1248" "objects_237_external_references_2_description_(Citation: TrendMicro Coronavirus Updates)" "objects_237_external_references_3_source_name_TrendMicro Coronavirus Updates" "objects_237_external_references_3_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_237_external_references_3_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_237_modified_2020-09-11T15:45:38.235Z" "objects_237_name_Corona Updates" "objects_237_description_[Corona Updates](https://attack.mitre.org/software/S0425) is Android spyware that took advantage of the Coronavirus pandemic. The campaign distributing this spyware is tracked as Project Spy. Multiple variants of this spyware have been discovered to have been hosted on the Google Play Store.(Citation: TrendMicro Coronavirus Updates)" "objects_237_x_mitre_version_1.1" "objects_237_x_mitre_attack_spec_version_2.1.0" "objects_237_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_237_spec_version_2.1" "objects_237_is_family_True" "objects_238_modified_2022-10-24T15:09:07.609Z" "objects_238_name_Skygofree" "objects_238_description_[Skygofree](https://attack.mitre.org/software/S0327) is Android spyware that is believed to have been developed in 2014 and used through at least 2017. (Citation: Kaspersky-Skygofree)" "objects_238_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_238_x_mitre_platforms_0_Android" "objects_238_x_mitre_domains_0_mobile-attack" "objects_238_x_mitre_version_1.2" "objects_238_x_mitre_attack_spec_version_2.1.0" "objects_238_x_mitre_aliases_0_Skygofree" "objects_238_type_malware" "objects_238_id_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_238_created_2018-10-17T00:14:20.652Z" "objects_238_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_238_external_references_0_source_name_mitre-attack" "objects_238_external_references_0_url_https://attack.mitre.org/software/S0327" "objects_238_external_references_0_external_id_S0327" "objects_238_external_references_1_source_name_Skygofree" "objects_238_external_references_1_description_(Citation: Kaspersky-Skygofree)" "objects_238_external_references_2_source_name_Kaspersky-Skygofree" "objects_238_external_references_2_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_238_external_references_2_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_238_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_238_spec_version_2.1" "objects_238_is_family_True" "objects_239_modified_2022-10-24T15:09:07.609Z" "objects_239_name_KeyRaider" "objects_239_description_[KeyRaider](https://attack.mitre.org/software/S0288) is malware that steals Apple account credentials and other data from jailbroken iOS devices. It also has ransomware functionality. (Citation: Xiao-KeyRaider)" "objects_239_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_239_x_mitre_domains_0_mobile-attack" "objects_239_x_mitre_version_1.0" "objects_239_x_mitre_attack_spec_version_2.1.0" "objects_239_type_malware" "objects_239_id_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_239_created_2017-10-25T14:48:43.815Z" "objects_239_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_239_external_references_0_source_name_mitre-attack" "objects_239_external_references_0_url_https://attack.mitre.org/software/S0288" "objects_239_external_references_0_external_id_S0288" "objects_239_external_references_1_source_name_KeyRaider" "objects_239_external_references_1_description_(Citation: Xiao-KeyRaider)" "objects_239_external_references_2_source_name_Xiao-KeyRaider" "objects_239_external_references_2_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_239_external_references_2_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_239_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_239_spec_version_2.1" "objects_239_is_family_True" "objects_240_modified_2022-10-24T15:09:07.609Z" "objects_240_name_ZergHelper" "objects_240_description_[ZergHelper](https://attack.mitre.org/software/S0287) is iOS riskware that was unique due to its apparent evasion of Apple's App Store review process. No malicious functionality was identified in the app, but it presents security risks. (Citation: Xiao-ZergHelper)" "objects_240_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_240_x_mitre_domains_0_mobile-attack" "objects_240_x_mitre_version_1.0" "objects_240_x_mitre_attack_spec_version_2.1.0" "objects_240_type_malware" "objects_240_id_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_240_created_2017-10-25T14:48:44.853Z" "objects_240_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_240_external_references_0_source_name_mitre-attack" "objects_240_external_references_0_url_https://attack.mitre.org/software/S0287" "objects_240_external_references_0_external_id_S0287" "objects_240_external_references_1_source_name_ZergHelper" "objects_240_external_references_1_description_(Citation: Xiao-ZergHelper)" "objects_240_external_references_2_source_name_Xiao-ZergHelper" "objects_240_external_references_2_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_240_external_references_2_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_240_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_240_spec_version_2.1" "objects_240_is_family_True" "objects_241_x_mitre_platforms_0_Android" "objects_241_x_mitre_domains_0_mobile-attack" "objects_241_x_mitre_aliases_0_DoubleAgent" "objects_241_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_241_id_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_241_type_malware" "objects_241_created_2020-12-24T21:50:02.027Z" "objects_241_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_241_external_references_0_external_id_S0550" "objects_241_external_references_0_source_name_mitre-attack" "objects_241_external_references_0_url_https://attack.mitre.org/software/S0550" "objects_241_external_references_1_source_name_Lookout Uyghur Campaign" "objects_241_external_references_1_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_241_external_references_1_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_241_modified_2021-04-19T17:05:42.253Z" "objects_241_name_DoubleAgent" "objects_241_description_[DoubleAgent](https://attack.mitre.org/software/S0550) is a family of RAT malware dating back to 2013, known to target groups with contentious relationships with the Chinese government.(Citation: Lookout Uyghur Campaign)" "objects_241_x_mitre_version_1.0" "objects_241_x_mitre_attack_spec_version_2.1.0" "objects_241_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_241_spec_version_2.1" "objects_241_is_family_True" "objects_242_modified_2022-10-24T15:09:07.609Z" "objects_242_name_Twitoor" "objects_242_description_[Twitoor](https://attack.mitre.org/software/S0302) is a dropper application capable of receiving commands from social media.(Citation: ESET-Twitoor)" "objects_242_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_242_x_mitre_platforms_0_Android" "objects_242_x_mitre_domains_0_mobile-attack" "objects_242_x_mitre_version_2.0" "objects_242_x_mitre_attack_spec_version_2.1.0" "objects_242_x_mitre_aliases_0_Twitoor" "objects_242_type_malware" "objects_242_id_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_242_created_2017-10-25T14:48:42.313Z" "objects_242_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_242_external_references_0_source_name_mitre-attack" "objects_242_external_references_0_url_https://attack.mitre.org/software/S0302" "objects_242_external_references_0_external_id_S0302" "objects_242_external_references_1_source_name_Twitoor" "objects_242_external_references_1_description_(Citation: ESET-Twitoor)" "objects_242_external_references_2_source_name_ESET-Twitoor" "objects_242_external_references_2_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_242_external_references_2_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_242_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_242_spec_version_2.1" "objects_242_is_family_True" "objects_243_modified_2023-10-11T14:36:39.396Z" "objects_243_name_Fakecalls" "objects_243_description_[Fakecalls](https://attack.mitre.org/software/S1080) is an Android trojan, first detected in January 2021, that masquerades as South Korean banking apps. It has capabilities to intercept calls to banking institutions and even maintain realistic dialogues with the victim using pre-recorded audio snippets.(Citation: kaspersky_fakecalls_0422) " "objects_243_x_mitre_platforms_0_Android" "objects_243_x_mitre_deprecated_False" "objects_243_x_mitre_domains_0_mobile-attack" "objects_243_x_mitre_version_1.0" "objects_243_x_mitre_contributors_0_Pooja Natarajan, NEC Corporation India" "objects_243_x_mitre_contributors_1_Hiroki Nagahama, NEC Corporation" "objects_243_x_mitre_contributors_2_Manikantan Srinivasan, NEC Corporation India" "objects_243_x_mitre_aliases_0_Fakecalls" "objects_243_type_malware" "objects_243_id_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_243_created_2023-07-21T19:49:44.577Z" "objects_243_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_243_revoked_False" "objects_243_external_references_0_source_name_mitre-attack" "objects_243_external_references_0_url_https://attack.mitre.org/software/S1080" "objects_243_external_references_0_external_id_S1080" "objects_243_external_references_1_source_name_kaspersky_fakecalls_0422" "objects_243_external_references_1_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_243_external_references_1_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_243_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_243_x_mitre_attack_spec_version_3.2.0" "objects_243_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_243_spec_version_2.1" "objects_243_is_family_True" "objects_244_modified_2023-04-13T22:32:16.509Z" "objects_244_name_S.O.V.A." "objects_244_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) is an Android banking trojan that was first identified in August 2021 and has subsequently been found in a variety of applications, including banking, cryptocurrency wallet/exchange, and shopping apps. [S.O.V.A.](https://attack.mitre.org/software/S1062), which is Russian for \"owl\", contains features not commonly found in Android malware, such as session cookie theft.(Citation: threatfabric_sova_0921)(Citation: cleafy_sova_1122)" "objects_244_x_mitre_platforms_0_Android" "objects_244_x_mitre_deprecated_False" "objects_244_x_mitre_domains_0_mobile-attack" "objects_244_x_mitre_version_1.0" "objects_244_x_mitre_aliases_0_S.O.V.A." "objects_244_type_malware" "objects_244_id_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_244_created_2023-02-06T19:34:43.026Z" "objects_244_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_244_revoked_False" "objects_244_external_references_0_source_name_mitre-attack" "objects_244_external_references_0_url_https://attack.mitre.org/software/S1062" "objects_244_external_references_0_external_id_S1062" "objects_244_external_references_1_source_name_cleafy_sova_1122" "objects_244_external_references_1_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_244_external_references_1_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_244_external_references_2_source_name_threatfabric_sova_0921" "objects_244_external_references_2_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_244_external_references_2_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_244_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_244_x_mitre_attack_spec_version_3.1.0" "objects_244_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_244_spec_version_2.1" "objects_244_is_family_True" "objects_245_modified_2022-10-24T15:09:07.609Z" "objects_245_name_ANDROIDOS_ANSERVER.A" "objects_245_description_[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) is Android malware that is unique because it uses encrypted content within a blog site for command and control. (Citation: TrendMicro-Anserver)" "objects_245_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_245_x_mitre_platforms_0_Android" "objects_245_x_mitre_domains_0_mobile-attack" "objects_245_x_mitre_version_1.3" "objects_245_x_mitre_attack_spec_version_2.1.0" "objects_245_x_mitre_aliases_0_ANDROIDOS_ANSERVER.A" "objects_245_type_malware" "objects_245_id_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_245_created_2017-10-25T14:48:47.965Z" "objects_245_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_245_external_references_0_source_name_mitre-attack" "objects_245_external_references_0_url_https://attack.mitre.org/software/S0310" "objects_245_external_references_0_external_id_S0310" "objects_245_external_references_1_source_name_ANDROIDOS_ANSERVER.A" "objects_245_external_references_1_description_(Citation: TrendMicro-Anserver)" "objects_245_external_references_2_source_name_TrendMicro-Anserver" "objects_245_external_references_2_description_Karl Dominguez. (2011, October 2). Android Malware Uses Blog Posts as C&C. Retrieved February 6, 2017." "objects_245_external_references_2_url_http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-uses-blog-posts-as-cc/" "objects_245_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_245_spec_version_2.1" "objects_245_is_family_True" "objects_246_modified_2022-10-24T15:09:07.609Z" "objects_246_name_DualToy" "objects_246_description_[DualToy](https://attack.mitre.org/software/S0315) is Windows malware that installs malicious applications onto Android and iOS devices connected over USB. (Citation: PaloAlto-DualToy)" "objects_246_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_246_x_mitre_domains_0_mobile-attack" "objects_246_x_mitre_version_1.0" "objects_246_x_mitre_attack_spec_version_2.1.0" "objects_246_type_malware" "objects_246_id_malware--507fe748-5e4a-4b45-9e9f-8b1115f4e878" "objects_246_created_2017-10-25T14:48:41.721Z" "objects_246_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_246_external_references_0_source_name_mitre-attack" "objects_246_external_references_0_url_https://attack.mitre.org/software/S0315" "objects_246_external_references_0_external_id_S0315" "objects_246_external_references_1_source_name_DualToy" "objects_246_external_references_1_description_(Citation: PaloAlto-DualToy)" "objects_246_external_references_2_source_name_PaloAlto-DualToy" "objects_246_external_references_2_description_Claud Xiao. (2016, September 13). DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices. Retrieved January 24, 2017." "objects_246_external_references_2_url_https://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/" "objects_246_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_246_spec_version_2.1" "objects_246_is_family_True" "objects_247_x_mitre_platforms_0_Android" "objects_247_x_mitre_domains_0_mobile-attack" "objects_247_x_mitre_aliases_0_Mandrake" "objects_247_x_mitre_aliases_1_oxide" "objects_247_x_mitre_aliases_2_briar" "objects_247_x_mitre_aliases_3_ricinus" "objects_247_x_mitre_aliases_4_darkmatter" "objects_247_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_247_id_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_247_type_malware" "objects_247_created_2020-07-15T20:20:58.846Z" "objects_247_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_247_external_references_0_external_id_S0485" "objects_247_external_references_0_source_name_mitre-attack" "objects_247_external_references_0_url_https://attack.mitre.org/software/S0485" "objects_247_external_references_1_source_name_oxide" "objects_247_external_references_1_description_(Citation: Bitdefender Mandrake)" "objects_247_external_references_2_source_name_briar" "objects_247_external_references_2_description_(Citation: Bitdefender Mandrake)" "objects_247_external_references_3_source_name_ricinus" "objects_247_external_references_3_description_(Citation: Bitdefender Mandrake)" "objects_247_external_references_4_source_name_darkmatter" "objects_247_external_references_4_description_(Citation: Bitdefender Mandrake)" "objects_247_external_references_5_source_name_Bitdefender Mandrake" "objects_247_external_references_5_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_247_external_references_5_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_247_modified_2020-09-11T15:52:12.097Z" "objects_247_name_Mandrake" "objects_247_description_[Mandrake](https://attack.mitre.org/software/S0485) is a sophisticated Android espionage platform that has been active in the wild since at least 2016. [Mandrake](https://attack.mitre.org/software/S0485) is very actively maintained, with sophisticated features and attacks that are executed with surgical precision.\n\n[Mandrake](https://attack.mitre.org/software/S0485) has gone undetected for several years by providing legitimate, ad-free applications with social media and real reviews to back the apps. The malware is only activated when the operators issue a specific command.(Citation: Bitdefender Mandrake)" "objects_247_x_mitre_version_1.0" "objects_247_x_mitre_attack_spec_version_2.1.0" "objects_247_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_247_spec_version_2.1" "objects_247_is_family_True" "objects_248_modified_2022-10-24T15:09:07.609Z" "objects_248_name_X-Agent for Android" "objects_248_description_[X-Agent for Android](https://attack.mitre.org/software/S0314) is Android malware that was placed in a repackaged version of a Ukrainian artillery targeting application. The malware reportedly retrieved general location data on where the victim device was used, and therefore could likely indicate the potential location of Ukrainian artillery. (Citation: CrowdStrike-Android) Is it tracked separately from the [CHOPSTICK](https://attack.mitre.org/software/S0023)." "objects_248_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_248_x_mitre_domains_0_mobile-attack" "objects_248_x_mitre_version_1.0" "objects_248_x_mitre_attack_spec_version_2.1.0" "objects_248_type_malware" "objects_248_id_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_248_created_2017-10-25T14:48:42.034Z" "objects_248_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_248_external_references_0_source_name_mitre-attack" "objects_248_external_references_0_url_https://attack.mitre.org/software/S0314" "objects_248_external_references_0_external_id_S0314" "objects_248_external_references_1_source_name_X-Agent for Android" "objects_248_external_references_1_description_(Citation: CrowdStrike-Android)" "objects_248_external_references_2_source_name_CrowdStrike-Android" "objects_248_external_references_2_description_CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017." "objects_248_external_references_2_url_https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf" "objects_248_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_248_spec_version_2.1" "objects_248_is_family_True" "objects_249_x_mitre_platforms_0_Android" "objects_249_x_mitre_domains_0_mobile-attack" "objects_249_x_mitre_contributors_0_Luk\u00e1\u0161 \u0160tefanko, ESET" "objects_249_x_mitre_aliases_0_DEFENSOR ID" "objects_249_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_249_id_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_249_type_malware" "objects_249_created_2020-06-26T15:12:39.648Z" "objects_249_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_249_external_references_0_external_id_S0479" "objects_249_external_references_0_source_name_mitre-attack" "objects_249_external_references_0_url_https://attack.mitre.org/software/S0479" "objects_249_external_references_1_source_name_ESET DEFENSOR ID" "objects_249_external_references_1_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_249_external_references_1_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_249_modified_2020-06-26T20:16:31.850Z" "objects_249_name_DEFENSOR ID" "objects_249_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) is a banking trojan capable of clearing a victim\u2019s bank account or cryptocurrency wallet and taking over email or social media accounts. [DEFENSOR ID](https://attack.mitre.org/software/S0479) performs the majority of its malicious functionality by abusing Android\u2019s accessibility service.(Citation: ESET DEFENSOR ID) " "objects_249_x_mitre_version_1.0" "objects_249_x_mitre_attack_spec_version_2.1.0" "objects_249_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_249_spec_version_2.1" "objects_249_is_family_True" "objects_250_modified_2022-10-24T15:09:07.609Z" "objects_250_name_MazarBOT" "objects_250_description_[MazarBOT](https://attack.mitre.org/software/S0303) is Android malware that was distributed via SMS in Denmark in 2016. (Citation: Tripwire-MazarBOT)" "objects_250_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_250_x_mitre_domains_0_mobile-attack" "objects_250_x_mitre_version_1.0" "objects_250_x_mitre_attack_spec_version_2.1.0" "objects_250_type_malware" "objects_250_id_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_250_created_2017-10-25T14:48:40.875Z" "objects_250_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_250_external_references_0_source_name_mitre-attack" "objects_250_external_references_0_url_https://attack.mitre.org/software/S0303" "objects_250_external_references_0_external_id_S0303" "objects_250_external_references_1_source_name_MazarBOT" "objects_250_external_references_1_description_(Citation: Tripwire-MazarBOT)" "objects_250_external_references_2_source_name_Tripwire-MazarBOT" "objects_250_external_references_2_description_Graham Cluley. (2016, February 16). Android users warned of malware attack spreading via SMS. Retrieved December 23, 2016." "objects_250_external_references_2_url_https://www.tripwire.com/state-of-security/security-data-protection/android-malware-sms/" "objects_250_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_250_spec_version_2.1" "objects_250_is_family_True" "objects_251_x_mitre_platforms_0_Android" "objects_251_x_mitre_domains_0_mobile-attack" "objects_251_x_mitre_contributors_0_Aviran Hazum, Check Point" "objects_251_x_mitre_contributors_1_Sergey Persikov, Check Point" "objects_251_x_mitre_aliases_0_Ginp" "objects_251_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_251_id_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_251_type_malware" "objects_251_created_2020-04-08T15:51:24.862Z" "objects_251_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_251_external_references_0_external_id_S0423" "objects_251_external_references_0_source_name_mitre-attack" "objects_251_external_references_0_url_https://attack.mitre.org/software/S0423" "objects_251_external_references_1_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_251_external_references_1_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_251_external_references_1_source_name_ThreatFabric Ginp" "objects_251_modified_2020-09-11T15:50:18.707Z" "objects_251_name_Ginp" "objects_251_description_[Ginp](https://attack.mitre.org/software/S0423) is an Android banking trojan that has been used to target Spanish banks. Some of the code was taken directly from [Anubis](https://attack.mitre.org/software/S0422).(Citation: ThreatFabric Ginp)" "objects_251_x_mitre_version_1.1" "objects_251_x_mitre_attack_spec_version_2.1.0" "objects_251_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_251_spec_version_2.1" "objects_251_is_family_True" "objects_252_modified_2022-10-24T15:09:07.609Z" "objects_252_name_HummingWhale" "objects_252_description_[HummingWhale](https://attack.mitre.org/software/S0321) is an Android malware family that performs ad fraud. (Citation: ArsTechnica-HummingWhale)" "objects_252_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_252_x_mitre_domains_0_mobile-attack" "objects_252_x_mitre_version_1.0" "objects_252_x_mitre_attack_spec_version_2.1.0" "objects_252_type_malware" "objects_252_id_malware--6447e3a1-ef4d-44b1-99d5-6b1c4888674f" "objects_252_created_2017-10-25T14:48:40.259Z" "objects_252_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_252_external_references_0_source_name_mitre-attack" "objects_252_external_references_0_url_https://attack.mitre.org/software/S0321" "objects_252_external_references_0_external_id_S0321" "objects_252_external_references_1_source_name_HummingWhale" "objects_252_external_references_1_description_(Citation: ArsTechnica-HummingWhale)" "objects_252_external_references_2_source_name_ArsTechnica-HummingWhale" "objects_252_external_references_2_description_Dan Goodin. (2017, January 23). Virulent Android malware returns, gets >2 million downloads on Google Play. Retrieved January 24, 2017." "objects_252_external_references_2_url_http://arstechnica.com/security/2017/01/virulent-android-malware-returns-gets-2-million-downloads-on-google-play/" "objects_252_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_252_spec_version_2.1" "objects_252_is_family_True" "objects_253_x_mitre_platforms_0_Android" "objects_253_x_mitre_platforms_1_iOS" "objects_253_x_mitre_domains_0_mobile-attack" "objects_253_x_mitre_aliases_0_eSurv" "objects_253_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_253_id_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_253_type_malware" "objects_253_created_2020-09-14T14:13:45.032Z" "objects_253_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_253_external_references_0_external_id_S0507" "objects_253_external_references_0_source_name_mitre-attack" "objects_253_external_references_0_url_https://attack.mitre.org/software/S0507" "objects_253_external_references_1_source_name_Lookout eSurv" "objects_253_external_references_1_url_https://blog.lookout.com/esurv-research" "objects_253_external_references_1_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_253_modified_2020-09-14T15:39:17.698Z" "objects_253_name_eSurv" "objects_253_description_[eSurv](https://attack.mitre.org/software/S0507) is mobile surveillanceware designed for the lawful intercept market that was developed over the course of many years.(Citation: Lookout eSurv)" "objects_253_x_mitre_version_1.0" "objects_253_x_mitre_attack_spec_version_2.1.0" "objects_253_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_253_spec_version_2.1" "objects_253_is_family_True" "objects_254_modified_2023-03-01T22:00:09.640Z" "objects_254_name_TangleBot" "objects_254_description_[TangleBot](https://attack.mitre.org/software/S1069) is SMS malware that was initially observed in September 2021, primarily targeting mobile users in the United States and Canada. [TangleBot](https://attack.mitre.org/software/S1069) has used SMS text message lures about COVID-19 regulations and vaccines to trick mobile users into downloading the malware, similar to [FluBot](https://attack.mitre.org/software/S1067) Android malware campaigns.(Citation: cloudmark_tanglebot_0921)" "objects_254_x_mitre_platforms_0_Android" "objects_254_x_mitre_deprecated_False" "objects_254_x_mitre_domains_0_mobile-attack" "objects_254_x_mitre_version_1.0" "objects_254_x_mitre_aliases_0_TangleBot" "objects_254_type_malware" "objects_254_id_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_254_created_2023-02-28T21:39:52.744Z" "objects_254_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_254_revoked_False" "objects_254_external_references_0_source_name_mitre-attack" "objects_254_external_references_0_url_https://attack.mitre.org/software/S1069" "objects_254_external_references_0_external_id_S1069" "objects_254_external_references_1_source_name_cloudmark_tanglebot_0921" "objects_254_external_references_1_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_254_external_references_1_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_254_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_254_x_mitre_attack_spec_version_3.1.0" "objects_254_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_254_spec_version_2.1" "objects_254_is_family_True" "objects_255_x_mitre_platforms_0_Android" "objects_255_x_mitre_domains_0_mobile-attack" "objects_255_x_mitre_contributors_0_J\u00f6rg Abraham, EclecticIQ" "objects_255_x_mitre_aliases_0_Monokle" "objects_255_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_255_id_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_255_type_malware" "objects_255_created_2019-09-04T14:28:14.181Z" "objects_255_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_255_external_references_0_url_https://attack.mitre.org/software/S0407" "objects_255_external_references_0_source_name_mitre-attack" "objects_255_external_references_0_external_id_S0407" "objects_255_external_references_1_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_255_external_references_1_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_255_external_references_1_source_name_Lookout-Monokle" "objects_255_modified_2021-11-01T18:30:41.998Z" "objects_255_name_Monokle" "objects_255_description_[Monokle](https://attack.mitre.org/software/S0407) is targeted, sophisticated mobile surveillanceware. It is developed for Android, but there are some code artifacts that suggests an iOS version may be in development.(Citation: Lookout-Monokle)" "objects_255_x_mitre_version_1.2" "objects_255_x_mitre_attack_spec_version_2.1.0" "objects_255_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_255_spec_version_2.1" "objects_255_is_family_True" "objects_256_x_mitre_platforms_0_Android" "objects_256_x_mitre_domains_0_mobile-attack" "objects_256_x_mitre_aliases_0_Red Alert 2.0" "objects_256_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_256_id_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_256_type_malware" "objects_256_created_2020-12-14T14:52:02.949Z" "objects_256_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_256_external_references_0_external_id_S0539" "objects_256_external_references_0_source_name_mitre-attack" "objects_256_external_references_0_url_https://attack.mitre.org/software/S0539" "objects_256_external_references_1_source_name_Sophos Red Alert 2.0" "objects_256_external_references_1_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_256_external_references_1_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_256_modified_2020-12-16T20:52:20.822Z" "objects_256_name_Red Alert 2.0" "objects_256_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) is a banking trojan that masquerades as a VPN client.(Citation: Sophos Red Alert 2.0) " "objects_256_x_mitre_version_1.0" "objects_256_x_mitre_attack_spec_version_2.1.0" "objects_256_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_256_spec_version_2.1" "objects_256_is_family_True" "objects_257_x_mitre_platforms_0_Android" "objects_257_x_mitre_domains_0_mobile-attack" "objects_257_x_mitre_aliases_0_ViceLeaker" "objects_257_x_mitre_aliases_1_Triout" "objects_257_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_257_id_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_257_type_malware" "objects_257_created_2019-11-21T16:42:48.203Z" "objects_257_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_257_external_references_0_external_id_S0418" "objects_257_external_references_0_source_name_mitre-attack" "objects_257_external_references_0_url_https://attack.mitre.org/software/S0418" "objects_257_external_references_1_source_name_ViceLeaker" "objects_257_external_references_1_description_(Citation: SecureList - ViceLeaker 2019)" "objects_257_external_references_2_source_name_Triout" "objects_257_external_references_2_description_(Citation: SecureList - ViceLeaker 2019)" "objects_257_external_references_3_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_257_external_references_3_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_257_external_references_3_source_name_SecureList - ViceLeaker 2019" "objects_257_external_references_4_source_name_Bitdefender - Triout 2018" "objects_257_external_references_4_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_257_external_references_4_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_257_modified_2020-03-26T19:00:42.233Z" "objects_257_name_ViceLeaker" "objects_257_description_[ViceLeaker](https://attack.mitre.org/software/S0418) is a spyware framework, capable of extensive surveillance and data exfiltration operations, primarily targeting devices belonging to Israeli citizens.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_257_x_mitre_version_1.0" "objects_257_x_mitre_attack_spec_version_2.1.0" "objects_257_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_257_spec_version_2.1" "objects_257_is_family_True" "objects_258_modified_2023-10-16T16:57:33.534Z" "objects_258_name_FlyTrap" "objects_258_description_[FlyTrap](https://attack.mitre.org/software/S1093) is an Android trojan, first detected in March 2021, that uses social engineering tactics to compromise Facebook accounts. [FlyTrap](https://attack.mitre.org/software/S1093) was initially detected through infected apps on the Google Play store, and is believed to have impacted over 10,000 victims across at least 140 countries.(Citation: Trend Micro FlyTrap) " "objects_258_x_mitre_platforms_0_Android" "objects_258_x_mitre_deprecated_False" "objects_258_x_mitre_domains_0_mobile-attack" "objects_258_x_mitre_version_1.0" "objects_258_x_mitre_contributors_0_Pooja Natarajan, NEC Corporation India" "objects_258_x_mitre_contributors_1_Hiroki Nagahama, NEC Corporation" "objects_258_x_mitre_contributors_2_Manikantan Srinivasan, NEC Corporation India" "objects_258_x_mitre_aliases_0_FlyTrap" "objects_258_type_malware" "objects_258_id_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_258_created_2023-09-28T17:36:00.965Z" "objects_258_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_258_revoked_False" "objects_258_external_references_0_source_name_mitre-attack" "objects_258_external_references_0_url_https://attack.mitre.org/software/S1093" "objects_258_external_references_0_external_id_S1093" "objects_258_external_references_1_source_name_Trend Micro FlyTrap" "objects_258_external_references_1_description_Trend Micro. (2021, August 17). FlyTrap Android Malware Is Taking Over Facebook Accounts \u2014 Protect Yourself With a Malware Scanner. Retrieved September 28, 2023." "objects_258_external_references_1_url_https://news.trendmicro.com/2021/08/17/flytrap-android-malware-is-taking-over-facebook-accounts-protect-yourself-with-a-malware-scanner/" "objects_258_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_258_x_mitre_attack_spec_version_3.2.0" "objects_258_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_258_spec_version_2.1" "objects_258_is_family_True" "objects_259_x_mitre_platforms_0_Android" "objects_259_x_mitre_domains_0_mobile-attack" "objects_259_x_mitre_contributors_0_Ofir Almkias, Cybereason" "objects_259_x_mitre_aliases_0_FakeSpy" "objects_259_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_259_id_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_259_type_malware" "objects_259_created_2020-09-15T15:18:11.971Z" "objects_259_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_259_external_references_0_external_id_S0509" "objects_259_external_references_0_source_name_mitre-attack" "objects_259_external_references_0_url_https://attack.mitre.org/software/S0509" "objects_259_external_references_1_source_name_Cybereason FakeSpy" "objects_259_external_references_1_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_259_external_references_1_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_259_modified_2020-10-06T20:09:57.659Z" "objects_259_name_FakeSpy" "objects_259_description_[FakeSpy](https://attack.mitre.org/software/S0509) is Android spyware that has been operated by the Chinese threat actor behind the Roaming Mantis campaigns.(Citation: Cybereason FakeSpy)" "objects_259_x_mitre_version_1.0" "objects_259_x_mitre_attack_spec_version_2.1.0" "objects_259_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_259_spec_version_2.1" "objects_259_is_family_True" "objects_260_modified_2022-10-24T15:09:07.609Z" "objects_260_name_SpyDealer" "objects_260_description_[SpyDealer](https://attack.mitre.org/software/S0324) is Android malware that exfiltrates sensitive data from Android devices. (Citation: PaloAlto-SpyDealer)" "objects_260_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_260_x_mitre_platforms_0_Android" "objects_260_x_mitre_domains_0_mobile-attack" "objects_260_x_mitre_version_1.2" "objects_260_x_mitre_attack_spec_version_2.1.0" "objects_260_x_mitre_aliases_0_SpyDealer" "objects_260_type_malware" "objects_260_id_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_260_created_2018-10-17T00:14:20.652Z" "objects_260_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_260_external_references_0_source_name_mitre-attack" "objects_260_external_references_0_url_https://attack.mitre.org/software/S0324" "objects_260_external_references_0_external_id_S0324" "objects_260_external_references_1_source_name_SpyDealer" "objects_260_external_references_1_description_(Citation: PaloAlto-SpyDealer)" "objects_260_external_references_2_source_name_PaloAlto-SpyDealer" "objects_260_external_references_2_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_260_external_references_2_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_260_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_260_spec_version_2.1" "objects_260_is_family_True" "objects_261_x_mitre_platforms_0_iOS" "objects_261_x_mitre_domains_0_mobile-attack" "objects_261_x_mitre_aliases_0_Concipit1248" "objects_261_x_mitre_aliases_1_Corona Updates" "objects_261_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_261_id_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_261_type_malware" "objects_261_created_2020-04-24T15:12:10.817Z" "objects_261_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_261_external_references_0_external_id_S0426" "objects_261_external_references_0_source_name_mitre-attack" "objects_261_external_references_0_url_https://attack.mitre.org/software/S0426" "objects_261_external_references_1_source_name_Corona Updates" "objects_261_external_references_1_description_(Citation: TrendMicro Coronavirus Updates)" "objects_261_external_references_2_source_name_TrendMicro Coronavirus Updates" "objects_261_external_references_2_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_261_external_references_2_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_261_modified_2020-04-30T18:30:05.787Z" "objects_261_name_Concipit1248" "objects_261_description_[Concipit1248](https://attack.mitre.org/software/S0426) is iOS spyware that was discovered using the same name as the developer of the Android spyware [Corona Updates](https://attack.mitre.org/software/S0425). Further investigation revealed that the two pieces of software contained the same C2 URL and similar functionality.(Citation: TrendMicro Coronavirus Updates)" "objects_261_x_mitre_version_1.0" "objects_261_x_mitre_attack_spec_version_2.1.0" "objects_261_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_261_spec_version_2.1" "objects_261_is_family_True" "objects_262_modified_2022-10-24T15:09:07.609Z" "objects_262_name_RuMMS" "objects_262_description_[RuMMS](https://attack.mitre.org/software/S0313) is an Android malware family. (Citation: FireEye-RuMMS)" "objects_262_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_262_x_mitre_domains_0_mobile-attack" "objects_262_x_mitre_version_1.0" "objects_262_x_mitre_attack_spec_version_2.1.0" "objects_262_type_malware" "objects_262_id_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_262_created_2017-10-25T14:48:48.917Z" "objects_262_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_262_external_references_0_source_name_mitre-attack" "objects_262_external_references_0_url_https://attack.mitre.org/software/S0313" "objects_262_external_references_0_external_id_S0313" "objects_262_external_references_1_source_name_RuMMS" "objects_262_external_references_1_description_(Citation: FireEye-RuMMS)" "objects_262_external_references_2_source_name_FireEye-RuMMS" "objects_262_external_references_2_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_262_external_references_2_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_262_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_262_spec_version_2.1" "objects_262_is_family_True" "objects_263_modified_2022-10-24T15:09:07.609Z" "objects_263_name_Pegasus for Android" "objects_263_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) is the Android version of malware that has reportedly been linked to the NSO Group. (Citation: Lookout-PegasusAndroid) (Citation: Google-Chrysaor) The iOS version is tracked separately under [Pegasus for iOS](https://attack.mitre.org/software/S0289)." "objects_263_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_263_x_mitre_platforms_0_Android" "objects_263_x_mitre_domains_0_mobile-attack" "objects_263_x_mitre_version_1.2" "objects_263_x_mitre_attack_spec_version_2.1.0" "objects_263_x_mitre_aliases_0_Pegasus for Android" "objects_263_x_mitre_aliases_1_Chrysaor" "objects_263_type_malware" "objects_263_id_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_263_created_2017-10-25T14:48:41.202Z" "objects_263_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_263_external_references_0_source_name_mitre-attack" "objects_263_external_references_0_url_https://attack.mitre.org/software/S0316" "objects_263_external_references_0_external_id_S0316" "objects_263_external_references_1_source_name_Pegasus for Android" "objects_263_external_references_1_description_(Citation: Lookout-PegasusAndroid) (Citation: Google-Chrysaor)" "objects_263_external_references_2_source_name_Chrysaor" "objects_263_external_references_2_description_(Citation: Lookout-PegasusAndroid) (Citation: Google-Chrysaor)" "objects_263_external_references_3_source_name_Lookout-PegasusAndroid" "objects_263_external_references_3_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_263_external_references_3_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_263_external_references_4_source_name_Google-Chrysaor" "objects_263_external_references_4_description_Rich Cannings et al.. (2017, April 3). An investigation of Chrysaor Malware on Android. Retrieved April 16, 2017." "objects_263_external_references_4_url_https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html" "objects_263_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_263_spec_version_2.1" "objects_263_is_family_True" "objects_264_x_mitre_platforms_0_Android" "objects_264_x_mitre_domains_0_mobile-attack" "objects_264_x_mitre_aliases_0_FrozenCell" "objects_264_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_264_id_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_264_type_malware" "objects_264_created_2021-02-17T20:43:52.033Z" "objects_264_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_264_external_references_0_external_id_S0577" "objects_264_external_references_0_source_name_mitre-attack" "objects_264_external_references_0_url_https://attack.mitre.org/software/S0577" "objects_264_external_references_1_source_name_Lookout FrozenCell" "objects_264_external_references_1_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_264_external_references_1_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_264_modified_2021-04-19T14:07:24.519Z" "objects_264_name_FrozenCell" "objects_264_description_[FrozenCell](https://attack.mitre.org/software/S0577) is the mobile component of a family of surveillanceware, with a corresponding desktop component known as KasperAgent and [Micropsia](https://attack.mitre.org/software/S0339).(Citation: Lookout FrozenCell)" "objects_264_x_mitre_version_1.0" "objects_264_x_mitre_attack_spec_version_2.1.0" "objects_264_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_264_spec_version_2.1" "objects_264_is_family_True" "objects_265_x_mitre_platforms_0_Android" "objects_265_x_mitre_domains_0_mobile-attack" "objects_265_x_mitre_aliases_0_AndroidOS/MalLocker.B" "objects_265_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_265_id_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_265_type_malware" "objects_265_created_2020-10-29T18:41:49.272Z" "objects_265_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_265_external_references_0_external_id_S0524" "objects_265_external_references_0_source_name_mitre-attack" "objects_265_external_references_0_url_https://attack.mitre.org/software/S0524" "objects_265_external_references_1_source_name_Microsoft MalLockerB" "objects_265_external_references_1_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_265_external_references_1_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_265_modified_2020-10-29T18:41:49.272Z" "objects_265_name_AndroidOS/MalLocker.B" "objects_265_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) is a variant of a ransomware family targeting Android devices. It prevents the user from interacting with the UI by displaying a screen containing a ransom note over all other windows. (Citation: Microsoft MalLockerB)" "objects_265_x_mitre_version_1.0" "objects_265_x_mitre_attack_spec_version_2.1.0" "objects_265_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_265_spec_version_2.1" "objects_265_is_family_True" "objects_266_modified_2023-02-28T21:05:57.018Z" "objects_266_name_SharkBot" "objects_266_description_[SharkBot](https://attack.mitre.org/software/S1055) is a banking malware, first discovered in October 2021, that tries to initiate money transfers directly from compromised devices by abusing Accessibility Services.(Citation: nccgroup_sharkbot_0322)" "objects_266_x_mitre_platforms_0_Android" "objects_266_x_mitre_deprecated_False" "objects_266_x_mitre_domains_0_mobile-attack" "objects_266_x_mitre_version_1.0" "objects_266_x_mitre_aliases_0_SharkBot" "objects_266_type_malware" "objects_266_id_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_266_created_2023-01-18T19:44:52.711Z" "objects_266_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_266_revoked_False" "objects_266_external_references_0_source_name_mitre-attack" "objects_266_external_references_0_url_https://attack.mitre.org/software/S1055" "objects_266_external_references_0_external_id_S1055" "objects_266_external_references_1_source_name_nccgroup_sharkbot_0322" "objects_266_external_references_1_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_266_external_references_1_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_266_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_266_x_mitre_attack_spec_version_3.1.0" "objects_266_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_266_spec_version_2.1" "objects_266_is_family_True" "objects_267_modified_2022-10-24T15:09:07.609Z" "objects_267_name_RedDrop" "objects_267_description_[RedDrop](https://attack.mitre.org/software/S0326) is an Android malware family that exfiltrates sensitive data from devices. (Citation: Wandera-RedDrop)" "objects_267_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_267_x_mitre_platforms_0_Android" "objects_267_x_mitre_domains_0_mobile-attack" "objects_267_x_mitre_version_1.2" "objects_267_x_mitre_attack_spec_version_2.1.0" "objects_267_x_mitre_aliases_0_RedDrop" "objects_267_type_malware" "objects_267_id_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_267_created_2018-10-17T00:14:20.652Z" "objects_267_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_267_external_references_0_source_name_mitre-attack" "objects_267_external_references_0_url_https://attack.mitre.org/software/S0326" "objects_267_external_references_0_external_id_S0326" "objects_267_external_references_1_source_name_RedDrop" "objects_267_external_references_1_description_(Citation: Wandera-RedDrop)" "objects_267_external_references_2_source_name_Wandera-RedDrop" "objects_267_external_references_2_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_267_external_references_2_url_https://www.wandera.com/reddrop-malware/" "objects_267_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_267_spec_version_2.1" "objects_267_is_family_True" "objects_268_x_mitre_platforms_0_Android" "objects_268_x_mitre_domains_0_mobile-attack" "objects_268_x_mitre_aliases_0_CHEMISTGAMES" "objects_268_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_268_id_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_268_type_malware" "objects_268_created_2020-12-31T18:25:04.779Z" "objects_268_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_268_external_references_0_external_id_S0555" "objects_268_external_references_0_source_name_mitre-attack" "objects_268_external_references_0_url_https://attack.mitre.org/software/S0555" "objects_268_external_references_1_source_name_CYBERWARCON CHEMISTGAMES" "objects_268_external_references_1_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_268_external_references_1_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_268_modified_2021-03-25T16:42:05.526Z" "objects_268_name_CHEMISTGAMES" "objects_268_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) is a modular backdoor that has been deployed by [Sandworm Team](https://attack.mitre.org/groups/G0034).(Citation: CYBERWARCON CHEMISTGAMES)" "objects_268_x_mitre_version_1.0" "objects_268_x_mitre_attack_spec_version_2.1.0" "objects_268_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_268_spec_version_2.1" "objects_268_is_family_True" "objects_269_modified_2023-04-20T18:19:15.826Z" "objects_269_name_YiSpecter" "objects_269_description_[YiSpecter](https://attack.mitre.org/software/S0311) is a family of iOS and Android malware, first detected in November 2014, targeting users in mainland China and Taiwan. [YiSpecter](https://attack.mitre.org/software/S0311) abuses private APIs in iOS to infect both jailbroken and non-jailbroken devices.(Citation: paloalto_yispecter_1015)" "objects_269_x_mitre_platforms_0_Android" "objects_269_x_mitre_platforms_1_iOS" "objects_269_x_mitre_deprecated_False" "objects_269_x_mitre_domains_0_mobile-attack" "objects_269_x_mitre_version_2.0" "objects_269_x_mitre_aliases_0_YiSpecter" "objects_269_type_malware" "objects_269_id_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_269_created_2017-10-25T14:48:48.301Z" "objects_269_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_269_revoked_False" "objects_269_external_references_0_source_name_mitre-attack" "objects_269_external_references_0_url_https://attack.mitre.org/software/S0311" "objects_269_external_references_0_external_id_S0311" "objects_269_external_references_1_source_name_paloalto_yispecter_1015" "objects_269_external_references_1_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_269_external_references_1_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_269_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_269_x_mitre_attack_spec_version_3.1.0" "objects_269_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_269_spec_version_2.1" "objects_269_is_family_True" "objects_270_modified_2022-10-24T15:09:07.609Z" "objects_270_name_Trojan-SMS.AndroidOS.Agent.ao" "objects_270_description_[Trojan-SMS.AndroidOS.Agent.ao](https://attack.mitre.org/software/S0307) is Android malware. (Citation: Kaspersky-MobileMalware)" "objects_270_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_270_x_mitre_domains_0_mobile-attack" "objects_270_x_mitre_version_1.0" "objects_270_x_mitre_attack_spec_version_2.1.0" "objects_270_type_malware" "objects_270_id_malware--a1867c56-8c86-455a-96ad-b0d5f7e2bc17" "objects_270_created_2017-10-25T14:48:46.411Z" "objects_270_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_270_external_references_0_source_name_mitre-attack" "objects_270_external_references_0_url_https://attack.mitre.org/software/S0307" "objects_270_external_references_0_external_id_S0307" "objects_270_external_references_1_source_name_Trojan-SMS.AndroidOS.Agent.ao" "objects_270_external_references_1_description_(Citation: Kaspersky-MobileMalware)" "objects_270_external_references_2_source_name_Kaspersky-MobileMalware" "objects_270_external_references_2_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_270_external_references_2_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_270_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_270_spec_version_2.1" "objects_270_is_family_True" "objects_271_modified_2023-10-20T21:40:21.121Z" "objects_271_name_BOULDSPY" "objects_271_description_[BOULDSPY](https://attack.mitre.org/software/S1079) is an Android malware, detected in early 2023, with surveillance and remote-control capabilities. Analysis of exfiltrated C2 data suggests that [BOULDSPY](https://attack.mitre.org/software/S1079) primarily targeted minority groups in Iran.(Citation: lookout_bouldspy_0423)" "objects_271_x_mitre_platforms_0_Android" "objects_271_x_mitre_deprecated_False" "objects_271_x_mitre_domains_0_mobile-attack" "objects_271_x_mitre_version_1.0" "objects_271_x_mitre_contributors_0_Gunji Satoshi, NEC Corporation" "objects_271_x_mitre_contributors_1_Manikantan Srinivasan, NEC Corporation India" "objects_271_x_mitre_contributors_2_Pooja Natarajan, NEC Corporation India" "objects_271_x_mitre_contributors_3_Phyo Paing Htun (ChiLai), I-Secure Co.,Ltd" "objects_271_x_mitre_aliases_0_BOULDSPY" "objects_271_type_malware" "objects_271_id_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_271_created_2023-07-21T19:31:54.632Z" "objects_271_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_271_revoked_False" "objects_271_external_references_0_source_name_mitre-attack" "objects_271_external_references_0_url_https://attack.mitre.org/software/S1079" "objects_271_external_references_0_external_id_S1079" "objects_271_external_references_1_source_name_lookout_bouldspy_0423" "objects_271_external_references_1_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_271_external_references_1_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_271_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_271_x_mitre_attack_spec_version_3.2.0" "objects_271_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_271_spec_version_2.1" "objects_271_is_family_True" "objects_272_x_mitre_platforms_0_Android" "objects_272_x_mitre_domains_0_mobile-attack" "objects_272_x_mitre_contributors_0_Aviran Hazum, Check Point" "objects_272_x_mitre_contributors_1_Sergey Persikov, Check Point" "objects_272_x_mitre_aliases_0_Anubis" "objects_272_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_272_id_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_272_type_malware" "objects_272_created_2020-04-08T15:41:19.114Z" "objects_272_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_272_external_references_0_external_id_S0422" "objects_272_external_references_0_source_name_mitre-attack" "objects_272_external_references_0_url_https://attack.mitre.org/software/S0422" "objects_272_external_references_1_source_name_Cofense Anubis" "objects_272_external_references_1_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_272_external_references_1_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_272_modified_2021-09-20T13:50:01.923Z" "objects_272_name_Anubis" "objects_272_description_[Anubis](https://attack.mitre.org/software/S0422) is Android malware that was originally used for cyber espionage, and has been retooled as a banking trojan.(Citation: Cofense Anubis)" "objects_272_x_mitre_version_1.3" "objects_272_x_mitre_attack_spec_version_2.1.0" "objects_272_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_272_spec_version_2.1" "objects_272_is_family_True" "objects_273_modified_2022-10-24T15:09:07.609Z" "objects_273_name_AndroRAT" "objects_273_description_[AndroRAT](https://attack.mitre.org/software/S0292) is malware that allows a third party to control the device and collect information. (Citation: Lookout-EnterpriseApps)" "objects_273_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_273_x_mitre_domains_0_mobile-attack" "objects_273_x_mitre_version_1.0" "objects_273_x_mitre_attack_spec_version_2.1.0" "objects_273_type_malware" "objects_273_id_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_273_created_2017-10-25T14:48:47.363Z" "objects_273_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_273_external_references_0_source_name_mitre-attack" "objects_273_external_references_0_url_https://attack.mitre.org/software/S0292" "objects_273_external_references_0_external_id_S0292" "objects_273_external_references_1_source_name_AndroRAT" "objects_273_external_references_1_description_(Citation: Lookout-EnterpriseApps)" "objects_273_external_references_2_source_name_Lookout-EnterpriseApps" "objects_273_external_references_2_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_273_external_references_2_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_273_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_273_spec_version_2.1" "objects_273_is_family_True" "objects_274_x_mitre_platforms_0_Windows" "objects_274_x_mitre_platforms_1_Android" "objects_274_x_mitre_domains_0_enterprise-attack" "objects_274_x_mitre_domains_1_mobile-attack" "objects_274_x_mitre_aliases_0_FinFisher" "objects_274_x_mitre_aliases_1_FinSpy" "objects_274_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_274_id_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_274_type_malware" "objects_274_created_2018-01-16T16:13:52.465Z" "objects_274_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_274_external_references_0_external_id_S0182" "objects_274_external_references_0_url_https://attack.mitre.org/software/S0182" "objects_274_external_references_0_source_name_mitre-attack" "objects_274_external_references_1_source_name_FinFisher" "objects_274_external_references_1_description_(Citation: FinFisher Citation) (Citation: Microsoft SIR Vol 21) (Citation: FireEye FinSpy Sept 2017) (Citation: Securelist BlackOasis Oct 2017)" "objects_274_external_references_2_source_name_FinSpy" "objects_274_external_references_2_description_(Citation: FireEye FinSpy Sept 2017) (Citation: Securelist BlackOasis Oct 2017)" "objects_274_external_references_3_url_http://www.finfisher.com/FinFisher/index.html" "objects_274_external_references_3_description_FinFisher. (n.d.). Retrieved December 20, 2017." "objects_274_external_references_3_source_name_FinFisher Citation" "objects_274_external_references_4_source_name_Microsoft SIR Vol 21" "objects_274_external_references_4_description_Anthe, C. et al. (2016, December 14). Microsoft Security Intelligence Report Volume 21. Retrieved November 27, 2017." "objects_274_external_references_4_url_http://download.microsoft.com/download/E/B/0/EB0F50CC-989C-4B66-B7F6-68CD3DC90DE3/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf" "objects_274_external_references_5_url_https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html" "objects_274_external_references_5_description_Jiang, G., et al. (2017, September 12). FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY. Retrieved February 15, 2018." "objects_274_external_references_5_source_name_FireEye FinSpy Sept 2017" "objects_274_external_references_6_source_name_Securelist BlackOasis Oct 2017" "objects_274_external_references_6_description_Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018." "objects_274_external_references_6_url_https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/" "objects_274_external_references_7_url_https://cloudblogs.microsoft.com/microsoftsecure/2018/03/01/finfisher-exposed-a-researchers-tale-of-defeating-traps-tricks-and-complex-virtual-machines/" "objects_274_external_references_7_description_Allievi, A.,Flori, E. (2018, March 01). FinFisher exposed: A researcher\u2019s tale of defeating traps, tricks, and complex virtual machines. Retrieved July 9, 2018." "objects_274_external_references_7_source_name_Microsoft FinFisher March 2018" "objects_274_modified_2022-03-02T15:47:13.329Z" "objects_274_name_FinFisher" "objects_274_description_[FinFisher](https://attack.mitre.org/software/S0182) is a government-grade commercial surveillance spyware reportedly sold exclusively to government agencies for use in targeted and lawful criminal investigations. It is heavily obfuscated and uses multiple anti-analysis techniques. It has other variants including [Wingbird](https://attack.mitre.org/software/S0176). (Citation: FinFisher Citation) (Citation: Microsoft SIR Vol 21) (Citation: FireEye FinSpy Sept 2017) (Citation: Securelist BlackOasis Oct 2017) (Citation: Microsoft FinFisher March 2018)" "objects_274_x_mitre_version_1.4" "objects_274_x_mitre_attack_spec_version_2.1.0" "objects_274_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_274_spec_version_2.1" "objects_274_is_family_True" "objects_275_x_mitre_platforms_0_Android" "objects_275_x_mitre_domains_0_mobile-attack" "objects_275_x_mitre_contributors_0_Aviran Hazum, Check Point" "objects_275_x_mitre_contributors_1_Sergey Persikov, Check Point" "objects_275_x_mitre_aliases_0_Agent Smith" "objects_275_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_275_id_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_275_type_malware" "objects_275_created_2020-05-07T15:18:34.417Z" "objects_275_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_275_external_references_0_external_id_S0440" "objects_275_external_references_0_source_name_mitre-attack" "objects_275_external_references_0_url_https://attack.mitre.org/software/S0440" "objects_275_external_references_1_source_name_CheckPoint Agent Smith" "objects_275_external_references_1_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_275_external_references_1_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_275_modified_2020-06-17T12:49:21.423Z" "objects_275_name_Agent Smith" "objects_275_description_[Agent Smith](https://attack.mitre.org/software/S0440) is mobile malware that generates financial gain by replacing legitimate applications on devices with malicious versions that include fraudulent ads. As of July 2019 [Agent Smith](https://attack.mitre.org/software/S0440) had infected around 25 million devices, primarily targeting India though effects had been observed in other Asian countries as well as Saudi Arabia, the United Kingdom, and the United States.(Citation: CheckPoint Agent Smith)" "objects_275_x_mitre_version_1.0" "objects_275_x_mitre_attack_spec_version_2.1.0" "objects_275_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_275_spec_version_2.1" "objects_275_is_family_True" "objects_276_x_mitre_platforms_0_Android" "objects_276_x_mitre_domains_0_mobile-attack" "objects_276_x_mitre_aliases_0_Asacub" "objects_276_x_mitre_aliases_1_Trojan-SMS.AndroidOS.Smaps" "objects_276_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_276_id_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_276_type_malware" "objects_276_created_2020-12-14T15:02:35.007Z" "objects_276_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_276_external_references_0_external_id_S0540" "objects_276_external_references_0_source_name_mitre-attack" "objects_276_external_references_0_url_https://attack.mitre.org/software/S0540" "objects_276_external_references_1_source_name_Trojan-SMS.AndroidOS.Smaps" "objects_276_external_references_1_description_(Citation: Securelist Asacub)" "objects_276_external_references_2_source_name_Securelist Asacub" "objects_276_external_references_2_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_276_external_references_2_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_276_modified_2020-12-16T20:21:43.239Z" "objects_276_name_Asacub" "objects_276_description_[Asacub](https://attack.mitre.org/software/S0540) is a banking trojan that attempts to steal money from victims\u2019 bank accounts. It attempts to do this by initiating a wire transfer via SMS message from compromised devices.(Citation: Securelist Asacub)" "objects_276_x_mitre_version_1.0" "objects_276_x_mitre_attack_spec_version_2.1.0" "objects_276_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_276_spec_version_2.1" "objects_276_is_family_True" "objects_277_x_mitre_platforms_0_Android" "objects_277_x_mitre_domains_0_mobile-attack" "objects_277_x_mitre_aliases_0_GPlayed" "objects_277_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_277_id_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_277_type_malware" "objects_277_created_2020-11-24T17:55:12.561Z" "objects_277_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_277_external_references_0_external_id_S0536" "objects_277_external_references_0_source_name_mitre-attack" "objects_277_external_references_0_url_https://attack.mitre.org/software/S0536" "objects_277_external_references_1_source_name_Talos GPlayed" "objects_277_external_references_1_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_277_external_references_1_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_277_modified_2020-11-24T17:55:12.561Z" "objects_277_name_GPlayed" "objects_277_description_[GPlayed](https://attack.mitre.org/software/S0536) is an Android trojan with a broad range of capabilities.(Citation: Talos GPlayed) " "objects_277_x_mitre_version_1.0" "objects_277_x_mitre_attack_spec_version_2.1.0" "objects_277_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_277_spec_version_2.1" "objects_277_is_family_True" "objects_278_x_mitre_platforms_0_Android" "objects_278_x_mitre_domains_0_mobile-attack" "objects_278_x_mitre_aliases_0_EventBot" "objects_278_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_278_id_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_278_type_malware" "objects_278_created_2020-06-26T14:55:12.847Z" "objects_278_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_278_external_references_0_external_id_S0478" "objects_278_external_references_0_source_name_mitre-attack" "objects_278_external_references_0_url_https://attack.mitre.org/software/S0478" "objects_278_external_references_1_source_name_Cybereason EventBot" "objects_278_external_references_1_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_278_external_references_1_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_278_modified_2020-06-26T21:01:58.595Z" "objects_278_name_EventBot" "objects_278_description_[EventBot](https://attack.mitre.org/software/S0478) is an Android banking trojan and information stealer that abuses Android\u2019s accessibility service to steal data from various applications.(Citation: Cybereason EventBot) [EventBot](https://attack.mitre.org/software/S0478) was designed to target over 200 different banking and financial applications, the majority of which are European bank and cryptocurrency exchange applications.(Citation: Cybereason EventBot)" "objects_278_x_mitre_version_1.0" "objects_278_x_mitre_attack_spec_version_2.1.0" "objects_278_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_278_spec_version_2.1" "objects_278_is_family_True" "objects_279_x_mitre_platforms_0_Android" "objects_279_x_mitre_domains_0_mobile-attack" "objects_279_x_mitre_aliases_0_HenBox" "objects_279_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_279_id_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_279_type_malware" "objects_279_created_2020-12-17T20:15:22.110Z" "objects_279_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_279_external_references_0_external_id_S0544" "objects_279_external_references_0_source_name_mitre-attack" "objects_279_external_references_0_url_https://attack.mitre.org/software/S0544" "objects_279_external_references_1_source_name_Palo Alto HenBox" "objects_279_external_references_1_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_279_external_references_1_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_279_modified_2021-04-12T03:02:06.792Z" "objects_279_name_HenBox" "objects_279_description_[HenBox](https://attack.mitre.org/software/S0544) is Android malware that attempts to only execute on Xiaomi devices running the MIUI operating system. [HenBox](https://attack.mitre.org/software/S0544) has primarily been used to target Uyghurs, a minority Turkic ethnic group.(Citation: Palo Alto HenBox)" "objects_279_x_mitre_version_1.0" "objects_279_x_mitre_attack_spec_version_2.1.0" "objects_279_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_279_spec_version_2.1" "objects_279_is_family_True" "objects_280_x_mitre_platforms_0_Android" "objects_280_x_mitre_domains_0_mobile-attack" "objects_280_x_mitre_aliases_0_Riltok" "objects_280_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_280_id_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_280_type_malware" "objects_280_created_2019-08-07T15:57:12.877Z" "objects_280_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_280_external_references_0_external_id_S0403" "objects_280_external_references_0_source_name_mitre-attack" "objects_280_external_references_0_url_https://attack.mitre.org/software/S0403" "objects_280_external_references_1_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_280_external_references_1_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_280_external_references_1_source_name_Kaspersky Riltok June 2019" "objects_280_modified_2019-09-18T13:44:13.080Z" "objects_280_name_Riltok" "objects_280_description_[Riltok](https://attack.mitre.org/software/S0403) is banking malware that uses phishing popups to collect user credentials.(Citation: Kaspersky Riltok June 2019)" "objects_280_x_mitre_version_1.0" "objects_280_x_mitre_attack_spec_version_2.1.0" "objects_280_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_280_spec_version_2.1" "objects_280_is_family_True" "objects_281_x_mitre_platforms_0_Android" "objects_281_x_mitre_domains_0_mobile-attack" "objects_281_x_mitre_aliases_0_GolfSpy" "objects_281_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_281_id_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_281_type_malware" "objects_281_created_2020-01-27T17:05:57.712Z" "objects_281_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_281_external_references_0_external_id_S0421" "objects_281_external_references_0_source_name_mitre-attack" "objects_281_external_references_0_url_https://attack.mitre.org/software/S0421" "objects_281_external_references_1_source_name_Trend Micro Bouncing Golf 2019" "objects_281_external_references_1_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_281_external_references_1_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_281_modified_2020-03-26T20:50:07.023Z" "objects_281_name_GolfSpy" "objects_281_description_[GolfSpy](https://attack.mitre.org/software/S0421) is Android spyware deployed by the group [Bouncing Golf](https://attack.mitre.org/groups/G0097).(Citation: Trend Micro Bouncing Golf 2019)" "objects_281_x_mitre_version_1.0" "objects_281_x_mitre_attack_spec_version_2.1.0" "objects_281_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_281_spec_version_2.1" "objects_281_is_family_True" "objects_282_x_mitre_platforms_0_Android" "objects_282_x_mitre_domains_0_mobile-attack" "objects_282_x_mitre_aliases_0_Pallas" "objects_282_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_282_id_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_282_type_malware" "objects_282_created_2019-07-10T15:35:43.217Z" "objects_282_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_282_external_references_0_external_id_S0399" "objects_282_external_references_0_source_name_mitre-attack" "objects_282_external_references_0_url_https://attack.mitre.org/software/S0399" "objects_282_external_references_1_source_name_Pallas" "objects_282_external_references_1_description_(Citation: Lookout Dark Caracal Jan 2018)" "objects_282_external_references_2_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_282_external_references_2_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_282_external_references_2_source_name_Lookout Dark Caracal Jan 2018" "objects_282_modified_2019-09-18T20:17:17.744Z" "objects_282_name_Pallas" "objects_282_description_[Pallas](https://attack.mitre.org/software/S0399) is mobile surveillanceware that was custom-developed by [Dark Caracal](https://attack.mitre.org/groups/G0070).(Citation: Lookout Dark Caracal Jan 2018)" "objects_282_x_mitre_version_1.1" "objects_282_x_mitre_attack_spec_version_2.1.0" "objects_282_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_282_spec_version_2.1" "objects_282_is_family_True" "objects_283_x_mitre_domains_0_mobile-attack" "objects_283_x_mitre_aliases_0_Circles" "objects_283_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_283_id_malware--c6a07c89-a24c-4c7e-9e3e-6153cc595e24" "objects_283_type_malware" "objects_283_created_2021-04-26T15:33:55.798Z" "objects_283_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_283_external_references_0_external_id_S0602" "objects_283_external_references_0_source_name_mitre-attack" "objects_283_external_references_0_url_https://attack.mitre.org/software/S0602" "objects_283_external_references_1_source_name_CitizenLab Circles" "objects_283_external_references_1_url_https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/" "objects_283_external_references_1_description_Bill Marczak, John Scott-Railton, Siddharth Prakash Rao, Siena Anstis, and Ron Deibert. (2020, December 1). Running in Circles Uncovering the Clients of Cyberespionage Firm Circles. Retrieved December 23, 2020." "objects_283_modified_2021-04-26T15:33:55.798Z" "objects_283_name_Circles" "objects_283_description_[Circles](https://attack.mitre.org/software/S0602) reportedly takes advantage of Signaling System 7 (SS7) weaknesses, the protocol suite used to route phone calls, to both track the location of mobile devices and intercept voice calls and SMS messages. It can be connected to a telecommunications company\u2019s infrastructure or purchased as a cloud service. Circles has reportedly been linked to the NSO Group.(Citation: CitizenLab Circles)" "objects_283_x_mitre_version_1.0" "objects_283_x_mitre_attack_spec_version_2.1.0" "objects_283_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_283_spec_version_2.1" "objects_283_is_family_True" "objects_284_x_mitre_platforms_0_Android" "objects_284_x_mitre_domains_0_mobile-attack" "objects_284_x_mitre_aliases_0_Tiktok Pro" "objects_284_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_284_id_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_284_type_malware" "objects_284_created_2021-01-05T20:16:19.968Z" "objects_284_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_284_external_references_0_external_id_S0558" "objects_284_external_references_0_source_name_mitre-attack" "objects_284_external_references_0_url_https://attack.mitre.org/software/S0558" "objects_284_external_references_1_source_name_Zscaler TikTok Spyware" "objects_284_external_references_1_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_284_external_references_1_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_284_modified_2021-04-19T16:30:16.930Z" "objects_284_name_Tiktok Pro" "objects_284_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) is spyware that has been masquerading as the TikTok application.(Citation: Zscaler TikTok Spyware)" "objects_284_x_mitre_version_1.0" "objects_284_x_mitre_attack_spec_version_2.1.0" "objects_284_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_284_spec_version_2.1" "objects_284_is_family_True" "objects_285_modified_2022-10-24T15:09:07.609Z" "objects_285_name_PJApps" "objects_285_description_[PJApps](https://attack.mitre.org/software/S0291) is an Android malware family. (Citation: Lookout-EnterpriseApps)" "objects_285_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_285_x_mitre_domains_0_mobile-attack" "objects_285_x_mitre_version_1.0" "objects_285_x_mitre_attack_spec_version_2.1.0" "objects_285_type_malware" "objects_285_id_malware--c709da93-20c3-4d17-ab68-48cba76b2137" "objects_285_created_2017-10-25T14:48:43.527Z" "objects_285_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_285_external_references_0_source_name_mitre-attack" "objects_285_external_references_0_url_https://attack.mitre.org/software/S0291" "objects_285_external_references_0_external_id_S0291" "objects_285_external_references_1_source_name_PJApps" "objects_285_external_references_1_description_(Citation: Lookout-EnterpriseApps)" "objects_285_external_references_2_source_name_Lookout-EnterpriseApps" "objects_285_external_references_2_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_285_external_references_2_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_285_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_285_spec_version_2.1" "objects_285_is_family_True" "objects_286_modified_2022-10-24T15:09:07.609Z" "objects_286_name_ShiftyBug" "objects_286_description_[ShiftyBug](https://attack.mitre.org/software/S0294) is an auto-rooting adware family of malware for Android. The family is very similar to the other Android families known as Shedun, Shuanet, Kemoge, though it is not believed all the families were created by the same group. (Citation: Lookout-Adware)" "objects_286_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_286_x_mitre_domains_0_mobile-attack" "objects_286_x_mitre_version_1.0" "objects_286_x_mitre_attack_spec_version_2.1.0" "objects_286_type_malware" "objects_286_id_malware--c80a6bef-b3ce-44d0-b113-946e93124898" "objects_286_created_2017-10-25T14:48:38.690Z" "objects_286_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_286_external_references_0_source_name_mitre-attack" "objects_286_external_references_0_url_https://attack.mitre.org/software/S0294" "objects_286_external_references_0_external_id_S0294" "objects_286_external_references_1_source_name_ShiftyBug" "objects_286_external_references_1_description_(Citation: Lookout-Adware)" "objects_286_external_references_2_source_name_Lookout-Adware" "objects_286_external_references_2_description_Michael Bentley. (2015, November 4). Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire. Retrieved December 21, 2016." "objects_286_external_references_2_url_https://blog.lookout.com/blog/2015/11/04/trojanized-adware/" "objects_286_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_286_spec_version_2.1" "objects_286_is_family_True" "objects_287_modified_2023-04-21T18:52:08.966Z" "objects_287_name_HummingBad" "objects_287_description_[HummingBad](https://attack.mitre.org/software/S0322) is a family of Android malware that generates fraudulent advertising revenue and has the ability to obtain root access on older, vulnerable versions of Android. (Citation: ArsTechnica-HummingBad)" "objects_287_x_mitre_deprecated_False" "objects_287_x_mitre_domains_0_mobile-attack" "objects_287_x_mitre_version_1.1" "objects_287_x_mitre_aliases_0_HummingBad" "objects_287_type_malware" "objects_287_id_malware--c8770c81-c29f-40d2-a140-38544206b2b4" "objects_287_created_2017-10-25T14:48:42.948Z" "objects_287_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_287_revoked_False" "objects_287_external_references_0_source_name_mitre-attack" "objects_287_external_references_0_url_https://attack.mitre.org/software/S0322" "objects_287_external_references_0_external_id_S0322" "objects_287_external_references_1_source_name_ArsTechnica-HummingBad" "objects_287_external_references_1_description_Dan Goodin. (2016, July 7). 10 million Android phones infected by all-powerful auto-rooting apps. Retrieved January 24, 2017." "objects_287_external_references_1_url_http://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/" "objects_287_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_287_x_mitre_attack_spec_version_3.1.0" "objects_287_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_287_spec_version_2.1" "objects_287_is_family_True" "objects_288_x_mitre_platforms_0_Android" "objects_288_x_mitre_domains_0_mobile-attack" "objects_288_x_mitre_aliases_0_Exobot" "objects_288_x_mitre_aliases_1_Marcher" "objects_288_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_288_id_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_288_type_malware" "objects_288_created_2020-10-29T13:32:20.972Z" "objects_288_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_288_external_references_0_external_id_S0522" "objects_288_external_references_0_source_name_mitre-attack" "objects_288_external_references_0_url_https://attack.mitre.org/software/S0522" "objects_288_external_references_1_source_name_Proofpoint-Marcher" "objects_288_external_references_1_description_Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018." "objects_288_external_references_1_url_https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks" "objects_288_external_references_2_source_name_Threat Fabric Exobot" "objects_288_external_references_2_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_288_external_references_2_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_288_modified_2022-07-07T14:00:00.188Z" "objects_288_name_Exobot" "objects_288_description_[Exobot](https://attack.mitre.org/software/S0522) is Android banking malware, primarily targeting financial institutions in Germany, Austria, and France.(Citation: Threat Fabric Exobot)" "objects_288_x_mitre_version_1.0" "objects_288_x_mitre_attack_spec_version_2.1.0" "objects_288_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_288_spec_version_2.1" "objects_288_is_family_True" "objects_289_modified_2022-10-24T15:09:07.609Z" "objects_289_name_OBAD" "objects_289_description_OBAD is an Android malware family. (Citation: TrendMicro-Obad)" "objects_289_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_289_x_mitre_domains_0_mobile-attack" "objects_289_x_mitre_version_1.0" "objects_289_x_mitre_attack_spec_version_2.1.0" "objects_289_type_malware" "objects_289_id_malware--ca4f63b9-a358-4214-bb26-8c912318cfde" "objects_289_created_2017-10-25T14:48:44.540Z" "objects_289_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_289_external_references_0_source_name_mitre-attack" "objects_289_external_references_0_url_https://attack.mitre.org/software/S0286" "objects_289_external_references_0_external_id_S0286" "objects_289_external_references_1_source_name_OBAD" "objects_289_external_references_1_description_(Citation: TrendMicro-Obad)" "objects_289_external_references_2_source_name_TrendMicro-Obad" "objects_289_external_references_2_description_Veo Zhang. (2013, June 13). Cybercriminals Improve Android Malware Stealth Routines with OBAD. Retrieved December 9, 2016." "objects_289_external_references_2_url_http://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-improve-android-malware-stealth-routines-with-obad/" "objects_289_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_289_spec_version_2.1" "objects_289_is_family_True" "objects_290_modified_2022-10-24T15:09:07.609Z" "objects_290_name_Android/Chuli.A" "objects_290_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) is Android malware that was delivered to activist groups via a spearphishing email with an attachment. (Citation: Kaspersky-WUC)" "objects_290_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_290_x_mitre_platforms_0_Android" "objects_290_x_mitre_domains_0_mobile-attack" "objects_290_x_mitre_version_1.2" "objects_290_x_mitre_attack_spec_version_2.1.0" "objects_290_x_mitre_aliases_0_Android/Chuli.A" "objects_290_type_malware" "objects_290_id_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_290_created_2017-10-25T14:48:45.482Z" "objects_290_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_290_external_references_0_source_name_mitre-attack" "objects_290_external_references_0_url_https://attack.mitre.org/software/S0304" "objects_290_external_references_0_external_id_S0304" "objects_290_external_references_1_source_name_Android/Chuli.A" "objects_290_external_references_1_description_(Citation: Kaspersky-WUC)" "objects_290_external_references_2_source_name_Kaspersky-WUC" "objects_290_external_references_2_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_290_external_references_2_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_290_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_290_spec_version_2.1" "objects_290_is_family_True" "objects_291_modified_2022-10-24T15:09:07.609Z" "objects_291_name_Charger" "objects_291_description_[Charger](https://attack.mitre.org/software/S0323) is Android malware that steals steals contacts and SMS messages from the user's device. It can also lock the device and demand ransom payment if it receives admin permissions. (Citation: CheckPoint-Charger)" "objects_291_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_291_x_mitre_platforms_0_Android" "objects_291_x_mitre_domains_0_mobile-attack" "objects_291_x_mitre_version_1.1" "objects_291_x_mitre_attack_spec_version_2.1.0" "objects_291_x_mitre_aliases_0_Charger" "objects_291_type_malware" "objects_291_id_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_291_created_2017-10-25T14:48:39.631Z" "objects_291_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_291_external_references_0_source_name_mitre-attack" "objects_291_external_references_0_url_https://attack.mitre.org/software/S0323" "objects_291_external_references_0_external_id_S0323" "objects_291_external_references_1_source_name_Charger" "objects_291_external_references_1_description_(Citation: CheckPoint-Charger)" "objects_291_external_references_2_source_name_CheckPoint-Charger" "objects_291_external_references_2_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_291_external_references_2_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_291_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_291_spec_version_2.1" "objects_291_is_family_True" "objects_292_modified_2023-04-13T22:33:34.237Z" "objects_292_name_Drinik" "objects_292_description_[Drinik](https://attack.mitre.org/software/S1054) is an evolving Android banking trojan that was observed targeting customers of around 27 banks in India in August 2021. Initially seen as an SMS stealer in 2016, [Drinik](https://attack.mitre.org/software/S1054) resurfaced as a banking trojan with more advanced capabilities included in subsequent versions between September 2021 and August 2022.(Citation: cyble_drinik_1022)" "objects_292_x_mitre_platforms_0_Android" "objects_292_x_mitre_deprecated_False" "objects_292_x_mitre_domains_0_mobile-attack" "objects_292_x_mitre_version_1.0" "objects_292_x_mitre_aliases_0_Drinik" "objects_292_type_malware" "objects_292_id_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_292_created_2023-01-18T19:05:43.194Z" "objects_292_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_292_revoked_False" "objects_292_external_references_0_source_name_mitre-attack" "objects_292_external_references_0_url_https://attack.mitre.org/software/S1054" "objects_292_external_references_0_external_id_S1054" "objects_292_external_references_1_source_name_cyble_drinik_1022" "objects_292_external_references_1_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_292_external_references_1_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_292_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_292_x_mitre_attack_spec_version_3.1.0" "objects_292_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_292_spec_version_2.1" "objects_292_is_family_True" "objects_293_modified_2022-10-24T15:09:07.609Z" "objects_293_name_Trojan-SMS.AndroidOS.OpFake.a" "objects_293_description_[Trojan-SMS.AndroidOS.OpFake.a](https://attack.mitre.org/software/S0308) is Android malware. (Citation: Kaspersky-MobileMalware)" "objects_293_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_293_x_mitre_domains_0_mobile-attack" "objects_293_x_mitre_version_1.0" "objects_293_x_mitre_attack_spec_version_2.1.0" "objects_293_type_malware" "objects_293_id_malware--d89c132d-7752-4c7f-9372-954a71522985" "objects_293_created_2017-10-25T14:48:46.734Z" "objects_293_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_293_external_references_0_source_name_mitre-attack" "objects_293_external_references_0_url_https://attack.mitre.org/software/S0308" "objects_293_external_references_0_external_id_S0308" "objects_293_external_references_1_source_name_Trojan-SMS.AndroidOS.OpFake.a" "objects_293_external_references_1_description_(Citation: Kaspersky-MobileMalware)" "objects_293_external_references_2_source_name_Kaspersky-MobileMalware" "objects_293_external_references_2_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_293_external_references_2_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_293_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_293_spec_version_2.1" "objects_293_is_family_True" "objects_294_modified_2022-10-24T15:09:07.609Z" "objects_294_name_XcodeGhost" "objects_294_description_[XcodeGhost](https://attack.mitre.org/software/S0297) is iOS malware that infected at least 39 iOS apps in 2015 and potentially affected millions of users. (Citation: PaloAlto-XcodeGhost1) (Citation: PaloAlto-XcodeGhost)" "objects_294_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_294_x_mitre_domains_0_mobile-attack" "objects_294_x_mitre_version_1.0" "objects_294_x_mitre_attack_spec_version_2.1.0" "objects_294_type_malware" "objects_294_id_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_294_created_2017-10-25T14:48:42.661Z" "objects_294_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_294_external_references_0_source_name_mitre-attack" "objects_294_external_references_0_url_https://attack.mitre.org/software/S0297" "objects_294_external_references_0_external_id_S0297" "objects_294_external_references_1_source_name_XcodeGhost" "objects_294_external_references_1_description_(Citation: PaloAlto-XcodeGhost1) (Citation: PaloAlto-XcodeGhost)" "objects_294_external_references_2_source_name_PaloAlto-XcodeGhost1" "objects_294_external_references_2_description_Claud Xiao. (2015, September 17). Novel Malware XcodeGhost Modifies Xcode, Infects Apple iOS Apps and Hits App Store. Retrieved December 21, 2016." "objects_294_external_references_2_url_http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/" "objects_294_external_references_3_source_name_PaloAlto-XcodeGhost" "objects_294_external_references_3_description_Claud Xiao. (2015, September 18). Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps. Retrieved December 21, 2016." "objects_294_external_references_3_url_http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/" "objects_294_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_294_spec_version_2.1" "objects_294_is_family_True" "objects_295_x_mitre_platforms_0_Android" "objects_295_x_mitre_domains_0_mobile-attack" "objects_295_x_mitre_aliases_0_SilkBean" "objects_295_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_295_id_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_295_type_malware" "objects_295_created_2020-12-24T21:41:36.719Z" "objects_295_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_295_external_references_0_external_id_S0549" "objects_295_external_references_0_source_name_mitre-attack" "objects_295_external_references_0_url_https://attack.mitre.org/software/S0549" "objects_295_external_references_1_source_name_Lookout Uyghur Campaign" "objects_295_external_references_1_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_295_external_references_1_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_295_modified_2021-04-19T14:29:45.809Z" "objects_295_name_SilkBean" "objects_295_description_[SilkBean](https://attack.mitre.org/software/S0549) is a piece of Android surveillanceware containing comprehensive remote access tool (RAT) functionality that has been used in targeting of the Uyghur ethnic group.(Citation: Lookout Uyghur Campaign)" "objects_295_x_mitre_version_1.0" "objects_295_x_mitre_attack_spec_version_2.1.0" "objects_295_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_295_spec_version_2.1" "objects_295_is_family_True" "objects_296_x_mitre_platforms_0_Android" "objects_296_x_mitre_domains_0_mobile-attack" "objects_296_x_mitre_aliases_0_WolfRAT" "objects_296_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_296_id_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_296_type_malware" "objects_296_created_2020-07-20T13:27:33.113Z" "objects_296_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_296_external_references_0_external_id_S0489" "objects_296_external_references_0_source_name_mitre-attack" "objects_296_external_references_0_url_https://attack.mitre.org/software/S0489" "objects_296_external_references_1_source_name_Talos-WolfRAT" "objects_296_external_references_1_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_296_external_references_1_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_296_modified_2020-09-11T15:58:40.564Z" "objects_296_name_WolfRAT" "objects_296_description_[WolfRAT](https://attack.mitre.org/software/S0489) is malware based on a leaked version of [Dendroid](https://attack.mitre.org/software/S0301) that has primarily targeted Thai users. [WolfRAT](https://attack.mitre.org/software/S0489) has most likely been operated by the now defunct organization Wolf Research.(Citation: Talos-WolfRAT) " "objects_296_x_mitre_version_1.0" "objects_296_x_mitre_attack_spec_version_2.1.0" "objects_296_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_296_spec_version_2.1" "objects_296_is_family_True" "objects_297_modified_2023-03-28T17:20:20.194Z" "objects_297_name_BusyGasper" "objects_297_description_[BusyGasper](https://attack.mitre.org/software/S0655) is Android spyware that has been in use since May 2016. There have been less than 10 victims, all who appear to be located in Russia, that were all infected via physical access to the device.(Citation: SecureList BusyGasper)" "objects_297_x_mitre_platforms_0_Android" "objects_297_x_mitre_deprecated_False" "objects_297_x_mitre_domains_0_mobile-attack" "objects_297_x_mitre_version_1.0" "objects_297_x_mitre_aliases_0_BusyGasper" "objects_297_type_malware" "objects_297_id_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_297_created_2021-10-01T14:42:48.234Z" "objects_297_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_297_revoked_False" "objects_297_external_references_0_source_name_mitre-attack" "objects_297_external_references_0_url_https://attack.mitre.org/software/S0655" "objects_297_external_references_0_external_id_S0655" "objects_297_external_references_1_source_name_SecureList BusyGasper" "objects_297_external_references_1_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_297_external_references_1_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_297_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_297_x_mitre_attack_spec_version_3.1.0" "objects_297_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_297_spec_version_2.1" "objects_297_is_family_True" "objects_298_x_mitre_domains_0_mobile-attack" "objects_298_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_298_type_malware" "objects_298_id_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_298_created_2017-10-25T14:48:47.674Z" "objects_298_x_mitre_version_1.0" "objects_298_external_references_0_source_name_mitre-attack" "objects_298_external_references_0_external_id_S0293" "objects_298_external_references_0_url_https://attack.mitre.org/software/S0293" "objects_298_external_references_1_source_name_CheckPoint-BrainTest" "objects_298_external_references_1_url_http://blog.checkpoint.com/2015/09/21/braintest-a-new-level-of-sophistication-in-mobile-malware/" "objects_298_external_references_1_description_Andrey Polkovnichenko and Alon Boxiner. (2015, September 21). BrainTest \u2013 A New Level of Sophistication in Mobile Malware. Retrieved December 21, 2016." "objects_298_external_references_2_source_name_Lookout-BrainTest" "objects_298_external_references_2_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_298_external_references_2_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_298_x_mitre_deprecated_False" "objects_298_revoked_False" "objects_298_description_[BrainTest](https://attack.mitre.org/software/S0293) is a family of Android malware. (Citation: CheckPoint-BrainTest) (Citation: Lookout-BrainTest)" "objects_298_modified_2022-04-15T15:36:43.770Z" "objects_298_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_298_name_BrainTest" "objects_298_x_mitre_attack_spec_version_2.1.0" "objects_298_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_298_spec_version_2.1" "objects_298_is_family_True" "objects_299_x_mitre_platforms_0_Android" "objects_299_x_mitre_domains_0_mobile-attack" "objects_299_x_mitre_aliases_0_TERRACOTTA" "objects_299_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_299_id_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_299_type_malware" "objects_299_created_2020-12-18T20:14:46.858Z" "objects_299_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_299_external_references_0_external_id_S0545" "objects_299_external_references_0_source_name_mitre-attack" "objects_299_external_references_0_url_https://attack.mitre.org/software/S0545" "objects_299_external_references_1_source_name_WhiteOps TERRACOTTA" "objects_299_external_references_1_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_299_external_references_1_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_299_modified_2020-12-28T18:59:32.817Z" "objects_299_name_TERRACOTTA" "objects_299_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) is an ad fraud botnet that has been capable of generating over 2 billion fraudulent requests per week.(Citation: WhiteOps TERRACOTTA)" "objects_299_x_mitre_version_1.0" "objects_299_x_mitre_attack_spec_version_2.1.0" "objects_299_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_299_spec_version_2.1" "objects_299_is_family_True" "objects_300_modified_2023-10-11T14:36:10.445Z" "objects_300_name_Escobar" "objects_300_description_[Escobar](https://attack.mitre.org/software/S1092) is an Android banking trojan, first detected in March 2021, believed to be a new variant of AbereBot.(Citation: Bleeipng Computer Escobar)" "objects_300_x_mitre_platforms_0_Android" "objects_300_x_mitre_deprecated_False" "objects_300_x_mitre_domains_0_mobile-attack" "objects_300_x_mitre_version_1.0" "objects_300_x_mitre_contributors_0_Pooja Natarajan, NEC Corporation India" "objects_300_x_mitre_contributors_1_Hiroki Nagahama, NEC Corporation" "objects_300_x_mitre_contributors_2_Manikantan Srinivasan, NEC Corporation India" "objects_300_x_mitre_aliases_0_Escobar" "objects_300_type_malware" "objects_300_id_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_300_created_2023-09-28T17:04:46.516Z" "objects_300_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_300_revoked_False" "objects_300_external_references_0_source_name_mitre-attack" "objects_300_external_references_0_url_https://attack.mitre.org/software/S1092" "objects_300_external_references_0_external_id_S1092" "objects_300_external_references_1_source_name_Bleeipng Computer Escobar" "objects_300_external_references_1_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_300_external_references_1_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_300_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_300_x_mitre_attack_spec_version_3.2.0" "objects_300_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_300_spec_version_2.1" "objects_300_is_family_True" "objects_301_x_mitre_platforms_0_Android" "objects_301_x_mitre_domains_0_mobile-attack" "objects_301_x_mitre_aliases_0_Triada" "objects_301_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_301_id_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_301_type_malware" "objects_301_created_2019-07-16T14:33:12.034Z" "objects_301_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_301_external_references_0_external_id_S0424" "objects_301_external_references_0_source_name_mitre-attack" "objects_301_external_references_0_url_https://attack.mitre.org/software/S0424" "objects_301_external_references_1_description_Snow, J. (2016, March 3). Triada: organized crime on Android. Retrieved July 16, 2019." "objects_301_external_references_1_url_https://www.kaspersky.com/blog/triada-trojan/11481/" "objects_301_external_references_1_source_name_Kaspersky Triada March 2016" "objects_301_modified_2020-05-28T16:52:37.979Z" "objects_301_name_Triada" "objects_301_description_[Triada](https://attack.mitre.org/software/S0424) was first reported in 2016 as a second stage malware. Later versions in 2019 appeared with new techniques and as an initial downloader of other Trojan apps.(Citation: Kaspersky Triada March 2016)" "objects_301_x_mitre_version_1.0" "objects_301_x_mitre_attack_spec_version_2.1.0" "objects_301_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_301_spec_version_2.1" "objects_301_is_family_True" "objects_302_x_mitre_platforms_0_Android" "objects_302_x_mitre_domains_0_mobile-attack" "objects_302_x_mitre_aliases_0_Golden Cup" "objects_302_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_302_id_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_302_type_malware" "objects_302_created_2020-11-20T15:44:57.339Z" "objects_302_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_302_external_references_0_external_id_S0535" "objects_302_external_references_0_source_name_mitre-attack" "objects_302_external_references_0_url_https://attack.mitre.org/software/S0535" "objects_302_external_references_1_source_name_Symantec GoldenCup" "objects_302_external_references_1_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_302_external_references_1_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_302_modified_2020-12-22T21:48:10.951Z" "objects_302_name_Golden Cup" "objects_302_description_[Golden Cup](https://attack.mitre.org/software/S0535) is Android spyware that has been used to target World Cup fans.(Citation: Symantec GoldenCup) " "objects_302_x_mitre_version_1.0" "objects_302_x_mitre_attack_spec_version_2.1.0" "objects_302_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_302_spec_version_2.1" "objects_302_is_family_True" "objects_303_modified_2023-03-31T23:02:48.577Z" "objects_303_name_FluBot" "objects_303_description_[FluBot](https://attack.mitre.org/software/S1067) is a multi-purpose mobile banking malware that was first observed in Spain in late 2020. It primarily spread through European countries using a variety of SMS phishing messages in multiple languages.(Citation: proofpoint_flubot_0421)(Citation: bitdefender_flubot_0524)" "objects_303_x_mitre_platforms_0_Android" "objects_303_x_mitre_deprecated_False" "objects_303_x_mitre_domains_0_mobile-attack" "objects_303_x_mitre_version_1.0" "objects_303_x_mitre_aliases_0_FluBot" "objects_303_type_malware" "objects_303_id_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_303_created_2023-02-28T20:25:59.034Z" "objects_303_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_303_revoked_False" "objects_303_external_references_0_source_name_mitre-attack" "objects_303_external_references_0_url_https://attack.mitre.org/software/S1067" "objects_303_external_references_0_external_id_S1067" "objects_303_external_references_1_source_name_proofpoint_flubot_0421" "objects_303_external_references_1_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_303_external_references_1_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_303_external_references_2_source_name_bitdefender_flubot_0524" "objects_303_external_references_2_description_Filip TRU\u021a\u0102, R\u0103zvan GOSA, Adrian Mihai GOZOB. (2022, May 24). New FluBot Campaign Sweeps through Europe Targeting Android and iOS Users Alike. Retrieved February 28, 2023." "objects_303_external_references_2_url_https://www.bitdefender.com/blog/labs/new-flubot-campaign-sweeps-through-europe-targeting-android-and-ios-users-alike/" "objects_303_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_303_x_mitre_attack_spec_version_3.1.0" "objects_303_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_303_spec_version_2.1" "objects_303_is_family_True" "objects_304_x_mitre_platforms_0_Android" "objects_304_x_mitre_domains_0_mobile-attack" "objects_304_x_mitre_aliases_0_ViperRAT" "objects_304_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_304_id_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_304_type_malware" "objects_304_created_2020-09-11T16:22:02.954Z" "objects_304_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_304_external_references_0_external_id_S0506" "objects_304_external_references_0_source_name_mitre-attack" "objects_304_external_references_0_url_https://attack.mitre.org/software/S0506" "objects_304_external_references_1_source_name_Lookout ViperRAT" "objects_304_external_references_1_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_304_external_references_1_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_304_modified_2020-09-29T20:03:42.662Z" "objects_304_name_ViperRAT" "objects_304_description_[ViperRAT](https://attack.mitre.org/software/S0506) is sophisticated surveillanceware that has been in operation since at least 2015 and was used to target the Israeli Defense Force.(Citation: Lookout ViperRAT) " "objects_304_x_mitre_version_1.0" "objects_304_x_mitre_attack_spec_version_2.1.0" "objects_304_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_304_spec_version_2.1" "objects_304_is_family_True" "objects_305_modified_2022-10-24T15:09:07.609Z" "objects_305_name_Adups" "objects_305_description_[Adups](https://attack.mitre.org/software/S0309) is software that was pre-installed onto Android devices, including those made by BLU Products. The software was reportedly designed to help a Chinese phone manufacturer monitor user behavior, transferring sensitive data to a Chinese server. (Citation: NYTimes-BackDoor) (Citation: BankInfoSecurity-BackDoor)" "objects_305_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_305_x_mitre_domains_0_mobile-attack" "objects_305_x_mitre_version_1.0" "objects_305_x_mitre_attack_spec_version_2.1.0" "objects_305_type_malware" "objects_305_id_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_305_created_2017-10-25T14:48:47.038Z" "objects_305_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_305_external_references_0_source_name_mitre-attack" "objects_305_external_references_0_url_https://attack.mitre.org/software/S0309" "objects_305_external_references_0_external_id_S0309" "objects_305_external_references_1_source_name_Adups" "objects_305_external_references_1_description_(Citation: NYTimes-BackDoor) (Citation: BankInfoSecurity-BackDoor)" "objects_305_external_references_2_source_name_NYTimes-BackDoor" "objects_305_external_references_2_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_305_external_references_2_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_305_external_references_3_source_name_BankInfoSecurity-BackDoor" "objects_305_external_references_3_description_Jeremy Kirk. (2016, November 16). Why Did Chinese Spyware Linger in U.S. Phones?. Retrieved February 6, 2017." "objects_305_external_references_3_url_http://www.bankinfosecurity.com/did-chinese-spyware-linger-in-us-phones-a-9534" "objects_305_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_305_spec_version_2.1" "objects_305_is_family_True" "objects_306_x_mitre_platforms_0_Android" "objects_306_x_mitre_domains_0_mobile-attack" "objects_306_x_mitre_aliases_0_SimBad" "objects_306_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_306_id_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_306_type_malware" "objects_306_created_2019-11-21T19:16:34.526Z" "objects_306_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_306_external_references_0_external_id_S0419" "objects_306_external_references_0_source_name_mitre-attack" "objects_306_external_references_0_url_https://attack.mitre.org/software/S0419" "objects_306_external_references_1_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_306_external_references_1_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_306_external_references_1_source_name_CheckPoint SimBad 2019" "objects_306_modified_2020-01-27T17:01:31.634Z" "objects_306_name_SimBad" "objects_306_description_[SimBad](https://attack.mitre.org/software/S0419) was a strain of adware on the Google Play Store, distributed through the RXDroider Software Development Kit. The name \"SimBad\" was derived from the fact that most of the infected applications were simulator games. The adware was controlled using an instance of the open source framework Parse Server.(Citation: CheckPoint SimBad 2019)" "objects_306_x_mitre_version_1.0" "objects_306_x_mitre_attack_spec_version_2.1.0" "objects_306_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_306_spec_version_2.1" "objects_306_is_family_True" "objects_307_x_mitre_platforms_0_Android" "objects_307_x_mitre_domains_0_mobile-attack" "objects_307_x_mitre_aliases_0_Android/AdDisplay.Ashas" "objects_307_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_307_id_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_307_type_malware" "objects_307_created_2020-10-29T19:19:08.848Z" "objects_307_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_307_external_references_0_external_id_S0525" "objects_307_external_references_0_source_name_mitre-attack" "objects_307_external_references_0_url_https://attack.mitre.org/software/S0525" "objects_307_external_references_1_source_name_WeLiveSecurity AdDisplayAshas" "objects_307_external_references_1_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_307_external_references_1_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_307_modified_2020-10-29T19:19:08.848Z" "objects_307_name_Android/AdDisplay.Ashas" "objects_307_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) is a variant of adware that has been distributed through multiple apps in the Google Play Store. (Citation: WeLiveSecurity AdDisplayAshas)" "objects_307_x_mitre_version_1.0" "objects_307_x_mitre_attack_spec_version_2.1.0" "objects_307_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_307_spec_version_2.1" "objects_307_is_family_True" "objects_308_modified_2022-10-24T15:09:07.609Z" "objects_308_name_Marcher" "objects_308_description_[Marcher](https://attack.mitre.org/software/S0317) is Android malware that is used for financial fraud. (Citation: Proofpoint-Marcher)" "objects_308_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_308_x_mitre_domains_0_mobile-attack" "objects_308_x_mitre_version_1.0" "objects_308_x_mitre_attack_spec_version_2.1.0" "objects_308_type_malware" "objects_308_id_malware--f9854ba6-989d-43bf-828b-7240b8a65291" "objects_308_created_2018-10-17T00:14:20.652Z" "objects_308_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_308_external_references_0_source_name_mitre-attack" "objects_308_external_references_0_url_https://attack.mitre.org/software/S0317" "objects_308_external_references_0_external_id_S0317" "objects_308_external_references_1_source_name_Proofpoint-Marcher" "objects_308_external_references_1_description_Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018." "objects_308_external_references_1_url_https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks" "objects_308_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_308_spec_version_2.1" "objects_308_is_family_True" "objects_309_modified_2023-03-29T21:11:14.364Z" "objects_309_name_TianySpy" "objects_309_description_[TianySpy](https://attack.mitre.org/software/S1056) is a mobile malware primarily spread by SMS phishing between September 30 and October 12, 2021. [TianySpy](https://attack.mitre.org/software/S1056) is believed to have targeted credentials associated with membership websites of major Japanese telecommunication services.(Citation: trendmicro_tianyspy_0122) " "objects_309_x_mitre_platforms_0_Android" "objects_309_x_mitre_platforms_1_iOS" "objects_309_x_mitre_deprecated_False" "objects_309_x_mitre_domains_0_mobile-attack" "objects_309_x_mitre_version_1.0" "objects_309_x_mitre_aliases_0_TianySpy" "objects_309_type_malware" "objects_309_id_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_309_created_2023-01-19T18:05:30.924Z" "objects_309_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_309_revoked_False" "objects_309_external_references_0_source_name_mitre-attack" "objects_309_external_references_0_url_https://attack.mitre.org/software/S1056" "objects_309_external_references_0_external_id_S1056" "objects_309_external_references_1_source_name_trendmicro_tianyspy_0122" "objects_309_external_references_1_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_309_external_references_1_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_309_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_309_x_mitre_attack_spec_version_3.1.0" "objects_309_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_309_spec_version_2.1" "objects_309_is_family_True" "objects_310_modified_2023-10-07T21:33:03.773Z" "objects_310_name_Sunbird" "objects_310_description_[Sunbird](https://attack.mitre.org/software/S1082) is one of two mobile malware families known to be used by the APT [Confucius](https://attack.mitre.org/groups/G0142). Analysis suggests that [Sunbird](https://attack.mitre.org/software/S1082) was first active in early 2017. While [Sunbird](https://attack.mitre.org/software/S1082) and [Hornbill](https://attack.mitre.org/software/S1077) overlap in core capabilities, [Sunbird](https://attack.mitre.org/software/S1082) has a more extensive set of malicious features.(Citation: lookout_hornbill_sunbird_0221)" "objects_310_x_mitre_platforms_0_Android" "objects_310_x_mitre_deprecated_False" "objects_310_x_mitre_domains_0_mobile-attack" "objects_310_x_mitre_version_1.0" "objects_310_x_mitre_aliases_0_Sunbird" "objects_310_type_malware" "objects_310_id_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_310_created_2023-08-04T18:27:24.614Z" "objects_310_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_310_revoked_False" "objects_310_external_references_0_source_name_mitre-attack" "objects_310_external_references_0_url_https://attack.mitre.org/software/S1082" "objects_310_external_references_0_external_id_S1082" "objects_310_external_references_1_source_name_lookout_hornbill_sunbird_0221" "objects_310_external_references_1_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_310_external_references_1_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_310_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_310_x_mitre_attack_spec_version_3.2.0" "objects_310_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_310_spec_version_2.1" "objects_310_is_family_True" "objects_311_modified_2022-10-24T15:09:07.609Z" "objects_311_name_DressCode" "objects_311_description_[DressCode](https://attack.mitre.org/software/S0300) is an Android malware family. (Citation: TrendMicro-DressCode)" "objects_311_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_311_x_mitre_domains_0_mobile-attack" "objects_311_x_mitre_version_1.0" "objects_311_x_mitre_attack_spec_version_2.1.0" "objects_311_type_malware" "objects_311_id_malware--ff742eeb-1f90-4f5a-8b92-9d40fffd99ca" "objects_311_created_2017-10-25T14:48:37.856Z" "objects_311_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_311_external_references_0_source_name_mitre-attack" "objects_311_external_references_0_url_https://attack.mitre.org/software/S0300" "objects_311_external_references_0_external_id_S0300" "objects_311_external_references_1_source_name_DressCode" "objects_311_external_references_1_description_(Citation: TrendMicro-DressCode)" "objects_311_external_references_2_source_name_TrendMicro-DressCode" "objects_311_external_references_2_description_Echo Duan. (2016, September 29). DressCode and its Potential Impact for Enterprises. Retrieved December 22, 2016." "objects_311_external_references_2_url_http://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/" "objects_311_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_311_spec_version_2.1" "objects_311_is_family_True" "objects_312_x_mitre_platforms_0_Android" "objects_312_x_mitre_domains_0_mobile-attack" "objects_312_x_mitre_aliases_0_Gustuff" "objects_312_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_312_id_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_312_type_malware" "objects_312_created_2019-09-03T20:08:00.241Z" "objects_312_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_312_external_references_0_external_id_S0406" "objects_312_external_references_0_source_name_mitre-attack" "objects_312_external_references_0_url_https://attack.mitre.org/software/S0406" "objects_312_external_references_1_source_name_Talos Gustuff Apr 2019" "objects_312_external_references_1_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_312_external_references_1_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_312_modified_2019-10-14T19:14:17.007Z" "objects_312_name_Gustuff" "objects_312_description_[Gustuff](https://attack.mitre.org/software/S0406) is mobile malware designed to steal users' banking and virtual currency credentials.(Citation: Talos Gustuff Apr 2019)" "objects_312_x_mitre_version_1.0" "objects_312_x_mitre_attack_spec_version_2.1.0" "objects_312_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_312_spec_version_2.1" "objects_312_is_family_True" "objects_313_definition_statement_Copyright 2015-2023, The MITRE Corporation. MITRE ATT&CK and ATT&CK are registered trademarks of The MITRE Corporation." "objects_313_id_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_313_type_marking-definition" "objects_313_created_2017-06-01T00:00:00.000Z" "objects_313_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_313_definition_type_statement" "objects_313_x_mitre_attack_spec_version_2.1.0" "objects_313_spec_version_2.1" "objects_313_x_mitre_domains_0_mobile-attack" "objects_314_type_relationship" "objects_314_id_relationship--0008005f-ca51-47c3-8369-55ee5de1c65a" "objects_314_created_2017-12-14T16:46:06.044Z" "objects_314_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_314_revoked_False" "objects_314_external_references_0_source_name_Zscaler-SpyNote" "objects_314_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_314_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_314_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_314_modified_2023-04-05T17:43:54.975Z" "objects_314_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) uses an Android broadcast receiver to automatically start when the device boots.(Citation: Zscaler-SpyNote)" "objects_314_relationship_type_uses" "objects_314_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_314_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_314_x_mitre_deprecated_False" "objects_314_x_mitre_version_1.0" "objects_314_x_mitre_attack_spec_version_3.1.0" "objects_314_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_314_spec_version_2.1" "objects_314_x_mitre_domains_0_mobile-attack" "objects_315_type_relationship" "objects_315_id_relationship--006b3910-e9c3-4de8-ba49-dff36b1a3308" "objects_315_created_2023-02-06T19:04:33.224Z" "objects_315_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_315_revoked_False" "objects_315_external_references_0_source_name_lookout_abstractemu_1021" "objects_315_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_315_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_315_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_315_modified_2023-03-27T17:06:11.934Z" "objects_315_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can monitor notifications.(Citation: lookout_abstractemu_1021)" "objects_315_relationship_type_uses" "objects_315_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_315_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_315_x_mitre_deprecated_False" "objects_315_x_mitre_version_0.1" "objects_315_x_mitre_attack_spec_version_3.1.0" "objects_315_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_315_spec_version_2.1" "objects_315_x_mitre_domains_0_mobile-attack" "objects_316_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_316_id_relationship--00dc2b34-1b74-4dae-b6e4-b676528d6341" "objects_316_type_relationship" "objects_316_created_2019-07-16T14:33:12.085Z" "objects_316_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_316_external_references_0_source_name_Google Triada June 2019" "objects_316_external_references_0_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_316_external_references_0_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_316_modified_2020-04-27T16:52:49.480Z" "objects_316_description_[Triada](https://attack.mitre.org/software/S0424) utilizes a backdoor in a Play Store app to install additional trojanized apps from the Command and Control server.(Citation: Google Triada June 2019)" "objects_316_relationship_type_uses" "objects_316_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_316_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_316_x_mitre_version_1.0" "objects_316_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_316_spec_version_2.1" "objects_316_x_mitre_attack_spec_version_2.1.0" "objects_316_x_mitre_domains_0_mobile-attack" "objects_317_type_relationship" "objects_317_id_relationship--0100020b-97d4-4657-bc71-c6a1774055a6" "objects_317_created_2022-04-20T17:36:25.707Z" "objects_317_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_317_revoked_False" "objects_317_external_references_0_source_name_Lookout Uyghur Campaign" "objects_317_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_317_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_317_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_317_modified_2023-04-05T20:39:23.114Z" "objects_317_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has exfiltrated data via both SMTP and HTTP.(Citation: Lookout Uyghur Campaign)" "objects_317_relationship_type_uses" "objects_317_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_317_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_317_x_mitre_deprecated_False" "objects_317_x_mitre_version_0.1" "objects_317_x_mitre_attack_spec_version_3.1.0" "objects_317_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_317_spec_version_2.1" "objects_317_x_mitre_domains_0_mobile-attack" "objects_318_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_318_id_relationship--01965668-d033-4aca-a8e5-71a07070e266" "objects_318_type_relationship" "objects_318_created_2018-10-17T00:14:20.652Z" "objects_318_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_318_modified_2018-10-17T00:14:20.652Z" "objects_318_relationship_type_revoked-by" "objects_318_source_ref_attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09" "objects_318_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_318_x_mitre_version_1.0" "objects_318_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_318_spec_version_2.1" "objects_318_x_mitre_attack_spec_version_2.1.0" "objects_318_x_mitre_domains_0_mobile-attack" "objects_319_type_relationship" "objects_319_id_relationship--01fd0686-d67f-4396-8812-3533063dd6b4" "objects_319_created_2023-08-16T16:38:47.766Z" "objects_319_revoked_False" "objects_319_external_references_0_source_name_cyble_chameleon_0423" "objects_319_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_319_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_319_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_319_modified_2023-08-16T16:38:47.766Z" "objects_319_description_[Chameleon](https://attack.mitre.org/software/S1083) can remove artifacts of its presence and uninstall itself.(Citation: cyble_chameleon_0423)" "objects_319_relationship_type_uses" "objects_319_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_319_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_319_x_mitre_deprecated_False" "objects_319_x_mitre_version_0.1" "objects_319_x_mitre_attack_spec_version_3.1.0" "objects_319_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_319_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_319_spec_version_2.1" "objects_319_x_mitre_domains_0_mobile-attack" "objects_320_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_320_id_relationship--020a1aaa-a444-4f3c-a08b-f1369be276f2" "objects_320_type_relationship" "objects_320_created_2020-09-15T15:18:12.398Z" "objects_320_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_320_external_references_0_source_name_Cybereason FakeSpy" "objects_320_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_320_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_320_modified_2020-09-15T15:18:12.398Z" "objects_320_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect device networking information, including phone number, IMEI, and IMSI.(Citation: Cybereason FakeSpy)" "objects_320_relationship_type_uses" "objects_320_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_320_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_320_x_mitre_version_1.0" "objects_320_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_320_spec_version_2.1" "objects_320_x_mitre_attack_spec_version_2.1.0" "objects_320_x_mitre_domains_0_mobile-attack" "objects_321_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_321_id_relationship--020f79c6-d5f8-49eb-beee-e716e1fa4e80" "objects_321_type_relationship" "objects_321_created_2020-07-20T13:49:03.692Z" "objects_321_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_321_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_321_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_321_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_321_modified_2020-09-24T15:12:24.191Z" "objects_321_description_[XLoader for Android](https://attack.mitre.org/software/S0318) collects the device\u2019s Android ID and serial number.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_321_relationship_type_uses" "objects_321_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_321_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_321_x_mitre_version_1.0" "objects_321_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_321_spec_version_2.1" "objects_321_x_mitre_attack_spec_version_2.1.0" "objects_321_x_mitre_domains_0_mobile-attack" "objects_322_type_relationship" "objects_322_id_relationship--021ca5c4-7e8a-439b-8c2e-38f817db63e3" "objects_322_created_2023-02-06T18:50:12.251Z" "objects_322_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_322_revoked_False" "objects_322_external_references_0_source_name_lookout_abstractemu_1021" "objects_322_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_322_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_322_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_322_modified_2023-04-14T14:40:57.100Z" "objects_322_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can check device system properties to potentially avoid running while under analysis.(Citation: lookout_abstractemu_1021)" "objects_322_relationship_type_uses" "objects_322_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_322_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_322_x_mitre_deprecated_False" "objects_322_x_mitre_version_0.1" "objects_322_x_mitre_attack_spec_version_3.1.0" "objects_322_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_322_spec_version_2.1" "objects_322_x_mitre_domains_0_mobile-attack" "objects_323_type_relationship" "objects_323_id_relationship--022e941f-30c3-45a9-9f6f-36e704b80060" "objects_323_created_2020-04-24T17:46:31.574Z" "objects_323_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_323_revoked_False" "objects_323_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_323_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_323_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_323_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_323_modified_2023-04-05T17:44:13.361Z" "objects_323_description_[TrickMo](https://attack.mitre.org/software/S0427) registers for the `SCREEN_ON` and `SMS_DELIVER` intents to perform actions when the device is unlocked and when the device receives an SMS message.(Citation: SecurityIntelligence TrickMo)" "objects_323_relationship_type_uses" "objects_323_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_323_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_323_x_mitre_deprecated_False" "objects_323_x_mitre_version_1.0" "objects_323_x_mitre_attack_spec_version_3.1.0" "objects_323_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_323_spec_version_2.1" "objects_323_x_mitre_domains_0_mobile-attack" "objects_324_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_324_type_relationship" "objects_324_id_relationship--024f9ee4-cb7d-49f4-b180-ad1e5e168a4c" "objects_324_created_2017-10-25T14:48:53.747Z" "objects_324_x_mitre_version_1.0" "objects_324_x_mitre_deprecated_False" "objects_324_revoked_False" "objects_324_description_Android 7 and later iOS versions introduced changes that prevent applications from performing Process Discovery without elevated privileges. " "objects_324_modified_2022-03-30T20:32:46.334Z" "objects_324_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_324_relationship_type_mitigates" "objects_324_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_324_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_324_x_mitre_attack_spec_version_2.1.0" "objects_324_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_324_spec_version_2.1" "objects_324_x_mitre_domains_0_mobile-attack" "objects_325_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_325_id_relationship--027a36dc-cd9e-4282-b101-b9a0abbb312f" "objects_325_type_relationship" "objects_325_created_2020-09-11T14:54:16.640Z" "objects_325_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_325_external_references_0_source_name_Lookout Desert Scorpion" "objects_325_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_325_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_325_modified_2020-09-11T14:54:16.640Z" "objects_325_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can encrypt exfiltrated data.(Citation: Lookout Desert Scorpion)" "objects_325_relationship_type_uses" "objects_325_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_325_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_325_x_mitre_version_1.0" "objects_325_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_325_spec_version_2.1" "objects_325_x_mitre_attack_spec_version_2.1.0" "objects_325_x_mitre_domains_0_mobile-attack" "objects_326_type_relationship" "objects_326_id_relationship--0291c9d5-8977-420d-8374-b786e3095a73" "objects_326_created_2023-03-20T18:49:53.204Z" "objects_326_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_326_revoked_False" "objects_326_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_326_modified_2023-08-08T15:34:15.917Z" "objects_326_description_Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken." "objects_326_relationship_type_detects" "objects_326_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_326_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_326_x_mitre_deprecated_False" "objects_326_x_mitre_version_0.1" "objects_326_x_mitre_attack_spec_version_3.1.0" "objects_326_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_326_spec_version_2.1" "objects_326_x_mitre_domains_0_mobile-attack" "objects_327_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_327_id_relationship--02b3c8fe-1539-4c77-b67e-07fa8a22c91e" "objects_327_type_relationship" "objects_327_created_2017-12-14T16:46:06.044Z" "objects_327_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_327_external_references_0_source_name_Lookout-BrainTest" "objects_327_external_references_0_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_327_external_references_0_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_327_modified_2020-03-31T14:49:39.188Z" "objects_327_description_Some original variants of [BrainTest](https://attack.mitre.org/software/S0293) had the capability to automatically root some devices, but that behavior was not observed in later samples.(Citation: Lookout-BrainTest)" "objects_327_relationship_type_uses" "objects_327_source_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_327_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_327_x_mitre_version_1.0" "objects_327_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_327_spec_version_2.1" "objects_327_x_mitre_attack_spec_version_2.1.0" "objects_327_x_mitre_domains_0_mobile-attack" "objects_328_type_relationship" "objects_328_id_relationship--02b5cb07-9eb5-4e47-a4df-9c3985ad70fc" "objects_328_created_2021-10-01T14:42:49.174Z" "objects_328_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_328_revoked_False" "objects_328_external_references_0_source_name_SecureList BusyGasper" "objects_328_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_328_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_328_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_328_modified_2023-04-05T17:26:41.762Z" "objects_328_description_[BusyGasper](https://attack.mitre.org/software/S0655) can abuse existing root access to copy components into the system partition.(Citation: SecureList BusyGasper)" "objects_328_relationship_type_uses" "objects_328_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_328_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_328_x_mitre_deprecated_False" "objects_328_x_mitre_version_1.0" "objects_328_x_mitre_attack_spec_version_3.1.0" "objects_328_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_328_spec_version_2.1" "objects_328_x_mitre_domains_0_mobile-attack" "objects_329_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_329_type_relationship" "objects_329_id_relationship--02e4aedc-0674-4598-948b-0a32758af9ca" "objects_329_created_2022-04-01T13:14:43.195Z" "objects_329_x_mitre_version_0.1" "objects_329_x_mitre_deprecated_False" "objects_329_revoked_False" "objects_329_description_" "objects_329_modified_2022-04-01T13:14:43.195Z" "objects_329_relationship_type_revoked-by" "objects_329_source_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_329_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_329_x_mitre_attack_spec_version_2.1.0" "objects_329_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_329_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_329_spec_version_2.1" "objects_329_x_mitre_domains_0_mobile-attack" "objects_330_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_330_id_relationship--03038590-e0c3-4751-b6fb-8a9ffff27e1b" "objects_330_type_relationship" "objects_330_created_2020-12-24T22:04:27.914Z" "objects_330_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_330_external_references_0_source_name_Lookout Uyghur Campaign" "objects_330_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_330_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_330_modified_2020-12-24T22:04:27.914Z" "objects_330_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has looked for .doc, .txt, .gif, .apk, .jpg, .png, .mp3, and .db files on external storage.(Citation: Lookout Uyghur Campaign)" "objects_330_relationship_type_uses" "objects_330_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_330_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_330_x_mitre_version_1.0" "objects_330_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_330_spec_version_2.1" "objects_330_x_mitre_attack_spec_version_2.1.0" "objects_330_x_mitre_domains_0_mobile-attack" "objects_331_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_331_type_relationship" "objects_331_id_relationship--03172b09-4f97-4fb8-95f0-92b2d8957408" "objects_331_created_2020-06-26T14:55:13.349Z" "objects_331_x_mitre_version_1.0" "objects_331_external_references_0_source_name_Cybereason EventBot" "objects_331_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_331_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_331_x_mitre_deprecated_False" "objects_331_revoked_False" "objects_331_description_[EventBot](https://attack.mitre.org/software/S0478) has encrypted base64-encoded payload data using RC4 and Curve25519.(Citation: Cybereason EventBot)" "objects_331_modified_2022-04-18T15:57:14.375Z" "objects_331_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_331_relationship_type_uses" "objects_331_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_331_target_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_331_x_mitre_attack_spec_version_2.1.0" "objects_331_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_331_spec_version_2.1" "objects_331_x_mitre_domains_0_mobile-attack" "objects_332_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_332_type_relationship" "objects_332_id_relationship--0330db55-06e0-45a2-85a6-17617a37fdaf" "objects_332_created_2022-04-06T13:57:49.186Z" "objects_332_x_mitre_version_0.1" "objects_332_x_mitre_deprecated_False" "objects_332_revoked_False" "objects_332_description_" "objects_332_modified_2022-04-06T13:57:49.186Z" "objects_332_relationship_type_revoked-by" "objects_332_source_ref_attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf" "objects_332_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_332_x_mitre_attack_spec_version_2.1.0" "objects_332_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_332_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_332_spec_version_2.1" "objects_332_x_mitre_domains_0_mobile-attack" "objects_333_type_relationship" "objects_333_id_relationship--035192e3-94f4-426d-9be9-312ddd1ce6a8" "objects_333_created_2019-11-21T16:42:48.437Z" "objects_333_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_333_revoked_False" "objects_333_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_333_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_333_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_333_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_333_modified_2023-04-05T20:22:18.013Z" "objects_333_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can collect SMS messages.(Citation: SecureList - ViceLeaker 2019)" "objects_333_relationship_type_uses" "objects_333_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_333_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_333_x_mitre_deprecated_False" "objects_333_x_mitre_version_1.0" "objects_333_x_mitre_attack_spec_version_3.1.0" "objects_333_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_333_spec_version_2.1" "objects_333_x_mitre_domains_0_mobile-attack" "objects_334_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_334_id_relationship--03ff6271-d7bc-40f3-b83d-25c541333694" "objects_334_type_relationship" "objects_334_created_2019-11-19T17:32:20.701Z" "objects_334_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_334_modified_2019-12-26T16:14:33.468Z" "objects_334_description_If a user sees a persistent notification they do not recognize, they should uninstall the source application and look for other unwanted applications or anomalies." "objects_334_relationship_type_mitigates" "objects_334_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_334_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_334_x_mitre_version_1.0" "objects_334_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_334_spec_version_2.1" "objects_334_x_mitre_attack_spec_version_2.1.0" "objects_334_x_mitre_domains_0_mobile-attack" "objects_335_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_335_type_relationship" "objects_335_id_relationship--042a4f26-612e-4ed5-b7f3-911a47ec5d71" "objects_335_created_2022-04-18T15:49:00.561Z" "objects_335_x_mitre_version_0.1" "objects_335_external_references_0_source_name_SecureList BusyGasper" "objects_335_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_335_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_335_x_mitre_deprecated_False" "objects_335_revoked_False" "objects_335_description_[BusyGasper](https://attack.mitre.org/software/S0655) can download text files with commands from an FTP server and exfiltrate data via email.(Citation: SecureList BusyGasper)" "objects_335_modified_2022-04-18T15:49:00.561Z" "objects_335_relationship_type_uses" "objects_335_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_335_target_ref_attack-pattern--37047267-3e56-453c-833e-d92b68118120" "objects_335_x_mitre_attack_spec_version_2.1.0" "objects_335_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_335_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_335_spec_version_2.1" "objects_335_x_mitre_domains_0_mobile-attack" "objects_336_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_336_id_relationship--04530307-22d8-4a06-9056-55eea225fabb" "objects_336_type_relationship" "objects_336_created_2019-07-10T15:35:43.710Z" "objects_336_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_336_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_336_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_336_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_336_modified_2020-03-31T14:49:39.188Z" "objects_336_description_[Pallas](https://attack.mitre.org/software/S0399) retrieves messages and decryption keys for popular messaging applications and other accounts stored on the device.(Citation: Lookout Dark Caracal Jan 2018)" "objects_336_relationship_type_uses" "objects_336_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_336_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_336_x_mitre_version_1.0" "objects_336_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_336_spec_version_2.1" "objects_336_x_mitre_attack_spec_version_2.1.0" "objects_336_x_mitre_domains_0_mobile-attack" "objects_337_type_relationship" "objects_337_id_relationship--046acda0-91de-4385-bcfb-157570d8e51d" "objects_337_created_2023-03-30T15:25:00.442Z" "objects_337_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_337_revoked_False" "objects_337_external_references_0_source_name_cleafy_sova_1122" "objects_337_external_references_0_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_337_external_references_0_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_337_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_337_modified_2023-03-30T15:26:46.611Z" "objects_337_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can search for installed applications that match a list of targets.(Citation: cleafy_sova_1122)" "objects_337_relationship_type_uses" "objects_337_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_337_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_337_x_mitre_deprecated_False" "objects_337_x_mitre_version_0.1" "objects_337_x_mitre_attack_spec_version_3.1.0" "objects_337_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_337_spec_version_2.1" "objects_337_x_mitre_domains_0_mobile-attack" "objects_338_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_338_type_relationship" "objects_338_id_relationship--049a5149-00c9-492a-8ffb-463f3d0cd910" "objects_338_created_2022-03-30T20:13:28.442Z" "objects_338_x_mitre_version_0.1" "objects_338_external_references_0_source_name_Android 10 Limitations to Hiding App Icons" "objects_338_external_references_0_url_https://source.android.com/setup/start/android-10-release#limitations_to_hiding_app_icons" "objects_338_external_references_0_description_Android. (n.d.). Android 10 Release Notes: Limitations to hiding app icons. Retrieved March 30, 2022." "objects_338_external_references_1_source_name_LauncherApps getActivityList" "objects_338_external_references_1_url_https://developer.android.com/reference/kotlin/android/content/pm/LauncherApps#getactivitylist" "objects_338_external_references_1_description_Android. (n.d.). LauncherApps: getActivityList. Retrieved March 30, 2022." "objects_338_x_mitre_deprecated_False" "objects_338_revoked_False" "objects_338_description_Android 10 introduced changes to prevent malicious applications from fully suppressing their icon in the launcher.(Citation: Android 10 Limitations to Hiding App Icons)(Citation: LauncherApps getActivityList)" "objects_338_modified_2022-05-20T17:16:08.998Z" "objects_338_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_338_relationship_type_mitigates" "objects_338_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_338_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_338_x_mitre_attack_spec_version_2.1.0" "objects_338_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_338_spec_version_2.1" "objects_338_x_mitre_domains_0_mobile-attack" "objects_339_type_relationship" "objects_339_id_relationship--049b0c71-63e3-47ce-bb0b-149df0344b15" "objects_339_created_2020-12-24T21:45:56.965Z" "objects_339_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_339_revoked_False" "objects_339_external_references_0_source_name_Lookout Uyghur Campaign" "objects_339_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_339_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_339_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_339_modified_2023-04-05T17:15:59.861Z" "objects_339_description_[SilkBean](https://attack.mitre.org/software/S0549) can access device contacts.(Citation: Lookout Uyghur Campaign)" "objects_339_relationship_type_uses" "objects_339_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_339_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_339_x_mitre_deprecated_False" "objects_339_x_mitre_version_1.0" "objects_339_x_mitre_attack_spec_version_3.1.0" "objects_339_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_339_spec_version_2.1" "objects_339_x_mitre_domains_0_mobile-attack" "objects_340_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_340_type_relationship" "objects_340_id_relationship--049c39ab-c036-457a-9b8f-4318416658b8" "objects_340_created_2022-03-30T19:54:24.468Z" "objects_340_x_mitre_version_0.1" "objects_340_x_mitre_deprecated_False" "objects_340_revoked_False" "objects_340_description_A locked bootloader could prevent unauthorized modifications of protected operating system files. " "objects_340_modified_2022-03-30T19:55:15.724Z" "objects_340_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_340_relationship_type_mitigates" "objects_340_source_ref_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_340_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_340_x_mitre_attack_spec_version_2.1.0" "objects_340_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_340_spec_version_2.1" "objects_340_x_mitre_domains_0_mobile-attack" "objects_341_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_341_type_relationship" "objects_341_id_relationship--04ae1d87-1741-4cfd-84ff-3c5e46c0b112" "objects_341_created_2022-04-05T19:59:03.285Z" "objects_341_x_mitre_version_0.1" "objects_341_x_mitre_deprecated_False" "objects_341_revoked_False" "objects_341_description_" "objects_341_modified_2022-04-05T19:59:03.285Z" "objects_341_relationship_type_subtechnique-of" "objects_341_source_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_341_target_ref_attack-pattern--2ccc3d39-9598-4d32-9657-42e1c7095d26" "objects_341_x_mitre_attack_spec_version_2.1.0" "objects_341_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_341_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_341_spec_version_2.1" "objects_341_x_mitre_domains_0_mobile-attack" "objects_342_type_relationship" "objects_342_id_relationship--04ec5f2f-b14f-46ae-b151-05f9b7af0bcc" "objects_342_created_2023-03-20T18:37:57.767Z" "objects_342_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_342_revoked_False" "objects_342_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_342_modified_2023-08-09T14:53:48.653Z" "objects_342_description_Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications." "objects_342_relationship_type_detects" "objects_342_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_342_target_ref_attack-pattern--27d18e87-8f32-4be1-b456-39b90454360f" "objects_342_x_mitre_deprecated_False" "objects_342_x_mitre_version_0.1" "objects_342_x_mitre_attack_spec_version_3.1.0" "objects_342_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_342_spec_version_2.1" "objects_342_x_mitre_domains_0_mobile-attack" "objects_343_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_343_id_relationship--04eeed4b-e0fc-4fff-8c61-4c175f26a0fe" "objects_343_type_relationship" "objects_343_created_2019-12-10T16:07:41.093Z" "objects_343_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_343_external_references_0_source_name_SecureList DVMap June 2017" "objects_343_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_343_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_343_modified_2019-12-10T16:07:41.093Z" "objects_343_description_[Dvmap](https://attack.mitre.org/software/S0420) can download code and binaries from the C2 server to execute on the device as root.(Citation: SecureList DVMap June 2017)" "objects_343_relationship_type_uses" "objects_343_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_343_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_343_x_mitre_version_1.0" "objects_343_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_343_spec_version_2.1" "objects_343_x_mitre_attack_spec_version_2.1.0" "objects_343_x_mitre_domains_0_mobile-attack" "objects_344_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_344_type_relationship" "objects_344_id_relationship--05243ccb-0aeb-4db4-bb03-51a65fb715ab" "objects_344_created_2020-09-11T14:54:16.589Z" "objects_344_x_mitre_version_1.0" "objects_344_external_references_0_source_name_Lookout Desert Scorpion" "objects_344_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_344_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_344_x_mitre_deprecated_False" "objects_344_revoked_False" "objects_344_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can be controlled using SMS messages.(Citation: Lookout Desert Scorpion)" "objects_344_modified_2022-04-19T14:25:41.669Z" "objects_344_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_344_relationship_type_uses" "objects_344_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_344_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_344_x_mitre_attack_spec_version_2.1.0" "objects_344_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_344_spec_version_2.1" "objects_344_x_mitre_domains_0_mobile-attack" "objects_345_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_345_id_relationship--05563777-5771-4bd6-a1af-3e244cf42372" "objects_345_type_relationship" "objects_345_created_2018-10-17T00:14:20.652Z" "objects_345_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_345_external_references_0_source_name_Xiao-KeyRaider" "objects_345_external_references_0_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_345_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_345_modified_2020-03-31T14:49:39.188Z" "objects_345_description_Most [KeyRaider](https://attack.mitre.org/software/S0288) samples search to find the Apple account's username, password and device's GUID in data being transferred.(Citation: Xiao-KeyRaider)" "objects_345_relationship_type_uses" "objects_345_source_ref_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_345_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_345_x_mitre_version_1.0" "objects_345_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_345_spec_version_2.1" "objects_345_x_mitre_attack_spec_version_2.1.0" "objects_345_x_mitre_domains_0_mobile-attack" "objects_346_type_relationship" "objects_346_id_relationship--0569a1e0-1eb5-4e87-ae09-b698571012ef" "objects_346_created_2018-10-17T00:14:20.652Z" "objects_346_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_346_revoked_False" "objects_346_external_references_0_source_name_Lookout-StealthMango" "objects_346_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_346_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_346_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_346_modified_2023-04-05T20:22:32.033Z" "objects_346_description_[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to gather SMS messages.(Citation: Lookout-StealthMango)" "objects_346_relationship_type_uses" "objects_346_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_346_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_346_x_mitre_deprecated_False" "objects_346_x_mitre_version_1.0" "objects_346_x_mitre_attack_spec_version_3.1.0" "objects_346_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_346_spec_version_2.1" "objects_346_x_mitre_domains_0_mobile-attack" "objects_347_type_relationship" "objects_347_id_relationship--05c36a8c-1526-4d5d-93c1-331fd132c30b" "objects_347_created_2023-09-21T19:38:21.735Z" "objects_347_revoked_False" "objects_347_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_347_modified_2023-09-21T19:38:21.735Z" "objects_347_description_Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious." "objects_347_relationship_type_detects" "objects_347_source_ref_x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c" "objects_347_target_ref_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_347_x_mitre_deprecated_False" "objects_347_x_mitre_version_0.1" "objects_347_x_mitre_attack_spec_version_3.1.0" "objects_347_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_347_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_347_spec_version_2.1" "objects_347_x_mitre_domains_0_mobile-attack" "objects_348_type_relationship" "objects_348_id_relationship--05c57e75-04b8-4bf6-8022-2e89f74e4b76" "objects_348_created_2020-12-17T20:15:22.441Z" "objects_348_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_348_revoked_False" "objects_348_external_references_0_source_name_Palo Alto HenBox" "objects_348_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_348_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_348_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_348_modified_2023-04-05T17:35:41.700Z" "objects_348_description_[HenBox](https://attack.mitre.org/software/S0544) has collected all outgoing phone numbers that start with \u201c86\u201d.(Citation: Palo Alto HenBox)" "objects_348_relationship_type_uses" "objects_348_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_348_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_348_x_mitre_deprecated_False" "objects_348_x_mitre_version_1.0" "objects_348_x_mitre_attack_spec_version_3.1.0" "objects_348_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_348_spec_version_2.1" "objects_348_x_mitre_domains_0_mobile-attack" "objects_349_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_349_id_relationship--06348e22-9a06-4e4c-a57c-e438462e7fce" "objects_349_type_relationship" "objects_349_created_2018-10-17T00:14:20.652Z" "objects_349_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_349_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_349_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_349_external_references_0_source_name_Kaspersky-Skygofree" "objects_349_modified_2020-03-31T14:49:39.188Z" "objects_349_description_[Skygofree](https://attack.mitre.org/software/S0327) can record audio via the microphone when an infected device is in a specified location.(Citation: Kaspersky-Skygofree)" "objects_349_relationship_type_uses" "objects_349_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_349_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_349_x_mitre_version_1.0" "objects_349_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_349_spec_version_2.1" "objects_349_x_mitre_attack_spec_version_2.1.0" "objects_349_x_mitre_domains_0_mobile-attack" "objects_350_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_350_type_relationship" "objects_350_id_relationship--069b2328-442b-491e-962d-d3fe01f0549e" "objects_350_created_2019-09-04T14:28:15.479Z" "objects_350_x_mitre_version_1.0" "objects_350_external_references_0_source_name_Lookout-Monokle" "objects_350_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_350_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_350_x_mitre_deprecated_False" "objects_350_revoked_False" "objects_350_description_[Monokle](https://attack.mitre.org/software/S0407) can be controlled via email and SMS from a set of \"control phones.\"(Citation: Lookout-Monokle)" "objects_350_modified_2022-04-19T14:25:41.669Z" "objects_350_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_350_relationship_type_uses" "objects_350_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_350_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_350_x_mitre_attack_spec_version_2.1.0" "objects_350_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_350_spec_version_2.1" "objects_350_x_mitre_domains_0_mobile-attack" "objects_351_type_relationship" "objects_351_id_relationship--06e2e07f-7835-4ef8-bcc0-bb5e2886839d" "objects_351_created_2023-08-16T16:40:14.482Z" "objects_351_revoked_False" "objects_351_external_references_0_source_name_cyble_chameleon_0423" "objects_351_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_351_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_351_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_351_modified_2023-08-16T16:40:14.482Z" "objects_351_description_[Chameleon](https://attack.mitre.org/software/S1083) can gather basic device information such as version, model, root status, and country.(Citation: cyble_chameleon_0423)" "objects_351_relationship_type_uses" "objects_351_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_351_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_351_x_mitre_deprecated_False" "objects_351_x_mitre_version_0.1" "objects_351_x_mitre_attack_spec_version_3.1.0" "objects_351_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_351_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_351_spec_version_2.1" "objects_351_x_mitre_domains_0_mobile-attack" "objects_352_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_352_id_relationship--07036963-6f5e-4eb5-9b20-3f81dd582c85" "objects_352_type_relationship" "objects_352_created_2020-11-20T16:37:28.547Z" "objects_352_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_352_external_references_0_source_name_Symantec GoldenCup" "objects_352_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_352_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_352_modified_2020-11-20T16:37:28.547Z" "objects_352_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect various pieces of device information, such as serial number and product information.(Citation: Symantec GoldenCup)" "objects_352_relationship_type_uses" "objects_352_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_352_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_352_x_mitre_version_1.0" "objects_352_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_352_spec_version_2.1" "objects_352_x_mitre_attack_spec_version_2.1.0" "objects_352_x_mitre_domains_0_mobile-attack" "objects_353_type_relationship" "objects_353_id_relationship--0727ac06-5b46-4f79-abe9-63c1b923d383" "objects_353_created_2023-02-06T19:05:56.974Z" "objects_353_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_353_revoked_False" "objects_353_external_references_0_source_name_lookout_abstractemu_1021" "objects_353_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_353_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_353_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_353_modified_2023-03-27T17:07:11.541Z" "objects_353_description_[AbstractEmu](https://attack.mitre.org/software/S1061) has included encoded shell scripts to potentially aid in the rooting process.(Citation: lookout_abstractemu_1021)" "objects_353_relationship_type_uses" "objects_353_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_353_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_353_x_mitre_deprecated_False" "objects_353_x_mitre_version_0.1" "objects_353_x_mitre_attack_spec_version_3.1.0" "objects_353_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_353_spec_version_2.1" "objects_353_x_mitre_domains_0_mobile-attack" "objects_354_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_354_id_relationship--078653a6-3613-4923-ae5a-1bccb8552e67" "objects_354_type_relationship" "objects_354_created_2020-09-11T16:22:03.250Z" "objects_354_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_354_external_references_0_source_name_Lookout ViperRAT" "objects_354_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_354_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_354_modified_2020-09-11T16:22:03.250Z" "objects_354_description_[ViperRAT](https://attack.mitre.org/software/S0506) has been installed in two stages and can secretly install new applications.(Citation: Lookout ViperRAT)" "objects_354_relationship_type_uses" "objects_354_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_354_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_354_x_mitre_version_1.0" "objects_354_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_354_spec_version_2.1" "objects_354_x_mitre_attack_spec_version_2.1.0" "objects_354_x_mitre_domains_0_mobile-attack" "objects_355_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_355_id_relationship--0791f28b-d06f-4fee-9cdb-85a6fd2eed61" "objects_355_type_relationship" "objects_355_created_2017-12-14T16:46:06.044Z" "objects_355_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_355_external_references_0_source_name_PaloAlto-WireLurker" "objects_355_external_references_0_description_Claud Xiao. (2014, November 5). WireLurker: A New Era in OS X and iOS Malware. Retrieved January 24, 2017." "objects_355_external_references_0_url_https://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware/" "objects_355_modified_2020-03-31T14:49:39.188Z" "objects_355_description_[WireLurker](https://attack.mitre.org/software/S0312) monitors for iOS devices connected via USB to an infected OSX computer and installs downloaded third-party applications or automatically generated malicious applications onto the device.(Citation: PaloAlto-WireLurker)" "objects_355_relationship_type_uses" "objects_355_source_ref_malware--326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb" "objects_355_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_355_x_mitre_version_1.0" "objects_355_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_355_spec_version_2.1" "objects_355_x_mitre_attack_spec_version_2.1.0" "objects_355_x_mitre_domains_0_mobile-attack" "objects_356_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_356_type_relationship" "objects_356_id_relationship--079911c5-0db9-4eb2-ab85-6ed6e118fbbc" "objects_356_created_2022-03-30T19:36:20.304Z" "objects_356_x_mitre_version_0.1" "objects_356_x_mitre_deprecated_False" "objects_356_revoked_False" "objects_356_description_Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups." "objects_356_modified_2022-03-30T19:36:20.304Z" "objects_356_relationship_type_mitigates" "objects_356_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_356_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_356_x_mitre_attack_spec_version_2.1.0" "objects_356_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_356_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_356_spec_version_2.1" "objects_356_x_mitre_domains_0_mobile-attack" "objects_357_type_relationship" "objects_357_id_relationship--07c727a6-6323-477a-bb55-34e130959b4e" "objects_357_created_2023-10-10T15:33:57.556Z" "objects_357_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_357_revoked_False" "objects_357_external_references_0_source_name_Bitdefender Mandrake" "objects_357_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_357_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_357_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_357_modified_2023-10-10T15:33:57.556Z" "objects_357_description_[Mandrake](https://attack.mitre.org/software/S0485) can mimic an app called \u201cStorage Settings\u201d if it cannot hide its icon.(Citation: Bitdefender Mandrake)" "objects_357_relationship_type_uses" "objects_357_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_357_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_357_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_357_x_mitre_deprecated_False" "objects_357_x_mitre_version_1.0" "objects_357_x_mitre_attack_spec_version_2.1.0" "objects_357_spec_version_2.1" "objects_357_x_mitre_domains_0_mobile-attack" "objects_358_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_358_id_relationship--07dd3318-2965-4085-be64-a8e956c7b8da" "objects_358_type_relationship" "objects_358_created_2020-12-18T20:14:47.319Z" "objects_358_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_358_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_358_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_358_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_358_modified_2020-12-18T20:14:47.319Z" "objects_358_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has stored encoded strings.(Citation: WhiteOps TERRACOTTA)" "objects_358_relationship_type_uses" "objects_358_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_358_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_358_x_mitre_version_1.0" "objects_358_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_358_spec_version_2.1" "objects_358_x_mitre_attack_spec_version_2.1.0" "objects_358_x_mitre_domains_0_mobile-attack" "objects_359_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_359_type_relationship" "objects_359_id_relationship--07fd2c39-c3e2-4044-b00b-71250cd7df2e" "objects_359_created_2022-03-30T18:15:03.625Z" "objects_359_x_mitre_version_0.1" "objects_359_x_mitre_deprecated_False" "objects_359_revoked_False" "objects_359_description_" "objects_359_modified_2022-03-30T18:15:03.625Z" "objects_359_relationship_type_subtechnique-of" "objects_359_source_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_359_target_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_359_x_mitre_attack_spec_version_2.1.0" "objects_359_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_359_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_359_spec_version_2.1" "objects_359_x_mitre_domains_0_mobile-attack" "objects_360_type_relationship" "objects_360_id_relationship--0800f6bf-00c5-46d8-b876-1eeeb81b741f" "objects_360_created_2023-03-20T15:55:32.395Z" "objects_360_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_360_revoked_False" "objects_360_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_360_modified_2023-08-14T16:45:55.097Z" "objects_360_description_Application vetting services could look for use of standard APIs (e.g. the clipboard API) that could indicate data manipulation is occurring." "objects_360_relationship_type_detects" "objects_360_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_360_target_ref_attack-pattern--c548d8c4-a0a3-4a24-bb79-2a84abbc7b36" "objects_360_x_mitre_deprecated_False" "objects_360_x_mitre_version_0.1" "objects_360_x_mitre_attack_spec_version_3.1.0" "objects_360_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_360_spec_version_2.1" "objects_360_x_mitre_domains_0_mobile-attack" "objects_361_type_relationship" "objects_361_id_relationship--084786ee-9384-4a00-9e1b-48f94ea70126" "objects_361_created_2019-09-03T19:45:48.517Z" "objects_361_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_361_revoked_False" "objects_361_external_references_0_source_name_SWB Exodus March 2019" "objects_361_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_361_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_361_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_361_modified_2023-04-05T17:09:45.426Z" "objects_361_description_[Exodus](https://attack.mitre.org/software/S0405) Two can exfiltrate calendar events.(Citation: SWB Exodus March 2019) " "objects_361_relationship_type_uses" "objects_361_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_361_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_361_x_mitre_deprecated_False" "objects_361_x_mitre_version_1.0" "objects_361_x_mitre_attack_spec_version_3.1.0" "objects_361_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_361_spec_version_2.1" "objects_361_x_mitre_domains_0_mobile-attack" "objects_362_type_relationship" "objects_362_id_relationship--085f8397-0233-42d7-855e-3dbd709f2eca" "objects_362_created_2023-01-18T21:39:27.823Z" "objects_362_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_362_revoked_False" "objects_362_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_362_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_362_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_362_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_362_modified_2023-03-27T18:30:43.093Z" "objects_362_description_[SharkBot](https://attack.mitre.org/software/S1055) can use the Android \u201cDirect Reply\u201d feature to spread the malware to other devices. It can also download the full version of the malware after initial device compromise.(Citation: nccgroup_sharkbot_0322)" "objects_362_relationship_type_uses" "objects_362_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_362_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_362_x_mitre_deprecated_False" "objects_362_x_mitre_version_0.1" "objects_362_x_mitre_attack_spec_version_3.1.0" "objects_362_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_362_spec_version_2.1" "objects_362_x_mitre_domains_0_mobile-attack" "objects_363_type_relationship" "objects_363_id_relationship--086c4c17-dde7-4a1f-90d1-79eb32f3c11f" "objects_363_created_2023-03-20T18:58:33.787Z" "objects_363_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_363_revoked_False" "objects_363_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_363_modified_2023-08-10T22:15:45.239Z" "objects_363_description_Application vetting services could look for `android.permission.READ_SMS` in an Android application\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. " "objects_363_relationship_type_detects" "objects_363_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_363_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_363_x_mitre_deprecated_False" "objects_363_x_mitre_version_0.1" "objects_363_x_mitre_attack_spec_version_3.1.0" "objects_363_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_363_spec_version_2.1" "objects_363_x_mitre_domains_0_mobile-attack" "objects_364_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_364_type_relationship" "objects_364_id_relationship--087609b6-cc6c-402f-ada9-00dbcbfecbe8" "objects_364_created_2022-04-01T15:16:02.324Z" "objects_364_x_mitre_version_0.1" "objects_364_external_references_0_source_name_iOS Universal Links" "objects_364_external_references_0_url_https://developer.apple.com/ios/universal-links/" "objects_364_external_references_0_description_Apple. (n.d.). Universal Links for Developers. Retrieved September 11, 2020." "objects_364_external_references_1_source_name_Android App Links" "objects_364_external_references_1_url_https://developer.android.com/training/app-links/verify-site-associations" "objects_364_external_references_1_description_Google. (n.d.). Verify Android App Links. Retrieved September 11, 2020." "objects_364_external_references_2_source_name_IETF-PKCE" "objects_364_external_references_2_url_https://tools.ietf.org/html/rfc7636" "objects_364_external_references_2_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_364_x_mitre_deprecated_False" "objects_364_revoked_False" "objects_364_description_Developers should use Android App Links(Citation: Android App Links) and iOS Universal Links(Citation: iOS Universal Links) to provide a secure binding between URIs and applications, preventing malicious applications from intercepting redirections. Additionally, for OAuth use cases, PKCE(Citation: IETF-PKCE) should be used to prevent use of stolen authorization codes. " "objects_364_modified_2022-04-01T15:16:02.324Z" "objects_364_relationship_type_mitigates" "objects_364_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_364_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_364_x_mitre_attack_spec_version_2.1.0" "objects_364_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_364_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_364_spec_version_2.1" "objects_364_x_mitre_domains_0_mobile-attack" "objects_365_type_relationship" "objects_365_id_relationship--088c74f5-4b43-48aa-a2be-275f0c02ffc8" "objects_365_created_2023-07-21T19:38:06.254Z" "objects_365_revoked_False" "objects_365_external_references_0_source_name_lookout_bouldspy_0423" "objects_365_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_365_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_365_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_365_modified_2023-07-21T19:38:06.254Z" "objects_365_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can retrieve account information for third party services, such as Google, Telegram, WeChat, or WhatsApp.(Citation: lookout_bouldspy_0423)" "objects_365_relationship_type_uses" "objects_365_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_365_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_365_x_mitre_deprecated_False" "objects_365_x_mitre_version_0.1" "objects_365_x_mitre_attack_spec_version_3.1.0" "objects_365_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_365_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_365_spec_version_2.1" "objects_365_x_mitre_domains_0_mobile-attack" "objects_366_type_relationship" "objects_366_id_relationship--08a43019-d393-451f-a23c-2dfa17ec40b2" "objects_366_created_2023-01-18T19:15:24.775Z" "objects_366_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_366_revoked_False" "objects_366_external_references_0_source_name_cyble_drinik_1022" "objects_366_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_366_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_366_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_366_modified_2023-03-27T17:51:07.963Z" "objects_366_description_[Drinik](https://attack.mitre.org/software/S1054) can steal incoming SMS messages and send SMS messages from compromised devices. (Citation: cyble_drinik_1022)" "objects_366_relationship_type_uses" "objects_366_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_366_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_366_x_mitre_deprecated_False" "objects_366_x_mitre_version_0.1" "objects_366_x_mitre_attack_spec_version_3.1.0" "objects_366_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_366_spec_version_2.1" "objects_366_x_mitre_domains_0_mobile-attack" "objects_367_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_367_type_relationship" "objects_367_id_relationship--08c81253-975c-4780-8e85-c72bc6a90c88" "objects_367_created_2020-10-29T19:21:23.225Z" "objects_367_x_mitre_version_1.0" "objects_367_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_367_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_367_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_367_x_mitre_deprecated_False" "objects_367_revoked_False" "objects_367_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) can generate revenue by automatically displaying ads.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_367_modified_2022-04-19T14:25:41.669Z" "objects_367_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_367_relationship_type_uses" "objects_367_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_367_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_367_x_mitre_attack_spec_version_2.1.0" "objects_367_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_367_spec_version_2.1" "objects_367_x_mitre_domains_0_mobile-attack" "objects_368_type_relationship" "objects_368_id_relationship--08f1a4b1-96c9-44c2-bc5b-5a779541213b" "objects_368_created_2019-12-10T16:07:41.081Z" "objects_368_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_368_revoked_False" "objects_368_external_references_0_source_name_SecureList DVMap June 2017" "objects_368_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_368_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_368_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_368_modified_2023-04-05T20:47:53.438Z" "objects_368_description_[Dvmap](https://attack.mitre.org/software/S0420) replaces `/system/bin/ip` with a malicious version. [Dvmap](https://attack.mitre.org/software/S0420) can inject code by patching `libdmv.so` or `libandroid_runtime.so`, depending on the Android OS version. Both libraries are related to the Dalvik and ART runtime environments. The patched functions can only call `/system/bin/ip`, which was replaced with the malicious version.(Citation: SecureList DVMap June 2017)" "objects_368_relationship_type_uses" "objects_368_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_368_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_368_x_mitre_deprecated_False" "objects_368_x_mitre_version_1.0" "objects_368_x_mitre_attack_spec_version_3.1.0" "objects_368_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_368_spec_version_2.1" "objects_368_x_mitre_domains_0_mobile-attack" "objects_369_type_relationship" "objects_369_id_relationship--0972d3cf-717e-4ed2-a89d-9cbe61081956" "objects_369_created_2020-11-24T17:55:12.873Z" "objects_369_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_369_revoked_False" "objects_369_external_references_0_source_name_Talos GPlayed" "objects_369_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_369_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_369_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_369_modified_2023-04-05T17:21:56.899Z" "objects_369_description_[GPlayed](https://attack.mitre.org/software/S0536) has communicated with the C2 using HTTP requests or WebSockets as a backup.(Citation: Talos GPlayed) " "objects_369_relationship_type_uses" "objects_369_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_369_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_369_x_mitre_deprecated_False" "objects_369_x_mitre_version_1.0" "objects_369_x_mitre_attack_spec_version_3.1.0" "objects_369_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_369_spec_version_2.1" "objects_369_x_mitre_domains_0_mobile-attack" "objects_370_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_370_id_relationship--0993769f-63fb-4720-bbcf-e6f37f71515e" "objects_370_type_relationship" "objects_370_created_2020-06-02T14:32:31.875Z" "objects_370_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_370_external_references_0_source_name_Google Project Zero Insomnia" "objects_370_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_370_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_370_modified_2020-06-02T14:32:31.875Z" "objects_370_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can collect the device\u2019s name, serial number, iOS version, total disk space, and free disk space.(Citation: Google Project Zero Insomnia) " "objects_370_relationship_type_uses" "objects_370_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_370_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_370_x_mitre_version_1.0" "objects_370_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_370_spec_version_2.1" "objects_370_x_mitre_attack_spec_version_2.1.0" "objects_370_x_mitre_domains_0_mobile-attack" "objects_371_type_relationship" "objects_371_id_relationship--09ad7d9f-d618-46c2-a9f3-e4a943245a72" "objects_371_created_2023-09-21T19:37:48.020Z" "objects_371_revoked_False" "objects_371_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_371_modified_2023-09-21T19:37:48.020Z" "objects_371_description_Users can be trained to identify social engineering techniques and phishing emails." "objects_371_relationship_type_mitigates" "objects_371_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_371_target_ref_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_371_x_mitre_deprecated_False" "objects_371_x_mitre_version_0.1" "objects_371_x_mitre_attack_spec_version_3.1.0" "objects_371_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_371_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_371_spec_version_2.1" "objects_371_x_mitre_domains_0_mobile-attack" "objects_372_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_372_type_relationship" "objects_372_id_relationship--09c55c29-ce4f-4d3e-a940-f3a4b6f07bca" "objects_372_created_2022-04-06T13:22:57.754Z" "objects_372_x_mitre_version_0.1" "objects_372_x_mitre_deprecated_False" "objects_372_revoked_False" "objects_372_description_" "objects_372_modified_2022-04-06T13:22:57.754Z" "objects_372_relationship_type_subtechnique-of" "objects_372_source_ref_attack-pattern--37047267-3e56-453c-833e-d92b68118120" "objects_372_target_ref_attack-pattern--3e091a89-a493-4a6c-8e88-d57be19bb98d" "objects_372_x_mitre_attack_spec_version_2.1.0" "objects_372_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_372_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_372_spec_version_2.1" "objects_372_x_mitre_domains_0_mobile-attack" "objects_373_type_relationship" "objects_373_id_relationship--09c6bbd4-9058-4657-9d8e-656439637ac6" "objects_373_created_2023-03-16T18:32:47.895Z" "objects_373_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_373_revoked_False" "objects_373_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_373_modified_2023-08-10T22:15:16.326Z" "objects_373_description_Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. " "objects_373_relationship_type_detects" "objects_373_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_373_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_373_x_mitre_deprecated_False" "objects_373_x_mitre_version_0.1" "objects_373_x_mitre_attack_spec_version_3.1.0" "objects_373_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_373_spec_version_2.1" "objects_373_x_mitre_domains_0_mobile-attack" "objects_374_type_relationship" "objects_374_id_relationship--09d08f16-9e4d-4279-9a8c-bdda7afdb37d" "objects_374_created_2023-02-06T19:01:08.265Z" "objects_374_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_374_revoked_False" "objects_374_external_references_0_source_name_lookout_abstractemu_1021" "objects_374_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_374_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_374_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_374_modified_2023-03-27T17:07:32.636Z" "objects_374_description_[AbstractEmu](https://attack.mitre.org/software/S1061) has encoded files, such as exploit binaries, to potentially use during and after the rooting process.(Citation: lookout_abstractemu_1021)" "objects_374_relationship_type_uses" "objects_374_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_374_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_374_x_mitre_deprecated_False" "objects_374_x_mitre_version_0.1" "objects_374_x_mitre_attack_spec_version_3.1.0" "objects_374_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_374_spec_version_2.1" "objects_374_x_mitre_domains_0_mobile-attack" "objects_375_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_375_id_relationship--0a28b2f2-ca0e-4d9f-9840-26e8ce944012" "objects_375_type_relationship" "objects_375_created_2018-10-17T00:14:20.652Z" "objects_375_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_375_modified_2018-10-17T00:14:20.652Z" "objects_375_relationship_type_revoked-by" "objects_375_source_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_375_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_375_x_mitre_version_1.0" "objects_375_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_375_spec_version_2.1" "objects_375_x_mitre_attack_spec_version_2.1.0" "objects_375_x_mitre_domains_0_mobile-attack" "objects_376_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_376_id_relationship--0a2e4b01-e78f-4c05-b157-c6714d34fddb" "objects_376_type_relationship" "objects_376_created_2020-12-18T20:14:47.412Z" "objects_376_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_376_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_376_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_376_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_376_modified_2020-12-18T20:14:47.412Z" "objects_376_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has included native modules.(Citation: WhiteOps TERRACOTTA)" "objects_376_relationship_type_uses" "objects_376_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_376_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_376_x_mitre_version_1.0" "objects_376_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_376_spec_version_2.1" "objects_376_x_mitre_attack_spec_version_2.1.0" "objects_376_x_mitre_domains_0_mobile-attack" "objects_377_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_377_id_relationship--0a610208-06af-425f-a9af-cd0899261e33" "objects_377_type_relationship" "objects_377_created_2020-09-11T15:45:38.450Z" "objects_377_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_377_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_377_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_377_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_377_modified_2020-09-11T15:45:38.450Z" "objects_377_description_[Corona Updates](https://attack.mitre.org/software/S0425) can send SMS messages.(Citation: TrendMicro Coronavirus Updates)" "objects_377_relationship_type_uses" "objects_377_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_377_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_377_x_mitre_version_1.0" "objects_377_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_377_spec_version_2.1" "objects_377_x_mitre_attack_spec_version_2.1.0" "objects_377_x_mitre_domains_0_mobile-attack" "objects_378_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_378_id_relationship--0a737289-c62d-4c0a-a857-6d116f774864" "objects_378_type_relationship" "objects_378_created_2020-06-26T15:12:40.077Z" "objects_378_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_378_external_references_0_source_name_ESET DEFENSOR ID" "objects_378_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_378_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_378_modified_2020-06-26T15:12:40.077Z" "objects_378_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) can abuse the accessibility service to read any text displayed on the screen.(Citation: ESET DEFENSOR ID)" "objects_378_relationship_type_uses" "objects_378_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_378_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_378_x_mitre_version_1.0" "objects_378_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_378_spec_version_2.1" "objects_378_x_mitre_attack_spec_version_2.1.0" "objects_378_x_mitre_domains_0_mobile-attack" "objects_379_type_relationship" "objects_379_id_relationship--0ae94053-1963-45ba-a3a9-62e508281c8e" "objects_379_created_2023-01-19T18:06:36.986Z" "objects_379_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_379_revoked_False" "objects_379_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_379_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_379_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_379_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_379_modified_2023-03-29T21:21:58.318Z" "objects_379_description_[TianySpy](https://attack.mitre.org/software/S1056) can install malicious configurations on iPhones to allow malware to be installed via Ad Hoc distribution.(Citation: trendmicro_tianyspy_0122) " "objects_379_relationship_type_uses" "objects_379_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_379_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_379_x_mitre_deprecated_False" "objects_379_x_mitre_version_0.1" "objects_379_x_mitre_attack_spec_version_3.1.0" "objects_379_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_379_spec_version_2.1" "objects_379_x_mitre_domains_0_mobile-attack" "objects_380_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_380_type_relationship" "objects_380_id_relationship--0b1aae4b-4dcd-41b6-a708-1441e5a24070" "objects_380_created_2022-04-15T17:18:44.185Z" "objects_380_x_mitre_version_0.1" "objects_380_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_380_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_380_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_380_x_mitre_deprecated_False" "objects_380_revoked_False" "objects_380_description_[Gustuff](https://attack.mitre.org/software/S0406) obfuscated command information using a custom base85-based encoding.(Citation: Talos Gustuff Apr 2019)" "objects_380_modified_2022-04-15T17:18:44.185Z" "objects_380_relationship_type_uses" "objects_380_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_380_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_380_x_mitre_attack_spec_version_2.1.0" "objects_380_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_380_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_380_spec_version_2.1" "objects_380_x_mitre_domains_0_mobile-attack" "objects_381_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_381_type_relationship" "objects_381_id_relationship--0b1e5e78-9ee1-4fc3-9fe7-dc069b59e77d" "objects_381_created_2020-05-04T14:04:56.179Z" "objects_381_x_mitre_version_1.0" "objects_381_external_references_0_source_name_Google Bread" "objects_381_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_381_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_381_x_mitre_deprecated_False" "objects_381_revoked_False" "objects_381_description_[Bread](https://attack.mitre.org/software/S0432) payloads have used several commercially available packers.(Citation: Google Bread)" "objects_381_modified_2022-04-15T17:20:54.552Z" "objects_381_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_381_relationship_type_uses" "objects_381_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_381_target_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_381_x_mitre_attack_spec_version_2.1.0" "objects_381_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_381_spec_version_2.1" "objects_381_x_mitre_domains_0_mobile-attack" "objects_382_type_relationship" "objects_382_id_relationship--0b1f2735-97d9-4f4a-9967-9fa1464bb651" "objects_382_created_2023-04-11T19:54:52.711Z" "objects_382_revoked_False" "objects_382_external_references_0_source_name_cleafy_sova_1122" "objects_382_external_references_0_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_382_external_references_0_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_382_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_382_modified_2023-04-11T19:54:52.711Z" "objects_382_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can programmatically tap the screen or swipe.(Citation: cleafy_sova_1122)" "objects_382_relationship_type_uses" "objects_382_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_382_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_382_x_mitre_deprecated_False" "objects_382_x_mitre_version_0.1" "objects_382_x_mitre_attack_spec_version_3.1.0" "objects_382_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_382_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_382_spec_version_2.1" "objects_382_x_mitre_domains_0_mobile-attack" "objects_383_type_relationship" "objects_383_id_relationship--0b531974-1a28-4f16-ba34-1f7c8371b6b2" "objects_383_created_2023-03-20T15:28:54.837Z" "objects_383_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_383_revoked_False" "objects_383_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_383_modified_2023-08-07T17:15:34.376Z" "objects_383_description_Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries." "objects_383_relationship_type_detects" "objects_383_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_383_target_ref_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_383_x_mitre_deprecated_False" "objects_383_x_mitre_version_0.1" "objects_383_x_mitre_attack_spec_version_3.1.0" "objects_383_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_383_spec_version_2.1" "objects_383_x_mitre_domains_0_mobile-attack" "objects_384_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_384_id_relationship--0b5bfa77-51b4-41b4-ae03-88b585d143c1" "objects_384_type_relationship" "objects_384_created_2020-09-11T14:54:16.650Z" "objects_384_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_384_external_references_0_source_name_Lookout Desert Scorpion" "objects_384_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_384_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_384_modified_2020-09-11T14:54:16.650Z" "objects_384_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) has been distributed in multiple stages.(Citation: Lookout Desert Scorpion)" "objects_384_relationship_type_uses" "objects_384_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_384_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_384_x_mitre_version_1.0" "objects_384_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_384_spec_version_2.1" "objects_384_x_mitre_attack_spec_version_2.1.0" "objects_384_x_mitre_domains_0_mobile-attack" "objects_385_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_385_id_relationship--0b693e45-cc20-45a9-846f-2f5f4d3a3253" "objects_385_type_relationship" "objects_385_created_2020-12-31T18:25:05.178Z" "objects_385_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_385_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_385_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_385_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_385_modified_2020-12-31T18:25:05.178Z" "objects_385_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has fingerprinted devices to uniquely identify them.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_385_relationship_type_uses" "objects_385_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_385_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_385_x_mitre_version_1.0" "objects_385_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_385_spec_version_2.1" "objects_385_x_mitre_attack_spec_version_2.1.0" "objects_385_x_mitre_domains_0_mobile-attack" "objects_386_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_386_id_relationship--0bb6f851-4302-4936-a98e-d23feecb234d" "objects_386_type_relationship" "objects_386_created_2020-06-02T14:32:31.777Z" "objects_386_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_386_external_references_0_source_name_Volexity Insomnia" "objects_386_external_references_0_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_386_external_references_0_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_386_modified_2020-06-02T14:32:31.777Z" "objects_386_description_[INSOMNIA](https://attack.mitre.org/software/S0463) exploits a WebKit vulnerability to achieve root access on the device.(Citation: Volexity Insomnia)" "objects_386_relationship_type_uses" "objects_386_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_386_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_386_x_mitre_version_1.0" "objects_386_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_386_spec_version_2.1" "objects_386_x_mitre_attack_spec_version_2.1.0" "objects_386_x_mitre_domains_0_mobile-attack" "objects_387_type_relationship" "objects_387_id_relationship--0bbe5936-04bf-4c9a-bb43-cd37f36c3349" "objects_387_created_2020-10-29T19:01:13.826Z" "objects_387_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_387_revoked_False" "objects_387_external_references_0_source_name_Microsoft MalLockerB" "objects_387_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_387_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_387_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_387_modified_2023-04-05T17:44:31.187Z" "objects_387_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has registered to receive 14 different broadcast intents for automatically triggering malware payloads. (Citation: Microsoft MalLockerB)" "objects_387_relationship_type_uses" "objects_387_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_387_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_387_x_mitre_deprecated_False" "objects_387_x_mitre_version_1.0" "objects_387_x_mitre_attack_spec_version_3.1.0" "objects_387_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_387_spec_version_2.1" "objects_387_x_mitre_domains_0_mobile-attack" "objects_388_type_relationship" "objects_388_id_relationship--0bc73d69-e769-4d0f-9d44-368c94225b6e" "objects_388_created_2020-07-15T20:20:59.200Z" "objects_388_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_388_revoked_False" "objects_388_external_references_0_source_name_Bitdefender Mandrake" "objects_388_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_388_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_388_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_388_modified_2023-04-05T17:50:39.124Z" "objects_388_description_[Mandrake](https://attack.mitre.org/software/S0485) can access the device\u2019s contact list.(Citation: Bitdefender Mandrake)" "objects_388_relationship_type_uses" "objects_388_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_388_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_388_x_mitre_deprecated_False" "objects_388_x_mitre_version_1.0" "objects_388_x_mitre_attack_spec_version_3.1.0" "objects_388_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_388_spec_version_2.1" "objects_388_x_mitre_domains_0_mobile-attack" "objects_389_type_relationship" "objects_389_id_relationship--0bc73eaf-a771-4ed0-b1f9-081ff4ca73ad" "objects_389_created_2023-03-20T18:55:03.385Z" "objects_389_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_389_revoked_False" "objects_389_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_389_modified_2023-08-09T16:44:01.271Z" "objects_389_description_Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it." "objects_389_relationship_type_detects" "objects_389_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_389_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_389_x_mitre_deprecated_False" "objects_389_x_mitre_version_0.1" "objects_389_x_mitre_attack_spec_version_3.1.0" "objects_389_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_389_spec_version_2.1" "objects_389_x_mitre_domains_0_mobile-attack" "objects_390_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_390_id_relationship--0bcdeb29-6eed-4c96-a9ae-e56aadc4a5db" "objects_390_type_relationship" "objects_390_created_2019-08-09T17:59:48.988Z" "objects_390_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_390_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_390_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_390_external_references_0_source_name_Lookout-StealthMango" "objects_390_modified_2020-03-31T14:49:39.188Z" "objects_390_description_[Stealth Mango](https://attack.mitre.org/software/S0328) can record and take pictures using the front and back cameras.(Citation: Lookout-StealthMango)" "objects_390_relationship_type_uses" "objects_390_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_390_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_390_x_mitre_version_1.0" "objects_390_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_390_spec_version_2.1" "objects_390_x_mitre_attack_spec_version_2.1.0" "objects_390_x_mitre_domains_0_mobile-attack" "objects_391_type_relationship" "objects_391_id_relationship--0c417238-738d-4bda-8359-d37d39414ebe" "objects_391_created_2023-08-04T18:30:41.599Z" "objects_391_revoked_False" "objects_391_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_391_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_391_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_391_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_391_modified_2023-08-04T18:30:41.599Z" "objects_391_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate phone number and IMEI.(Citation: lookout_hornbill_sunbird_0221)" "objects_391_relationship_type_uses" "objects_391_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_391_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_391_x_mitre_deprecated_False" "objects_391_x_mitre_version_0.1" "objects_391_x_mitre_attack_spec_version_3.1.0" "objects_391_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_391_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_391_spec_version_2.1" "objects_391_x_mitre_domains_0_mobile-attack" "objects_392_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_392_type_relationship" "objects_392_id_relationship--0c558826-5cea-422e-8e67-83e53c04d409" "objects_392_created_2020-06-26T15:32:25.146Z" "objects_392_x_mitre_version_1.0" "objects_392_external_references_0_source_name_CheckPoint Cerberus" "objects_392_external_references_0_url_https://research.checkpoint.com/2020/mobile-as-attack-vector-using-mdm/" "objects_392_external_references_0_description_A. Hazum, B. Melnykov, C. Efrati, D. Golubenko, I. Wernik, L. Kuperman, O. Mana. (2020, April 29). First seen in the wild \u2013 Malware uses Corporate MDM as attack vector. Retrieved June 26, 2020." "objects_392_x_mitre_deprecated_False" "objects_392_revoked_False" "objects_392_description_[Cerberus](https://attack.mitre.org/software/S0480) communicates with the C2 using HTTP requests over port 8888.(Citation: CheckPoint Cerberus)" "objects_392_modified_2022-04-20T16:37:46.192Z" "objects_392_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_392_relationship_type_uses" "objects_392_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_392_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_392_x_mitre_attack_spec_version_2.1.0" "objects_392_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_392_spec_version_2.1" "objects_392_x_mitre_domains_0_mobile-attack" "objects_393_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_393_id_relationship--0cabc5f9-045e-490c-a97f-efe00dbade86" "objects_393_type_relationship" "objects_393_created_2020-01-27T17:05:58.276Z" "objects_393_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_393_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_393_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_393_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_393_modified_2020-01-27T17:05:58.276Z" "objects_393_description_[GolfSpy](https://attack.mitre.org/software/S0421) can record video.(Citation: Trend Micro Bouncing Golf 2019)" "objects_393_relationship_type_uses" "objects_393_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_393_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_393_x_mitre_version_1.0" "objects_393_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_393_spec_version_2.1" "objects_393_x_mitre_attack_spec_version_2.1.0" "objects_393_x_mitre_domains_0_mobile-attack" "objects_394_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_394_id_relationship--0cae6859-d7d1-483b-b473-4f32084938a9" "objects_394_type_relationship" "objects_394_created_2017-12-14T16:46:06.044Z" "objects_394_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_394_external_references_0_source_name_Lookout-PegasusAndroid" "objects_394_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_394_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_394_modified_2020-03-31T14:49:39.188Z" "objects_394_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) has the ability to record device audio.(Citation: Lookout-PegasusAndroid)" "objects_394_relationship_type_uses" "objects_394_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_394_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_394_x_mitre_version_1.0" "objects_394_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_394_spec_version_2.1" "objects_394_x_mitre_attack_spec_version_2.1.0" "objects_394_x_mitre_domains_0_mobile-attack" "objects_395_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_395_type_relationship" "objects_395_id_relationship--0ce5bf43-39e1-4afb-a939-1984cc2d235c" "objects_395_created_2022-04-01T18:51:44.595Z" "objects_395_x_mitre_version_0.1" "objects_395_x_mitre_deprecated_False" "objects_395_revoked_False" "objects_395_description_System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files." "objects_395_modified_2022-04-01T18:51:44.595Z" "objects_395_relationship_type_mitigates" "objects_395_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_395_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_395_x_mitre_attack_spec_version_2.1.0" "objects_395_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_395_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_395_spec_version_2.1" "objects_395_x_mitre_domains_0_mobile-attack" "objects_396_type_relationship" "objects_396_id_relationship--0cf39d51-2d80-4576-b088-e787b113513e" "objects_396_created_2023-09-28T17:39:48.745Z" "objects_396_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_396_revoked_False" "objects_396_external_references_0_source_name_Zimperium FlyTrap" "objects_396_external_references_0_description_A. Yaswant. (2021, August 9). FlyTrap Android Malware Compromises Thousands of Facebook Accounts. Retrieved September 28, 2023." "objects_396_external_references_0_url_https://www.zimperium.com/blog/flytrap-android-malware-compromises-thousands-of-facebook-accounts/" "objects_396_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_396_modified_2023-09-30T21:05:31.625Z" "objects_396_description_[FlyTrap](https://attack.mitre.org/software/S1093) can use HTTP to communicate with the C2 server.(Citation: Zimperium FlyTrap)" "objects_396_relationship_type_uses" "objects_396_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_396_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_396_x_mitre_deprecated_False" "objects_396_x_mitre_version_0.1" "objects_396_x_mitre_attack_spec_version_3.2.0" "objects_396_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_396_spec_version_2.1" "objects_396_x_mitre_domains_0_mobile-attack" "objects_397_type_relationship" "objects_397_id_relationship--0cfbea52-d6ab-467f-97e5-8c74b332b16f" "objects_397_created_2020-12-24T21:55:56.749Z" "objects_397_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_397_revoked_False" "objects_397_external_references_0_source_name_Lookout Uyghur Campaign" "objects_397_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_397_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_397_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_397_modified_2023-04-05T20:41:52.454Z" "objects_397_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has hidden its app icon.(Citation: Lookout Uyghur Campaign)" "objects_397_relationship_type_uses" "objects_397_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_397_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_397_x_mitre_deprecated_False" "objects_397_x_mitre_version_1.0" "objects_397_x_mitre_attack_spec_version_3.1.0" "objects_397_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_397_spec_version_2.1" "objects_397_x_mitre_domains_0_mobile-attack" "objects_398_type_relationship" "objects_398_id_relationship--0d12ee41-9ac0-4083-bc28-6568be4b9d5b" "objects_398_created_2023-03-20T18:41:56.287Z" "objects_398_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_398_revoked_False" "objects_398_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_398_modified_2023-08-14T16:50:42.655Z" "objects_398_description_On Android, the user can review which applications have Device Administrator access in the device settings and revoke permission where appropriate. " "objects_398_relationship_type_detects" "objects_398_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_398_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_398_x_mitre_deprecated_False" "objects_398_x_mitre_version_0.1" "objects_398_x_mitre_attack_spec_version_3.1.0" "objects_398_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_398_spec_version_2.1" "objects_398_x_mitre_domains_0_mobile-attack" "objects_399_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_399_id_relationship--0d2d9c6e-6ac8-4cda-bfa4-cedf26a1760a" "objects_399_type_relationship" "objects_399_created_2021-02-17T20:43:52.333Z" "objects_399_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_399_external_references_0_source_name_Lookout FrozenCell" "objects_399_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_399_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_399_modified_2021-02-17T20:43:52.333Z" "objects_399_description_[FrozenCell](https://attack.mitre.org/software/S0577) has used an online cell tower geolocation service to track targets.(Citation: Lookout FrozenCell)" "objects_399_relationship_type_uses" "objects_399_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_399_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_399_x_mitre_version_1.0" "objects_399_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_399_spec_version_2.1" "objects_399_x_mitre_attack_spec_version_2.1.0" "objects_399_x_mitre_domains_0_mobile-attack" "objects_400_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_400_type_relationship" "objects_400_id_relationship--0d305e1e-df8f-4028-bf6f-1d7fed9e6184" "objects_400_created_2022-03-30T17:53:56.805Z" "objects_400_x_mitre_version_0.1" "objects_400_x_mitre_deprecated_False" "objects_400_revoked_False" "objects_400_description_" "objects_400_modified_2022-03-30T17:53:56.805Z" "objects_400_relationship_type_subtechnique-of" "objects_400_source_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_400_target_ref_attack-pattern--27d18e87-8f32-4be1-b456-39b90454360f" "objects_400_x_mitre_attack_spec_version_2.1.0" "objects_400_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_400_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_400_spec_version_2.1" "objects_400_x_mitre_domains_0_mobile-attack" "objects_401_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_401_type_relationship" "objects_401_id_relationship--0d82a9ed-4184-4f95-99f4-5ee467fe6594" "objects_401_created_2022-04-05T17:14:08.267Z" "objects_401_x_mitre_version_0.1" "objects_401_x_mitre_deprecated_False" "objects_401_revoked_False" "objects_401_description_" "objects_401_modified_2022-04-05T17:14:08.267Z" "objects_401_relationship_type_subtechnique-of" "objects_401_source_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_401_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_401_x_mitre_attack_spec_version_2.1.0" "objects_401_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_401_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_401_spec_version_2.1" "objects_401_x_mitre_domains_0_mobile-attack" "objects_402_type_relationship" "objects_402_id_relationship--0e8607f6-daab-44df-b167-105403a4ef41" "objects_402_created_2023-01-18T19:57:33.986Z" "objects_402_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_402_revoked_False" "objects_402_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_402_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_402_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_402_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_402_modified_2023-03-27T18:39:39.355Z" "objects_402_description_[SharkBot](https://attack.mitre.org/software/S1055) can use the \u201cDirect Reply\u201d feature of Android to automatically reply to notifications with a message provided by C2.(Citation: nccgroup_sharkbot_0322)" "objects_402_relationship_type_uses" "objects_402_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_402_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_402_x_mitre_deprecated_False" "objects_402_x_mitre_version_0.1" "objects_402_x_mitre_attack_spec_version_3.1.0" "objects_402_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_402_spec_version_2.1" "objects_402_x_mitre_domains_0_mobile-attack" "objects_403_type_relationship" "objects_403_id_relationship--0e9968b7-ad1e-440d-9fe3-2599a1571f39" "objects_403_created_2020-06-26T14:55:13.387Z" "objects_403_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_403_revoked_False" "objects_403_external_references_0_source_name_Cybereason EventBot" "objects_403_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_403_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_403_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_403_modified_2023-04-05T19:59:55.854Z" "objects_403_description_[EventBot](https://attack.mitre.org/software/S0478) communicates with the C2 using HTTP requests.(Citation: Cybereason EventBot)" "objects_403_relationship_type_uses" "objects_403_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_403_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_403_x_mitre_deprecated_False" "objects_403_x_mitre_version_1.0" "objects_403_x_mitre_attack_spec_version_3.1.0" "objects_403_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_403_spec_version_2.1" "objects_403_x_mitre_domains_0_mobile-attack" "objects_404_type_relationship" "objects_404_id_relationship--0e9edc13-7af7-43c4-8ec2-636b1f8cb7f1" "objects_404_created_2017-12-14T16:46:06.044Z" "objects_404_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_404_revoked_False" "objects_404_external_references_0_source_name_Lookout-BrainTest" "objects_404_external_references_0_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_404_external_references_0_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_404_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_404_modified_2023-04-05T21:25:52.381Z" "objects_404_description_[BrainTest](https://attack.mitre.org/software/S0293) uses root privileges (if available) to copy an additional Android app package (APK) to /system/priv-app to maintain persistence even after a factory reset.(Citation: Lookout-BrainTest)" "objects_404_relationship_type_uses" "objects_404_source_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_404_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_404_x_mitre_deprecated_False" "objects_404_x_mitre_version_1.0" "objects_404_x_mitre_attack_spec_version_3.1.0" "objects_404_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_404_spec_version_2.1" "objects_404_x_mitre_domains_0_mobile-attack" "objects_405_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_405_id_relationship--0ef4845d-994e-4f0d-9eed-7cf600fc03b4" "objects_405_type_relationship" "objects_405_created_2020-06-02T14:32:31.885Z" "objects_405_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_405_external_references_0_source_name_Google Project Zero Insomnia" "objects_405_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_405_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_405_modified_2020-06-02T14:32:31.885Z" "objects_405_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can track the device\u2019s location.(Citation: Google Project Zero Insomnia)" "objects_405_relationship_type_uses" "objects_405_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_405_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_405_x_mitre_version_1.0" "objects_405_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_405_spec_version_2.1" "objects_405_x_mitre_attack_spec_version_2.1.0" "objects_405_x_mitre_domains_0_mobile-attack" "objects_406_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_406_type_relationship" "objects_406_id_relationship--0efe4125-504f-4eea-b19f-a44c81ee31dd" "objects_406_created_2021-01-05T20:16:20.488Z" "objects_406_x_mitre_version_1.0" "objects_406_external_references_0_source_name_Zscaler TikTok Spyware" "objects_406_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_406_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_406_x_mitre_deprecated_False" "objects_406_revoked_False" "objects_406_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can launch a fake Facebook login page.(Citation: Zscaler TikTok Spyware)" "objects_406_modified_2022-04-12T10:01:44.682Z" "objects_406_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_406_relationship_type_uses" "objects_406_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_406_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_406_x_mitre_attack_spec_version_2.1.0" "objects_406_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_406_spec_version_2.1" "objects_406_x_mitre_domains_0_mobile-attack" "objects_407_type_relationship" "objects_407_id_relationship--0f116d99-9ce4-4790-aeda-ad9199d8bf7b" "objects_407_created_2023-02-28T20:31:03.379Z" "objects_407_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_407_revoked_False" "objects_407_external_references_0_source_name_proofpoint_flubot_0421" "objects_407_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_407_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_407_external_references_1_source_name_bitdefender_flubot_0524" "objects_407_external_references_1_description_Filip TRU\u021a\u0102, R\u0103zvan GOSA, Adrian Mihai GOZOB. (2022, May 24). New FluBot Campaign Sweeps through Europe Targeting Android and iOS Users Alike. Retrieved February 28, 2023." "objects_407_external_references_1_url_https://www.bitdefender.com/blog/labs/new-flubot-campaign-sweeps-through-europe-targeting-android-and-ios-users-alike/" "objects_407_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_407_modified_2023-03-31T22:06:56.734Z" "objects_407_description_[FluBot](https://attack.mitre.org/software/S1067) can send SMS phishing messages to other contacts on an infected device.(Citation: proofpoint_flubot_0421)(Citation: bitdefender_flubot_0524)" "objects_407_relationship_type_uses" "objects_407_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_407_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_407_x_mitre_deprecated_False" "objects_407_x_mitre_version_0.1" "objects_407_x_mitre_attack_spec_version_3.1.0" "objects_407_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_407_spec_version_2.1" "objects_407_x_mitre_domains_0_mobile-attack" "objects_408_type_relationship" "objects_408_id_relationship--0f70bdf1-a6a7-406c-a4c0-cee509ff8369" "objects_408_created_2023-02-02T17:46:27.077Z" "objects_408_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_408_revoked_False" "objects_408_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_408_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_408_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_408_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_408_modified_2023-03-27T18:43:17.131Z" "objects_408_description_[SharkBot](https://attack.mitre.org/software/S1055) can exfiltrate captured user credentials and event logs back to the C2 server. (Citation: nccgroup_sharkbot_0322)" "objects_408_relationship_type_uses" "objects_408_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_408_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_408_x_mitre_deprecated_False" "objects_408_x_mitre_version_0.1" "objects_408_x_mitre_attack_spec_version_3.1.0" "objects_408_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_408_spec_version_2.1" "objects_408_x_mitre_domains_0_mobile-attack" "objects_409_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_409_id_relationship--0f7e7c29-43f0-4aff-ae83-dfff331915ef" "objects_409_type_relationship" "objects_409_created_2017-12-14T16:46:06.044Z" "objects_409_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_409_external_references_0_source_name_Zscaler-SpyNote" "objects_409_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_409_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_409_modified_2020-03-31T14:49:39.188Z" "objects_409_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) collects the device's location.(Citation: Zscaler-SpyNote)" "objects_409_relationship_type_uses" "objects_409_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_409_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_409_x_mitre_version_1.0" "objects_409_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_409_spec_version_2.1" "objects_409_x_mitre_attack_spec_version_2.1.0" "objects_409_x_mitre_domains_0_mobile-attack" "objects_410_type_relationship" "objects_410_id_relationship--0f949bc5-9f6a-4ec8-a29a-87e309aa08a2" "objects_410_created_2020-12-24T22:04:28.027Z" "objects_410_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_410_revoked_False" "objects_410_external_references_0_source_name_Lookout Uyghur Campaign" "objects_410_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_410_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_410_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_410_modified_2023-04-05T21:20:48.937Z" "objects_410_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has modified or configured proxy information.(Citation: Lookout Uyghur Campaign) " "objects_410_relationship_type_uses" "objects_410_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_410_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_410_x_mitre_deprecated_False" "objects_410_x_mitre_version_1.0" "objects_410_x_mitre_attack_spec_version_3.1.0" "objects_410_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_410_spec_version_2.1" "objects_410_x_mitre_domains_0_mobile-attack" "objects_411_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_411_type_relationship" "objects_411_id_relationship--0fd34764-8a5d-43da-9bdf-5a0b7e436936" "objects_411_created_2019-08-29T18:57:55.926Z" "objects_411_x_mitre_version_1.0" "objects_411_external_references_0_source_name_Samsung Keyboards" "objects_411_external_references_0_url_https://support.samsungknox.com/hc/en-us/articles/360001485027-3rd-party-keyboards-must-be-whitelisted-" "objects_411_external_references_0_description_Samsung. (2019, August 16). 3rd party keyboards must be whitelisted.. Retrieved September 1, 2019." "objects_411_x_mitre_deprecated_False" "objects_411_revoked_False" "objects_411_description_When using Samsung Knox, third-party keyboards must be explicitly added to an allow list in order to be available to the end-user.(Citation: Samsung Keyboards) An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features. " "objects_411_modified_2022-04-05T19:41:57.905Z" "objects_411_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_411_relationship_type_mitigates" "objects_411_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_411_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_411_x_mitre_attack_spec_version_2.1.0" "objects_411_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_411_spec_version_2.1" "objects_411_x_mitre_domains_0_mobile-attack" "objects_412_type_relationship" "objects_412_id_relationship--10560632-6449-4579-90eb-20fc46dcca08" "objects_412_created_2020-10-29T19:21:23.200Z" "objects_412_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_412_revoked_False" "objects_412_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_412_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_412_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_412_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_412_modified_2023-04-05T20:49:16.886Z" "objects_412_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) can check that the device IP is not in the range of known Google IP addresses before triggering the payload and can delay payload deployment to avoid detection during testing and avoid association with unwanted ads.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_412_relationship_type_uses" "objects_412_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_412_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_412_x_mitre_deprecated_False" "objects_412_x_mitre_version_1.0" "objects_412_x_mitre_attack_spec_version_3.1.0" "objects_412_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_412_spec_version_2.1" "objects_412_x_mitre_domains_0_mobile-attack" "objects_413_type_relationship" "objects_413_id_relationship--10c07066-df05-4dff-bb95-c76be02ea4ef" "objects_413_created_2020-09-14T14:13:45.291Z" "objects_413_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_413_revoked_False" "objects_413_external_references_0_source_name_Lookout eSurv" "objects_413_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_413_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_413_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_413_modified_2023-04-05T21:30:00.975Z" "objects_413_description_[eSurv](https://attack.mitre.org/software/S0507) imposes geo-restrictions when delivering the second stage.(Citation: Lookout eSurv)" "objects_413_relationship_type_uses" "objects_413_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_413_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_413_x_mitre_deprecated_False" "objects_413_x_mitre_version_1.0" "objects_413_x_mitre_attack_spec_version_3.1.0" "objects_413_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_413_spec_version_2.1" "objects_413_x_mitre_domains_0_mobile-attack" "objects_414_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_414_id_relationship--10e02179-0434-4d4b-86b4-5d9fbc5d5451" "objects_414_type_relationship" "objects_414_created_2019-10-10T15:03:27.682Z" "objects_414_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_414_external_references_0_source_name_SWB Exodus March 2019" "objects_414_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_414_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_414_modified_2020-03-31T14:49:39.188Z" "objects_414_description_[Exodus](https://attack.mitre.org/software/S0405) One encrypts data using XOR prior to exfiltration.(Citation: SWB Exodus March 2019) " "objects_414_relationship_type_uses" "objects_414_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_414_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_414_x_mitre_version_1.0" "objects_414_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_414_spec_version_2.1" "objects_414_x_mitre_attack_spec_version_2.1.0" "objects_414_x_mitre_domains_0_mobile-attack" "objects_415_type_relationship" "objects_415_id_relationship--117a7e1e-d5dc-451d-ab79-f29bdfec40ae" "objects_415_created_2023-10-10T15:33:59.743Z" "objects_415_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_415_revoked_False" "objects_415_external_references_0_source_name_CrowdStrike-Android" "objects_415_external_references_0_description_CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017." "objects_415_external_references_0_url_https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf" "objects_415_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_415_modified_2023-10-10T15:33:59.743Z" "objects_415_description_[X-Agent for Android](https://attack.mitre.org/software/S0314) was placed in a repackaged version of an application used by Ukrainian artillery forces.(Citation: CrowdStrike-Android)" "objects_415_relationship_type_uses" "objects_415_source_ref_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_415_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_415_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_415_x_mitre_deprecated_False" "objects_415_x_mitre_version_1.0" "objects_415_x_mitre_attack_spec_version_2.1.0" "objects_415_spec_version_2.1" "objects_415_x_mitre_domains_0_mobile-attack" "objects_416_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_416_type_relationship" "objects_416_id_relationship--119b848b-84b4-4f86-a265-0c9eb8680072" "objects_416_created_2021-10-01T14:42:49.171Z" "objects_416_x_mitre_version_1.0" "objects_416_external_references_0_source_name_SecureList BusyGasper" "objects_416_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_416_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_416_x_mitre_deprecated_False" "objects_416_revoked_False" "objects_416_description_[BusyGasper](https://attack.mitre.org/software/S0655) can be controlled via IRC using freenode.net servers.(Citation: SecureList BusyGasper)" "objects_416_modified_2022-04-18T19:01:58.546Z" "objects_416_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_416_relationship_type_uses" "objects_416_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_416_target_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_416_x_mitre_attack_spec_version_2.1.0" "objects_416_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_416_spec_version_2.1" "objects_416_x_mitre_domains_0_mobile-attack" "objects_417_type_relationship" "objects_417_id_relationship--11a1da8f-f0db-4abe-88bb-1ab06f271f3f" "objects_417_created_2023-10-10T15:33:57.223Z" "objects_417_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_417_revoked_False" "objects_417_external_references_0_source_name_Lookout ViperRAT" "objects_417_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_417_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_417_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_417_modified_2023-10-10T15:33:57.223Z" "objects_417_description_[ViperRAT](https://attack.mitre.org/software/S0506)\u2019s second stage has masqueraded as \u201cSystem Updates\u201d, \u201cViber Update\u201d, and \u201cWhatsApp Update\u201d.(Citation: Lookout ViperRAT)" "objects_417_relationship_type_uses" "objects_417_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_417_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_417_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_417_x_mitre_deprecated_False" "objects_417_x_mitre_version_1.0" "objects_417_x_mitre_attack_spec_version_2.1.0" "objects_417_spec_version_2.1" "objects_417_x_mitre_domains_0_mobile-attack" "objects_418_type_relationship" "objects_418_id_relationship--11a992e7-83a3-4dc3-b391-fbd79e518943" "objects_418_created_2023-07-21T19:40:08.668Z" "objects_418_revoked_False" "objects_418_external_references_0_source_name_lookout_bouldspy_0423" "objects_418_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_418_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_418_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_418_modified_2023-07-21T19:40:08.668Z" "objects_418_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can encrypt its data before exfiltration.(Citation: lookout_bouldspy_0423)" "objects_418_relationship_type_uses" "objects_418_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_418_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_418_x_mitre_deprecated_False" "objects_418_x_mitre_version_0.1" "objects_418_x_mitre_attack_spec_version_3.1.0" "objects_418_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_418_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_418_spec_version_2.1" "objects_418_x_mitre_domains_0_mobile-attack" "objects_419_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_419_id_relationship--12098dee-27b3-4d0b-a15a-6b5955ba8879" "objects_419_type_relationship" "objects_419_created_2019-09-04T14:28:16.426Z" "objects_419_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_419_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_419_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_419_external_references_0_source_name_Lookout-Monokle" "objects_419_modified_2020-03-31T14:49:39.188Z" "objects_419_description_[Monokle](https://attack.mitre.org/software/S0407) uses XOR to obfuscate its second stage binary.(Citation: Lookout-Monokle)" "objects_419_relationship_type_uses" "objects_419_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_419_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_419_x_mitre_version_1.0" "objects_419_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_419_spec_version_2.1" "objects_419_x_mitre_attack_spec_version_2.1.0" "objects_419_x_mitre_domains_0_mobile-attack" "objects_420_type_relationship" "objects_420_id_relationship--1218ed50-bd44-4f37-baba-1aae998b5a1f" "objects_420_created_2017-12-14T16:46:06.044Z" "objects_420_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_420_revoked_False" "objects_420_external_references_0_source_name_PaloAlto-Xbot" "objects_420_external_references_0_description_Cong Zheng, Claud Xiao and Zhi Xu. (2016, February 18). New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom. Retrieved December 21, 2016." "objects_420_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/" "objects_420_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_420_modified_2023-04-05T21:17:40.860Z" "objects_420_description_[Xbot](https://attack.mitre.org/software/S0298) can remotely lock infected Android devices and ask for a ransom.(Citation: PaloAlto-Xbot)" "objects_420_relationship_type_uses" "objects_420_source_ref_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_420_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_420_x_mitre_deprecated_False" "objects_420_x_mitre_version_1.0" "objects_420_x_mitre_attack_spec_version_3.1.0" "objects_420_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_420_spec_version_2.1" "objects_420_x_mitre_domains_0_mobile-attack" "objects_421_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_421_id_relationship--1250f91c-723d-4b4c-afea-b3a71101951f" "objects_421_type_relationship" "objects_421_created_2019-08-07T15:57:13.415Z" "objects_421_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_421_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_421_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_421_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_421_modified_2020-03-31T14:49:39.188Z" "objects_421_description_[Riltok](https://attack.mitre.org/software/S0403) can query the device's IMEI.(Citation: Kaspersky Riltok June 2019)" "objects_421_relationship_type_uses" "objects_421_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_421_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_421_x_mitre_version_1.0" "objects_421_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_421_spec_version_2.1" "objects_421_x_mitre_attack_spec_version_2.1.0" "objects_421_x_mitre_domains_0_mobile-attack" "objects_422_type_relationship" "objects_422_id_relationship--127e6672-d16a-4370-b277-4d04874a4cfe" "objects_422_created_2023-02-06T19:37:24.358Z" "objects_422_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_422_revoked_False" "objects_422_external_references_0_source_name_threatfabric_sova_0921" "objects_422_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_422_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_422_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_422_modified_2023-04-11T19:29:31.138Z" "objects_422_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can use overlays capture banking credentials and credit card information, and can open arbitrary WebViews from the C2.(Citation: threatfabric_sova_0921)" "objects_422_relationship_type_uses" "objects_422_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_422_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_422_x_mitre_deprecated_False" "objects_422_x_mitre_version_0.1" "objects_422_x_mitre_attack_spec_version_3.1.0" "objects_422_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_422_spec_version_2.1" "objects_422_x_mitre_domains_0_mobile-attack" "objects_423_type_relationship" "objects_423_id_relationship--1284ba4a-c48c-4533-ac35-664828616ee3" "objects_423_created_2023-07-21T19:52:46.863Z" "objects_423_revoked_False" "objects_423_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_423_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_423_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_423_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_423_modified_2023-07-21T19:52:46.863Z" "objects_423_description_[Fakecalls](https://attack.mitre.org/software/S1080) can access and exfiltrate files, such as photos or video.(Citation: kaspersky_fakecalls_0422)" "objects_423_relationship_type_uses" "objects_423_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_423_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_423_x_mitre_deprecated_False" "objects_423_x_mitre_version_0.1" "objects_423_x_mitre_attack_spec_version_3.1.0" "objects_423_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_423_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_423_spec_version_2.1" "objects_423_x_mitre_domains_0_mobile-attack" "objects_424_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_424_type_relationship" "objects_424_id_relationship--1284f6fe-d352-415c-9479-82141524380a" "objects_424_created_2022-03-30T18:06:48.250Z" "objects_424_x_mitre_version_0.1" "objects_424_x_mitre_deprecated_False" "objects_424_revoked_False" "objects_424_description_Typically, insecure or malicious configuration settings are not installed without the user's consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning). " "objects_424_modified_2022-03-30T18:06:48.250Z" "objects_424_relationship_type_mitigates" "objects_424_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_424_target_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_424_x_mitre_attack_spec_version_2.1.0" "objects_424_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_424_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_424_spec_version_2.1" "objects_424_x_mitre_domains_0_mobile-attack" "objects_425_type_relationship" "objects_425_id_relationship--12852406-87df-4892-a177-e15e81739000" "objects_425_created_2023-03-20T18:50:14.139Z" "objects_425_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_425_revoked_False" "objects_425_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_425_modified_2023-08-08T15:34:56.071Z" "objects_425_description_Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities." "objects_425_relationship_type_detects" "objects_425_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_425_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_425_x_mitre_deprecated_False" "objects_425_x_mitre_version_0.1" "objects_425_x_mitre_attack_spec_version_3.1.0" "objects_425_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_425_spec_version_2.1" "objects_425_x_mitre_domains_0_mobile-attack" "objects_426_type_relationship" "objects_426_id_relationship--12d14048-793c-456c-a2b8-d812de547ca7" "objects_426_created_2023-09-28T17:19:38.041Z" "objects_426_revoked_False" "objects_426_external_references_0_source_name_Bleeipng Computer Escobar" "objects_426_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_426_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_426_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_426_modified_2023-09-28T17:19:38.041Z" "objects_426_description_[Escobar](https://attack.mitre.org/software/S1092) can read SMS messages on the device.(Citation: Bleeipng Computer Escobar)" "objects_426_relationship_type_uses" "objects_426_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_426_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_426_x_mitre_deprecated_False" "objects_426_x_mitre_version_0.1" "objects_426_x_mitre_attack_spec_version_3.2.0" "objects_426_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_426_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_426_spec_version_2.1" "objects_426_x_mitre_domains_0_mobile-attack" "objects_427_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_427_type_relationship" "objects_427_id_relationship--12d61e7d-7fa6-422d-9817-901decf6b650" "objects_427_created_2019-07-10T15:35:43.663Z" "objects_427_x_mitre_version_1.0" "objects_427_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_427_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_427_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_427_x_mitre_deprecated_False" "objects_427_revoked_False" "objects_427_description_[Pallas](https://attack.mitre.org/software/S0399) uses phishing popups to harvest user credentials.(Citation: Lookout Dark Caracal Jan 2018)" "objects_427_modified_2022-04-12T10:01:44.682Z" "objects_427_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_427_relationship_type_uses" "objects_427_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_427_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_427_x_mitre_attack_spec_version_2.1.0" "objects_427_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_427_spec_version_2.1" "objects_427_x_mitre_domains_0_mobile-attack" "objects_428_type_relationship" "objects_428_id_relationship--12de5aeb-9427-4665-81a0-257c76d6f188" "objects_428_created_2023-03-03T16:20:48.781Z" "objects_428_revoked_False" "objects_428_external_references_0_source_name_paloalto_yispecter_1015" "objects_428_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_428_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_428_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_428_modified_2023-03-03T16:20:48.781Z" "objects_428_description_[YiSpecter](https://attack.mitre.org/software/S0311) has replaced device apps with ones it has downloaded.(Citation: paloalto_yispecter_1015)" "objects_428_relationship_type_uses" "objects_428_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_428_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_428_x_mitre_deprecated_False" "objects_428_x_mitre_version_0.1" "objects_428_x_mitre_attack_spec_version_3.1.0" "objects_428_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_428_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_428_spec_version_2.1" "objects_428_x_mitre_domains_0_mobile-attack" "objects_429_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_429_type_relationship" "objects_429_id_relationship--13078a96-2cda-4d0b-99f8-693a65a4b63d" "objects_429_created_2020-12-18T20:14:47.297Z" "objects_429_x_mitre_version_1.0" "objects_429_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_429_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_429_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_429_x_mitre_deprecated_False" "objects_429_revoked_False" "objects_429_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has generated non-human advertising impressions.(Citation: WhiteOps TERRACOTTA)" "objects_429_modified_2022-04-19T14:25:41.669Z" "objects_429_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_429_relationship_type_uses" "objects_429_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_429_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_429_x_mitre_attack_spec_version_2.1.0" "objects_429_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_429_spec_version_2.1" "objects_429_x_mitre_domains_0_mobile-attack" "objects_430_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_430_type_relationship" "objects_430_id_relationship--1317fb3d-ded3-4b84-8007-147f3b02948a" "objects_430_created_2022-04-05T19:52:38.539Z" "objects_430_x_mitre_version_0.1" "objects_430_external_references_0_source_name_CSRIC-WG1-FinalReport" "objects_430_external_references_0_description_CSRIC-WG1-FinalReport" "objects_430_x_mitre_deprecated_False" "objects_430_revoked_False" "objects_430_description_Filtering requests by checking request origin information may provide some defense against spurious operators.(Citation: CSRIC-WG1-FinalReport) " "objects_430_modified_2022-04-05T19:52:38.539Z" "objects_430_relationship_type_mitigates" "objects_430_source_ref_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_430_target_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_430_x_mitre_attack_spec_version_2.1.0" "objects_430_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_430_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_430_spec_version_2.1" "objects_430_x_mitre_domains_0_mobile-attack" "objects_431_type_relationship" "objects_431_id_relationship--1329a866-0f6b-4660-b537-a6d208352502" "objects_431_created_2023-06-09T19:11:12.827Z" "objects_431_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_431_revoked_False" "objects_431_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_431_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_431_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_431_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_431_modified_2023-09-22T20:48:55.333Z" "objects_431_description_[Hornbill](https://attack.mitre.org/software/S1077) can collect a device's phone number and IMEI, and can check to see if WiFi is enabled.(Citation: lookout_hornbill_sunbird_0221)" "objects_431_relationship_type_uses" "objects_431_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_431_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_431_x_mitre_deprecated_False" "objects_431_x_mitre_version_0.1" "objects_431_x_mitre_attack_spec_version_3.1.0" "objects_431_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_431_spec_version_2.1" "objects_431_x_mitre_domains_0_mobile-attack" "objects_432_type_relationship" "objects_432_id_relationship--1343f1a3-0f03-4bcf-a9e6-4f5697ae35dd" "objects_432_created_2023-08-04T18:35:25.381Z" "objects_432_revoked_False" "objects_432_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_432_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_432_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_432_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_432_modified_2023-08-04T18:35:25.381Z" "objects_432_description_[Sunbird](https://attack.mitre.org/software/S1082) can try to run arbitrary commands as root.(Citation: lookout_hornbill_sunbird_0221)" "objects_432_relationship_type_uses" "objects_432_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_432_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_432_x_mitre_deprecated_False" "objects_432_x_mitre_version_0.1" "objects_432_x_mitre_attack_spec_version_3.1.0" "objects_432_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_432_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_432_spec_version_2.1" "objects_432_x_mitre_domains_0_mobile-attack" "objects_433_type_relationship" "objects_433_id_relationship--1348c744-3127-4a55-a5b4-2f439f41e941" "objects_433_created_2020-07-27T14:14:56.994Z" "objects_433_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_433_revoked_False" "objects_433_external_references_0_source_name_Google Security Zen" "objects_433_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_433_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_433_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_433_modified_2023-04-05T20:48:16.775Z" "objects_433_description_[Zen](https://attack.mitre.org/software/S0494) can install itself on the system partition to achieve persistence. [Zen](https://attack.mitre.org/software/S0494) can also replace `framework.jar`, which allows it to intercept and modify the behavior of the standard Android API.(Citation: Google Security Zen)" "objects_433_relationship_type_uses" "objects_433_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_433_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_433_x_mitre_deprecated_False" "objects_433_x_mitre_version_1.0" "objects_433_x_mitre_attack_spec_version_3.1.0" "objects_433_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_433_spec_version_2.1" "objects_433_x_mitre_domains_0_mobile-attack" "objects_434_type_relationship" "objects_434_id_relationship--13495d9c-6877-4bc9-888a-7d92362bcb40" "objects_434_created_2023-06-09T19:10:19.108Z" "objects_434_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_434_revoked_False" "objects_434_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_434_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_434_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_434_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_434_modified_2023-08-04T19:13:50.488Z" "objects_434_description_[Hornbill](https://attack.mitre.org/software/S1077) can collect device contacts.(Citation: lookout_hornbill_sunbird_0221)" "objects_434_relationship_type_uses" "objects_434_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_434_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_434_x_mitre_deprecated_False" "objects_434_x_mitre_version_0.1" "objects_434_x_mitre_attack_spec_version_3.1.0" "objects_434_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_434_spec_version_2.1" "objects_434_x_mitre_domains_0_mobile-attack" "objects_435_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_435_type_relationship" "objects_435_id_relationship--13518e48-bb32-4ee3-9cd0-e5f367a2fb2d" "objects_435_created_2019-10-18T14:50:57.491Z" "objects_435_x_mitre_version_1.0" "objects_435_x_mitre_deprecated_False" "objects_435_revoked_False" "objects_435_description_Security updates often contain patches for vulnerabilities." "objects_435_modified_2022-03-30T15:52:58.256Z" "objects_435_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_435_relationship_type_mitigates" "objects_435_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_435_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_435_x_mitre_attack_spec_version_2.1.0" "objects_435_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_435_spec_version_2.1" "objects_435_x_mitre_domains_0_mobile-attack" "objects_436_type_relationship" "objects_436_id_relationship--13aba849-5004-4457-9f3b-49e470b589e0" "objects_436_created_2023-03-20T18:43:44.617Z" "objects_436_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_436_revoked_False" "objects_436_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_436_modified_2023-08-14T16:21:05.598Z" "objects_436_description_Application vetting services could look for connections to unknown domains or IP addresses. " "objects_436_relationship_type_detects" "objects_436_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_436_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_436_x_mitre_deprecated_False" "objects_436_x_mitre_version_0.1" "objects_436_x_mitre_attack_spec_version_3.1.0" "objects_436_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_436_spec_version_2.1" "objects_436_x_mitre_domains_0_mobile-attack" "objects_437_type_relationship" "objects_437_id_relationship--13e69c40-1511-4fac-b4c3-d31fc4b6c579" "objects_437_created_2023-07-21T19:40:25.197Z" "objects_437_revoked_False" "objects_437_external_references_0_source_name_lookout_bouldspy_0423" "objects_437_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_437_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_437_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_437_modified_2023-07-21T19:40:25.197Z" "objects_437_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can download and run code obtained from the C2.(Citation: lookout_bouldspy_0423)" "objects_437_relationship_type_uses" "objects_437_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_437_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_437_x_mitre_deprecated_False" "objects_437_x_mitre_version_0.1" "objects_437_x_mitre_attack_spec_version_3.1.0" "objects_437_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_437_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_437_spec_version_2.1" "objects_437_x_mitre_domains_0_mobile-attack" "objects_438_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_438_type_relationship" "objects_438_id_relationship--13efc415-5e17-4a16-81c2-64e74815907f" "objects_438_created_2017-12-14T16:46:06.044Z" "objects_438_x_mitre_version_1.0" "objects_438_external_references_0_source_name_PaloAlto-XcodeGhost" "objects_438_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/" "objects_438_external_references_0_description_Claud Xiao. (2015, September 18). Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps. Retrieved December 21, 2016." "objects_438_x_mitre_deprecated_False" "objects_438_revoked_False" "objects_438_description_[XcodeGhost](https://attack.mitre.org/software/S0297) can prompt a fake alert dialog to phish user credentials.(Citation: PaloAlto-XcodeGhost)" "objects_438_modified_2022-04-12T10:01:44.682Z" "objects_438_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_438_relationship_type_uses" "objects_438_source_ref_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_438_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_438_x_mitre_attack_spec_version_2.1.0" "objects_438_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_438_spec_version_2.1" "objects_438_x_mitre_domains_0_mobile-attack" "objects_439_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_439_id_relationship--14143e21-51bf-4fa7-a949-d22a8271f590" "objects_439_type_relationship" "objects_439_created_2017-12-14T16:46:06.044Z" "objects_439_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_439_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_439_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_439_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_439_modified_2020-03-31T14:49:39.188Z" "objects_439_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can record audio using the device microphone.(Citation: TrendMicro-RCSAndroid)" "objects_439_relationship_type_uses" "objects_439_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_439_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_439_x_mitre_version_1.0" "objects_439_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_439_spec_version_2.1" "objects_439_x_mitre_attack_spec_version_2.1.0" "objects_439_x_mitre_domains_0_mobile-attack" "objects_440_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_440_type_relationship" "objects_440_id_relationship--1417d832-3fa5-4a87-a40b-5ca2d4ee5d1c" "objects_440_created_2022-04-01T14:59:39.294Z" "objects_440_x_mitre_version_0.1" "objects_440_x_mitre_deprecated_False" "objects_440_revoked_False" "objects_440_description_Apple regularly provides security updates for known OS vulnerabilities." "objects_440_modified_2022-04-01T14:59:39.294Z" "objects_440_relationship_type_mitigates" "objects_440_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_440_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_440_x_mitre_attack_spec_version_2.1.0" "objects_440_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_440_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_440_spec_version_2.1" "objects_440_x_mitre_domains_0_mobile-attack" "objects_441_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_441_id_relationship--142532a6-bf7c-4b25-be23-16f01160f3c5" "objects_441_type_relationship" "objects_441_created_2020-09-15T15:18:12.417Z" "objects_441_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_441_external_references_0_source_name_Cybereason FakeSpy" "objects_441_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_441_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_441_modified_2020-09-15T15:18:12.417Z" "objects_441_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect account information stored on the device, as well as data in external storage.(Citation: Cybereason FakeSpy)" "objects_441_relationship_type_uses" "objects_441_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_441_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_441_x_mitre_version_1.0" "objects_441_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_441_spec_version_2.1" "objects_441_x_mitre_attack_spec_version_2.1.0" "objects_441_x_mitre_domains_0_mobile-attack" "objects_442_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_442_id_relationship--14474366-938a-4359-bf24-e2c718adfaf5" "objects_442_type_relationship" "objects_442_created_2020-06-26T14:55:13.382Z" "objects_442_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_442_external_references_0_source_name_Cybereason EventBot" "objects_442_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_442_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_442_modified_2020-06-26T14:55:13.382Z" "objects_442_description_[EventBot](https://attack.mitre.org/software/S0478) can download new libraries when instructed to.(Citation: Cybereason EventBot)" "objects_442_relationship_type_uses" "objects_442_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_442_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_442_x_mitre_version_1.0" "objects_442_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_442_spec_version_2.1" "objects_442_x_mitre_attack_spec_version_2.1.0" "objects_442_x_mitre_domains_0_mobile-attack" "objects_443_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_443_id_relationship--146275c0-b6dd-4700-bded-bc361a67d023" "objects_443_type_relationship" "objects_443_created_2020-09-14T14:13:45.253Z" "objects_443_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_443_external_references_0_source_name_Lookout eSurv" "objects_443_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_443_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_443_modified_2020-09-14T14:13:45.253Z" "objects_443_description_[eSurv](https://attack.mitre.org/software/S0507) can record audio.(Citation: Lookout eSurv)" "objects_443_relationship_type_uses" "objects_443_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_443_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_443_x_mitre_version_1.0" "objects_443_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_443_spec_version_2.1" "objects_443_x_mitre_attack_spec_version_2.1.0" "objects_443_x_mitre_domains_0_mobile-attack" "objects_444_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_444_type_relationship" "objects_444_id_relationship--147d82a6-a61a-41d0-8eef-b6193bdd92d6" "objects_444_created_2022-03-30T15:18:21.256Z" "objects_444_x_mitre_version_0.1" "objects_444_x_mitre_deprecated_False" "objects_444_revoked_False" "objects_444_description_" "objects_444_modified_2022-03-30T15:18:21.256Z" "objects_444_relationship_type_revoked-by" "objects_444_source_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_444_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_444_x_mitre_attack_spec_version_2.1.0" "objects_444_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_444_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_444_spec_version_2.1" "objects_444_x_mitre_domains_0_mobile-attack" "objects_445_type_relationship" "objects_445_id_relationship--148703c5-6d07-439c-a4ff-d77119c70857" "objects_445_created_2023-03-20T18:52:21.767Z" "objects_445_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_445_revoked_False" "objects_445_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_445_modified_2023-08-14T16:23:41.266Z" "objects_445_description_Many properly configured firewalls may also naturally block command and control traffic over non-standard ports." "objects_445_relationship_type_detects" "objects_445_source_ref_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_445_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_445_x_mitre_deprecated_False" "objects_445_x_mitre_version_0.1" "objects_445_x_mitre_attack_spec_version_3.1.0" "objects_445_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_445_spec_version_2.1" "objects_445_x_mitre_domains_0_mobile-attack" "objects_446_type_relationship" "objects_446_id_relationship--15065492-1aef-4cf8-af3c-cc763eee5daf" "objects_446_created_2020-09-24T15:34:51.213Z" "objects_446_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_446_revoked_False" "objects_446_external_references_0_source_name_Lookout-Dendroid" "objects_446_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_446_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_446_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_446_modified_2023-04-05T20:49:32.064Z" "objects_446_description_[Dendroid](https://attack.mitre.org/software/S0301) can detect if it is being ran on an emulator.(Citation: Lookout-Dendroid)" "objects_446_relationship_type_uses" "objects_446_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_446_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_446_x_mitre_deprecated_False" "objects_446_x_mitre_version_1.0" "objects_446_x_mitre_attack_spec_version_3.1.0" "objects_446_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_446_spec_version_2.1" "objects_446_x_mitre_domains_0_mobile-attack" "objects_447_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_447_id_relationship--1577a79c-5f70-41cc-95bd-2407cfd1acbd" "objects_447_type_relationship" "objects_447_created_2020-06-26T15:12:40.094Z" "objects_447_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_447_external_references_0_source_name_ESET DEFENSOR ID" "objects_447_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_447_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_447_modified_2020-06-26T15:12:40.094Z" "objects_447_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) can abuse the accessibility service to perform actions on behalf of the user, including launching attacker-specified applications to steal data.(Citation: ESET DEFENSOR ID)" "objects_447_relationship_type_uses" "objects_447_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_447_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_447_x_mitre_version_1.0" "objects_447_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_447_spec_version_2.1" "objects_447_x_mitre_attack_spec_version_2.1.0" "objects_447_x_mitre_domains_0_mobile-attack" "objects_448_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_448_type_relationship" "objects_448_id_relationship--15d83ba8-be89-4151-9c6e-35d14df4fa80" "objects_448_created_2022-03-30T19:33:05.375Z" "objects_448_x_mitre_version_0.1" "objects_448_x_mitre_deprecated_False" "objects_448_revoked_False" "objects_448_description_Security updates typically provide patches for vulnerabilities that enable device rooting." "objects_448_modified_2022-03-30T19:33:05.375Z" "objects_448_relationship_type_mitigates" "objects_448_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_448_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_448_x_mitre_attack_spec_version_2.1.0" "objects_448_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_448_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_448_spec_version_2.1" "objects_448_x_mitre_domains_0_mobile-attack" "objects_449_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_449_id_relationship--15eccf44-e528-41fb-9cb8-834c8c0ca9d9" "objects_449_type_relationship" "objects_449_created_2020-04-24T17:46:31.582Z" "objects_449_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_449_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_449_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_449_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_449_modified_2020-04-24T17:46:31.582Z" "objects_449_description_[TrickMo](https://attack.mitre.org/software/S0427) can collect device network configuration information such as IMSI, IMEI, and Wi-Fi connection state.(Citation: SecurityIntelligence TrickMo)" "objects_449_relationship_type_uses" "objects_449_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_449_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_449_x_mitre_version_1.0" "objects_449_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_449_spec_version_2.1" "objects_449_x_mitre_attack_spec_version_2.1.0" "objects_449_x_mitre_domains_0_mobile-attack" "objects_450_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_450_id_relationship--16955c8e-65ab-4c9a-a8b1-bec4d5a45f8d" "objects_450_type_relationship" "objects_450_created_2021-10-01T14:42:48.740Z" "objects_450_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_450_external_references_0_source_name_SecureList BusyGasper" "objects_450_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_450_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_450_modified_2021-10-12T13:51:41.045Z" "objects_450_description_[BusyGasper](https://attack.mitre.org/software/S0655) can collect images stored on the device and browser history.(Citation: SecureList BusyGasper)" "objects_450_relationship_type_uses" "objects_450_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_450_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_450_x_mitre_version_1.0" "objects_450_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_450_spec_version_2.1" "objects_450_x_mitre_attack_spec_version_2.1.0" "objects_450_x_mitre_domains_0_mobile-attack" "objects_451_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_451_type_relationship" "objects_451_id_relationship--17141729-226d-40d4-928d-ffbd2eed7d11" "objects_451_created_2022-04-05T19:37:16.086Z" "objects_451_x_mitre_version_0.1" "objects_451_x_mitre_deprecated_False" "objects_451_revoked_False" "objects_451_description_" "objects_451_modified_2022-04-05T19:37:16.086Z" "objects_451_relationship_type_subtechnique-of" "objects_451_source_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_451_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_451_x_mitre_attack_spec_version_2.1.0" "objects_451_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_451_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_451_spec_version_2.1" "objects_451_x_mitre_domains_0_mobile-attack" "objects_452_type_relationship" "objects_452_id_relationship--173c0c41-c7e3-48e9-b785-d9e0232d85ca" "objects_452_created_2020-09-11T16:22:03.285Z" "objects_452_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_452_revoked_False" "objects_452_external_references_0_source_name_Lookout ViperRAT" "objects_452_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_452_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_452_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_452_modified_2023-04-05T17:50:52.737Z" "objects_452_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect the device\u2019s contact list.(Citation: Lookout ViperRAT)" "objects_452_relationship_type_uses" "objects_452_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_452_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_452_x_mitre_deprecated_False" "objects_452_x_mitre_version_1.0" "objects_452_x_mitre_attack_spec_version_3.1.0" "objects_452_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_452_spec_version_2.1" "objects_452_x_mitre_domains_0_mobile-attack" "objects_453_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_453_id_relationship--17558571-7352-470b-b728-0511fb3f699d" "objects_453_type_relationship" "objects_453_created_2019-10-18T15:51:48.484Z" "objects_453_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_453_modified_2020-06-24T15:02:13.534Z" "objects_453_description_Users should be warned against granting access to accessibility features, and to carefully scrutinize applications that request this dangerous permission." "objects_453_relationship_type_mitigates" "objects_453_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_453_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_453_x_mitre_version_1.0" "objects_453_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_453_spec_version_2.1" "objects_453_x_mitre_attack_spec_version_2.1.0" "objects_453_x_mitre_domains_0_mobile-attack" "objects_454_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_454_type_relationship" "objects_454_id_relationship--17adf4c2-e278-41fc-9183-cda5c8b74de7" "objects_454_created_2022-03-31T19:53:01.320Z" "objects_454_x_mitre_version_0.1" "objects_454_x_mitre_deprecated_False" "objects_454_revoked_False" "objects_454_description_" "objects_454_modified_2022-03-31T19:53:01.320Z" "objects_454_relationship_type_subtechnique-of" "objects_454_source_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_454_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_454_x_mitre_attack_spec_version_2.1.0" "objects_454_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_454_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_454_spec_version_2.1" "objects_454_x_mitre_domains_0_mobile-attack" "objects_455_type_relationship" "objects_455_id_relationship--17e94f34-e367-491c-9f9f-79294e124b4f" "objects_455_created_2020-12-17T20:15:22.501Z" "objects_455_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_455_revoked_False" "objects_455_external_references_0_source_name_Palo Alto HenBox" "objects_455_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_455_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_455_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_455_modified_2023-04-05T20:22:48.246Z" "objects_455_description_[HenBox](https://attack.mitre.org/software/S0544) can intercept SMS messages.(Citation: Palo Alto HenBox)" "objects_455_relationship_type_uses" "objects_455_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_455_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_455_x_mitre_deprecated_False" "objects_455_x_mitre_version_1.0" "objects_455_x_mitre_attack_spec_version_3.1.0" "objects_455_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_455_spec_version_2.1" "objects_455_x_mitre_domains_0_mobile-attack" "objects_456_type_relationship" "objects_456_id_relationship--1822e616-ae33-487c-8aa6-4fa81e724184" "objects_456_created_2021-02-08T16:36:20.785Z" "objects_456_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_456_revoked_False" "objects_456_external_references_0_source_name_BlackBerry Bahamut" "objects_456_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_456_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_456_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_456_modified_2023-04-05T17:06:22.576Z" "objects_456_description_[Windshift](https://attack.mitre.org/groups/G0112) has included contact list exfiltration in the malicious apps deployed as part of Operation BULL.(Citation: BlackBerry Bahamut)" "objects_456_relationship_type_uses" "objects_456_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_456_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_456_x_mitre_deprecated_False" "objects_456_x_mitre_version_1.0" "objects_456_x_mitre_attack_spec_version_3.1.0" "objects_456_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_456_spec_version_2.1" "objects_456_x_mitre_domains_0_mobile-attack" "objects_457_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_457_type_relationship" "objects_457_id_relationship--188c09ee-ca3b-4bac-ad69-36489c50b5bd" "objects_457_created_2022-04-01T18:50:00.027Z" "objects_457_x_mitre_version_0.1" "objects_457_x_mitre_deprecated_False" "objects_457_revoked_False" "objects_457_description_" "objects_457_modified_2022-04-01T18:50:00.027Z" "objects_457_relationship_type_subtechnique-of" "objects_457_source_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_457_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_457_x_mitre_attack_spec_version_2.1.0" "objects_457_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_457_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_457_spec_version_2.1" "objects_457_x_mitre_domains_0_mobile-attack" "objects_458_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_458_type_relationship" "objects_458_id_relationship--18a6020d-8fea-4a6e-84ab-a18343f2acea" "objects_458_created_2022-04-06T13:40:14.515Z" "objects_458_x_mitre_version_0.1" "objects_458_external_references_0_source_name_Android 10 Privacy Changes" "objects_458_external_references_0_url_https://developer.android.com/about/versions/10/privacy/changes#clipboard-data" "objects_458_external_references_0_description_Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019." "objects_458_x_mitre_deprecated_False" "objects_458_revoked_False" "objects_458_description_Android 10 prevents applications from accessing clipboard data unless the application is on the foreground or is set as the device\u2019s default input method editor (IME).(Citation: Android 10 Privacy Changes)" "objects_458_modified_2022-04-06T13:40:14.515Z" "objects_458_relationship_type_mitigates" "objects_458_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_458_target_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_458_x_mitre_attack_spec_version_2.1.0" "objects_458_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_458_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_458_spec_version_2.1" "objects_458_x_mitre_domains_0_mobile-attack" "objects_459_type_relationship" "objects_459_id_relationship--18afa4ad-4fd7-47ad-acdb-3b298b640d3c" "objects_459_created_2017-12-14T16:46:06.044Z" "objects_459_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_459_revoked_False" "objects_459_external_references_0_source_name_Lookout-Adware" "objects_459_external_references_0_description_Michael Bentley. (2015, November 4). Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire. Retrieved December 21, 2016." "objects_459_external_references_0_url_https://blog.lookout.com/blog/2015/11/04/trojanized-adware/" "objects_459_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_459_modified_2023-04-05T21:26:05.199Z" "objects_459_description_[ShiftyBug](https://attack.mitre.org/software/S0294) is auto-rooting adware that embeds itself as a system application, making it nearly impossible to remove.(Citation: Lookout-Adware)" "objects_459_relationship_type_uses" "objects_459_source_ref_malware--c80a6bef-b3ce-44d0-b113-946e93124898" "objects_459_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_459_x_mitre_deprecated_False" "objects_459_x_mitre_version_1.0" "objects_459_x_mitre_attack_spec_version_3.1.0" "objects_459_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_459_spec_version_2.1" "objects_459_x_mitre_domains_0_mobile-attack" "objects_460_type_relationship" "objects_460_id_relationship--18d3f4c7-2888-4d27-9ac7-b7ade1a1c04c" "objects_460_created_2017-12-14T16:46:06.044Z" "objects_460_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_460_revoked_False" "objects_460_external_references_0_source_name_NYTimes-BackDoor" "objects_460_external_references_0_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_460_external_references_0_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_460_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_460_modified_2023-04-05T20:23:04.150Z" "objects_460_description_[Adups](https://attack.mitre.org/software/S0309) transmitted the full contents of text messages.(Citation: NYTimes-BackDoor)" "objects_460_relationship_type_uses" "objects_460_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_460_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_460_x_mitre_deprecated_False" "objects_460_x_mitre_version_1.0" "objects_460_x_mitre_attack_spec_version_3.1.0" "objects_460_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_460_spec_version_2.1" "objects_460_x_mitre_domains_0_mobile-attack" "objects_461_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_461_type_relationship" "objects_461_id_relationship--1987b242-c868-40b2-993d-9dbeea311d4b" "objects_461_created_2022-03-30T14:08:09.882Z" "objects_461_x_mitre_version_0.1" "objects_461_x_mitre_deprecated_False" "objects_461_revoked_False" "objects_461_description_" "objects_461_modified_2022-03-30T14:08:09.882Z" "objects_461_relationship_type_subtechnique-of" "objects_461_source_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_461_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_461_x_mitre_attack_spec_version_2.1.0" "objects_461_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_461_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_461_spec_version_2.1" "objects_461_x_mitre_domains_0_mobile-attack" "objects_462_type_relationship" "objects_462_id_relationship--198b99e6-3954-4c93-90bc-4227b45270a4" "objects_462_created_2023-08-04T19:03:55.638Z" "objects_462_revoked_False" "objects_462_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_462_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_462_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_462_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_462_modified_2023-08-04T19:03:55.638Z" "objects_462_description_[Hornbill](https://attack.mitre.org/software/S1077) can delete locally gathered files after uploading them to the C2 to avoid suspicion.(Citation: lookout_hornbill_sunbird_0221) " "objects_462_relationship_type_uses" "objects_462_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_462_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_462_x_mitre_deprecated_False" "objects_462_x_mitre_version_0.1" "objects_462_x_mitre_attack_spec_version_3.1.0" "objects_462_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_462_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_462_spec_version_2.1" "objects_462_x_mitre_domains_0_mobile-attack" "objects_463_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_463_type_relationship" "objects_463_id_relationship--19b95b83-bac0-455f-882f-0209abddb76f" "objects_463_created_2022-04-05T20:11:35.619Z" "objects_463_x_mitre_version_0.1" "objects_463_x_mitre_deprecated_False" "objects_463_revoked_False" "objects_463_description_Applications that properly encrypt network traffic may evade some forms of AiTM behavior. " "objects_463_modified_2022-04-05T20:11:35.619Z" "objects_463_relationship_type_mitigates" "objects_463_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_463_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_463_x_mitre_attack_spec_version_2.1.0" "objects_463_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_463_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_463_spec_version_2.1" "objects_463_x_mitre_domains_0_mobile-attack" "objects_464_type_relationship" "objects_464_id_relationship--19df76ee-fa85-43cf-96ce-422d46f29a13" "objects_464_created_2017-12-14T16:46:06.044Z" "objects_464_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_464_revoked_False" "objects_464_external_references_0_source_name_Lookout-PegasusAndroid" "objects_464_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_464_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_464_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_464_modified_2023-04-05T17:12:48.998Z" "objects_464_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) listens for the `BOOT_COMPLETED` broadcast intent in order to maintain persistence and activate its functionality at device boot time.(Citation: Lookout-PegasusAndroid)" "objects_464_relationship_type_uses" "objects_464_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_464_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_464_x_mitre_deprecated_False" "objects_464_x_mitre_version_1.0" "objects_464_x_mitre_attack_spec_version_3.1.0" "objects_464_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_464_spec_version_2.1" "objects_464_x_mitre_domains_0_mobile-attack" "objects_465_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_465_type_relationship" "objects_465_id_relationship--19f220fd-94e8-4c8f-971d-ad37d7eeee80" "objects_465_created_2022-03-31T19:51:41.431Z" "objects_465_x_mitre_version_0.1" "objects_465_x_mitre_deprecated_False" "objects_465_revoked_False" "objects_465_description_iOS users should be instructed to not download applications from unofficial sources, as applications distributed via the Apple App Store cannot list installed applications on a device." "objects_465_modified_2022-03-31T19:51:41.431Z" "objects_465_relationship_type_mitigates" "objects_465_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_465_target_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_465_x_mitre_attack_spec_version_2.1.0" "objects_465_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_465_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_465_spec_version_2.1" "objects_465_x_mitre_domains_0_mobile-attack" "objects_466_type_relationship" "objects_466_id_relationship--1a2f6cdc-7c52-4f6e-9182-bc5b16a638dd" "objects_466_created_2020-07-15T20:20:59.289Z" "objects_466_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_466_revoked_False" "objects_466_external_references_0_source_name_Bitdefender Mandrake" "objects_466_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_466_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_466_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_466_modified_2023-04-05T20:49:47.110Z" "objects_466_description_[Mandrake](https://attack.mitre.org/software/S0485) can evade automated analysis environments by requiring a CAPTCHA on launch that will prevent the application from running if not passed. It also checks for indications that it is running in an emulator.(Citation: Bitdefender Mandrake)" "objects_466_relationship_type_uses" "objects_466_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_466_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_466_x_mitre_deprecated_False" "objects_466_x_mitre_version_1.0" "objects_466_x_mitre_attack_spec_version_3.1.0" "objects_466_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_466_spec_version_2.1" "objects_466_x_mitre_domains_0_mobile-attack" "objects_467_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_467_type_relationship" "objects_467_id_relationship--1a5bde32-aaa9-42d0-ab70-c9f11b0ae81e" "objects_467_created_2020-09-14T14:13:45.299Z" "objects_467_x_mitre_version_1.0" "objects_467_external_references_0_source_name_Lookout eSurv" "objects_467_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_467_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_467_x_mitre_deprecated_False" "objects_467_revoked_False" "objects_467_description_[eSurv](https://attack.mitre.org/software/S0507)\u2019s Android version has used public key encryption and certificate pinning for C2 communication.(Citation: Lookout eSurv)" "objects_467_modified_2022-04-18T15:58:08.240Z" "objects_467_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_467_relationship_type_uses" "objects_467_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_467_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_467_x_mitre_attack_spec_version_2.1.0" "objects_467_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_467_spec_version_2.1" "objects_467_x_mitre_domains_0_mobile-attack" "objects_468_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_468_type_relationship" "objects_468_id_relationship--1b633efc-762f-47f9-96c3-d08ba92e0e3e" "objects_468_created_2022-04-01T17:05:56.046Z" "objects_468_x_mitre_version_0.1" "objects_468_x_mitre_deprecated_False" "objects_468_revoked_False" "objects_468_description_On Android 11 and up, users are not prompted with the option to select \u201cAllow all the time\u201d and must navigate to the settings page to manually select this option. On iOS 14 and up, users can select whether to provide Precise Location for each installed application. " "objects_468_modified_2022-04-01T17:05:56.046Z" "objects_468_relationship_type_mitigates" "objects_468_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_468_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_468_x_mitre_attack_spec_version_2.1.0" "objects_468_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_468_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_468_spec_version_2.1" "objects_468_x_mitre_domains_0_mobile-attack" "objects_469_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_469_id_relationship--1b7be26d-cb1d-497b-94bf-a34f11ed66c9" "objects_469_type_relationship" "objects_469_created_2020-09-11T14:54:16.548Z" "objects_469_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_469_external_references_0_source_name_Lookout Desert Scorpion" "objects_469_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_469_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_469_modified_2020-09-11T14:54:16.548Z" "objects_469_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can obtain a list of installed applications.(Citation: Lookout Desert Scorpion)" "objects_469_relationship_type_uses" "objects_469_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_469_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_469_x_mitre_version_1.0" "objects_469_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_469_spec_version_2.1" "objects_469_x_mitre_attack_spec_version_2.1.0" "objects_469_x_mitre_domains_0_mobile-attack" "objects_470_type_relationship" "objects_470_id_relationship--1b9b145c-ce80-4d0e-99f2-d756b806745b" "objects_470_created_2023-07-21T19:35:17.565Z" "objects_470_revoked_False" "objects_470_external_references_0_source_name_lookout_bouldspy_0423" "objects_470_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_470_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_470_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_470_modified_2023-07-21T19:35:17.565Z" "objects_470_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can access a device\u2019s microphone to record audio, as well as cell and VoIP application calls.(Citation: lookout_bouldspy_0423)" "objects_470_relationship_type_uses" "objects_470_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_470_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_470_x_mitre_deprecated_False" "objects_470_x_mitre_version_0.1" "objects_470_x_mitre_attack_spec_version_3.1.0" "objects_470_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_470_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_470_spec_version_2.1" "objects_470_x_mitre_domains_0_mobile-attack" "objects_471_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_471_type_relationship" "objects_471_id_relationship--1bcd4b25-a1e0-4511-b0bf-3923a1e74c4e" "objects_471_created_2020-12-31T18:25:05.165Z" "objects_471_x_mitre_version_1.0" "objects_471_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_471_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_471_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_471_x_mitre_deprecated_False" "objects_471_revoked_False" "objects_471_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has used HTTPS for C2 communication.(Citation: CYBERWARCON CHEMISTGAMES) " "objects_471_modified_2022-04-18T16:00:57.320Z" "objects_471_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_471_relationship_type_uses" "objects_471_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_471_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_471_x_mitre_attack_spec_version_2.1.0" "objects_471_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_471_spec_version_2.1" "objects_471_x_mitre_domains_0_mobile-attack" "objects_472_type_relationship" "objects_472_id_relationship--1be8aca9-d5a6-4cc5-9fbe-7625f7ff8d6a" "objects_472_created_2023-08-16T16:36:59.360Z" "objects_472_revoked_False" "objects_472_external_references_0_source_name_cyble_chameleon_0423" "objects_472_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_472_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_472_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_472_modified_2023-08-16T16:36:59.360Z" "objects_472_description_[Chameleon](https://attack.mitre.org/software/S1083) can gather cookies and device logs.(Citation: cyble_chameleon_0423) " "objects_472_relationship_type_uses" "objects_472_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_472_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_472_x_mitre_deprecated_False" "objects_472_x_mitre_version_0.1" "objects_472_x_mitre_attack_spec_version_3.1.0" "objects_472_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_472_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_472_spec_version_2.1" "objects_472_x_mitre_domains_0_mobile-attack" "objects_473_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_473_id_relationship--1c180c0e-c789-4176-b568-789ada9487bb" "objects_473_type_relationship" "objects_473_created_2020-10-29T19:21:23.162Z" "objects_473_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_473_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_473_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_473_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_473_modified_2020-10-29T19:21:23.162Z" "objects_473_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) can collect information about the device including device type, OS version, language, free storage space, battery status, device root, and if *developer mode* is enabled.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_473_relationship_type_uses" "objects_473_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_473_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_473_x_mitre_version_1.0" "objects_473_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_473_spec_version_2.1" "objects_473_x_mitre_attack_spec_version_2.1.0" "objects_473_x_mitre_domains_0_mobile-attack" "objects_474_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_474_type_relationship" "objects_474_id_relationship--1c42ee3a-c400-4de6-84aa-b254422af7b9" "objects_474_created_2018-10-17T00:14:20.652Z" "objects_474_x_mitre_version_1.0" "objects_474_external_references_0_source_name_CheckPoint-Judy" "objects_474_external_references_0_url_https://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/" "objects_474_external_references_0_description_CheckPoint. (2017, May 25). The Judy Malware: Possibly the largest malware campaign found on Google Play. Retrieved September 18, 2018." "objects_474_x_mitre_deprecated_False" "objects_474_revoked_False" "objects_474_description_[Judy](https://attack.mitre.org/software/S0325) uses infected devices to generate fraudulent clicks on advertisements to generate revenue.(Citation: CheckPoint-Judy)" "objects_474_modified_2022-04-19T14:25:41.669Z" "objects_474_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_474_relationship_type_uses" "objects_474_source_ref_malware--172444ab-97fc-4d94-b142-179452bfb760" "objects_474_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_474_x_mitre_attack_spec_version_2.1.0" "objects_474_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_474_spec_version_2.1" "objects_474_x_mitre_domains_0_mobile-attack" "objects_475_type_relationship" "objects_475_id_relationship--1c67b72f-7389-4c21-9347-2b1bba07aaaf" "objects_475_created_2023-02-06T18:59:46.976Z" "objects_475_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_475_revoked_False" "objects_475_external_references_0_source_name_lookout_abstractemu_1021" "objects_475_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_475_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_475_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_475_modified_2023-03-27T17:12:28.993Z" "objects_475_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can collect device IP address and SIM information.(Citation: lookout_abstractemu_1021)" "objects_475_relationship_type_uses" "objects_475_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_475_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_475_x_mitre_deprecated_False" "objects_475_x_mitre_version_0.1" "objects_475_x_mitre_attack_spec_version_3.1.0" "objects_475_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_475_spec_version_2.1" "objects_475_x_mitre_domains_0_mobile-attack" "objects_476_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_476_id_relationship--1c7d2d48-ea9a-448f-891f-66f635c95f73" "objects_476_type_relationship" "objects_476_created_2020-07-20T14:12:15.566Z" "objects_476_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_476_external_references_0_source_name_Check Point-Joker" "objects_476_external_references_0_url_https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/" "objects_476_external_references_0_description_Hazum, A., Melnykov, B., Wernik, I.. (2020, July 9). New Joker variant hits Google Play with an old trick. Retrieved July 20, 2020." "objects_476_modified_2020-07-20T14:12:15.566Z" "objects_476_description_[Bread](https://attack.mitre.org/software/S0432) can collect device notifications.(Citation: Check Point-Joker)" "objects_476_relationship_type_uses" "objects_476_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_476_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_476_x_mitre_version_1.0" "objects_476_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_476_spec_version_2.1" "objects_476_x_mitre_attack_spec_version_2.1.0" "objects_476_x_mitre_domains_0_mobile-attack" "objects_477_type_relationship" "objects_477_id_relationship--1cc71849-142f-4097-9546-7946b0b546a6" "objects_477_created_2020-04-08T15:51:25.125Z" "objects_477_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_477_revoked_False" "objects_477_external_references_0_source_name_ThreatFabric Ginp" "objects_477_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_477_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_477_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_477_modified_2023-04-05T17:29:22.884Z" "objects_477_description_[Ginp](https://attack.mitre.org/software/S0423) can determine if it is running in an emulator.(Citation: ThreatFabric Ginp)" "objects_477_relationship_type_uses" "objects_477_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_477_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_477_x_mitre_deprecated_False" "objects_477_x_mitre_version_1.0" "objects_477_x_mitre_attack_spec_version_3.1.0" "objects_477_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_477_spec_version_2.1" "objects_477_x_mitre_domains_0_mobile-attack" "objects_478_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_478_type_relationship" "objects_478_id_relationship--1cca5e17-80ae-4b6e-8919-2768153aa966" "objects_478_created_2017-12-14T16:46:06.044Z" "objects_478_x_mitre_version_1.0" "objects_478_external_references_0_source_name_PaloAlto-Xbot" "objects_478_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/" "objects_478_external_references_0_description_Cong Zheng, Claud Xiao and Zhi Xu. (2016, February 18). New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom. Retrieved December 21, 2016." "objects_478_x_mitre_deprecated_False" "objects_478_revoked_False" "objects_478_description_[Xbot](https://attack.mitre.org/software/S0298) uses phishing pages mimicking Google Play's payment interface as well as bank login pages.(Citation: PaloAlto-Xbot)" "objects_478_modified_2022-04-12T10:01:44.682Z" "objects_478_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_478_relationship_type_uses" "objects_478_source_ref_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_478_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_478_x_mitre_attack_spec_version_2.1.0" "objects_478_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_478_spec_version_2.1" "objects_478_x_mitre_domains_0_mobile-attack" "objects_479_type_relationship" "objects_479_id_relationship--1d027925-7d63-459c-b5a5-48ffb49ba1de" "objects_479_created_2023-03-20T15:57:00.953Z" "objects_479_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_479_revoked_False" "objects_479_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_479_modified_2023-08-08T15:30:59.104Z" "objects_479_description_The user is prompted for approval when an application requests device administrator permissions." "objects_479_relationship_type_detects" "objects_479_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_479_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_479_x_mitre_deprecated_False" "objects_479_x_mitre_version_0.1" "objects_479_x_mitre_attack_spec_version_3.1.0" "objects_479_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_479_spec_version_2.1" "objects_479_x_mitre_domains_0_mobile-attack" "objects_480_type_relationship" "objects_480_id_relationship--1d2daf8f-ce51-47b5-b985-63ae4edfad4b" "objects_480_created_2023-08-07T22:15:34.550Z" "objects_480_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_480_revoked_False" "objects_480_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_480_modified_2023-08-07T22:46:12.263Z" "objects_480_description_Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells." "objects_480_relationship_type_detects" "objects_480_source_ref_x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0" "objects_480_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_480_x_mitre_deprecated_False" "objects_480_x_mitre_version_0.1" "objects_480_x_mitre_attack_spec_version_3.1.0" "objects_480_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_480_spec_version_2.1" "objects_480_x_mitre_domains_0_mobile-attack" "objects_481_type_relationship" "objects_481_id_relationship--1d828f51-1c04-466c-beaf-2d4de741a544" "objects_481_created_2020-05-04T14:04:56.184Z" "objects_481_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_481_revoked_False" "objects_481_external_references_0_source_name_Google Bread" "objects_481_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_481_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_481_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_481_modified_2023-04-05T17:03:18.675Z" "objects_481_description_[Bread](https://attack.mitre.org/software/S0432) can access SMS messages in order to complete carrier billing fraud.(Citation: Google Bread)" "objects_481_relationship_type_uses" "objects_481_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_481_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_481_x_mitre_deprecated_False" "objects_481_x_mitre_version_1.0" "objects_481_x_mitre_attack_spec_version_3.1.0" "objects_481_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_481_spec_version_2.1" "objects_481_x_mitre_domains_0_mobile-attack" "objects_482_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_482_type_relationship" "objects_482_id_relationship--1db350b2-1e8b-4d58-9086-eac41de1b110" "objects_482_created_2022-04-05T17:13:56.584Z" "objects_482_x_mitre_version_0.1" "objects_482_x_mitre_deprecated_False" "objects_482_revoked_False" "objects_482_description_" "objects_482_modified_2022-04-05T17:13:56.584Z" "objects_482_relationship_type_subtechnique-of" "objects_482_source_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_482_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_482_x_mitre_attack_spec_version_2.1.0" "objects_482_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_482_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_482_spec_version_2.1" "objects_482_x_mitre_domains_0_mobile-attack" "objects_483_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_483_type_relationship" "objects_483_id_relationship--1e286a4a-63cd-47df-a034-11a5d92daceb" "objects_483_created_2022-04-06T15:41:03.981Z" "objects_483_x_mitre_version_0.1" "objects_483_x_mitre_deprecated_False" "objects_483_revoked_False" "objects_483_description_" "objects_483_modified_2022-04-06T15:41:03.981Z" "objects_483_relationship_type_subtechnique-of" "objects_483_source_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_483_target_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_483_x_mitre_attack_spec_version_2.1.0" "objects_483_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_483_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_483_spec_version_2.1" "objects_483_x_mitre_domains_0_mobile-attack" "objects_484_type_relationship" "objects_484_id_relationship--1e29a9ce-ed11-44ae-b66e-8b90ee79de6a" "objects_484_created_2020-06-26T15:32:24.962Z" "objects_484_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_484_revoked_False" "objects_484_external_references_0_source_name_Threat Fabric Cerberus" "objects_484_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_484_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_484_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_484_modified_2023-04-05T20:42:04.769Z" "objects_484_description_[Cerberus](https://attack.mitre.org/software/S0480) hides its icon from the application drawer after being launched for the first time.(Citation: Threat Fabric Cerberus)" "objects_484_relationship_type_uses" "objects_484_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_484_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_484_x_mitre_deprecated_False" "objects_484_x_mitre_version_1.0" "objects_484_x_mitre_attack_spec_version_3.1.0" "objects_484_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_484_spec_version_2.1" "objects_484_x_mitre_domains_0_mobile-attack" "objects_485_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_485_id_relationship--1ed5b4fa-b871-4efa-87ee-1c91dcaa421e" "objects_485_type_relationship" "objects_485_created_2019-09-03T19:45:48.496Z" "objects_485_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_485_external_references_0_source_name_SWB Exodus March 2019" "objects_485_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_485_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_485_modified_2020-03-31T14:49:39.188Z" "objects_485_description_[Exodus](https://attack.mitre.org/software/S0405) Two extracts information from Facebook, Facebook Messenger, Gmail, IMO, Skype, Telegram, Viber, WhatsApp, and WeChat.(Citation: SWB Exodus March 2019)" "objects_485_relationship_type_uses" "objects_485_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_485_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_485_x_mitre_version_1.0" "objects_485_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_485_spec_version_2.1" "objects_485_x_mitre_attack_spec_version_2.1.0" "objects_485_x_mitre_domains_0_mobile-attack" "objects_486_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_486_id_relationship--1f027bab-76d9-4f5f-a73e-ea733a1ab223" "objects_486_type_relationship" "objects_486_created_2020-11-20T16:37:28.610Z" "objects_486_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_486_external_references_0_source_name_Symantec GoldenCup" "objects_486_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_486_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_486_modified_2020-11-20T16:37:28.610Z" "objects_486_description_[Golden Cup](https://attack.mitre.org/software/S0535) has been distributed in two stages.(Citation: Symantec GoldenCup)" "objects_486_relationship_type_uses" "objects_486_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_486_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_486_x_mitre_version_1.0" "objects_486_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_486_spec_version_2.1" "objects_486_x_mitre_attack_spec_version_2.1.0" "objects_486_x_mitre_domains_0_mobile-attack" "objects_487_type_relationship" "objects_487_id_relationship--1f31e348-a4ee-4874-891f-393c65a7640a" "objects_487_created_2023-07-21T19:34:13.200Z" "objects_487_revoked_False" "objects_487_external_references_0_source_name_lookout_bouldspy_0423" "objects_487_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_487_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_487_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_487_modified_2023-07-21T19:34:13.200Z" "objects_487_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can exfiltrate a device\u2019s contacts.(Citation: lookout_bouldspy_0423)" "objects_487_relationship_type_uses" "objects_487_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_487_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_487_x_mitre_deprecated_False" "objects_487_x_mitre_version_0.1" "objects_487_x_mitre_attack_spec_version_3.1.0" "objects_487_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_487_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_487_spec_version_2.1" "objects_487_x_mitre_domains_0_mobile-attack" "objects_488_type_relationship" "objects_488_id_relationship--1f32e107-aef9-42f8-84d1-4c4fcd863b7f" "objects_488_created_2023-02-28T20:39:57.194Z" "objects_488_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_488_revoked_False" "objects_488_external_references_0_source_name_proofpoint_flubot_0421" "objects_488_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_488_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_488_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_488_modified_2023-03-31T22:07:21.417Z" "objects_488_description_[FluBot](https://attack.mitre.org/software/S1067) can use Domain Generation Algorithms to connect to the C2 server.(Citation: proofpoint_flubot_0421)" "objects_488_relationship_type_uses" "objects_488_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_488_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_488_x_mitre_deprecated_False" "objects_488_x_mitre_version_0.1" "objects_488_x_mitre_attack_spec_version_3.1.0" "objects_488_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_488_spec_version_2.1" "objects_488_x_mitre_domains_0_mobile-attack" "objects_489_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_489_type_relationship" "objects_489_id_relationship--1f44936e-b84c-404f-a92e-6fb7e24b5435" "objects_489_created_2022-04-05T19:51:08.770Z" "objects_489_x_mitre_version_0.1" "objects_489_external_references_0_source_name_Android 12 Features" "objects_489_external_references_0_url_https://developer.android.com/about/versions/12/features" "objects_489_external_references_0_description_Google. (2022, April 4). Features and APIs Overview. Retrieved April 5, 2022." "objects_489_x_mitre_deprecated_False" "objects_489_revoked_False" "objects_489_description_The `HIDE_OVERLAY_WINDOWS` permission was introduced in Android 12 allowing apps to hide overlay windows of type `TYPE_APPLICATION_OVERLAY` drawn by other apps with the `SYSTEM_ALERT_WINDOW` permission, preventing other applications from creating overlay windows on top of the current application.(Citation: Android 12 Features)" "objects_489_modified_2022-04-05T19:51:08.770Z" "objects_489_relationship_type_mitigates" "objects_489_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_489_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_489_x_mitre_attack_spec_version_2.1.0" "objects_489_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_489_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_489_spec_version_2.1" "objects_489_x_mitre_domains_0_mobile-attack" "objects_490_type_relationship" "objects_490_id_relationship--1f7428d7-6f6e-40d0-aedb-cb0578875ff9" "objects_490_created_2021-10-01T14:42:49.170Z" "objects_490_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_490_revoked_False" "objects_490_external_references_0_source_name_SecureList BusyGasper" "objects_490_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_490_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_490_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_490_modified_2023-04-05T17:26:02.260Z" "objects_490_description_[BusyGasper](https://attack.mitre.org/software/S0655) can hide its icon.(Citation: SecureList BusyGasper)" "objects_490_relationship_type_uses" "objects_490_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_490_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_490_x_mitre_deprecated_False" "objects_490_x_mitre_version_1.0" "objects_490_x_mitre_attack_spec_version_3.1.0" "objects_490_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_490_spec_version_2.1" "objects_490_x_mitre_domains_0_mobile-attack" "objects_491_type_relationship" "objects_491_id_relationship--1f7b7de2-10e8-4eec-9c8f-db44ac3f271b" "objects_491_created_2020-04-08T15:51:25.128Z" "objects_491_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_491_revoked_False" "objects_491_external_references_0_source_name_ThreatFabric Ginp" "objects_491_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_491_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_491_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_491_modified_2023-04-05T17:29:36.827Z" "objects_491_description_[Ginp](https://attack.mitre.org/software/S0423) can collect SMS messages.(Citation: ThreatFabric Ginp)" "objects_491_relationship_type_uses" "objects_491_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_491_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_491_x_mitre_deprecated_False" "objects_491_x_mitre_version_1.0" "objects_491_x_mitre_attack_spec_version_3.1.0" "objects_491_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_491_spec_version_2.1" "objects_491_x_mitre_domains_0_mobile-attack" "objects_492_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_492_id_relationship--1f8b1ee1-e44b-4a37-a407-5cbceba35d87" "objects_492_type_relationship" "objects_492_created_2020-05-04T14:04:56.217Z" "objects_492_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_492_external_references_0_source_name_Google Bread" "objects_492_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_492_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_492_modified_2020-05-04T15:40:21.305Z" "objects_492_description_[Bread](https://attack.mitre.org/software/S0432) has utilized JavaScript within WebViews that loaded a URL hosted on a Bread-controlled server which provided functions to run. [Bread](https://attack.mitre.org/software/S0432) downloads billing fraud execution steps at runtime.(Citation: Google Bread)" "objects_492_relationship_type_uses" "objects_492_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_492_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_492_x_mitre_version_1.0" "objects_492_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_492_spec_version_2.1" "objects_492_x_mitre_attack_spec_version_2.1.0" "objects_492_x_mitre_domains_0_mobile-attack" "objects_493_type_relationship" "objects_493_id_relationship--1f8f0021-6992-476c-ba1c-232542dc1633" "objects_493_created_2023-03-20T18:58:52.857Z" "objects_493_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_493_revoked_False" "objects_493_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_493_modified_2023-08-10T22:13:53.253Z" "objects_493_description_On Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary." "objects_493_relationship_type_detects" "objects_493_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_493_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_493_x_mitre_deprecated_False" "objects_493_x_mitre_version_0.1" "objects_493_x_mitre_attack_spec_version_3.1.0" "objects_493_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_493_spec_version_2.1" "objects_493_x_mitre_domains_0_mobile-attack" "objects_494_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_494_id_relationship--1fdad4b5-18a1-4fbf-81ce-861feaf2bbdd" "objects_494_type_relationship" "objects_494_created_2020-04-08T18:55:29.205Z" "objects_494_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_494_external_references_0_source_name_Cofense Anubis" "objects_494_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_494_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_494_external_references_1_source_name_Trend Micro Anubis" "objects_494_external_references_1_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_494_external_references_1_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_494_modified_2021-01-20T16:01:19.565Z" "objects_494_description_[Anubis](https://attack.mitre.org/software/S0422) can exfiltrate files encrypted with the ransomware module from the device and can modify external storage.(Citation: Cofense Anubis)(Citation: Trend Micro Anubis) " "objects_494_relationship_type_uses" "objects_494_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_494_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_494_x_mitre_version_1.0" "objects_494_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_494_spec_version_2.1" "objects_494_x_mitre_attack_spec_version_2.1.0" "objects_494_x_mitre_domains_0_mobile-attack" "objects_495_type_relationship" "objects_495_id_relationship--1fdf9c43-0237-461f-86d4-1da843078744" "objects_495_created_2023-09-21T19:38:49.571Z" "objects_495_revoked_False" "objects_495_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_495_modified_2023-09-21T19:38:49.571Z" "objects_495_description_Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise." "objects_495_relationship_type_detects" "objects_495_source_ref_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_495_target_ref_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_495_x_mitre_deprecated_False" "objects_495_x_mitre_version_0.1" "objects_495_x_mitre_attack_spec_version_3.1.0" "objects_495_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_495_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_495_spec_version_2.1" "objects_495_x_mitre_domains_0_mobile-attack" "objects_496_type_relationship" "objects_496_id_relationship--20310407-9b05-4d7b-9548-961f545e14e1" "objects_496_created_2023-06-09T19:18:41.955Z" "objects_496_revoked_False" "objects_496_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_496_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_496_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_496_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_496_modified_2023-06-09T19:18:41.955Z" "objects_496_description_[Hornbill](https://attack.mitre.org/software/S1077) uses an infrequent data upload schedule to avoid user detection and battery drain. It also can delete on-device data after being sent to the C2, and stores collected data in hidden folders on external storage.(Citation: lookout_hornbill_sunbird_0221)" "objects_496_relationship_type_uses" "objects_496_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_496_target_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_496_x_mitre_deprecated_False" "objects_496_x_mitre_version_0.1" "objects_496_x_mitre_attack_spec_version_3.1.0" "objects_496_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_496_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_496_spec_version_2.1" "objects_496_x_mitre_domains_0_mobile-attack" "objects_497_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_497_id_relationship--20376a7f-897a-4f5d-a87a-93e64200a5a6" "objects_497_type_relationship" "objects_497_created_2020-07-20T13:27:33.553Z" "objects_497_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_497_external_references_0_source_name_Talos-WolfRAT" "objects_497_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_497_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_497_modified_2020-08-10T21:57:54.518Z" "objects_497_description_[WolfRAT](https://attack.mitre.org/software/S0489) sends the device\u2019s IMEI with each exfiltration request.(Citation: Talos-WolfRAT)" "objects_497_relationship_type_uses" "objects_497_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_497_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_497_x_mitre_version_1.0" "objects_497_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_497_spec_version_2.1" "objects_497_x_mitre_attack_spec_version_2.1.0" "objects_497_x_mitre_domains_0_mobile-attack" "objects_498_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_498_type_relationship" "objects_498_id_relationship--204e30ed-5e69-400b-a814-b77e10596865" "objects_498_created_2022-04-06T15:50:42.481Z" "objects_498_x_mitre_version_0.1" "objects_498_x_mitre_deprecated_False" "objects_498_revoked_False" "objects_498_description_" "objects_498_modified_2022-04-06T15:50:42.481Z" "objects_498_relationship_type_revoked-by" "objects_498_source_ref_attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34" "objects_498_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_498_x_mitre_attack_spec_version_2.1.0" "objects_498_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_498_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_498_spec_version_2.1" "objects_498_x_mitre_domains_0_mobile-attack" "objects_499_type_relationship" "objects_499_id_relationship--2065382f-45ae-4b9a-a77c-027ecd6c1735" "objects_499_created_2017-12-14T16:46:06.044Z" "objects_499_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_499_revoked_False" "objects_499_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_499_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_499_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_499_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_499_modified_2023-04-05T20:23:38.651Z" "objects_499_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can collect SMS, MMS, and Gmail messages.(Citation: TrendMicro-RCSAndroid)" "objects_499_relationship_type_uses" "objects_499_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_499_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_499_x_mitre_deprecated_False" "objects_499_x_mitre_version_1.0" "objects_499_x_mitre_attack_spec_version_3.1.0" "objects_499_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_499_spec_version_2.1" "objects_499_x_mitre_domains_0_mobile-attack" "objects_500_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_500_type_relationship" "objects_500_id_relationship--209aa948-393c-46b0-9488-ef93a6252438" "objects_500_created_2022-03-30T20:07:19.296Z" "objects_500_x_mitre_version_0.1" "objects_500_x_mitre_deprecated_False" "objects_500_revoked_False" "objects_500_description_" "objects_500_modified_2022-03-30T20:07:19.296Z" "objects_500_relationship_type_subtechnique-of" "objects_500_source_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_500_target_ref_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_500_x_mitre_attack_spec_version_2.1.0" "objects_500_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_500_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_500_spec_version_2.1" "objects_500_x_mitre_domains_0_mobile-attack" "objects_501_type_relationship" "objects_501_id_relationship--20aaafe2-1f55-410f-9eb1-1fc979021fe0" "objects_501_created_2020-12-24T21:55:56.741Z" "objects_501_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_501_revoked_False" "objects_501_external_references_0_source_name_Lookout Uyghur Campaign" "objects_501_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_501_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_501_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_501_modified_2023-04-05T17:51:16.331Z" "objects_501_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed the contact list.(Citation: Lookout Uyghur Campaign)" "objects_501_relationship_type_uses" "objects_501_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_501_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_501_x_mitre_deprecated_False" "objects_501_x_mitre_version_1.0" "objects_501_x_mitre_attack_spec_version_3.1.0" "objects_501_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_501_spec_version_2.1" "objects_501_x_mitre_domains_0_mobile-attack" "objects_502_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_502_type_relationship" "objects_502_id_relationship--20dcd886-56c4-421d-ba36-0f37a47a3f86" "objects_502_created_2022-04-06T13:55:37.498Z" "objects_502_x_mitre_version_0.1" "objects_502_x_mitre_deprecated_False" "objects_502_revoked_False" "objects_502_description_Users should be advised that applications generally do not require permission to send SMS messages." "objects_502_modified_2022-04-06T13:55:37.498Z" "objects_502_relationship_type_mitigates" "objects_502_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_502_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_502_x_mitre_attack_spec_version_2.1.0" "objects_502_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_502_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_502_spec_version_2.1" "objects_502_x_mitre_domains_0_mobile-attack" "objects_503_type_relationship" "objects_503_id_relationship--2115228b-c61a-4ebb-829a-df7355635fbf" "objects_503_created_2020-12-17T20:15:22.491Z" "objects_503_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_503_revoked_False" "objects_503_external_references_0_source_name_Palo Alto HenBox" "objects_503_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_503_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_503_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_503_modified_2023-04-05T20:50:12.639Z" "objects_503_description_[HenBox](https://attack.mitre.org/software/S0544) can detect if the app is running on an emulator.(Citation: Palo Alto HenBox)" "objects_503_relationship_type_uses" "objects_503_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_503_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_503_x_mitre_deprecated_False" "objects_503_x_mitre_version_1.0" "objects_503_x_mitre_attack_spec_version_3.1.0" "objects_503_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_503_spec_version_2.1" "objects_503_x_mitre_domains_0_mobile-attack" "objects_504_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_504_type_relationship" "objects_504_id_relationship--212801c2-5d14-4381-b25a-340cda11a5ac" "objects_504_created_2020-12-18T20:14:47.310Z" "objects_504_x_mitre_version_1.0" "objects_504_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_504_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_504_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_504_x_mitre_deprecated_False" "objects_504_revoked_False" "objects_504_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has displayed a form to collect user data after installation.(Citation: WhiteOps TERRACOTTA)" "objects_504_modified_2022-04-12T10:01:44.682Z" "objects_504_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_504_relationship_type_uses" "objects_504_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_504_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_504_x_mitre_attack_spec_version_2.1.0" "objects_504_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_504_spec_version_2.1" "objects_504_x_mitre_domains_0_mobile-attack" "objects_505_type_relationship" "objects_505_id_relationship--21e179f2-49c9-4ec9-ac7a-b8eae8e15bd9" "objects_505_created_2020-07-20T13:27:33.509Z" "objects_505_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_505_revoked_False" "objects_505_external_references_0_source_name_Talos-WolfRAT" "objects_505_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_505_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_505_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_505_modified_2023-04-05T17:36:07.297Z" "objects_505_description_[WolfRAT](https://attack.mitre.org/software/S0489) can collect the device\u2019s call log.(Citation: Talos-WolfRAT)" "objects_505_relationship_type_uses" "objects_505_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_505_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_505_x_mitre_deprecated_False" "objects_505_x_mitre_version_1.0" "objects_505_x_mitre_attack_spec_version_3.1.0" "objects_505_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_505_spec_version_2.1" "objects_505_x_mitre_domains_0_mobile-attack" "objects_506_type_relationship" "objects_506_id_relationship--22041a01-75e7-4ff6-8768-ad45188c53c7" "objects_506_created_2023-02-28T21:45:25.064Z" "objects_506_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_506_revoked_False" "objects_506_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_506_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_506_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_506_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_506_modified_2023-03-01T22:03:00.755Z" "objects_506_description_[TangleBot](https://attack.mitre.org/software/S1069) can obtain a list of installed applications.(Citation: cloudmark_tanglebot_0921)" "objects_506_relationship_type_uses" "objects_506_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_506_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_506_x_mitre_deprecated_False" "objects_506_x_mitre_version_0.1" "objects_506_x_mitre_attack_spec_version_3.1.0" "objects_506_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_506_spec_version_2.1" "objects_506_x_mitre_domains_0_mobile-attack" "objects_507_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_507_id_relationship--22290cce-856a-46d5-9589-699f5dfc1429" "objects_507_type_relationship" "objects_507_created_2018-10-17T00:14:20.652Z" "objects_507_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_507_external_references_0_source_name_TrendMicro-XLoader" "objects_507_external_references_0_description_Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018." "objects_507_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing/" "objects_507_modified_2020-07-20T13:49:03.687Z" "objects_507_description_[XLoader for Android](https://attack.mitre.org/software/S0318) covertly records phone calls.(Citation: TrendMicro-XLoader)" "objects_507_relationship_type_uses" "objects_507_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_507_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_507_x_mitre_version_1.0" "objects_507_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_507_spec_version_2.1" "objects_507_x_mitre_attack_spec_version_2.1.0" "objects_507_x_mitre_domains_0_mobile-attack" "objects_508_type_relationship" "objects_508_id_relationship--22334426-e99f-4e97-b4dd-17e297da4118" "objects_508_created_2020-12-24T21:55:56.696Z" "objects_508_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_508_revoked_False" "objects_508_external_references_0_source_name_Lookout Uyghur Campaign" "objects_508_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_508_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_508_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_508_modified_2023-04-05T20:23:54.777Z" "objects_508_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has captured SMS and MMS messages.(Citation: Lookout Uyghur Campaign)" "objects_508_relationship_type_uses" "objects_508_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_508_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_508_x_mitre_deprecated_False" "objects_508_x_mitre_version_1.0" "objects_508_x_mitre_attack_spec_version_3.1.0" "objects_508_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_508_spec_version_2.1" "objects_508_x_mitre_domains_0_mobile-attack" "objects_509_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_509_id_relationship--22708018-defd-4690-8b0f-fe47e11cb5d6" "objects_509_type_relationship" "objects_509_created_2020-07-15T20:20:59.316Z" "objects_509_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_509_external_references_0_source_name_Bitdefender Mandrake" "objects_509_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_509_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_509_modified_2020-07-15T20:20:59.316Z" "objects_509_description_[Mandrake](https://attack.mitre.org/software/S0485) can capture all device notifications and hide notifications from the user.(Citation: Bitdefender Mandrake)" "objects_509_relationship_type_uses" "objects_509_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_509_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_509_x_mitre_version_1.0" "objects_509_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_509_spec_version_2.1" "objects_509_x_mitre_attack_spec_version_2.1.0" "objects_509_x_mitre_domains_0_mobile-attack" "objects_510_type_relationship" "objects_510_id_relationship--22755928-b0e1-4004-a89e-5f5ea2504cf8" "objects_510_created_2023-08-04T18:32:57.089Z" "objects_510_revoked_False" "objects_510_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_510_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_510_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_510_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_510_modified_2023-08-04T18:32:57.089Z" "objects_510_description_[Sunbird](https://attack.mitre.org/software/S1082) can record environmental and call audio.(Citation: lookout_hornbill_sunbird_0221)" "objects_510_relationship_type_uses" "objects_510_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_510_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_510_x_mitre_deprecated_False" "objects_510_x_mitre_version_0.1" "objects_510_x_mitre_attack_spec_version_3.1.0" "objects_510_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_510_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_510_spec_version_2.1" "objects_510_x_mitre_domains_0_mobile-attack" "objects_511_type_relationship" "objects_511_id_relationship--22773074-4a95-48e0-905f-688ce048b5ed" "objects_511_created_2020-04-24T17:46:31.593Z" "objects_511_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_511_revoked_False" "objects_511_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_511_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_511_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_511_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_511_modified_2023-04-05T20:53:51.524Z" "objects_511_description_[TrickMo](https://attack.mitre.org/software/S0427) can prevent the user from interacting with the UI by showing a WebView with a persistent cursor.(Citation: SecurityIntelligence TrickMo)" "objects_511_relationship_type_uses" "objects_511_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_511_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_511_x_mitre_deprecated_False" "objects_511_x_mitre_version_1.0" "objects_511_x_mitre_attack_spec_version_3.1.0" "objects_511_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_511_spec_version_2.1" "objects_511_x_mitre_domains_0_mobile-attack" "objects_512_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_512_id_relationship--22f3d28b-ba0c-4aa3-99b4-60790ba9c7b6" "objects_512_type_relationship" "objects_512_created_2021-01-05T20:16:20.484Z" "objects_512_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_512_external_references_0_source_name_Zscaler TikTok Spyware" "objects_512_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_512_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_512_modified_2021-01-05T20:16:20.484Z" "objects_512_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can track the device\u2019s location.(Citation: Zscaler TikTok Spyware)" "objects_512_relationship_type_uses" "objects_512_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_512_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_512_x_mitre_version_1.0" "objects_512_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_512_spec_version_2.1" "objects_512_x_mitre_attack_spec_version_2.1.0" "objects_512_x_mitre_domains_0_mobile-attack" "objects_513_type_relationship" "objects_513_id_relationship--22f5308c-77ee-4198-be1c-54062aa6a613" "objects_513_created_2020-12-31T18:25:05.160Z" "objects_513_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_513_revoked_False" "objects_513_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_513_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_513_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_513_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_513_modified_2023-04-05T20:00:13.616Z" "objects_513_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has used HTTPS for C2 communication.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_513_relationship_type_uses" "objects_513_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_513_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_513_x_mitre_deprecated_False" "objects_513_x_mitre_version_1.0" "objects_513_x_mitre_attack_spec_version_3.1.0" "objects_513_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_513_spec_version_2.1" "objects_513_x_mitre_domains_0_mobile-attack" "objects_514_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_514_id_relationship--2341fdfa-9699-4798-a35a-2cc4f150cd14" "objects_514_type_relationship" "objects_514_created_2019-07-10T15:35:43.610Z" "objects_514_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_514_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_514_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_514_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_514_modified_2020-03-31T14:49:39.188Z" "objects_514_description_[Pallas](https://attack.mitre.org/software/S0399) retrieves a list of all applications installed on the device.(Citation: Lookout Dark Caracal Jan 2018)" "objects_514_relationship_type_uses" "objects_514_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_514_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_514_x_mitre_version_1.0" "objects_514_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_514_spec_version_2.1" "objects_514_x_mitre_attack_spec_version_2.1.0" "objects_514_x_mitre_domains_0_mobile-attack" "objects_515_type_relationship" "objects_515_id_relationship--2359ad4b-b00b-4fd5-aef8-2d2be8bcf081" "objects_515_created_2023-01-18T19:19:01.740Z" "objects_515_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_515_revoked_False" "objects_515_external_references_0_source_name_cyble_drinik_1022" "objects_515_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_515_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_515_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_515_modified_2023-03-27T17:52:20.587Z" "objects_515_description_[Drinik](https://attack.mitre.org/software/S1054) can use Accessibility Services to disable Google Play Protect.(Citation: cyble_drinik_1022)" "objects_515_relationship_type_uses" "objects_515_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_515_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_515_x_mitre_deprecated_False" "objects_515_x_mitre_version_0.1" "objects_515_x_mitre_attack_spec_version_3.1.0" "objects_515_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_515_spec_version_2.1" "objects_515_x_mitre_domains_0_mobile-attack" "objects_516_type_relationship" "objects_516_id_relationship--23a67f24-a8eb-4e31-acf1-11cb5e9f88b2" "objects_516_created_2023-01-18T19:57:13.265Z" "objects_516_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_516_revoked_False" "objects_516_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_516_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_516_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_516_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_516_modified_2023-03-27T18:43:35.115Z" "objects_516_description_[SharkBot](https://attack.mitre.org/software/S1055) can use Accessibility Services to detect which process is in the foreground.(Citation: nccgroup_sharkbot_0322)" "objects_516_relationship_type_uses" "objects_516_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_516_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_516_x_mitre_deprecated_False" "objects_516_x_mitre_version_0.1" "objects_516_x_mitre_attack_spec_version_3.1.0" "objects_516_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_516_spec_version_2.1" "objects_516_x_mitre_domains_0_mobile-attack" "objects_517_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_517_id_relationship--23cac1d7-27ca-4c78-bfa0-2d6023d21798" "objects_517_type_relationship" "objects_517_created_2020-10-29T19:01:13.854Z" "objects_517_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_517_external_references_0_source_name_Microsoft MalLockerB" "objects_517_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_517_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_517_modified_2020-10-29T19:01:13.854Z" "objects_517_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has employed both name mangling and meaningless variable names in source. [AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has stored encrypted payload code in the Assets directory, coupled with a custom decryption routine that assembles a .dex file by passing data through Android Intent objects. (Citation: Microsoft MalLockerB)" "objects_517_relationship_type_uses" "objects_517_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_517_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_517_x_mitre_version_1.0" "objects_517_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_517_spec_version_2.1" "objects_517_x_mitre_attack_spec_version_2.1.0" "objects_517_x_mitre_domains_0_mobile-attack" "objects_518_type_relationship" "objects_518_id_relationship--23ecc134-0623-45ec-b8b5-52516483bda1" "objects_518_created_2023-04-14T14:10:04.452Z" "objects_518_revoked_False" "objects_518_external_references_0_source_name_lookout_abstractemu_1021" "objects_518_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_518_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_518_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_518_modified_2023-04-14T14:10:04.452Z" "objects_518_description_[AbstractEmu](https://attack.mitre.org/software/S1061) has used code abstraction and anti-emulation checks to potentially avoid running while under analysis.(Citation: lookout_abstractemu_1021)" "objects_518_relationship_type_uses" "objects_518_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_518_target_ref_attack-pattern--27d18e87-8f32-4be1-b456-39b90454360f" "objects_518_x_mitre_deprecated_False" "objects_518_x_mitre_version_0.1" "objects_518_x_mitre_attack_spec_version_3.1.0" "objects_518_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_518_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_518_spec_version_2.1" "objects_518_x_mitre_domains_0_mobile-attack" "objects_519_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_519_type_relationship" "objects_519_id_relationship--23fa0fcc-0193-45f2-9e0b-a5f68380015f" "objects_519_created_2022-04-01T18:52:13.171Z" "objects_519_x_mitre_version_0.1" "objects_519_x_mitre_deprecated_False" "objects_519_revoked_False" "objects_519_description_Mobile security software can typically detect if a device has been rooted or jailbroken and can inform the user, who can then take appropriate action." "objects_519_modified_2022-04-01T18:52:13.171Z" "objects_519_relationship_type_mitigates" "objects_519_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_519_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_519_x_mitre_attack_spec_version_2.1.0" "objects_519_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_519_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_519_spec_version_2.1" "objects_519_x_mitre_domains_0_mobile-attack" "objects_520_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_520_type_relationship" "objects_520_id_relationship--242dc659-c205-4e9e-95f9-14fee66195af" "objects_520_created_2022-04-01T15:29:36.082Z" "objects_520_x_mitre_version_0.1" "objects_520_x_mitre_deprecated_False" "objects_520_revoked_False" "objects_520_description_Configuration of per-app VPN policies instead of device-wide VPN can restrict access to internal enterprise resource access via VPN to only enterprise-approved applications" "objects_520_modified_2022-04-01T15:29:36.082Z" "objects_520_relationship_type_mitigates" "objects_520_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_520_target_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_520_x_mitre_attack_spec_version_2.1.0" "objects_520_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_520_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_520_spec_version_2.1" "objects_520_x_mitre_domains_0_mobile-attack" "objects_521_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_521_id_relationship--24951cfe-d3ce-4802-86ff-028fc9cbbe53" "objects_521_type_relationship" "objects_521_created_2020-07-15T20:20:59.318Z" "objects_521_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_521_external_references_0_source_name_Bitdefender Mandrake" "objects_521_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_521_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_521_modified_2020-07-15T20:20:59.318Z" "objects_521_description_[Mandrake](https://attack.mitre.org/software/S0485) uses foreground persistence to keep a service running. It shows the user a transparent notification to evade detection.(Citation: Bitdefender Mandrake)" "objects_521_relationship_type_uses" "objects_521_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_521_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_521_x_mitre_version_1.0" "objects_521_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_521_spec_version_2.1" "objects_521_x_mitre_attack_spec_version_2.1.0" "objects_521_x_mitre_domains_0_mobile-attack" "objects_522_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_522_id_relationship--24a7379e-a994-411b-b17c-add6c6c6fc07" "objects_522_type_relationship" "objects_522_created_2020-12-24T21:45:56.949Z" "objects_522_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_522_external_references_0_source_name_Lookout Uyghur Campaign" "objects_522_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_522_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_522_modified_2020-12-24T21:45:56.949Z" "objects_522_description_[SilkBean](https://attack.mitre.org/software/S0549) has hidden malicious functionality in a second stage file and has encrypted C2 server information.(Citation: Lookout Uyghur Campaign)" "objects_522_relationship_type_uses" "objects_522_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_522_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_522_x_mitre_version_1.0" "objects_522_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_522_spec_version_2.1" "objects_522_x_mitre_attack_spec_version_2.1.0" "objects_522_x_mitre_domains_0_mobile-attack" "objects_523_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_523_type_relationship" "objects_523_id_relationship--24bcb2cd-1532-4e98-a485-a55e06d2577d" "objects_523_created_2018-10-17T00:14:20.652Z" "objects_523_x_mitre_version_1.0" "objects_523_x_mitre_deprecated_False" "objects_523_revoked_False" "objects_523_description_" "objects_523_modified_2022-07-07T14:00:00.188Z" "objects_523_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_523_relationship_type_revoked-by" "objects_523_source_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_523_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_523_x_mitre_attack_spec_version_2.1.0" "objects_523_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_523_spec_version_2.1" "objects_523_x_mitre_domains_0_mobile-attack" "objects_524_type_relationship" "objects_524_id_relationship--24de6f6e-86d3-4e4e-a965-3e0435205f48" "objects_524_created_2020-09-24T15:34:51.298Z" "objects_524_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_524_revoked_False" "objects_524_external_references_0_source_name_Lookout-Dendroid" "objects_524_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_524_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_524_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_524_modified_2023-04-05T20:24:09.872Z" "objects_524_description_[Dendroid](https://attack.mitre.org/software/S0301) can intercept SMS messages.(Citation: Lookout-Dendroid)" "objects_524_relationship_type_uses" "objects_524_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_524_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_524_x_mitre_deprecated_False" "objects_524_x_mitre_version_1.0" "objects_524_x_mitre_attack_spec_version_3.1.0" "objects_524_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_524_spec_version_2.1" "objects_524_x_mitre_domains_0_mobile-attack" "objects_525_type_relationship" "objects_525_id_relationship--25466097-53c6-4dc7-8409-197758e88673" "objects_525_created_2023-08-16T16:45:11.580Z" "objects_525_revoked_False" "objects_525_external_references_0_source_name_cyble_chameleon_0423" "objects_525_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_525_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_525_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_525_modified_2023-08-16T16:45:11.580Z" "objects_525_description_[Chameleon](https://attack.mitre.org/software/S1083) can download HTML overlay pages after installation.(Citation: cyble_chameleon_0423)" "objects_525_relationship_type_uses" "objects_525_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_525_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_525_x_mitre_deprecated_False" "objects_525_x_mitre_version_0.1" "objects_525_x_mitre_attack_spec_version_3.1.0" "objects_525_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_525_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_525_spec_version_2.1" "objects_525_x_mitre_domains_0_mobile-attack" "objects_526_type_relationship" "objects_526_id_relationship--25655385-5b0d-4700-a59f-d5d043625b84" "objects_526_created_2023-02-06T18:50:50.273Z" "objects_526_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_526_revoked_False" "objects_526_external_references_0_source_name_lookout_abstractemu_1021" "objects_526_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_526_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_526_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_526_modified_2023-03-27T17:13:16.813Z" "objects_526_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can use rooting exploits to silently give itself permissions or install additional malware.(Citation: lookout_abstractemu_1021)" "objects_526_relationship_type_uses" "objects_526_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_526_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_526_x_mitre_deprecated_False" "objects_526_x_mitre_version_0.1" "objects_526_x_mitre_attack_spec_version_3.1.0" "objects_526_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_526_spec_version_2.1" "objects_526_x_mitre_domains_0_mobile-attack" "objects_527_type_relationship" "objects_527_id_relationship--25cdb4f2-5b38-411c-bfb6-eca7ea4d4527" "objects_527_created_2019-09-04T14:28:16.335Z" "objects_527_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_527_revoked_False" "objects_527_external_references_0_source_name_Lookout-Monokle" "objects_527_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_527_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_527_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_527_modified_2023-04-05T19:57:56.616Z" "objects_527_description_[Monokle](https://attack.mitre.org/software/S0407) can retrieve nearby cell tower and Wi-Fi network information.(Citation: Lookout-Monokle)" "objects_527_relationship_type_uses" "objects_527_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_527_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_527_x_mitre_deprecated_False" "objects_527_x_mitre_version_1.0" "objects_527_x_mitre_attack_spec_version_3.1.0" "objects_527_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_527_spec_version_2.1" "objects_527_x_mitre_domains_0_mobile-attack" "objects_528_type_relationship" "objects_528_id_relationship--25de6cf6-38d5-4d1e-b3f1-6956a0ff0ac3" "objects_528_created_2023-03-03T16:26:48.531Z" "objects_528_revoked_False" "objects_528_external_references_0_source_name_paloalto_yispecter_1015" "objects_528_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_528_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_528_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_528_modified_2023-03-03T16:26:48.531Z" "objects_528_description_[YiSpecter](https://attack.mitre.org/software/S0311) has collected compromised device MAC addresses.(Citation: paloalto_yispecter_1015)" "objects_528_relationship_type_uses" "objects_528_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_528_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_528_x_mitre_deprecated_False" "objects_528_x_mitre_version_0.1" "objects_528_x_mitre_attack_spec_version_3.1.0" "objects_528_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_528_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_528_spec_version_2.1" "objects_528_x_mitre_domains_0_mobile-attack" "objects_529_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_529_id_relationship--2621a020-8d4f-4ca4-b874-0be336a8cafd" "objects_529_type_relationship" "objects_529_created_2020-04-08T18:55:29.196Z" "objects_529_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_529_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_529_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_529_external_references_0_source_name_Cofense Anubis" "objects_529_modified_2020-04-09T16:45:38.751Z" "objects_529_description_[Anubis](https://attack.mitre.org/software/S0422) exfiltrates data encrypted (with RC4) by its ransomware module.(Citation: Cofense Anubis)" "objects_529_relationship_type_uses" "objects_529_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_529_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_529_x_mitre_version_1.0" "objects_529_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_529_spec_version_2.1" "objects_529_x_mitre_attack_spec_version_2.1.0" "objects_529_x_mitre_domains_0_mobile-attack" "objects_530_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_530_type_relationship" "objects_530_id_relationship--268c12df-d3bc-46fa-99e9-32caab50b175" "objects_530_created_2022-03-30T15:52:09.759Z" "objects_530_x_mitre_version_0.1" "objects_530_x_mitre_deprecated_False" "objects_530_revoked_False" "objects_530_description_Device attestation can often detect jailbroken or rooted devices." "objects_530_modified_2022-03-30T15:52:09.759Z" "objects_530_relationship_type_mitigates" "objects_530_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_530_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_530_x_mitre_attack_spec_version_2.1.0" "objects_530_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_530_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_530_spec_version_2.1" "objects_530_x_mitre_domains_0_mobile-attack" "objects_531_type_relationship" "objects_531_id_relationship--269d4409-e287-4ef3-b5f3-765ec03e503e" "objects_531_created_2020-06-02T14:32:31.900Z" "objects_531_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_531_revoked_False" "objects_531_external_references_0_source_name_Google Project Zero Insomnia" "objects_531_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_531_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_531_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_531_modified_2023-04-05T21:18:38.700Z" "objects_531_description_[INSOMNIA](https://attack.mitre.org/software/S0463) grants itself permissions by injecting its hash into the kernel\u2019s trust cache.(Citation: Google Project Zero Insomnia)" "objects_531_relationship_type_uses" "objects_531_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_531_target_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_531_x_mitre_deprecated_False" "objects_531_x_mitre_version_1.0" "objects_531_x_mitre_attack_spec_version_3.1.0" "objects_531_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_531_spec_version_2.1" "objects_531_x_mitre_domains_0_mobile-attack" "objects_532_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_532_type_relationship" "objects_532_id_relationship--26b1025b-5c08-4b6e-8c50-7d2baf29e7b7" "objects_532_created_2022-04-01T18:45:11.299Z" "objects_532_x_mitre_version_0.1" "objects_532_x_mitre_deprecated_False" "objects_532_revoked_False" "objects_532_description_Recent versions of Android modified how device administrator applications are uninstalled, making it easier for the user to remove them." "objects_532_modified_2022-04-01T18:45:11.299Z" "objects_532_relationship_type_mitigates" "objects_532_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_532_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_532_x_mitre_attack_spec_version_2.1.0" "objects_532_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_532_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_532_spec_version_2.1" "objects_532_x_mitre_domains_0_mobile-attack" "objects_533_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_533_type_relationship" "objects_533_id_relationship--26bf27dc-f65d-477d-abbd-f4c3ce475c51" "objects_533_created_2022-04-01T12:37:17.515Z" "objects_533_x_mitre_version_0.1" "objects_533_x_mitre_deprecated_False" "objects_533_revoked_False" "objects_533_description_OS feature updates often enhance security and privacy around permissions. " "objects_533_modified_2022-04-01T12:37:17.515Z" "objects_533_relationship_type_mitigates" "objects_533_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_533_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_533_x_mitre_attack_spec_version_2.1.0" "objects_533_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_533_spec_version_2.1" "objects_533_x_mitre_domains_0_mobile-attack" "objects_534_type_relationship" "objects_534_id_relationship--27050442-e578-44b7-9534-ada78824befe" "objects_534_created_2023-02-06T19:45:09.612Z" "objects_534_revoked_False" "objects_534_external_references_0_source_name_threatfabric_sova_0921" "objects_534_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_534_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_534_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_534_modified_2023-02-06T19:45:09.612Z" "objects_534_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can intercept and read SMS messages.(Citation: threatfabric_sova_0921)" "objects_534_relationship_type_uses" "objects_534_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_534_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_534_x_mitre_deprecated_False" "objects_534_x_mitre_version_0.1" "objects_534_x_mitre_attack_spec_version_3.1.0" "objects_534_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_534_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_534_spec_version_2.1" "objects_534_x_mitre_domains_0_mobile-attack" "objects_535_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_535_id_relationship--271a311f-71bc-4558-a314-0edfbec44b64" "objects_535_type_relationship" "objects_535_created_2019-11-21T16:42:48.495Z" "objects_535_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_535_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_535_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_535_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_535_modified_2019-11-21T16:42:48.495Z" "objects_535_description_[ViceLeaker](https://attack.mitre.org/software/S0418) collects device information, including the device model and OS version.(Citation: SecureList - ViceLeaker 2019)" "objects_535_relationship_type_uses" "objects_535_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_535_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_535_x_mitre_version_1.0" "objects_535_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_535_spec_version_2.1" "objects_535_x_mitre_attack_spec_version_2.1.0" "objects_535_x_mitre_domains_0_mobile-attack" "objects_536_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_536_id_relationship--27247071-356b-4b5f-bc8f-6436a3fec095" "objects_536_type_relationship" "objects_536_created_2017-12-14T16:46:06.044Z" "objects_536_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_536_external_references_0_source_name_Lookout-EnterpriseApps" "objects_536_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_536_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_536_modified_2020-03-31T14:49:39.188Z" "objects_536_description_[PJApps](https://attack.mitre.org/software/S0291) has the capability to collect and leak the victim's location.(Citation: Lookout-EnterpriseApps)" "objects_536_relationship_type_uses" "objects_536_source_ref_malware--c709da93-20c3-4d17-ab68-48cba76b2137" "objects_536_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_536_x_mitre_version_1.0" "objects_536_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_536_spec_version_2.1" "objects_536_x_mitre_attack_spec_version_2.1.0" "objects_536_x_mitre_domains_0_mobile-attack" "objects_537_type_relationship" "objects_537_id_relationship--27490b14-8044-408a-8c6a-6d8427eb78ff" "objects_537_created_2023-03-20T18:44:26.233Z" "objects_537_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_537_revoked_False" "objects_537_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_537_modified_2023-08-08T16:44:47.944Z" "objects_537_description_The user can review which applications have location and sensitive phone information permissions in the operating system\u2019s settings menu. " "objects_537_relationship_type_detects" "objects_537_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_537_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_537_x_mitre_deprecated_False" "objects_537_x_mitre_version_0.1" "objects_537_x_mitre_attack_spec_version_3.1.0" "objects_537_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_537_spec_version_2.1" "objects_537_x_mitre_domains_0_mobile-attack" "objects_538_type_relationship" "objects_538_id_relationship--276bfd69-33cc-4665-8aa7-72bed65d01f9" "objects_538_created_2023-02-28T21:42:52.037Z" "objects_538_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_538_revoked_False" "objects_538_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_538_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_538_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_538_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_538_modified_2023-03-29T21:25:22.438Z" "objects_538_description_[TangleBot](https://attack.mitre.org/software/S1069) can request location permissions.(Citation: cloudmark_tanglebot_0921)" "objects_538_relationship_type_uses" "objects_538_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_538_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_538_x_mitre_deprecated_False" "objects_538_x_mitre_version_0.1" "objects_538_x_mitre_attack_spec_version_3.1.0" "objects_538_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_538_spec_version_2.1" "objects_538_x_mitre_domains_0_mobile-attack" "objects_539_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_539_type_relationship" "objects_539_id_relationship--2793d721-df10-4621-8387-f3342def59a1" "objects_539_created_2022-03-30T18:14:36.786Z" "objects_539_x_mitre_version_0.1" "objects_539_x_mitre_deprecated_False" "objects_539_revoked_False" "objects_539_description_On iOS, the `allowEnterpriseAppTrust` and `allowEnterpriseAppTrustModification` configuration profile restrictions can be used to prevent users from installing apps signed using enterprise distribution keys. " "objects_539_modified_2022-03-30T18:14:36.786Z" "objects_539_relationship_type_mitigates" "objects_539_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_539_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_539_x_mitre_attack_spec_version_2.1.0" "objects_539_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_539_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_539_spec_version_2.1" "objects_539_x_mitre_domains_0_mobile-attack" "objects_540_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_540_id_relationship--27b8153c-130e-44a7-84a9-840f4c23e2ea" "objects_540_type_relationship" "objects_540_created_2020-07-15T20:20:59.377Z" "objects_540_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_540_external_references_0_source_name_Bitdefender Mandrake" "objects_540_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_540_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_540_modified_2020-07-15T20:20:59.377Z" "objects_540_description_[Mandrake](https://attack.mitre.org/software/S0485) can collect all accounts stored on the device.(Citation: Bitdefender Mandrake)" "objects_540_relationship_type_uses" "objects_540_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_540_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_540_x_mitre_version_1.0" "objects_540_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_540_spec_version_2.1" "objects_540_x_mitre_attack_spec_version_2.1.0" "objects_540_x_mitre_domains_0_mobile-attack" "objects_541_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_541_id_relationship--27c8d474-f3f8-4a0e-a317-7e57b9de620c" "objects_541_type_relationship" "objects_541_created_2020-07-27T14:14:56.954Z" "objects_541_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_541_external_references_0_source_name_Google Security Zen" "objects_541_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_541_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_541_modified_2020-08-10T22:18:20.777Z" "objects_541_description_[Zen](https://attack.mitre.org/software/S0494) can obtain root access via a rooting trojan in its infection chain.(Citation: Google Security Zen)" "objects_541_relationship_type_uses" "objects_541_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_541_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_541_x_mitre_version_1.0" "objects_541_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_541_spec_version_2.1" "objects_541_x_mitre_attack_spec_version_2.1.0" "objects_541_x_mitre_domains_0_mobile-attack" "objects_542_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_542_type_relationship" "objects_542_id_relationship--27f5dc22-6ab9-406f-9092-6cb610d777a6" "objects_542_created_2022-04-01T14:59:53.782Z" "objects_542_x_mitre_version_0.1" "objects_542_x_mitre_deprecated_False" "objects_542_revoked_False" "objects_542_description_Device attestation can often detect jailbroken devices." "objects_542_modified_2022-04-01T14:59:53.782Z" "objects_542_relationship_type_mitigates" "objects_542_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_542_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_542_x_mitre_attack_spec_version_2.1.0" "objects_542_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_542_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_542_spec_version_2.1" "objects_542_x_mitre_domains_0_mobile-attack" "objects_543_type_relationship" "objects_543_id_relationship--280aa15d-c7ff-4005-9861-9fc5c3bfe95a" "objects_543_created_2020-12-28T18:47:52.357Z" "objects_543_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_543_revoked_False" "objects_543_external_references_0_source_name_Palo Alto HenBox" "objects_543_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_543_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_543_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_543_modified_2023-04-05T21:22:26.702Z" "objects_543_description_[HenBox](https://attack.mitre.org/software/S0544) can run commands as root.(Citation: Palo Alto HenBox) " "objects_543_relationship_type_uses" "objects_543_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_543_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_543_x_mitre_deprecated_False" "objects_543_x_mitre_version_1.0" "objects_543_x_mitre_attack_spec_version_3.1.0" "objects_543_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_543_spec_version_2.1" "objects_543_x_mitre_domains_0_mobile-attack" "objects_544_type_relationship" "objects_544_id_relationship--2836dc3d-cbea-493b-af31-5f1fa8279ec2" "objects_544_created_2020-04-24T17:46:31.589Z" "objects_544_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_544_revoked_False" "objects_544_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_544_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_544_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_544_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_544_modified_2023-04-05T20:00:28.299Z" "objects_544_description_[TrickMo](https://attack.mitre.org/software/S0427) communicates with the C2 by sending JSON objects over unencrypted HTTP requests.(Citation: SecurityIntelligence TrickMo)" "objects_544_relationship_type_uses" "objects_544_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_544_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_544_x_mitre_deprecated_False" "objects_544_x_mitre_version_1.0" "objects_544_x_mitre_attack_spec_version_3.1.0" "objects_544_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_544_spec_version_2.1" "objects_544_x_mitre_domains_0_mobile-attack" "objects_545_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_545_type_relationship" "objects_545_id_relationship--289f5e23-088a-4840-a2a6-bab30da2a64b" "objects_545_created_2022-04-01T16:51:04.584Z" "objects_545_x_mitre_version_0.1" "objects_545_external_references_0_source_name_GoogleIO2016" "objects_545_external_references_0_url_https://www.youtube.com/watch?v=XZzLjllizYs" "objects_545_external_references_0_description_Adrian Ludwig. (2016, May 19). What's new in Android security (M and N Version). Retrieved December 9, 2016." "objects_545_x_mitre_deprecated_False" "objects_545_revoked_False" "objects_545_description_Changes were introduced in Android 7 to make abuse of device administrator permissions more difficult.(Citation: GoogleIO2016)" "objects_545_modified_2022-04-01T16:51:04.584Z" "objects_545_relationship_type_mitigates" "objects_545_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_545_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_545_x_mitre_attack_spec_version_2.1.0" "objects_545_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_545_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_545_spec_version_2.1" "objects_545_x_mitre_domains_0_mobile-attack" "objects_546_type_relationship" "objects_546_id_relationship--2908f0f6-2408-41a1-aaab-cf3e7db06aad" "objects_546_created_2020-12-24T21:55:56.752Z" "objects_546_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_546_revoked_False" "objects_546_external_references_0_source_name_Lookout Uyghur Campaign" "objects_546_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_546_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_546_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_546_modified_2023-04-05T21:26:16.282Z" "objects_546_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has used exploits to root devices and install additional malware on the system partition.(Citation: Lookout Uyghur Campaign)" "objects_546_relationship_type_uses" "objects_546_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_546_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_546_x_mitre_deprecated_False" "objects_546_x_mitre_version_1.0" "objects_546_x_mitre_attack_spec_version_3.1.0" "objects_546_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_546_spec_version_2.1" "objects_546_x_mitre_domains_0_mobile-attack" "objects_547_type_relationship" "objects_547_id_relationship--290a627d-172d-494d-a0cc-685f480a1034" "objects_547_created_2017-12-14T16:46:06.044Z" "objects_547_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_547_revoked_False" "objects_547_external_references_0_source_name_Lookout-EnterpriseApps" "objects_547_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_547_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_547_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_547_modified_2023-04-05T17:36:27.983Z" "objects_547_description_[AndroRAT](https://attack.mitre.org/software/S0292) collects call logs.(Citation: Lookout-EnterpriseApps)" "objects_547_relationship_type_uses" "objects_547_source_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_547_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_547_x_mitre_deprecated_False" "objects_547_x_mitre_version_1.0" "objects_547_x_mitre_attack_spec_version_3.1.0" "objects_547_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_547_spec_version_2.1" "objects_547_x_mitre_domains_0_mobile-attack" "objects_548_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_548_id_relationship--290c9d3f-f59b-4e2b-9b7b-115014845c15" "objects_548_type_relationship" "objects_548_created_2021-09-24T14:47:34.447Z" "objects_548_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_548_modified_2021-10-04T20:08:48.439Z" "objects_548_description_Device attestation can often detect rooted devices." "objects_548_relationship_type_mitigates" "objects_548_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_548_target_ref_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_548_x_mitre_version_1.0" "objects_548_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_548_spec_version_2.1" "objects_548_x_mitre_attack_spec_version_2.1.0" "objects_548_x_mitre_domains_0_mobile-attack" "objects_549_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_549_type_relationship" "objects_549_id_relationship--29357289-362c-447c-b387-9a38b50d7296" "objects_549_created_2022-04-15T17:20:06.338Z" "objects_549_x_mitre_version_0.1" "objects_549_external_references_0_source_name_Google Bread" "objects_549_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_549_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_549_external_references_1_source_name_Check Point-Joker" "objects_549_external_references_1_url_https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/" "objects_549_external_references_1_description_Hazum, A., Melnykov, B., Wernik, I.. (2020, July 9). New Joker variant hits Google Play with an old trick. Retrieved July 20, 2020." "objects_549_x_mitre_deprecated_False" "objects_549_revoked_False" "objects_549_description_[Bread](https://attack.mitre.org/software/S0432) uses various tricks to obfuscate its strings including standard and custom encryption, programmatically building strings at runtime, and splitting unencrypted strings with repeated delimiters to break up keywords. [Bread](https://attack.mitre.org/software/S0432) has also abused Java and JavaScript features to obfuscate code. [Bread](https://attack.mitre.org/software/S0432) payloads have hidden code in native libraries and encrypted JAR files in the data section of an ELF file. [Bread](https://attack.mitre.org/software/S0432) has stored DEX payloads as base64-encoded strings in the Android manifest and internal Java classes.(Citation: Check Point-Joker)(Citation: Google Bread)" "objects_549_modified_2022-04-15T17:20:06.338Z" "objects_549_relationship_type_uses" "objects_549_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_549_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_549_x_mitre_attack_spec_version_2.1.0" "objects_549_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_549_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_549_spec_version_2.1" "objects_549_x_mitre_domains_0_mobile-attack" "objects_550_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_550_id_relationship--295fab07-9f02-4504-9ae4-1a60c2e8c224" "objects_550_type_relationship" "objects_550_created_2019-09-03T20:08:00.670Z" "objects_550_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_550_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_550_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_550_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_550_modified_2020-03-31T14:49:39.188Z" "objects_550_description_ [Gustuff](https://attack.mitre.org/software/S0406) can capture files and photos from the compromised device.(Citation: Talos Gustuff Apr 2019) " "objects_550_relationship_type_uses" "objects_550_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_550_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_550_x_mitre_version_1.0" "objects_550_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_550_spec_version_2.1" "objects_550_x_mitre_attack_spec_version_2.1.0" "objects_550_x_mitre_domains_0_mobile-attack" "objects_551_type_relationship" "objects_551_id_relationship--299931f0-4c60-4a9b-8a6a-4adb6362e590" "objects_551_created_2019-09-23T13:36:08.543Z" "objects_551_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_551_revoked_False" "objects_551_external_references_0_source_name_securelist rotexy 2018" "objects_551_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_551_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_551_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_551_modified_2023-04-05T16:57:05.633Z" "objects_551_description_[Rotexy](https://attack.mitre.org/software/S0411) can access and upload the contacts list to the command and control server.(Citation: securelist rotexy 2018)" "objects_551_relationship_type_uses" "objects_551_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_551_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_551_x_mitre_deprecated_False" "objects_551_x_mitre_version_1.0" "objects_551_x_mitre_attack_spec_version_3.1.0" "objects_551_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_551_spec_version_2.1" "objects_551_x_mitre_domains_0_mobile-attack" "objects_552_type_relationship" "objects_552_id_relationship--29dc105c-0b1b-4645-85ef-436c096bd3e2" "objects_552_created_2017-12-14T16:46:06.044Z" "objects_552_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_552_revoked_False" "objects_552_external_references_0_source_name_FireEye-RuMMS" "objects_552_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_552_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_552_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_552_modified_2023-04-05T20:24:38.256Z" "objects_552_description_[RuMMS](https://attack.mitre.org/software/S0313) uploads incoming SMS messages to a remote command and control server.(Citation: FireEye-RuMMS)" "objects_552_relationship_type_uses" "objects_552_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_552_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_552_x_mitre_deprecated_False" "objects_552_x_mitre_version_1.0" "objects_552_x_mitre_attack_spec_version_3.1.0" "objects_552_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_552_spec_version_2.1" "objects_552_x_mitre_domains_0_mobile-attack" "objects_553_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_553_id_relationship--2a1d27a5-8149-4a6c-bbb7-6db83ce3a7ce" "objects_553_type_relationship" "objects_553_created_2020-12-18T20:14:47.339Z" "objects_553_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_553_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_553_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_553_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_553_modified_2020-12-18T20:14:47.339Z" "objects_553_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has used timer events in React Native to initiate the foreground service.(Citation: WhiteOps TERRACOTTA)" "objects_553_relationship_type_uses" "objects_553_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_553_target_ref_attack-pattern--00290ac5-551e-44aa-bbd8-c4b913488a6d" "objects_553_x_mitre_version_1.0" "objects_553_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_553_spec_version_2.1" "objects_553_x_mitre_attack_spec_version_2.1.0" "objects_553_x_mitre_domains_0_mobile-attack" "objects_554_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_554_type_relationship" "objects_554_id_relationship--2a472430-c30e-4877-8933-2e75f1de9a01" "objects_554_created_2022-03-30T14:00:45.120Z" "objects_554_x_mitre_version_0.1" "objects_554_x_mitre_deprecated_False" "objects_554_revoked_False" "objects_554_description_" "objects_554_modified_2022-03-30T14:00:45.120Z" "objects_554_relationship_type_revoked-by" "objects_554_source_ref_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_554_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_554_x_mitre_attack_spec_version_2.1.0" "objects_554_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_554_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_554_spec_version_2.1" "objects_554_x_mitre_domains_0_mobile-attack" "objects_555_type_relationship" "objects_555_id_relationship--2a5f4f05-bd60-4571-bcce-f3b764a5b5a0" "objects_555_created_2023-02-28T20:30:01.082Z" "objects_555_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_555_revoked_False" "objects_555_external_references_0_source_name_proofpoint_flubot_0421" "objects_555_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_555_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_555_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_555_modified_2023-03-31T22:08:11.662Z" "objects_555_description_[FluBot](https://attack.mitre.org/software/S1067) can retrieve the contacts list from an infected device.(Citation: proofpoint_flubot_0421)" "objects_555_relationship_type_uses" "objects_555_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_555_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_555_x_mitre_deprecated_False" "objects_555_x_mitre_version_0.1" "objects_555_x_mitre_attack_spec_version_3.1.0" "objects_555_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_555_spec_version_2.1" "objects_555_x_mitre_domains_0_mobile-attack" "objects_556_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_556_type_relationship" "objects_556_id_relationship--2acc0c1a-af30-4410-976b-31148df5378d" "objects_556_created_2022-03-28T19:39:42.538Z" "objects_556_x_mitre_version_0.1" "objects_556_x_mitre_deprecated_False" "objects_556_revoked_False" "objects_556_description_" "objects_556_modified_2022-03-28T19:39:42.538Z" "objects_556_relationship_type_subtechnique-of" "objects_556_source_ref_attack-pattern--c08366bb-8d11-4921-853f-f0a3b6a2a1da" "objects_556_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_556_x_mitre_attack_spec_version_2.1.0" "objects_556_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_556_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_556_spec_version_2.1" "objects_556_x_mitre_domains_0_mobile-attack" "objects_557_type_relationship" "objects_557_id_relationship--2af26be3-f910-4700-ab14-9d14532601cc" "objects_557_created_2023-07-21T19:53:32.703Z" "objects_557_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_557_revoked_False" "objects_557_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_557_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_557_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_557_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_557_modified_2023-09-28T17:25:51.814Z" "objects_557_description_[Fakecalls](https://attack.mitre.org/software/S1080) can access the device\u2019s call log.(Citation: kaspersky_fakecalls_0422)" "objects_557_relationship_type_uses" "objects_557_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_557_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_557_x_mitre_deprecated_False" "objects_557_x_mitre_version_0.1" "objects_557_x_mitre_attack_spec_version_3.2.0" "objects_557_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_557_spec_version_2.1" "objects_557_x_mitre_domains_0_mobile-attack" "objects_558_type_relationship" "objects_558_id_relationship--2b065fcf-7ed1-4f88-8910-2eb46bde9ab7" "objects_558_created_2023-01-18T19:19:34.604Z" "objects_558_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_558_revoked_False" "objects_558_external_references_0_source_name_cyble_drinik_1022" "objects_558_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_558_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_558_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_558_modified_2023-03-27T17:52:35.805Z" "objects_558_description_[Drinik](https://attack.mitre.org/software/S1054) can send stolen data back to the C2 server.(Citation: cyble_drinik_1022)" "objects_558_relationship_type_uses" "objects_558_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_558_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_558_x_mitre_deprecated_False" "objects_558_x_mitre_version_0.1" "objects_558_x_mitre_attack_spec_version_3.1.0" "objects_558_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_558_spec_version_2.1" "objects_558_x_mitre_domains_0_mobile-attack" "objects_559_type_relationship" "objects_559_id_relationship--2b0f4c1d-8d99-4e80-8555-d9a454d5cab7" "objects_559_created_2023-03-20T18:55:33.546Z" "objects_559_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_559_revoked_False" "objects_559_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_559_modified_2023-08-09T16:44:31.916Z" "objects_559_description_Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it." "objects_559_relationship_type_detects" "objects_559_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_559_target_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_559_x_mitre_deprecated_False" "objects_559_x_mitre_version_0.1" "objects_559_x_mitre_attack_spec_version_3.1.0" "objects_559_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_559_spec_version_2.1" "objects_559_x_mitre_domains_0_mobile-attack" "objects_560_type_relationship" "objects_560_id_relationship--2bbd620d-6deb-4f81-a95b-98a7a74878e9" "objects_560_created_2023-03-20T18:51:07.547Z" "objects_560_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_560_revoked_False" "objects_560_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_560_modified_2023-08-09T17:20:06.469Z" "objects_560_description_Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. " "objects_560_relationship_type_detects" "objects_560_source_ref_x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c" "objects_560_target_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_560_x_mitre_deprecated_False" "objects_560_x_mitre_version_0.1" "objects_560_x_mitre_attack_spec_version_3.1.0" "objects_560_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_560_spec_version_2.1" "objects_560_x_mitre_domains_0_mobile-attack" "objects_561_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_561_id_relationship--2be3d0a4-2e24-4d04-859e-37d24835ff16" "objects_561_type_relationship" "objects_561_created_2021-02-17T20:43:52.420Z" "objects_561_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_561_external_references_0_source_name_Lookout FrozenCell" "objects_561_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_561_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_561_modified_2021-02-17T20:43:52.420Z" "objects_561_description_[FrozenCell](https://attack.mitre.org/software/S0577) has retrieved device images for exfiltration.(Citation: Lookout FrozenCell)" "objects_561_relationship_type_uses" "objects_561_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_561_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_561_x_mitre_version_1.0" "objects_561_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_561_spec_version_2.1" "objects_561_x_mitre_attack_spec_version_2.1.0" "objects_561_x_mitre_domains_0_mobile-attack" "objects_562_type_relationship" "objects_562_id_relationship--2bedbf86-2ef0-45bf-950d-b9d072c03bdc" "objects_562_created_2017-12-14T16:46:06.044Z" "objects_562_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_562_revoked_False" "objects_562_external_references_0_source_name_Kaspersky-WUC" "objects_562_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_562_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_562_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_562_modified_2023-04-05T17:37:02.853Z" "objects_562_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) stole call logs.(Citation: Kaspersky-WUC)" "objects_562_relationship_type_uses" "objects_562_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_562_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_562_x_mitre_deprecated_False" "objects_562_x_mitre_version_1.0" "objects_562_x_mitre_attack_spec_version_3.1.0" "objects_562_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_562_spec_version_2.1" "objects_562_x_mitre_domains_0_mobile-attack" "objects_563_type_relationship" "objects_563_id_relationship--2c5b36b4-5381-4d9e-9ce5-cd7cd19041b1" "objects_563_created_2020-07-20T13:27:33.514Z" "objects_563_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_563_revoked_False" "objects_563_external_references_0_source_name_Talos-WolfRAT" "objects_563_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_563_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_563_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_563_modified_2023-04-05T20:35:47.258Z" "objects_563_description_[WolfRAT](https://attack.mitre.org/software/S0489) can delete files from the device.(Citation: Talos-WolfRAT)" "objects_563_relationship_type_uses" "objects_563_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_563_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_563_x_mitre_deprecated_False" "objects_563_x_mitre_version_1.0" "objects_563_x_mitre_attack_spec_version_3.1.0" "objects_563_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_563_spec_version_2.1" "objects_563_x_mitre_domains_0_mobile-attack" "objects_564_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_564_id_relationship--2c9ad579-0c29-4f2a-80f3-242dc6b0bafd" "objects_564_type_relationship" "objects_564_created_2020-09-11T14:54:16.644Z" "objects_564_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_564_external_references_0_source_name_Lookout Desert Scorpion" "objects_564_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_564_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_564_modified_2020-09-11T14:54:16.644Z" "objects_564_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can list files stored on external storage.(Citation: Lookout Desert Scorpion)" "objects_564_relationship_type_uses" "objects_564_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_564_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_564_x_mitre_version_1.0" "objects_564_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_564_spec_version_2.1" "objects_564_x_mitre_attack_spec_version_2.1.0" "objects_564_x_mitre_domains_0_mobile-attack" "objects_565_type_relationship" "objects_565_id_relationship--2caddf52-2bc2-4f75-90bb-0f292952ada6" "objects_565_created_2023-01-19T18:07:26.323Z" "objects_565_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_565_revoked_False" "objects_565_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_565_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_565_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_565_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_565_modified_2023-03-29T21:13:32.345Z" "objects_565_description_[TianySpy](https://attack.mitre.org/software/S1056) can utilize WebViews to display fake authentication pages that capture user credentials.(Citation: trendmicro_tianyspy_0122) " "objects_565_relationship_type_uses" "objects_565_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_565_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_565_x_mitre_deprecated_False" "objects_565_x_mitre_version_0.1" "objects_565_x_mitre_attack_spec_version_3.1.0" "objects_565_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_565_spec_version_2.1" "objects_565_x_mitre_domains_0_mobile-attack" "objects_566_type_relationship" "objects_566_id_relationship--2cb834dd-d7cf-46f3-a19b-bdbfb5bfee07" "objects_566_created_2023-03-20T18:54:25.458Z" "objects_566_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_566_revoked_False" "objects_566_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_566_modified_2023-08-08T15:02:50.786Z" "objects_566_description_The user can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong." "objects_566_relationship_type_detects" "objects_566_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_566_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_566_x_mitre_deprecated_False" "objects_566_x_mitre_version_0.1" "objects_566_x_mitre_attack_spec_version_3.1.0" "objects_566_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_566_spec_version_2.1" "objects_566_x_mitre_domains_0_mobile-attack" "objects_567_type_relationship" "objects_567_id_relationship--2cdd5474-620c-499e-8b9c-835505febc2c" "objects_567_created_2017-12-14T16:46:06.044Z" "objects_567_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_567_revoked_False" "objects_567_external_references_0_source_name_Kaspersky-MobileMalware" "objects_567_external_references_0_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_567_external_references_0_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_567_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_567_modified_2023-04-05T20:00:45.438Z" "objects_567_description_[Trojan-SMS.AndroidOS.OpFake.a](https://attack.mitre.org/software/S0308) uses Google Cloud Messaging (GCM) for command and control.(Citation: Kaspersky-MobileMalware)" "objects_567_relationship_type_uses" "objects_567_source_ref_malware--d89c132d-7752-4c7f-9372-954a71522985" "objects_567_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_567_x_mitre_deprecated_False" "objects_567_x_mitre_version_1.0" "objects_567_x_mitre_attack_spec_version_3.1.0" "objects_567_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_567_spec_version_2.1" "objects_567_x_mitre_domains_0_mobile-attack" "objects_568_type_relationship" "objects_568_id_relationship--2ce1e63a-2e9b-4cac-9469-3fb78bf4640f" "objects_568_created_2023-08-16T16:38:15.526Z" "objects_568_revoked_False" "objects_568_external_references_0_source_name_cyble_chameleon_0423" "objects_568_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_568_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_568_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_568_modified_2023-08-16T16:38:15.527Z" "objects_568_description_[Chameleon](https://attack.mitre.org/software/S1083) can perform system checks to verify if the device is rooted or has ADB enabled and can avoid execution if found.(Citation: cyble_chameleon_0423)" "objects_568_relationship_type_uses" "objects_568_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_568_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_568_x_mitre_deprecated_False" "objects_568_x_mitre_version_0.1" "objects_568_x_mitre_attack_spec_version_3.1.0" "objects_568_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_568_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_568_spec_version_2.1" "objects_568_x_mitre_domains_0_mobile-attack" "objects_569_type_relationship" "objects_569_id_relationship--2d1b46d5-cc2e-4312-adf2-43fb130a506b" "objects_569_created_2021-02-17T20:49:24.542Z" "objects_569_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_569_revoked_False" "objects_569_external_references_0_source_name_Lookout Uyghur Campaign" "objects_569_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_569_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_569_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_569_modified_2023-04-05T21:22:40.300Z" "objects_569_description_[DoubleAgent](https://attack.mitre.org/software/S0550) can run arbitrary shell commands.(Citation: Lookout Uyghur Campaign)" "objects_569_relationship_type_uses" "objects_569_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_569_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_569_x_mitre_deprecated_False" "objects_569_x_mitre_version_1.0" "objects_569_x_mitre_attack_spec_version_3.1.0" "objects_569_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_569_spec_version_2.1" "objects_569_x_mitre_domains_0_mobile-attack" "objects_570_type_relationship" "objects_570_id_relationship--2d3198ff-a481-47ec-ae64-13d7be706929" "objects_570_created_2023-02-28T21:41:47.503Z" "objects_570_revoked_False" "objects_570_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_570_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_570_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_570_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_570_modified_2023-02-28T21:41:47.503Z" "objects_570_description_[TangleBot](https://attack.mitre.org/software/S1069) can record video from the device camera.(Citation: cloudmark_tanglebot_0921)" "objects_570_relationship_type_uses" "objects_570_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_570_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_570_x_mitre_deprecated_False" "objects_570_x_mitre_version_0.1" "objects_570_x_mitre_attack_spec_version_3.1.0" "objects_570_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_570_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_570_spec_version_2.1" "objects_570_x_mitre_domains_0_mobile-attack" "objects_571_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_571_id_relationship--2de76a24-ec87-4808-b0d3-b84d318ac22c" "objects_571_type_relationship" "objects_571_created_2017-12-14T16:46:06.044Z" "objects_571_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_571_external_references_0_source_name_PaloAlto-XcodeGhost" "objects_571_external_references_0_description_Claud Xiao. (2015, September 18). Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps. Retrieved December 21, 2016." "objects_571_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/" "objects_571_modified_2020-03-31T14:49:39.188Z" "objects_571_description_[XcodeGhost](https://attack.mitre.org/software/S0297) can read and write data in the user\u2019s clipboard.(Citation: PaloAlto-XcodeGhost)" "objects_571_relationship_type_uses" "objects_571_source_ref_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_571_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_571_x_mitre_version_1.0" "objects_571_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_571_spec_version_2.1" "objects_571_x_mitre_attack_spec_version_2.1.0" "objects_571_x_mitre_domains_0_mobile-attack" "objects_572_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_572_id_relationship--2e08820f-a81d-480e-9e60-f14db3e49080" "objects_572_type_relationship" "objects_572_created_2019-09-04T14:28:15.909Z" "objects_572_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_572_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_572_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_572_external_references_0_source_name_Lookout-Monokle" "objects_572_modified_2020-03-31T14:49:39.188Z" "objects_572_description_[Monokle](https://attack.mitre.org/software/S0407) can take photos and videos.(Citation: Lookout-Monokle)" "objects_572_relationship_type_uses" "objects_572_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_572_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_572_x_mitre_version_1.0" "objects_572_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_572_spec_version_2.1" "objects_572_x_mitre_attack_spec_version_2.1.0" "objects_572_x_mitre_domains_0_mobile-attack" "objects_573_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_573_id_relationship--2e2d1ffa-f6df-4d3c-b99b-f7b8baff53e8" "objects_573_type_relationship" "objects_573_created_2019-09-04T15:38:56.994Z" "objects_573_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_573_external_references_0_source_name_FlexiSpy-Features" "objects_573_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_573_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_573_modified_2020-03-31T14:49:39.188Z" "objects_573_description_ [FlexiSpy](https://attack.mitre.org/software/S0408) can take screenshots of other applications.(Citation: FlexiSpy-Features) " "objects_573_relationship_type_uses" "objects_573_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_573_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_573_x_mitre_version_1.0" "objects_573_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_573_spec_version_2.1" "objects_573_x_mitre_attack_spec_version_2.1.0" "objects_573_x_mitre_domains_0_mobile-attack" "objects_574_type_relationship" "objects_574_id_relationship--2e3a5d0d-a80a-4606-8be2-208302e995d1" "objects_574_created_2020-12-24T21:45:56.920Z" "objects_574_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_574_revoked_False" "objects_574_external_references_0_source_name_Lookout Uyghur Campaign" "objects_574_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_574_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_574_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_574_modified_2023-04-05T17:16:17.615Z" "objects_574_description_[SilkBean](https://attack.mitre.org/software/S0549) has attempted to trick users into enabling installation of applications from unknown sources.(Citation: Lookout Uyghur Campaign)" "objects_574_relationship_type_uses" "objects_574_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_574_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_574_x_mitre_deprecated_False" "objects_574_x_mitre_version_1.0" "objects_574_x_mitre_attack_spec_version_3.1.0" "objects_574_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_574_spec_version_2.1" "objects_574_x_mitre_domains_0_mobile-attack" "objects_575_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_575_id_relationship--2e59d381-eac6-41c6-a5e6-f9617c10259e" "objects_575_type_relationship" "objects_575_created_2020-06-02T14:32:31.888Z" "objects_575_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_575_external_references_0_source_name_Volexity Insomnia" "objects_575_external_references_0_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_575_external_references_0_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_575_modified_2020-06-02T14:32:31.888Z" "objects_575_description_[INSOMNIA](https://attack.mitre.org/software/S0463) obfuscates various pieces of information within the application.(Citation: Volexity Insomnia) " "objects_575_relationship_type_uses" "objects_575_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_575_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_575_x_mitre_version_1.0" "objects_575_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_575_spec_version_2.1" "objects_575_x_mitre_attack_spec_version_2.1.0" "objects_575_x_mitre_domains_0_mobile-attack" "objects_576_type_relationship" "objects_576_id_relationship--2e6d507e-afbb-4fa5-b459-2b060ab52db3" "objects_576_created_2020-12-18T20:14:47.316Z" "objects_576_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_576_revoked_False" "objects_576_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_576_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_576_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_576_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_576_modified_2023-04-05T20:50:29.535Z" "objects_576_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) checks whether its call stack has been modified, an indication that it is running in an analysis environment, and if so, does not decrypt its obfuscated strings(Citation: WhiteOps TERRACOTTA)." "objects_576_relationship_type_uses" "objects_576_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_576_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_576_x_mitre_deprecated_False" "objects_576_x_mitre_version_1.0" "objects_576_x_mitre_attack_spec_version_3.1.0" "objects_576_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_576_spec_version_2.1" "objects_576_x_mitre_domains_0_mobile-attack" "objects_577_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_577_type_relationship" "objects_577_id_relationship--2e797961-356f-4763-bdb2-0ebc2ad4c8b0" "objects_577_created_2019-09-04T20:01:42.722Z" "objects_577_x_mitre_version_1.0" "objects_577_x_mitre_deprecated_False" "objects_577_revoked_False" "objects_577_description_Enterprise policies should block access to the Android Debug Bridge (ADB) by preventing users from enabling USB debugging on Android devices unless specifically needed (e.g., if the device is used for application development). An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features. " "objects_577_modified_2022-04-01T13:32:19.919Z" "objects_577_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_577_relationship_type_mitigates" "objects_577_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_577_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_577_x_mitre_attack_spec_version_2.1.0" "objects_577_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_577_spec_version_2.1" "objects_577_x_mitre_domains_0_mobile-attack" "objects_578_type_relationship" "objects_578_id_relationship--2e7f8995-93ae-41bb-9baf-53178341d93e" "objects_578_created_2021-02-08T16:36:20.630Z" "objects_578_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_578_revoked_False" "objects_578_external_references_0_source_name_BlackBerry Bahamut" "objects_578_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_578_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_578_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_578_modified_2023-04-05T17:06:00.885Z" "objects_578_description_[Windshift](https://attack.mitre.org/groups/G0112) has deployed anti-analysis capabilities during their Operation BULL campaign.(Citation: BlackBerry Bahamut)" "objects_578_relationship_type_uses" "objects_578_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_578_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_578_x_mitre_deprecated_False" "objects_578_x_mitre_version_1.0" "objects_578_x_mitre_attack_spec_version_3.1.0" "objects_578_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_578_spec_version_2.1" "objects_578_x_mitre_domains_0_mobile-attack" "objects_579_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_579_id_relationship--2e826926-fd5b-407c-adbc-e998058728d3" "objects_579_type_relationship" "objects_579_created_2019-09-04T15:38:56.786Z" "objects_579_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_579_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_579_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_579_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_579_modified_2020-03-31T14:49:39.188Z" "objects_579_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can record both incoming and outgoing phone calls, as well as microphone audio.(Citation: CyberMerchants-FlexiSpy)" "objects_579_relationship_type_uses" "objects_579_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_579_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_579_x_mitre_version_1.0" "objects_579_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_579_spec_version_2.1" "objects_579_x_mitre_attack_spec_version_2.1.0" "objects_579_x_mitre_domains_0_mobile-attack" "objects_580_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_580_id_relationship--2e913583-123a-47af-8872-98fc12ab4a6a" "objects_580_type_relationship" "objects_580_created_2020-11-24T17:55:12.846Z" "objects_580_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_580_external_references_0_source_name_Talos GPlayed" "objects_580_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_580_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_580_modified_2020-11-24T17:55:12.846Z" "objects_580_description_[GPlayed](https://attack.mitre.org/software/S0536) can send SMS messages.(Citation: Talos GPlayed)" "objects_580_relationship_type_uses" "objects_580_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_580_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_580_x_mitre_version_1.0" "objects_580_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_580_spec_version_2.1" "objects_580_x_mitre_attack_spec_version_2.1.0" "objects_580_x_mitre_domains_0_mobile-attack" "objects_581_type_relationship" "objects_581_id_relationship--2ebd5c4c-af03-4874-a6fd-1e58d51cc055" "objects_581_created_2020-01-27T17:05:58.310Z" "objects_581_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_581_revoked_False" "objects_581_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_581_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_581_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_581_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_581_modified_2023-04-05T17:28:20.439Z" "objects_581_description_[GolfSpy](https://attack.mitre.org/software/S0421) can collect SMS messages.(Citation: Trend Micro Bouncing Golf 2019)" "objects_581_relationship_type_uses" "objects_581_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_581_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_581_x_mitre_deprecated_False" "objects_581_x_mitre_version_1.0" "objects_581_x_mitre_attack_spec_version_3.1.0" "objects_581_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_581_spec_version_2.1" "objects_581_x_mitre_domains_0_mobile-attack" "objects_582_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_582_type_relationship" "objects_582_id_relationship--2f1e5d77-0054-4f8a-8e01-7c0318278a76" "objects_582_created_2019-10-18T14:50:57.472Z" "objects_582_x_mitre_version_1.0" "objects_582_x_mitre_deprecated_False" "objects_582_revoked_False" "objects_582_description_Security updates frequently contain patches for known exploits." "objects_582_modified_2022-03-25T14:12:54.498Z" "objects_582_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_582_relationship_type_mitigates" "objects_582_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_582_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_582_x_mitre_attack_spec_version_2.1.0" "objects_582_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_582_spec_version_2.1" "objects_582_x_mitre_domains_0_mobile-attack" "objects_583_type_relationship" "objects_583_id_relationship--2f41ab75-3490-4642-8111-9d4d43b88df7" "objects_583_created_2023-08-04T18:32:23.019Z" "objects_583_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_583_revoked_False" "objects_583_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_583_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_583_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_583_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_583_modified_2023-09-22T20:40:40.079Z" "objects_583_description_[Sunbird](https://attack.mitre.org/software/S1082) can take screenshots and abuse accessibility services to scrape BlackBerry Messenger and WhatsApp messages, contacts, and notifications(Citation: lookout_hornbill_sunbird_0221)" "objects_583_relationship_type_uses" "objects_583_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_583_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_583_x_mitre_deprecated_False" "objects_583_x_mitre_version_0.1" "objects_583_x_mitre_attack_spec_version_3.1.0" "objects_583_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_583_spec_version_2.1" "objects_583_x_mitre_domains_0_mobile-attack" "objects_584_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_584_type_relationship" "objects_584_id_relationship--2f55e452-f8b3-402b-a193-d261dac9f327" "objects_584_created_2022-04-01T18:53:48.715Z" "objects_584_x_mitre_version_0.1" "objects_584_x_mitre_deprecated_False" "objects_584_revoked_False" "objects_584_description_" "objects_584_modified_2022-04-01T18:53:48.715Z" "objects_584_relationship_type_subtechnique-of" "objects_584_source_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_584_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_584_x_mitre_attack_spec_version_2.1.0" "objects_584_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_584_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_584_spec_version_2.1" "objects_584_x_mitre_domains_0_mobile-attack" "objects_585_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_585_id_relationship--2f8b5252-551c-4a0d-8e72-8da4050757f3" "objects_585_type_relationship" "objects_585_created_2021-04-19T14:29:46.530Z" "objects_585_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_585_external_references_0_source_name_Lookout Uyghur Campaign" "objects_585_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_585_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_585_modified_2021-04-19T14:29:46.530Z" "objects_585_description_ [SilkBean](https://attack.mitre.org/software/S0549) can send SMS messages.(Citation: Lookout Uyghur Campaign) " "objects_585_relationship_type_uses" "objects_585_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_585_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_585_x_mitre_version_1.0" "objects_585_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_585_spec_version_2.1" "objects_585_x_mitre_attack_spec_version_2.1.0" "objects_585_x_mitre_domains_0_mobile-attack" "objects_586_type_relationship" "objects_586_id_relationship--2f9b95b2-0ef4-40b8-a230-86f273000dc7" "objects_586_created_2023-03-15T16:26:04.949Z" "objects_586_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_586_revoked_False" "objects_586_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_586_modified_2023-08-09T15:34:52.478Z" "objects_586_description_The user can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). " "objects_586_relationship_type_detects" "objects_586_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_586_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_586_x_mitre_deprecated_False" "objects_586_x_mitre_version_0.1" "objects_586_x_mitre_attack_spec_version_3.1.0" "objects_586_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_586_spec_version_2.1" "objects_586_x_mitre_domains_0_mobile-attack" "objects_587_type_relationship" "objects_587_id_relationship--2f9c31d2-2e6c-4e95-9058-c9a8def46865" "objects_587_created_2023-09-28T17:21:02.298Z" "objects_587_revoked_False" "objects_587_external_references_0_source_name_Bleeipng Computer Escobar" "objects_587_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_587_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_587_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_587_modified_2023-09-28T17:21:02.298Z" "objects_587_description_[Escobar](https://attack.mitre.org/software/S1092) can take photos using the device cameras.(Citation: Bleeipng Computer Escobar)" "objects_587_relationship_type_uses" "objects_587_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_587_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_587_x_mitre_deprecated_False" "objects_587_x_mitre_version_0.1" "objects_587_x_mitre_attack_spec_version_3.2.0" "objects_587_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_587_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_587_spec_version_2.1" "objects_587_x_mitre_domains_0_mobile-attack" "objects_588_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_588_type_relationship" "objects_588_id_relationship--2fcc6291-9a68-45c2-a5c5-94b1973ed3d2" "objects_588_created_2022-04-01T13:27:29.919Z" "objects_588_x_mitre_version_0.1" "objects_588_x_mitre_deprecated_False" "objects_588_revoked_False" "objects_588_description_" "objects_588_modified_2022-04-01T13:27:29.920Z" "objects_588_relationship_type_revoked-by" "objects_588_source_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_588_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_588_x_mitre_attack_spec_version_2.1.0" "objects_588_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_588_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_588_spec_version_2.1" "objects_588_x_mitre_domains_0_mobile-attack" "objects_589_type_relationship" "objects_589_id_relationship--2fdcc49e-1875-4618-b3c5-c0ecfab97386" "objects_589_created_2023-08-04T19:02:39.950Z" "objects_589_revoked_False" "objects_589_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_589_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_589_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_589_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_589_modified_2023-08-04T19:02:39.950Z" "objects_589_description_[Hornbill](https://attack.mitre.org/software/S1077) has impersonated chat applications such as Fruit Chat, Cucu Chat, and Kako Chat.(Citation: lookout_hornbill_sunbird_0221) " "objects_589_relationship_type_uses" "objects_589_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_589_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_589_x_mitre_deprecated_False" "objects_589_x_mitre_version_0.1" "objects_589_x_mitre_attack_spec_version_3.1.0" "objects_589_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_589_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_589_spec_version_2.1" "objects_589_x_mitre_domains_0_mobile-attack" "objects_590_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_590_type_relationship" "objects_590_id_relationship--300c824d-5586-411b-b274-8941a99a98fb" "objects_590_created_2022-03-30T14:06:01.859Z" "objects_590_x_mitre_version_0.1" "objects_590_x_mitre_deprecated_False" "objects_590_revoked_False" "objects_590_description_Device attestation can often detect jailbroken or rooted devices." "objects_590_modified_2022-03-30T14:06:01.859Z" "objects_590_relationship_type_mitigates" "objects_590_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_590_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_590_x_mitre_attack_spec_version_2.1.0" "objects_590_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_590_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_590_spec_version_2.1" "objects_590_x_mitre_domains_0_mobile-attack" "objects_591_type_relationship" "objects_591_id_relationship--3057267c-fdd5-41d8-a9d8-76c0a87b28fa" "objects_591_created_2023-08-07T17:12:44.013Z" "objects_591_revoked_False" "objects_591_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_591_modified_2023-08-07T17:12:44.013Z" "objects_591_description_Mobile security products can often alert the user if their device is vulnerable to known exploits." "objects_591_relationship_type_detects" "objects_591_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_591_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_591_x_mitre_deprecated_False" "objects_591_x_mitre_version_0.1" "objects_591_x_mitre_attack_spec_version_3.1.0" "objects_591_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_591_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_591_spec_version_2.1" "objects_591_x_mitre_domains_0_mobile-attack" "objects_592_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_592_type_relationship" "objects_592_id_relationship--30ab9ce7-5369-402a-94ee-f8452642acb9" "objects_592_created_2022-03-30T19:50:37.739Z" "objects_592_x_mitre_version_0.1" "objects_592_x_mitre_deprecated_False" "objects_592_revoked_False" "objects_592_description_" "objects_592_modified_2022-03-30T19:50:37.739Z" "objects_592_relationship_type_revoked-by" "objects_592_source_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_592_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_592_x_mitre_attack_spec_version_2.1.0" "objects_592_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_592_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_592_spec_version_2.1" "objects_592_x_mitre_domains_0_mobile-attack" "objects_593_type_relationship" "objects_593_id_relationship--3115a062-e7d0-4eac-9d78-9a9c797e7546" "objects_593_created_2023-07-21T19:53:45.997Z" "objects_593_revoked_False" "objects_593_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_593_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_593_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_593_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_593_modified_2023-07-21T19:53:45.997Z" "objects_593_description_[Fakecalls](https://attack.mitre.org/software/S1080) can request camera permissions.(Citation: kaspersky_fakecalls_0422)" "objects_593_relationship_type_uses" "objects_593_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_593_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_593_x_mitre_deprecated_False" "objects_593_x_mitre_version_0.1" "objects_593_x_mitre_attack_spec_version_3.1.0" "objects_593_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_593_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_593_spec_version_2.1" "objects_593_x_mitre_domains_0_mobile-attack" "objects_594_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_594_id_relationship--312950f2-80d2-4941-bfce-b97b2cb7a1ff" "objects_594_type_relationship" "objects_594_created_2018-10-17T00:14:20.652Z" "objects_594_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_594_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_594_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_594_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_594_modified_2019-07-16T15:35:21.063Z" "objects_594_description_(Citation: Lookout Dark Caracal Jan 2018)" "objects_594_relationship_type_uses" "objects_594_source_ref_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_594_target_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_594_x_mitre_version_1.0" "objects_594_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_594_spec_version_2.1" "objects_594_x_mitre_attack_spec_version_2.1.0" "objects_594_x_mitre_domains_0_mobile-attack" "objects_595_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_595_type_relationship" "objects_595_id_relationship--31330d32-50c8-4499-91fb-e1dcffa9ea8f" "objects_595_created_2022-03-30T18:14:04.881Z" "objects_595_x_mitre_version_0.1" "objects_595_external_references_0_source_name_Symantec-iOSProfile2" "objects_595_external_references_0_url_https://www.symantec.com/connect/blogs/apple-ios-103-finally-battles-malicious-profiles" "objects_595_external_references_0_description_Brian Duckering. (2017, March 27). Apple iOS 10.3 Finally Battles Malicious Profiles. Retrieved September 24, 2018." "objects_595_external_references_1_source_name_Android-TrustedCA" "objects_595_external_references_1_url_https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html" "objects_595_external_references_1_description_Chad Brubaker. (2016, July 7). Changes to Trusted Certificate Authorities in Android Nougat. Retrieved September 24, 2018." "objects_595_x_mitre_deprecated_False" "objects_595_revoked_False" "objects_595_description_Mobile OSes have implemented measures to make it more difficult to trick users into installing untrusted certificates and configurations. iOS 10.3 and higher add an additional step for users to install new trusted CA certificates and configuration profiles. On Android, apps that target compatibility with Android 7 and higher (API Level 24) default to only trusting CA certificates that are bundled with the operating system, not CA certificates that are added by the user or administrator, hence decreasing their susceptibility to successful adversary-in-the-middle attack.(Citation: Symantec-iOSProfile2)(Citation: Android-TrustedCA)" "objects_595_modified_2022-03-30T18:14:04.881Z" "objects_595_relationship_type_mitigates" "objects_595_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_595_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_595_x_mitre_attack_spec_version_2.1.0" "objects_595_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_595_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_595_spec_version_2.1" "objects_595_x_mitre_domains_0_mobile-attack" "objects_596_type_relationship" "objects_596_id_relationship--319d46b5-de41-4f23-9001-2fa75f954720" "objects_596_created_2017-12-14T16:46:06.044Z" "objects_596_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_596_revoked_False" "objects_596_external_references_0_source_name_Kaspersky-MobileMalware" "objects_596_external_references_0_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_596_external_references_0_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_596_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_596_modified_2023-04-05T20:01:14.020Z" "objects_596_description_[Trojan-SMS.AndroidOS.Agent.ao](https://attack.mitre.org/software/S0307) uses Google Cloud Messaging (GCM) for command and control.(Citation: Kaspersky-MobileMalware)" "objects_596_relationship_type_uses" "objects_596_source_ref_malware--a1867c56-8c86-455a-96ad-b0d5f7e2bc17" "objects_596_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_596_x_mitre_deprecated_False" "objects_596_x_mitre_version_1.0" "objects_596_x_mitre_attack_spec_version_3.1.0" "objects_596_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_596_spec_version_2.1" "objects_596_x_mitre_domains_0_mobile-attack" "objects_597_type_relationship" "objects_597_id_relationship--322d0123-ea4c-4562-a718-672952c83d05" "objects_597_created_2023-03-20T18:55:54.372Z" "objects_597_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_597_revoked_False" "objects_597_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_597_modified_2023-08-08T15:35:51.271Z" "objects_597_description_Application vetting services could look for misuse of dynamic libraries." "objects_597_relationship_type_detects" "objects_597_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_597_target_ref_attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff" "objects_597_x_mitre_deprecated_False" "objects_597_x_mitre_version_0.1" "objects_597_x_mitre_attack_spec_version_3.1.0" "objects_597_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_597_spec_version_2.1" "objects_597_x_mitre_domains_0_mobile-attack" "objects_598_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_598_type_relationship" "objects_598_id_relationship--3230c032-17e0-49f7-b948-c157049aafe2" "objects_598_created_2017-10-25T14:48:53.742Z" "objects_598_x_mitre_version_1.0" "objects_598_x_mitre_deprecated_False" "objects_598_revoked_False" "objects_598_description_Users should ensure bootloaders are locked to prevent arbitrary operating system code from being flashed onto the device." "objects_598_modified_2022-04-01T15:34:50.556Z" "objects_598_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_598_relationship_type_mitigates" "objects_598_source_ref_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_598_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_598_x_mitre_attack_spec_version_2.1.0" "objects_598_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_598_spec_version_2.1" "objects_598_x_mitre_domains_0_mobile-attack" "objects_599_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_599_type_relationship" "objects_599_id_relationship--3272111a-f31d-47d5-a266-1749255b5016" "objects_599_created_2019-09-23T13:36:08.335Z" "objects_599_x_mitre_version_1.0" "objects_599_external_references_0_source_name_securelist rotexy 2018" "objects_599_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_599_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_599_x_mitre_deprecated_False" "objects_599_revoked_False" "objects_599_description_[Rotexy](https://attack.mitre.org/software/S0411) can be controlled through SMS messages.(Citation: securelist rotexy 2018)" "objects_599_modified_2022-04-19T14:25:41.669Z" "objects_599_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_599_relationship_type_uses" "objects_599_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_599_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_599_x_mitre_attack_spec_version_2.1.0" "objects_599_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_599_spec_version_2.1" "objects_599_x_mitre_domains_0_mobile-attack" "objects_600_type_relationship" "objects_600_id_relationship--327d0102-2113-4e12-be68-504db097a6fd" "objects_600_created_2019-08-07T15:57:13.409Z" "objects_600_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_600_revoked_False" "objects_600_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_600_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_600_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_600_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_600_modified_2023-04-05T20:01:31.230Z" "objects_600_description_[Riltok](https://attack.mitre.org/software/S0403) communicates with the command and control server using HTTP requests.(Citation: Kaspersky Riltok June 2019)" "objects_600_relationship_type_uses" "objects_600_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_600_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_600_x_mitre_deprecated_False" "objects_600_x_mitre_version_1.0" "objects_600_x_mitre_attack_spec_version_3.1.0" "objects_600_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_600_spec_version_2.1" "objects_600_x_mitre_domains_0_mobile-attack" "objects_601_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_601_id_relationship--32958f57-ad9b-4fe1-abf3-6f92df895014" "objects_601_type_relationship" "objects_601_created_2019-08-05T13:22:03.917Z" "objects_601_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_601_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_601_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_601_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_601_modified_2020-03-31T14:49:39.188Z" "objects_601_description_[Pallas](https://attack.mitre.org/software/S0399) stores domain information and URL paths as hardcoded AES-encrypted, base64-encoded strings.(Citation: Lookout Dark Caracal Jan 2018)" "objects_601_relationship_type_uses" "objects_601_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_601_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_601_x_mitre_version_1.0" "objects_601_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_601_spec_version_2.1" "objects_601_x_mitre_attack_spec_version_2.1.0" "objects_601_x_mitre_domains_0_mobile-attack" "objects_602_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_602_id_relationship--32be51e2-f74d-441f-aa0d-952697a76494" "objects_602_type_relationship" "objects_602_created_2019-09-04T15:38:56.774Z" "objects_602_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_602_external_references_0_source_name_FortiGuard-FlexiSpy" "objects_602_external_references_0_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_602_external_references_0_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_602_modified_2020-03-31T14:49:39.188Z" "objects_602_description_[FlexiSpy](https://attack.mitre.org/software/S0408) uses a `FileObserver` object to monitor the Skype and WeChat database file and shared preferences to retrieve chat messages, account information, and profile pictures of the account owner and chat participants. [FlexiSpy](https://attack.mitre.org/software/S0408) can also spy on popular applications, including Facebook, Hangouts, Hike, Instagram, Kik, Line, QQ, Snapchat, Telegram, Tinder, Viber, and WhatsApp.(Citation: FortiGuard-FlexiSpy)" "objects_602_relationship_type_uses" "objects_602_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_602_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_602_x_mitre_version_1.0" "objects_602_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_602_spec_version_2.1" "objects_602_x_mitre_attack_spec_version_2.1.0" "objects_602_x_mitre_domains_0_mobile-attack" "objects_603_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_603_id_relationship--33316f49-f1fb-453a-9ba7-d6889982a010" "objects_603_type_relationship" "objects_603_created_2020-07-20T13:27:33.459Z" "objects_603_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_603_external_references_0_source_name_Talos-WolfRAT" "objects_603_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_603_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_603_modified_2020-08-10T21:57:54.516Z" "objects_603_description_[WolfRAT](https://attack.mitre.org/software/S0489) can obtain a list of installed applications.(Citation: Talos-WolfRAT)" "objects_603_relationship_type_uses" "objects_603_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_603_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_603_x_mitre_version_1.0" "objects_603_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_603_spec_version_2.1" "objects_603_x_mitre_attack_spec_version_2.1.0" "objects_603_x_mitre_domains_0_mobile-attack" "objects_604_type_relationship" "objects_604_id_relationship--3364dd33-c012-4aaf-852b-86e63bd724ac" "objects_604_created_2023-02-06T19:38:22.312Z" "objects_604_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_604_revoked_False" "objects_604_external_references_0_source_name_cleafy_sova_1122" "objects_604_external_references_0_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_604_external_references_0_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_604_external_references_1_source_name_threatfabric_sova_0921" "objects_604_external_references_1_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_604_external_references_1_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_604_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_604_modified_2023-04-11T22:06:53.022Z" "objects_604_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can gather session cookies from infected devices. [S.O.V.A.](https://attack.mitre.org/software/S1062) can also abuse Accessibility Services to steal Google Authenticator tokens.(Citation: threatfabric_sova_0921)(Citation: cleafy_sova_1122)" "objects_604_relationship_type_uses" "objects_604_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_604_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_604_x_mitre_deprecated_False" "objects_604_x_mitre_version_0.1" "objects_604_x_mitre_attack_spec_version_3.1.0" "objects_604_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_604_spec_version_2.1" "objects_604_x_mitre_domains_0_mobile-attack" "objects_605_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_605_id_relationship--33857221-2543-4a7f-8255-b0d140d70ad7" "objects_605_type_relationship" "objects_605_created_2020-07-20T13:27:33.461Z" "objects_605_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_605_external_references_0_source_name_Talos-WolfRAT" "objects_605_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_605_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_605_modified_2020-08-10T21:57:54.686Z" "objects_605_description_[WolfRAT](https://attack.mitre.org/software/S0489) can record call audio.(Citation: Talos-WolfRAT)" "objects_605_relationship_type_uses" "objects_605_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_605_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_605_x_mitre_version_1.0" "objects_605_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_605_spec_version_2.1" "objects_605_x_mitre_attack_spec_version_2.1.0" "objects_605_x_mitre_domains_0_mobile-attack" "objects_606_type_relationship" "objects_606_id_relationship--34351abd-1f58-420a-a893-ad822839815d" "objects_606_created_2017-12-14T16:46:06.044Z" "objects_606_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_606_revoked_False" "objects_606_external_references_0_source_name_Lookout-Pegasus" "objects_606_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_606_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_606_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_606_modified_2023-04-05T17:33:36.294Z" "objects_606_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) captures call logs.(Citation: Lookout-Pegasus)" "objects_606_relationship_type_uses" "objects_606_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_606_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_606_x_mitre_deprecated_False" "objects_606_x_mitre_version_1.0" "objects_606_x_mitre_attack_spec_version_3.1.0" "objects_606_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_606_spec_version_2.1" "objects_606_x_mitre_domains_0_mobile-attack" "objects_607_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_607_id_relationship--346b7e4a-dbd1-486b-ba26-55ae2ac613d0" "objects_607_type_relationship" "objects_607_created_2020-12-14T14:52:03.396Z" "objects_607_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_607_external_references_0_source_name_Sophos Red Alert 2.0" "objects_607_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_607_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_607_modified_2020-12-16T20:52:21.426Z" "objects_607_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can download additional overlay templates.(Citation: Sophos Red Alert 2.0)" "objects_607_relationship_type_uses" "objects_607_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_607_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_607_x_mitre_version_1.0" "objects_607_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_607_spec_version_2.1" "objects_607_x_mitre_attack_spec_version_2.1.0" "objects_607_x_mitre_domains_0_mobile-attack" "objects_608_type_relationship" "objects_608_id_relationship--348d1acd-3f37-4523-95cd-ae002c02c975" "objects_608_created_2023-08-23T22:17:46.116Z" "objects_608_revoked_False" "objects_608_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_608_modified_2023-08-23T22:17:46.116Z" "objects_608_description_Users should be wary of iMessages from unknown senders. Additionally, users should be instructed not to open unrecognized links or other attachments in text messages. " "objects_608_relationship_type_mitigates" "objects_608_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_608_target_ref_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_608_x_mitre_deprecated_False" "objects_608_x_mitre_version_0.1" "objects_608_x_mitre_attack_spec_version_3.1.0" "objects_608_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_608_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_608_spec_version_2.1" "objects_608_x_mitre_domains_0_mobile-attack" "objects_609_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_609_id_relationship--3498d304-48e3-4fe4-a3ab-fc261104f413" "objects_609_type_relationship" "objects_609_created_2018-10-17T00:14:20.652Z" "objects_609_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_609_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_609_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_609_external_references_0_source_name_Lookout-StealthMango" "objects_609_modified_2020-03-31T14:49:39.188Z" "objects_609_description_[Stealth Mango](https://attack.mitre.org/software/S0328) can record audio using the device microphone.(Citation: Lookout-StealthMango)" "objects_609_relationship_type_uses" "objects_609_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_609_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_609_x_mitre_version_1.0" "objects_609_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_609_spec_version_2.1" "objects_609_x_mitre_attack_spec_version_2.1.0" "objects_609_x_mitre_domains_0_mobile-attack" "objects_610_type_relationship" "objects_610_id_relationship--34a8a945-cc6c-474b-8db1-ffe8b5ecf99f" "objects_610_created_2019-11-21T19:16:34.776Z" "objects_610_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_610_revoked_False" "objects_610_external_references_0_source_name_CheckPoint SimBad 2019" "objects_610_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_610_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_610_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_610_modified_2023-04-05T17:44:53.855Z" "objects_610_description_[SimBad](https://attack.mitre.org/software/S0419) registers for the `BOOT_COMPLETED` and `USER_PRESENT` broadcast intents, which allows the software to perform actions after the device is booted and when the user is using the device, respectively.(Citation: CheckPoint SimBad 2019)" "objects_610_relationship_type_uses" "objects_610_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_610_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_610_x_mitre_deprecated_False" "objects_610_x_mitre_version_1.0" "objects_610_x_mitre_attack_spec_version_3.1.0" "objects_610_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_610_spec_version_2.1" "objects_610_x_mitre_domains_0_mobile-attack" "objects_611_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_611_type_relationship" "objects_611_id_relationship--34b6abb0-d199-46bb-af21-b65560e75658" "objects_611_created_2022-04-01T19:06:40.361Z" "objects_611_x_mitre_version_0.1" "objects_611_x_mitre_deprecated_False" "objects_611_revoked_False" "objects_611_description_" "objects_611_modified_2022-04-01T19:06:40.361Z" "objects_611_relationship_type_subtechnique-of" "objects_611_source_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_611_target_ref_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_611_x_mitre_attack_spec_version_2.1.0" "objects_611_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_611_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_611_spec_version_2.1" "objects_611_x_mitre_domains_0_mobile-attack" "objects_612_type_relationship" "objects_612_id_relationship--34dd5c26-eec9-4288-8e53-677271d490b2" "objects_612_created_2023-01-18T19:46:02.646Z" "objects_612_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_612_revoked_False" "objects_612_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_612_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_612_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_612_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_612_modified_2023-03-27T18:43:57.834Z" "objects_612_description_[SharkBot](https://attack.mitre.org/software/S1055) can use accessibility event logging to steal data in text fields.(Citation: nccgroup_sharkbot_0322)" "objects_612_relationship_type_uses" "objects_612_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_612_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_612_x_mitre_deprecated_False" "objects_612_x_mitre_version_0.1" "objects_612_x_mitre_attack_spec_version_3.1.0" "objects_612_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_612_spec_version_2.1" "objects_612_x_mitre_domains_0_mobile-attack" "objects_613_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_613_type_relationship" "objects_613_id_relationship--34f9aed0-48a7-4815-8456-5541a7b8210f" "objects_613_created_2019-09-04T14:28:16.487Z" "objects_613_x_mitre_version_1.0" "objects_613_external_references_0_source_name_Lookout-Monokle" "objects_613_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_613_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_613_x_mitre_deprecated_False" "objects_613_revoked_False" "objects_613_description_[Monokle](https://attack.mitre.org/software/S0407) can record the user's keystrokes.(Citation: Lookout-Monokle)" "objects_613_modified_2022-04-15T17:34:52.414Z" "objects_613_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_613_relationship_type_uses" "objects_613_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_613_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_613_x_mitre_attack_spec_version_2.1.0" "objects_613_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_613_spec_version_2.1" "objects_613_x_mitre_domains_0_mobile-attack" "objects_614_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_614_type_relationship" "objects_614_id_relationship--352fabc8-48fe-4190-92b3-49b00348bb22" "objects_614_created_2019-03-11T15:13:40.454Z" "objects_614_x_mitre_version_1.0" "objects_614_external_references_0_source_name_TrendMicro-Anserver" "objects_614_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-uses-blog-posts-as-cc/" "objects_614_external_references_0_description_Karl Dominguez. (2011, October 2). Android Malware Uses Blog Posts as C&C. Retrieved February 6, 2017." "objects_614_x_mitre_deprecated_False" "objects_614_revoked_False" "objects_614_description_[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) uses encrypted content within a blog site for part of its command and control. Specifically, the encrypted content contains URLs for other servers to be used for other aspects of command and control.(Citation: TrendMicro-Anserver)" "objects_614_modified_2022-04-18T19:04:48.388Z" "objects_614_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_614_relationship_type_uses" "objects_614_source_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_614_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_614_x_mitre_attack_spec_version_2.1.0" "objects_614_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_614_spec_version_2.1" "objects_614_x_mitre_domains_0_mobile-attack" "objects_615_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_615_id_relationship--35453bbb-c9b3-4421-8452-95efdd290d21" "objects_615_type_relationship" "objects_615_created_2021-01-20T16:01:19.323Z" "objects_615_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_615_external_references_0_source_name_Zimperium z9" "objects_615_external_references_0_url_https://blog.zimperium.com/how-zimperiums-z9-detected-unknown-mobile-malware-overlooked-by-the-av-industry/" "objects_615_external_references_0_description_zLabs. (2019, November 12). How Zimperium\u2019s z9 Detected Unknown Mobile Malware Overlooked by the AV Industry . Retrieved January 20, 2021." "objects_615_modified_2021-01-20T16:01:19.323Z" "objects_615_description_[Anubis](https://attack.mitre.org/software/S0422) can collect a list of running processes.(Citation: Zimperium z9)" "objects_615_relationship_type_uses" "objects_615_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_615_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_615_x_mitre_version_1.0" "objects_615_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_615_spec_version_2.1" "objects_615_x_mitre_attack_spec_version_2.1.0" "objects_615_x_mitre_domains_0_mobile-attack" "objects_616_type_relationship" "objects_616_id_relationship--3565140f-1570-494d-9d6f-91c9203ece69" "objects_616_created_2023-03-20T18:52:29.821Z" "objects_616_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_616_revoked_False" "objects_616_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_616_modified_2023-08-07T17:14:40.565Z" "objects_616_description_Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries." "objects_616_relationship_type_detects" "objects_616_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_616_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_616_x_mitre_deprecated_False" "objects_616_x_mitre_version_0.1" "objects_616_x_mitre_attack_spec_version_3.1.0" "objects_616_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_616_spec_version_2.1" "objects_616_x_mitre_domains_0_mobile-attack" "objects_617_type_relationship" "objects_617_id_relationship--35927c96-7645-4ef3-b3da-e44822386a10" "objects_617_created_2023-01-18T21:43:10.838Z" "objects_617_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_617_revoked_False" "objects_617_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_617_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_617_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_617_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_617_modified_2023-03-27T18:47:19.403Z" "objects_617_description_[SharkBot](https://attack.mitre.org/software/S1055) contains domain generation algorithms to use as backups in case the hardcoded C2 domains are unavailable.(Citation: nccgroup_sharkbot_0322)" "objects_617_relationship_type_uses" "objects_617_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_617_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_617_x_mitre_deprecated_False" "objects_617_x_mitre_version_0.1" "objects_617_x_mitre_attack_spec_version_3.1.0" "objects_617_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_617_spec_version_2.1" "objects_617_x_mitre_domains_0_mobile-attack" "objects_618_type_relationship" "objects_618_id_relationship--3598ab6e-9271-40ca-9771-b9a6bbce497c" "objects_618_created_2023-08-16T16:44:09.459Z" "objects_618_revoked_False" "objects_618_external_references_0_source_name_cyble_chameleon_0423" "objects_618_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_618_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_618_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_618_modified_2023-08-16T16:44:09.459Z" "objects_618_description_[Chameleon](https://attack.mitre.org/software/S1083) can use HTTP to communicate with the C2 server.(Citation: cyble_chameleon_0423)" "objects_618_relationship_type_uses" "objects_618_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_618_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_618_x_mitre_deprecated_False" "objects_618_x_mitre_version_0.1" "objects_618_x_mitre_attack_spec_version_3.1.0" "objects_618_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_618_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_618_spec_version_2.1" "objects_618_x_mitre_domains_0_mobile-attack" "objects_619_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_619_type_relationship" "objects_619_id_relationship--35a12ae8-562d-4e24-979e-ef970dde0b94" "objects_619_created_2022-04-15T17:52:24.125Z" "objects_619_x_mitre_version_0.1" "objects_619_x_mitre_deprecated_False" "objects_619_revoked_False" "objects_619_description_" "objects_619_modified_2022-04-15T17:52:24.125Z" "objects_619_relationship_type_revoked-by" "objects_619_source_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_619_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_619_x_mitre_attack_spec_version_2.1.0" "objects_619_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_619_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_619_spec_version_2.1" "objects_619_x_mitre_domains_0_mobile-attack" "objects_620_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_620_type_relationship" "objects_620_id_relationship--35c67a18-7e8d-4bd5-9fe1-35b1ac3f401f" "objects_620_created_2018-10-17T00:14:20.652Z" "objects_620_x_mitre_version_1.0" "objects_620_external_references_0_source_name_Wandera-RedDrop" "objects_620_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_620_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_620_x_mitre_deprecated_False" "objects_620_revoked_False" "objects_620_description_[RedDrop](https://attack.mitre.org/software/S0326) tricks the user into sending SMS messages to premium services and then deletes those messages.(Citation: Wandera-RedDrop)" "objects_620_modified_2022-04-19T14:25:41.669Z" "objects_620_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_620_relationship_type_uses" "objects_620_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_620_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_620_x_mitre_attack_spec_version_2.1.0" "objects_620_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_620_spec_version_2.1" "objects_620_x_mitre_domains_0_mobile-attack" "objects_621_type_relationship" "objects_621_id_relationship--3616bacc-6f6e-41f2-832c-cdbbae9622f3" "objects_621_created_2020-11-24T17:55:12.830Z" "objects_621_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_621_revoked_False" "objects_621_external_references_0_source_name_Talos GPlayed" "objects_621_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_621_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_621_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_621_modified_2023-04-05T17:21:42.102Z" "objects_621_description_[GPlayed](https://attack.mitre.org/software/S0536) can read SMS messages.(Citation: Talos GPlayed)" "objects_621_relationship_type_uses" "objects_621_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_621_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_621_x_mitre_deprecated_False" "objects_621_x_mitre_version_1.0" "objects_621_x_mitre_attack_spec_version_3.1.0" "objects_621_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_621_spec_version_2.1" "objects_621_x_mitre_domains_0_mobile-attack" "objects_622_type_relationship" "objects_622_id_relationship--36268322-9f5e-4749-8760-6430178a3d68" "objects_622_created_2020-06-26T14:55:13.311Z" "objects_622_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_622_revoked_False" "objects_622_external_references_0_source_name_Cybereason EventBot" "objects_622_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_622_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_622_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_622_modified_2023-04-05T20:25:08.956Z" "objects_622_description_[EventBot](https://attack.mitre.org/software/S0478) can intercept SMS messages.(Citation: Cybereason EventBot)" "objects_622_relationship_type_uses" "objects_622_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_622_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_622_x_mitre_deprecated_False" "objects_622_x_mitre_version_1.0" "objects_622_x_mitre_attack_spec_version_3.1.0" "objects_622_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_622_spec_version_2.1" "objects_622_x_mitre_domains_0_mobile-attack" "objects_623_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_623_id_relationship--36298fd6-d909-4490-8a04-095aef9ffafe" "objects_623_type_relationship" "objects_623_created_2020-11-20T15:54:07.747Z" "objects_623_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_623_external_references_0_source_name_Symantec GoldenCup" "objects_623_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_623_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_623_modified_2020-11-20T15:54:07.747Z" "objects_623_description_[Golden Cup](https://attack.mitre.org/software/S0535) can record audio from the microphone and phone calls.(Citation: Symantec GoldenCup) " "objects_623_relationship_type_uses" "objects_623_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_623_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_623_x_mitre_version_1.0" "objects_623_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_623_spec_version_2.1" "objects_623_x_mitre_attack_spec_version_2.1.0" "objects_623_x_mitre_domains_0_mobile-attack" "objects_624_type_relationship" "objects_624_id_relationship--3644d1dd-8d9f-4a89-a618-c6b22c2a1a96" "objects_624_created_2018-10-17T00:14:20.652Z" "objects_624_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_624_revoked_False" "objects_624_external_references_0_source_name_Wandera-RedDrop" "objects_624_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_624_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_624_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_624_modified_2023-04-05T20:01:48.463Z" "objects_624_description_[RedDrop](https://attack.mitre.org/software/S0326) uses HTTP requests for C2 communication.(Citation: Wandera-RedDrop)" "objects_624_relationship_type_uses" "objects_624_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_624_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_624_x_mitre_deprecated_False" "objects_624_x_mitre_version_1.0" "objects_624_x_mitre_attack_spec_version_3.1.0" "objects_624_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_624_spec_version_2.1" "objects_624_x_mitre_domains_0_mobile-attack" "objects_625_type_relationship" "objects_625_id_relationship--36c71b5d-e453-488c-ae63-8fb063924c27" "objects_625_created_2023-08-10T21:57:51.879Z" "objects_625_revoked_False" "objects_625_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_625_modified_2023-08-10T21:57:51.879Z" "objects_625_description_The user can review available call logs for irregularities, such as missing or unrecognized calls." "objects_625_relationship_type_detects" "objects_625_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_625_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_625_x_mitre_deprecated_False" "objects_625_x_mitre_version_0.1" "objects_625_x_mitre_attack_spec_version_3.1.0" "objects_625_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_625_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_625_spec_version_2.1" "objects_625_x_mitre_domains_0_mobile-attack" "objects_626_type_relationship" "objects_626_id_relationship--370bf74f-7499-4d66-9626-a61926af8f84" "objects_626_created_2023-09-21T22:32:19.683Z" "objects_626_revoked_False" "objects_626_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_626_modified_2023-09-21T22:32:19.683Z" "objects_626_description_Application vetting services may detect when an application requests permissions after an application update." "objects_626_relationship_type_detects" "objects_626_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_626_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_626_x_mitre_deprecated_False" "objects_626_x_mitre_version_0.1" "objects_626_x_mitre_attack_spec_version_3.1.0" "objects_626_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_626_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_626_spec_version_2.1" "objects_626_x_mitre_domains_0_mobile-attack" "objects_627_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_627_id_relationship--37123a8d-5c03-459c-bd0b-c17e2ee75a10" "objects_627_type_relationship" "objects_627_created_2020-06-26T15:32:25.074Z" "objects_627_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_627_external_references_0_source_name_Threat Fabric Cerberus" "objects_627_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_627_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_627_modified_2020-06-26T15:32:25.074Z" "objects_627_description_[Cerberus](https://attack.mitre.org/software/S0480) can update the malicious payload module on command.(Citation: Threat Fabric Cerberus)" "objects_627_relationship_type_uses" "objects_627_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_627_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_627_x_mitre_version_1.0" "objects_627_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_627_spec_version_2.1" "objects_627_x_mitre_attack_spec_version_2.1.0" "objects_627_x_mitre_domains_0_mobile-attack" "objects_628_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_628_id_relationship--373223d8-f18c-4151-8fe0-7d40c0c6e631" "objects_628_type_relationship" "objects_628_created_2020-11-24T17:55:12.885Z" "objects_628_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_628_external_references_0_source_name_Talos GPlayed" "objects_628_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_628_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_628_modified_2020-11-24T17:55:12.885Z" "objects_628_description_[GPlayed](https://attack.mitre.org/software/S0536) has used timers to enable Wi-Fi, ping the C2 server, register the device with the C2, and register wake locks on the system.(Citation: Talos GPlayed)" "objects_628_relationship_type_uses" "objects_628_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_628_target_ref_attack-pattern--00290ac5-551e-44aa-bbd8-c4b913488a6d" "objects_628_x_mitre_version_1.0" "objects_628_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_628_spec_version_2.1" "objects_628_x_mitre_attack_spec_version_2.1.0" "objects_628_x_mitre_domains_0_mobile-attack" "objects_629_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_629_id_relationship--373f33be-9b40-44f5-bfd3-db2a9f5fa72c" "objects_629_type_relationship" "objects_629_created_2017-12-14T16:46:06.044Z" "objects_629_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_629_external_references_0_source_name_HackerNews-OldBoot" "objects_629_external_references_0_description_Sudhir K Bansal. (2014, January 28). First widely distributed Android bootkit Malware infects more than 350,000 Devices. Retrieved December 21, 2016." "objects_629_external_references_0_url_http://thehackernews.com/2014/01/first-widely-distributed-android.html" "objects_629_modified_2020-03-31T14:49:39.188Z" "objects_629_description_[OldBoot](https://attack.mitre.org/software/S0285) uses escalated privileges to modify the init script on the device's boot partition to maintain persistence.(Citation: HackerNews-OldBoot)" "objects_629_relationship_type_uses" "objects_629_source_ref_malware--2074b2ad-612e-4758-adce-7901c1b49bbc" "objects_629_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_629_x_mitre_version_1.0" "objects_629_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_629_spec_version_2.1" "objects_629_x_mitre_attack_spec_version_2.1.0" "objects_629_x_mitre_domains_0_mobile-attack" "objects_630_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_630_id_relationship--3752c235-0576-47dc-b05d-d3eaeaccfecc" "objects_630_type_relationship" "objects_630_created_2020-12-24T21:55:56.688Z" "objects_630_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_630_external_references_0_source_name_Lookout Uyghur Campaign" "objects_630_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_630_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_630_modified_2020-12-24T21:55:56.688Z" "objects_630_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has captured audio and can record phone calls.(Citation: Lookout Uyghur Campaign)" "objects_630_relationship_type_uses" "objects_630_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_630_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_630_x_mitre_version_1.0" "objects_630_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_630_spec_version_2.1" "objects_630_x_mitre_attack_spec_version_2.1.0" "objects_630_x_mitre_domains_0_mobile-attack" "objects_631_type_relationship" "objects_631_id_relationship--37d14338-b629-4b54-b734-446789b79f6f" "objects_631_created_2023-10-10T15:33:57.641Z" "objects_631_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_631_revoked_False" "objects_631_external_references_0_source_name_Cybereason EventBot" "objects_631_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_631_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_631_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_631_modified_2023-10-10T15:33:57.641Z" "objects_631_description_[EventBot](https://attack.mitre.org/software/S0478) has used icons from popular applications.(Citation: Cybereason EventBot)" "objects_631_relationship_type_uses" "objects_631_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_631_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_631_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_631_x_mitre_deprecated_False" "objects_631_x_mitre_version_1.0" "objects_631_x_mitre_attack_spec_version_2.1.0" "objects_631_spec_version_2.1" "objects_631_x_mitre_domains_0_mobile-attack" "objects_632_type_relationship" "objects_632_id_relationship--37fd2f2a-e4f4-4d39-8698-d17305fb2517" "objects_632_created_2023-08-16T16:45:37.235Z" "objects_632_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_632_revoked_False" "objects_632_external_references_0_source_name_cyble_chameleon_0423" "objects_632_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_632_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_632_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_632_modified_2023-09-15T19:17:24.158Z" "objects_632_description_[Chameleon](https://attack.mitre.org/software/S1083) can communicate over port 7242 using HTTP.(Citation: cyble_chameleon_0423)" "objects_632_relationship_type_uses" "objects_632_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_632_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_632_x_mitre_deprecated_False" "objects_632_x_mitre_version_0.1" "objects_632_x_mitre_attack_spec_version_3.1.0" "objects_632_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_632_spec_version_2.1" "objects_632_x_mitre_domains_0_mobile-attack" "objects_633_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_633_id_relationship--383e5b12-061e-45c6-911b-b37187dd9254" "objects_633_type_relationship" "objects_633_created_2021-02-08T16:36:20.701Z" "objects_633_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_633_external_references_0_source_name_BlackBerry Bahamut" "objects_633_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_633_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_633_modified_2021-05-24T13:16:56.399Z" "objects_633_description_[Windshift](https://attack.mitre.org/groups/G0112) has included file enumeration in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_633_relationship_type_uses" "objects_633_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_633_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_633_x_mitre_version_1.0" "objects_633_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_633_spec_version_2.1" "objects_633_x_mitre_attack_spec_version_2.1.0" "objects_633_x_mitre_domains_0_mobile-attack" "objects_634_type_relationship" "objects_634_id_relationship--3841024e-1047-40fa-9e25-ac6d5c14612a" "objects_634_created_2023-02-28T21:41:22.768Z" "objects_634_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_634_revoked_False" "objects_634_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_634_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_634_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_634_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_634_modified_2023-03-29T21:25:52.302Z" "objects_634_description_[TangleBot](https://attack.mitre.org/software/S1069) can request permission to view device contacts.(Citation: cloudmark_tanglebot_0921)" "objects_634_relationship_type_uses" "objects_634_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_634_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_634_x_mitre_deprecated_False" "objects_634_x_mitre_version_0.1" "objects_634_x_mitre_attack_spec_version_3.1.0" "objects_634_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_634_spec_version_2.1" "objects_634_x_mitre_domains_0_mobile-attack" "objects_635_type_relationship" "objects_635_id_relationship--3857f790-6ea1-4f37-8d90-90904f175d63" "objects_635_created_2023-01-18T21:37:55.717Z" "objects_635_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_635_revoked_False" "objects_635_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_635_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_635_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_635_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_635_modified_2023-03-27T18:48:17.771Z" "objects_635_description_[SharkBot](https://attack.mitre.org/software/S1055) has C2 commands that can uninstall the app from the infected device.(Citation: nccgroup_sharkbot_0322)" "objects_635_relationship_type_uses" "objects_635_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_635_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_635_x_mitre_deprecated_False" "objects_635_x_mitre_version_0.1" "objects_635_x_mitre_attack_spec_version_3.1.0" "objects_635_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_635_spec_version_2.1" "objects_635_x_mitre_domains_0_mobile-attack" "objects_636_type_relationship" "objects_636_id_relationship--38634e49-f19e-41bc-bb6d-e711f0cabd91" "objects_636_created_2020-10-29T19:21:23.187Z" "objects_636_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_636_revoked_False" "objects_636_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_636_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_636_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_636_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_636_modified_2023-04-05T20:42:27.975Z" "objects_636_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) can hide its icon and create a shortcut based on the C2 server response.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_636_relationship_type_uses" "objects_636_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_636_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_636_x_mitre_deprecated_False" "objects_636_x_mitre_version_1.0" "objects_636_x_mitre_attack_spec_version_3.1.0" "objects_636_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_636_spec_version_2.1" "objects_636_x_mitre_domains_0_mobile-attack" "objects_637_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_637_id_relationship--386b0a9f-9951-4717-8bce-30c8fbe05050" "objects_637_type_relationship" "objects_637_created_2020-06-26T15:32:24.955Z" "objects_637_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_637_external_references_0_source_name_Threat Fabric Cerberus" "objects_637_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_637_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_637_modified_2020-06-26T15:32:24.955Z" "objects_637_description_[Cerberus](https://attack.mitre.org/software/S0480) uses standard payload and string obfuscation techniques.(Citation: Threat Fabric Cerberus)" "objects_637_relationship_type_uses" "objects_637_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_637_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_637_x_mitre_version_1.0" "objects_637_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_637_spec_version_2.1" "objects_637_x_mitre_attack_spec_version_2.1.0" "objects_637_x_mitre_domains_0_mobile-attack" "objects_638_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_638_type_relationship" "objects_638_id_relationship--38962b26-7cbe-4761-8b4f-50a022167c4d" "objects_638_created_2019-09-03T20:08:00.708Z" "objects_638_x_mitre_version_1.0" "objects_638_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_638_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_638_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_638_x_mitre_deprecated_False" "objects_638_revoked_False" "objects_638_description_[Gustuff](https://attack.mitre.org/software/S0406) checks for antivirus software contained in a predefined list.(Citation: Talos Gustuff Apr 2019)" "objects_638_modified_2022-04-15T16:55:56.825Z" "objects_638_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_638_relationship_type_uses" "objects_638_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_638_target_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_638_x_mitre_attack_spec_version_2.1.0" "objects_638_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_638_spec_version_2.1" "objects_638_x_mitre_domains_0_mobile-attack" "objects_639_type_relationship" "objects_639_id_relationship--38cb6365-40ba-47c6-a5e4-1a9be665f951" "objects_639_created_2023-01-19T18:08:14.716Z" "objects_639_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_639_revoked_False" "objects_639_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_639_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_639_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_639_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_639_modified_2023-03-01T16:50:04.964Z" "objects_639_description_[TianySpy](https://attack.mitre.org/software/S1056) has encrypted C2 details, email addresses, and passwords.(Citation: trendmicro_tianyspy_0122) " "objects_639_relationship_type_uses" "objects_639_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_639_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_639_x_mitre_deprecated_False" "objects_639_x_mitre_version_0.1" "objects_639_x_mitre_attack_spec_version_3.1.0" "objects_639_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_639_spec_version_2.1" "objects_639_x_mitre_domains_0_mobile-attack" "objects_640_type_relationship" "objects_640_id_relationship--38ec048f-7f6e-4bbd-9455-1b1e54968af4" "objects_640_created_2023-03-30T15:18:37.934Z" "objects_640_revoked_False" "objects_640_external_references_0_source_name_cleafy_sova_1122" "objects_640_external_references_0_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_640_external_references_0_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_640_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_640_modified_2023-03-30T15:18:37.934Z" "objects_640_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can take screenshots and abuse the Android Screen Cast feature to capture screen data.(Citation: cleafy_sova_1122)" "objects_640_relationship_type_uses" "objects_640_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_640_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_640_x_mitre_deprecated_False" "objects_640_x_mitre_version_0.1" "objects_640_x_mitre_attack_spec_version_3.1.0" "objects_640_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_640_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_640_spec_version_2.1" "objects_640_x_mitre_domains_0_mobile-attack" "objects_641_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_641_id_relationship--38f37e3f-1d4b-4f04-b176-1cae6d22931e" "objects_641_type_relationship" "objects_641_created_2020-12-14T14:52:03.310Z" "objects_641_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_641_external_references_0_source_name_Sophos Red Alert 2.0" "objects_641_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_641_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_641_modified_2020-12-14T14:52:03.310Z" "objects_641_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can send SMS messages.(Citation: Sophos Red Alert 2.0)" "objects_641_relationship_type_uses" "objects_641_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_641_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_641_x_mitre_version_1.0" "objects_641_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_641_spec_version_2.1" "objects_641_x_mitre_attack_spec_version_2.1.0" "objects_641_x_mitre_domains_0_mobile-attack" "objects_642_type_relationship" "objects_642_id_relationship--38f96449-dfb1-49db-b0d0-f257c3ee2c5d" "objects_642_created_2020-09-11T14:54:16.587Z" "objects_642_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_642_revoked_False" "objects_642_external_references_0_source_name_Lookout Desert Scorpion" "objects_642_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_642_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_642_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_642_modified_2023-04-05T20:25:21.998Z" "objects_642_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can retrieve SMS messages.(Citation: Lookout Desert Scorpion)" "objects_642_relationship_type_uses" "objects_642_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_642_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_642_x_mitre_deprecated_False" "objects_642_x_mitre_version_1.0" "objects_642_x_mitre_attack_spec_version_3.1.0" "objects_642_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_642_spec_version_2.1" "objects_642_x_mitre_domains_0_mobile-attack" "objects_643_type_relationship" "objects_643_id_relationship--393300c4-6852-466d-a163-1d51330fe055" "objects_643_created_2023-03-20T18:45:39.292Z" "objects_643_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_643_revoked_False" "objects_643_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_643_modified_2023-08-09T15:40:52.983Z" "objects_643_description_Mobile security products can potentially detect jailbroken devices." "objects_643_relationship_type_detects" "objects_643_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_643_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_643_x_mitre_deprecated_False" "objects_643_x_mitre_version_0.1" "objects_643_x_mitre_attack_spec_version_3.1.0" "objects_643_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_643_spec_version_2.1" "objects_643_x_mitre_domains_0_mobile-attack" "objects_644_type_relationship" "objects_644_id_relationship--395cb6b2-0848-43c7-ac4a-617e103fb66a" "objects_644_created_2020-11-20T16:37:28.591Z" "objects_644_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_644_revoked_False" "objects_644_external_references_0_source_name_Symantec GoldenCup" "objects_644_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_644_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_644_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_644_modified_2023-04-05T20:02:09.253Z" "objects_644_description_[Golden Cup](https://attack.mitre.org/software/S0535) has communicated with the C2 using MQTT and HTTP.(Citation: Symantec GoldenCup)" "objects_644_relationship_type_uses" "objects_644_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_644_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_644_x_mitre_deprecated_False" "objects_644_x_mitre_version_1.0" "objects_644_x_mitre_attack_spec_version_3.1.0" "objects_644_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_644_spec_version_2.1" "objects_644_x_mitre_domains_0_mobile-attack" "objects_645_type_relationship" "objects_645_id_relationship--3997b2a1-2b70-4eeb-aa8f-1053bb3744c2" "objects_645_created_2023-03-20T19:00:26.780Z" "objects_645_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_645_revoked_False" "objects_645_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_645_modified_2023-08-08T17:04:24.775Z" "objects_645_description_Application vetting services could potentially detect the usage of APIs intended for artifact hiding." "objects_645_relationship_type_detects" "objects_645_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_645_target_ref_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_645_x_mitre_deprecated_False" "objects_645_x_mitre_version_0.1" "objects_645_x_mitre_attack_spec_version_3.1.0" "objects_645_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_645_spec_version_2.1" "objects_645_x_mitre_domains_0_mobile-attack" "objects_646_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_646_type_relationship" "objects_646_id_relationship--39b854c1-5906-4d14-a0bc-1242c3eaa5b0" "objects_646_created_2022-04-11T20:05:56.540Z" "objects_646_x_mitre_version_0.1" "objects_646_x_mitre_deprecated_False" "objects_646_revoked_False" "objects_646_description_" "objects_646_modified_2022-04-11T20:05:56.540Z" "objects_646_relationship_type_subtechnique-of" "objects_646_source_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_646_target_ref_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_646_x_mitre_attack_spec_version_2.1.0" "objects_646_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_646_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_646_spec_version_2.1" "objects_646_x_mitre_domains_0_mobile-attack" "objects_647_type_relationship" "objects_647_id_relationship--3a18f41d-876c-403a-80cc-47ef57ae630d" "objects_647_created_2023-09-25T19:53:56.034Z" "objects_647_revoked_False" "objects_647_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_647_modified_2023-09-25T19:53:56.034Z" "objects_647_description_Remote access software typically requires many privileged permissions, such as accessibility services or device administrator. " "objects_647_relationship_type_detects" "objects_647_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_647_target_ref_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_647_x_mitre_deprecated_False" "objects_647_x_mitre_version_0.1" "objects_647_x_mitre_attack_spec_version_3.1.0" "objects_647_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_647_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_647_spec_version_2.1" "objects_647_x_mitre_domains_0_mobile-attack" "objects_648_type_relationship" "objects_648_id_relationship--3a282967-0536-474d-8831-30cd60b818a9" "objects_648_created_2023-09-28T17:20:38.294Z" "objects_648_revoked_False" "objects_648_external_references_0_source_name_Bleeipng Computer Escobar" "objects_648_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_648_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_648_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_648_modified_2023-09-28T17:20:38.294Z" "objects_648_description_[Escobar](https://attack.mitre.org/software/S1092) can initiate phone calls.(Citation: Bleeipng Computer Escobar)" "objects_648_relationship_type_uses" "objects_648_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_648_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_648_x_mitre_deprecated_False" "objects_648_x_mitre_version_0.1" "objects_648_x_mitre_attack_spec_version_3.2.0" "objects_648_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_648_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_648_spec_version_2.1" "objects_648_x_mitre_domains_0_mobile-attack" "objects_649_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_649_type_relationship" "objects_649_id_relationship--3a8fea40-69ba-4cfe-b577-c3112a60887a" "objects_649_created_2022-04-01T14:51:51.593Z" "objects_649_x_mitre_version_0.1" "objects_649_x_mitre_deprecated_False" "objects_649_revoked_False" "objects_649_description_Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to notifications. " "objects_649_modified_2022-04-01T14:51:51.593Z" "objects_649_relationship_type_mitigates" "objects_649_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_649_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_649_x_mitre_attack_spec_version_2.1.0" "objects_649_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_649_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_649_spec_version_2.1" "objects_649_x_mitre_domains_0_mobile-attack" "objects_650_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_650_id_relationship--3abc80ad-4ea0-4e91-a170-f040469c2083" "objects_650_type_relationship" "objects_650_created_2020-07-20T13:27:33.483Z" "objects_650_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_650_external_references_0_source_name_Talos-WolfRAT" "objects_650_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_650_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_650_modified_2020-08-10T21:57:54.688Z" "objects_650_description_[WolfRAT](https://attack.mitre.org/software/S0489) can take photos and videos.(Citation: Talos-WolfRAT)" "objects_650_relationship_type_uses" "objects_650_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_650_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_650_x_mitre_version_1.0" "objects_650_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_650_spec_version_2.1" "objects_650_x_mitre_attack_spec_version_2.1.0" "objects_650_x_mitre_domains_0_mobile-attack" "objects_651_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_651_type_relationship" "objects_651_id_relationship--3abcd7f4-5f6d-4b5d-9b37-eee68751dcbd" "objects_651_created_2022-04-01T15:02:43.475Z" "objects_651_x_mitre_version_0.1" "objects_651_x_mitre_deprecated_False" "objects_651_revoked_False" "objects_651_description_" "objects_651_modified_2022-04-01T15:02:43.475Z" "objects_651_relationship_type_revoked-by" "objects_651_source_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_651_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_651_x_mitre_attack_spec_version_2.1.0" "objects_651_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_651_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_651_spec_version_2.1" "objects_651_x_mitre_domains_0_mobile-attack" "objects_652_type_relationship" "objects_652_id_relationship--3acbaa64-fb6e-4c26-ada4-1aab88798265" "objects_652_created_2021-04-19T14:29:46.510Z" "objects_652_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_652_revoked_False" "objects_652_external_references_0_source_name_Lookout Uyghur Campaign" "objects_652_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_652_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_652_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_652_modified_2023-04-05T17:15:42.930Z" "objects_652_description_[SilkBean](https://attack.mitre.org/software/S0549) has used HTTPS for C2 communication.(Citation: Lookout Uyghur Campaign) " "objects_652_relationship_type_uses" "objects_652_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_652_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_652_x_mitre_deprecated_False" "objects_652_x_mitre_version_1.0" "objects_652_x_mitre_attack_spec_version_3.1.0" "objects_652_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_652_spec_version_2.1" "objects_652_x_mitre_domains_0_mobile-attack" "objects_653_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_653_type_relationship" "objects_653_id_relationship--3ae62d66-6405-413f-86e3-ccdb66fac7ba" "objects_653_created_2018-10-17T00:14:20.652Z" "objects_653_x_mitre_version_1.0" "objects_653_x_mitre_deprecated_False" "objects_653_revoked_False" "objects_653_description_" "objects_653_modified_2022-07-07T14:00:00.188Z" "objects_653_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_653_relationship_type_revoked-by" "objects_653_source_ref_attack-pattern--e30cc912-7ea1-4683-9219-543b86cbdec9" "objects_653_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_653_x_mitre_attack_spec_version_2.1.0" "objects_653_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_653_spec_version_2.1" "objects_653_x_mitre_domains_0_mobile-attack" "objects_654_type_relationship" "objects_654_id_relationship--3b0cb886-dabc-4622-b91f-3851e2a71bf2" "objects_654_created_2018-10-17T00:14:20.652Z" "objects_654_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_654_revoked_False" "objects_654_external_references_0_source_name_Kaspersky-WUC" "objects_654_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_654_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_654_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_654_modified_2023-04-05T20:02:40.717Z" "objects_654_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) used HTTP uploads to a URL as a command and control mechanism.(Citation: Kaspersky-WUC)" "objects_654_relationship_type_uses" "objects_654_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_654_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_654_x_mitre_deprecated_False" "objects_654_x_mitre_version_1.0" "objects_654_x_mitre_attack_spec_version_3.1.0" "objects_654_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_654_spec_version_2.1" "objects_654_x_mitre_domains_0_mobile-attack" "objects_655_type_relationship" "objects_655_id_relationship--3b24a287-36e1-49b9-811d-c0080147ff57" "objects_655_created_2023-03-20T18:41:47.754Z" "objects_655_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_655_revoked_False" "objects_655_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_655_modified_2023-08-07T22:45:47.105Z" "objects_655_description_Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells." "objects_655_relationship_type_detects" "objects_655_source_ref_x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0" "objects_655_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_655_x_mitre_deprecated_False" "objects_655_x_mitre_version_0.1" "objects_655_x_mitre_attack_spec_version_3.1.0" "objects_655_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_655_spec_version_2.1" "objects_655_x_mitre_domains_0_mobile-attack" "objects_656_type_relationship" "objects_656_id_relationship--3be6ad82-722d-4699-8e3a-c1ea60018244" "objects_656_created_2023-03-16T13:32:55.140Z" "objects_656_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_656_revoked_False" "objects_656_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_656_modified_2023-08-14T16:29:15.000Z" "objects_656_description_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_656_relationship_type_detects" "objects_656_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_656_target_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_656_x_mitre_deprecated_False" "objects_656_x_mitre_version_0.1" "objects_656_x_mitre_attack_spec_version_3.1.0" "objects_656_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_656_spec_version_2.1" "objects_656_x_mitre_domains_0_mobile-attack" "objects_657_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_657_type_relationship" "objects_657_id_relationship--3bf4b093-a1a3-48da-9236-bce9514765eb" "objects_657_created_2022-04-05T19:46:05.853Z" "objects_657_x_mitre_version_0.1" "objects_657_external_references_0_source_name_Samsung Keyboards" "objects_657_external_references_0_url_https://support.samsungknox.com/hc/en-us/articles/360001485027-3rd-party-keyboards-must-be-whitelisted-" "objects_657_external_references_0_description_Samsung. (2019, August 16). 3rd party keyboards must be whitelisted.. Retrieved September 1, 2019." "objects_657_x_mitre_deprecated_False" "objects_657_revoked_False" "objects_657_description_When using Samsung Knox, third-party keyboards must be explicitly added to an allow list in order to be available to the end-user.(Citation: Samsung Keyboards)" "objects_657_modified_2022-04-05T19:46:05.853Z" "objects_657_relationship_type_mitigates" "objects_657_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_657_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_657_x_mitre_attack_spec_version_2.1.0" "objects_657_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_657_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_657_spec_version_2.1" "objects_657_x_mitre_domains_0_mobile-attack" "objects_658_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_658_id_relationship--3bf5a566-986b-478c-b2da-e57caf261378" "objects_658_type_relationship" "objects_658_created_2019-09-03T19:45:48.515Z" "objects_658_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_658_external_references_0_source_name_SWB Exodus March 2019" "objects_658_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_658_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_658_modified_2020-03-31T14:49:39.188Z" "objects_658_description_ [Exodus](https://attack.mitre.org/software/S0405) Two attempts to elevate privileges by using a modified version of the DirtyCow exploit.(Citation: SWB Exodus March 2019) " "objects_658_relationship_type_uses" "objects_658_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_658_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_658_x_mitre_version_1.0" "objects_658_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_658_spec_version_2.1" "objects_658_x_mitre_attack_spec_version_2.1.0" "objects_658_x_mitre_domains_0_mobile-attack" "objects_659_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_659_type_relationship" "objects_659_id_relationship--3c0b0763-78d2-4d6e-8e57-b4f27af7e414" "objects_659_created_2019-10-18T14:50:57.521Z" "objects_659_x_mitre_version_1.0" "objects_659_x_mitre_deprecated_False" "objects_659_revoked_False" "objects_659_description_Security updates frequently contain fixes for vulnerabilities that could be leveraged to modify protected operating system files. " "objects_659_modified_2022-03-30T20:08:17.127Z" "objects_659_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_659_relationship_type_mitigates" "objects_659_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_659_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_659_x_mitre_attack_spec_version_2.1.0" "objects_659_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_659_spec_version_2.1" "objects_659_x_mitre_domains_0_mobile-attack" "objects_660_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_660_id_relationship--3c291ee5-1782-4e5b-8131-5188c7388f45" "objects_660_type_relationship" "objects_660_created_2017-12-14T16:46:06.044Z" "objects_660_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_660_external_references_0_source_name_FireEye-RuMMS" "objects_660_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_660_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_660_modified_2020-03-31T14:49:39.188Z" "objects_660_description_[RuMMS](https://attack.mitre.org/software/S0313) gathers the device phone number and IMEI and transmits them to a command and control server.(Citation: FireEye-RuMMS)" "objects_660_relationship_type_uses" "objects_660_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_660_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_660_x_mitre_version_1.0" "objects_660_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_660_spec_version_2.1" "objects_660_x_mitre_attack_spec_version_2.1.0" "objects_660_x_mitre_domains_0_mobile-attack" "objects_661_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_661_id_relationship--3c3c957e-7a23-4801-9f6a-ba599ad727d7" "objects_661_type_relationship" "objects_661_created_2019-10-15T19:33:42.204Z" "objects_661_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_661_external_references_0_source_name_Kaspersky-Skygofree" "objects_661_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_661_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_661_modified_2020-03-31T14:49:39.188Z" "objects_661_description_[Skygofree](https://attack.mitre.org/software/S0327) can track the device's location.(Citation: Kaspersky-Skygofree)" "objects_661_relationship_type_uses" "objects_661_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_661_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_661_x_mitre_version_1.0" "objects_661_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_661_spec_version_2.1" "objects_661_x_mitre_attack_spec_version_2.1.0" "objects_661_x_mitre_domains_0_mobile-attack" "objects_662_type_relationship" "objects_662_id_relationship--3c43d125-6719-420e-bb69-878cc91c2474" "objects_662_created_2020-09-15T15:18:12.428Z" "objects_662_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_662_revoked_False" "objects_662_external_references_0_source_name_Cybereason FakeSpy" "objects_662_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_662_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_662_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_662_modified_2023-04-05T17:45:11.727Z" "objects_662_description_[FakeSpy](https://attack.mitre.org/software/S0509) can register for the `BOOT_COMPLETED` broadcast Intent.(Citation: Cybereason FakeSpy)" "objects_662_relationship_type_uses" "objects_662_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_662_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_662_x_mitre_deprecated_False" "objects_662_x_mitre_version_1.0" "objects_662_x_mitre_attack_spec_version_3.1.0" "objects_662_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_662_spec_version_2.1" "objects_662_x_mitre_domains_0_mobile-attack" "objects_663_type_relationship" "objects_663_id_relationship--3c57ee56-34bc-4f0c-b363-68dab3e5e7b3" "objects_663_created_2023-10-10T15:33:58.361Z" "objects_663_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_663_revoked_False" "objects_663_external_references_0_source_name_Proofpoint-Droidjack" "objects_663_external_references_0_description_Proofpoint. (2016, July 7). DroidJack Uses Side-Load\u2026It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017." "objects_663_external_references_0_url_https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app" "objects_663_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_663_modified_2023-10-10T15:33:58.361Z" "objects_663_description_[DroidJack](https://attack.mitre.org/software/S0320) included code from the legitimate Pokemon GO app in order to appear identical to the user, but it also included additional malicious code.(Citation: Proofpoint-Droidjack)" "objects_663_relationship_type_uses" "objects_663_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_663_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_663_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_663_x_mitre_deprecated_False" "objects_663_x_mitre_version_1.0" "objects_663_x_mitre_attack_spec_version_2.1.0" "objects_663_spec_version_2.1" "objects_663_x_mitre_domains_0_mobile-attack" "objects_664_type_relationship" "objects_664_id_relationship--3c6776b9-258c-460c-b4b4-ea1a1453e5c5" "objects_664_created_2023-08-16T16:40:34.787Z" "objects_664_revoked_False" "objects_664_external_references_0_source_name_cyble_chameleon_0423" "objects_664_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_664_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_664_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_664_modified_2023-08-16T16:40:34.787Z" "objects_664_description_[Chameleon](https://attack.mitre.org/software/S1083) can gather device location data.(Citation: cyble_chameleon_0423)" "objects_664_relationship_type_uses" "objects_664_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_664_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_664_x_mitre_deprecated_False" "objects_664_x_mitre_version_0.1" "objects_664_x_mitre_attack_spec_version_3.1.0" "objects_664_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_664_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_664_spec_version_2.1" "objects_664_x_mitre_domains_0_mobile-attack" "objects_665_type_relationship" "objects_665_id_relationship--3c874ffa-63c3-491f-8d8c-623b19a7fdad" "objects_665_created_2020-04-24T15:06:33.397Z" "objects_665_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_665_revoked_False" "objects_665_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_665_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_665_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_665_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_665_modified_2023-04-05T17:37:37.674Z" "objects_665_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect the device\u2019s call log.(Citation: TrendMicro Coronavirus Updates)" "objects_665_relationship_type_uses" "objects_665_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_665_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_665_x_mitre_deprecated_False" "objects_665_x_mitre_version_1.0" "objects_665_x_mitre_attack_spec_version_3.1.0" "objects_665_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_665_spec_version_2.1" "objects_665_x_mitre_domains_0_mobile-attack" "objects_666_type_relationship" "objects_666_id_relationship--3c90dc4c-8156-49ae-8144-76526268a6c1" "objects_666_created_2023-08-04T18:32:08.706Z" "objects_666_revoked_False" "objects_666_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_666_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_666_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_666_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_666_modified_2023-08-04T18:32:08.706Z" "objects_666_description_[Sunbird](https://attack.mitre.org/software/S1082) can request device administrator privileges. (Citation: lookout_hornbill_sunbird_0221)" "objects_666_relationship_type_uses" "objects_666_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_666_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_666_x_mitre_deprecated_False" "objects_666_x_mitre_version_0.1" "objects_666_x_mitre_attack_spec_version_3.1.0" "objects_666_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_666_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_666_spec_version_2.1" "objects_666_x_mitre_domains_0_mobile-attack" "objects_667_type_relationship" "objects_667_id_relationship--3ca284e7-062c-4f23-b95d-9f9c6a2d882a" "objects_667_created_2019-07-16T14:33:12.175Z" "objects_667_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_667_revoked_False" "objects_667_external_references_0_source_name_Kaspersky Triada March 2016" "objects_667_external_references_0_description_Snow, J. (2016, March 3). Triada: organized crime on Android. Retrieved July 16, 2019." "objects_667_external_references_0_url_https://www.kaspersky.com/blog/triada-trojan/11481/" "objects_667_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_667_modified_2023-04-05T20:25:35.330Z" "objects_667_description_[Triada](https://attack.mitre.org/software/S0424) variants capture transaction data from SMS-based in-app purchases.(Citation: Kaspersky Triada March 2016) " "objects_667_relationship_type_uses" "objects_667_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_667_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_667_x_mitre_deprecated_False" "objects_667_x_mitre_version_1.0" "objects_667_x_mitre_attack_spec_version_3.1.0" "objects_667_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_667_spec_version_2.1" "objects_667_x_mitre_domains_0_mobile-attack" "objects_668_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_668_id_relationship--3ca453a4-bd78-4087-a93f-9261fb2e3f00" "objects_668_type_relationship" "objects_668_created_2020-09-15T15:18:12.421Z" "objects_668_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_668_external_references_0_source_name_Cybereason FakeSpy" "objects_668_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_668_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_668_modified_2020-09-15T15:18:12.421Z" "objects_668_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect a list of installed applications.(Citation: Cybereason FakeSpy)" "objects_668_relationship_type_uses" "objects_668_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_668_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_668_x_mitre_version_1.0" "objects_668_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_668_spec_version_2.1" "objects_668_x_mitre_attack_spec_version_2.1.0" "objects_668_x_mitre_domains_0_mobile-attack" "objects_669_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_669_id_relationship--3d24d88e-a0ab-42c6-8e8f-11f721082bba" "objects_669_type_relationship" "objects_669_created_2017-12-14T16:46:06.044Z" "objects_669_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_669_external_references_0_source_name_Lookout-PegasusAndroid" "objects_669_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_669_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_669_modified_2020-03-31T14:49:39.188Z" "objects_669_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) attempts to exploit well-known Android OS vulnerabilities to escalate privileges.(Citation: Lookout-PegasusAndroid)" "objects_669_relationship_type_uses" "objects_669_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_669_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_669_x_mitre_version_1.0" "objects_669_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_669_spec_version_2.1" "objects_669_x_mitre_attack_spec_version_2.1.0" "objects_669_x_mitre_domains_0_mobile-attack" "objects_670_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_670_id_relationship--3d5f7bdf-ab59-48f9-89d5-23f9d8cd235b" "objects_670_type_relationship" "objects_670_created_2021-01-05T20:16:20.419Z" "objects_670_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_670_external_references_0_source_name_Zscaler TikTok Spyware" "objects_670_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_670_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_670_modified_2021-01-05T20:16:20.419Z" "objects_670_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can capture audio from the device\u2019s microphone and can record phone calls.(Citation: Zscaler TikTok Spyware)" "objects_670_relationship_type_uses" "objects_670_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_670_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_670_x_mitre_version_1.0" "objects_670_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_670_spec_version_2.1" "objects_670_x_mitre_attack_spec_version_2.1.0" "objects_670_x_mitre_domains_0_mobile-attack" "objects_671_type_relationship" "objects_671_id_relationship--3d65c2b7-c907-45e1-b942-95f7d765e749" "objects_671_created_2023-03-20T18:53:34.056Z" "objects_671_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_671_revoked_False" "objects_671_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_671_modified_2023-08-14T16:29:32.104Z" "objects_671_description_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_671_relationship_type_detects" "objects_671_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_671_target_ref_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_671_x_mitre_deprecated_False" "objects_671_x_mitre_version_0.1" "objects_671_x_mitre_attack_spec_version_3.1.0" "objects_671_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_671_spec_version_2.1" "objects_671_x_mitre_domains_0_mobile-attack" "objects_672_type_relationship" "objects_672_id_relationship--3db58541-3870-424d-ad74-f2b84ff87abb" "objects_672_created_2023-07-14T19:06:42.839Z" "objects_672_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_672_revoked_False" "objects_672_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_672_modified_2023-07-14T19:10:57.654Z" "objects_672_description_Unexpected behavior from an application could be an indicator of masquerading." "objects_672_relationship_type_detects" "objects_672_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_672_target_ref_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_672_x_mitre_deprecated_False" "objects_672_x_mitre_version_0.1" "objects_672_x_mitre_attack_spec_version_3.1.0" "objects_672_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_672_spec_version_2.1" "objects_672_x_mitre_domains_0_mobile-attack" "objects_673_type_relationship" "objects_673_id_relationship--3dd0cd4d-bcde-4105-b98e-b32add191083" "objects_673_created_2020-01-27T17:05:58.331Z" "objects_673_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_673_revoked_False" "objects_673_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_673_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_673_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_673_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_673_modified_2023-04-05T20:39:39.589Z" "objects_673_description_[GolfSpy](https://attack.mitre.org/software/S0421) exfiltrates data using HTTP POST requests.(Citation: Trend Micro Bouncing Golf 2019)" "objects_673_relationship_type_uses" "objects_673_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_673_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_673_x_mitre_deprecated_False" "objects_673_x_mitre_version_1.0" "objects_673_x_mitre_attack_spec_version_3.1.0" "objects_673_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_673_spec_version_2.1" "objects_673_x_mitre_domains_0_mobile-attack" "objects_674_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_674_id_relationship--3dff770d-9627-4647-b945-7f24a97b2273" "objects_674_type_relationship" "objects_674_created_2019-09-15T15:26:22.926Z" "objects_674_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_674_modified_2020-06-24T15:02:13.533Z" "objects_674_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features." "objects_674_relationship_type_mitigates" "objects_674_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_674_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_674_x_mitre_version_1.0" "objects_674_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_674_spec_version_2.1" "objects_674_x_mitre_attack_spec_version_2.1.0" "objects_674_x_mitre_domains_0_mobile-attack" "objects_675_type_relationship" "objects_675_id_relationship--3e11a61b-14b3-4268-a6dd-937d4baef6de" "objects_675_created_2023-06-09T19:17:12.858Z" "objects_675_revoked_False" "objects_675_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_675_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_675_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_675_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_675_modified_2023-06-09T19:17:12.858Z" "objects_675_description_[Hornbill](https://attack.mitre.org/software/S1077) can record environmental and call audio.(Citation: lookout_hornbill_sunbird_0221)" "objects_675_relationship_type_uses" "objects_675_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_675_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_675_x_mitre_deprecated_False" "objects_675_x_mitre_version_0.1" "objects_675_x_mitre_attack_spec_version_3.1.0" "objects_675_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_675_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_675_spec_version_2.1" "objects_675_x_mitre_domains_0_mobile-attack" "objects_676_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_676_type_relationship" "objects_676_id_relationship--3e2474d3-f36d-4193-92f6-273296befdd3" "objects_676_created_2022-04-05T19:38:18.760Z" "objects_676_x_mitre_version_0.1" "objects_676_x_mitre_deprecated_False" "objects_676_revoked_False" "objects_676_description_Users should protect their account credentials and enable multi-factor authentication options when available. " "objects_676_modified_2022-04-05T19:38:18.760Z" "objects_676_relationship_type_mitigates" "objects_676_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_676_target_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_676_x_mitre_attack_spec_version_2.1.0" "objects_676_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_676_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_676_spec_version_2.1" "objects_676_x_mitre_domains_0_mobile-attack" "objects_677_type_relationship" "objects_677_id_relationship--3e2b9dc1-5da0-46a1-a576-4b41a10f3a60" "objects_677_created_2020-11-24T17:55:12.828Z" "objects_677_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_677_revoked_False" "objects_677_external_references_0_source_name_Talos GPlayed" "objects_677_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_677_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_677_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_677_modified_2023-04-05T17:21:27.210Z" "objects_677_description_[GPlayed](https://attack.mitre.org/software/S0536) can access the device\u2019s contact list.(Citation: Talos GPlayed)" "objects_677_relationship_type_uses" "objects_677_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_677_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_677_x_mitre_deprecated_False" "objects_677_x_mitre_version_1.0" "objects_677_x_mitre_attack_spec_version_3.1.0" "objects_677_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_677_spec_version_2.1" "objects_677_x_mitre_domains_0_mobile-attack" "objects_678_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_678_id_relationship--3e3cad6c-dd73-43c9-bf99-d4796ba97fb1" "objects_678_type_relationship" "objects_678_created_2017-12-14T16:46:06.044Z" "objects_678_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_678_external_references_0_url_https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf" "objects_678_external_references_0_description_CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017." "objects_678_external_references_0_source_name_CrowdStrike-Android" "objects_678_modified_2020-03-20T16:37:06.668Z" "objects_678_description_(Citation: CrowdStrike-Android)" "objects_678_relationship_type_uses" "objects_678_source_ref_intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c" "objects_678_target_ref_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_678_x_mitre_version_1.0" "objects_678_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_678_spec_version_2.1" "objects_678_x_mitre_attack_spec_version_2.1.0" "objects_678_x_mitre_domains_0_mobile-attack" "objects_679_type_relationship" "objects_679_id_relationship--3e5b5c7a-32e1-4745-8ceb-c46ce7276364" "objects_679_created_2023-02-06T19:46:19.592Z" "objects_679_revoked_False" "objects_679_external_references_0_source_name_threatfabric_sova_0921" "objects_679_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_679_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_679_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_679_modified_2023-02-06T19:46:19.592Z" "objects_679_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) has C2 commands to add an infected device to a DDoS pool.(Citation: threatfabric_sova_0921)" "objects_679_relationship_type_uses" "objects_679_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_679_target_ref_attack-pattern--d2e112dc-f6d4-488d-b8df-ecbfb57a0a2d" "objects_679_x_mitre_deprecated_False" "objects_679_x_mitre_version_0.1" "objects_679_x_mitre_attack_spec_version_3.1.0" "objects_679_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_679_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_679_spec_version_2.1" "objects_679_x_mitre_domains_0_mobile-attack" "objects_680_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_680_type_relationship" "objects_680_id_relationship--3ebcd3d8-dd8e-4cc9-8087-ce9e93df6f56" "objects_680_created_2017-10-25T14:48:53.738Z" "objects_680_x_mitre_version_1.0" "objects_680_x_mitre_deprecated_False" "objects_680_revoked_False" "objects_680_description_Android 9 introduced a new security policy that prevents applications from reading or writing data to other applications\u2019 internal storage directories, regardless of permissions. " "objects_680_modified_2022-04-01T13:51:48.934Z" "objects_680_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_680_relationship_type_mitigates" "objects_680_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_680_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_680_x_mitre_attack_spec_version_2.1.0" "objects_680_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_680_spec_version_2.1" "objects_680_x_mitre_domains_0_mobile-attack" "objects_681_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_681_type_relationship" "objects_681_id_relationship--3ebdc17d-401e-4f6a-af51-2dc57437b817" "objects_681_created_2019-09-20T18:03:57.062Z" "objects_681_x_mitre_version_1.0" "objects_681_external_references_0_source_name_Android 10 Execute" "objects_681_external_references_0_url_https://developer.android.com/about/versions/10/behavior-changes-all#execute-permission" "objects_681_external_references_0_description_Android Developers. (n.d.). Behavior changes: all apps - Removed execute permission for app home directory. Retrieved September 20, 2019." "objects_681_x_mitre_deprecated_False" "objects_681_revoked_False" "objects_681_description_Applications that target Android API level 29 or higher cannot execute native code stored in the application's internal data storage directory, limiting the ability of applications to download and execute native code at runtime. (Citation: Android 10 Execute)" "objects_681_modified_2022-04-01T18:37:44.516Z" "objects_681_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_681_relationship_type_mitigates" "objects_681_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_681_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_681_x_mitre_attack_spec_version_2.1.0" "objects_681_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_681_spec_version_2.1" "objects_681_x_mitre_domains_0_mobile-attack" "objects_682_type_relationship" "objects_682_id_relationship--3efe7dcc-a572-45ac-aff2-2932206a0632" "objects_682_created_2019-08-07T15:57:13.441Z" "objects_682_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_682_revoked_False" "objects_682_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_682_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_682_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_682_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_682_modified_2023-04-05T17:52:06.559Z" "objects_682_description_[Riltok](https://attack.mitre.org/software/S0403) can access and upload the device's contact list to the command and control server.(Citation: Kaspersky Riltok June 2019)" "objects_682_relationship_type_uses" "objects_682_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_682_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_682_x_mitre_deprecated_False" "objects_682_x_mitre_version_1.0" "objects_682_x_mitre_attack_spec_version_3.1.0" "objects_682_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_682_spec_version_2.1" "objects_682_x_mitre_domains_0_mobile-attack" "objects_683_type_relationship" "objects_683_id_relationship--3f2daf2e-c28c-46cd-bf91-ae35e873f365" "objects_683_created_2019-09-04T14:28:15.950Z" "objects_683_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_683_revoked_False" "objects_683_external_references_0_source_name_Lookout-Monokle" "objects_683_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_683_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_683_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_683_modified_2023-04-05T20:35:59.273Z" "objects_683_description_[Monokle](https://attack.mitre.org/software/S0407) can delete arbitrary files on the device, and can also uninstall itself and clean up staging files.(Citation: Lookout-Monokle)" "objects_683_relationship_type_uses" "objects_683_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_683_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_683_x_mitre_deprecated_False" "objects_683_x_mitre_version_1.0" "objects_683_x_mitre_attack_spec_version_3.1.0" "objects_683_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_683_spec_version_2.1" "objects_683_x_mitre_domains_0_mobile-attack" "objects_684_type_relationship" "objects_684_id_relationship--3f31b209-dbc7-4c7e-bb0a-e37801121c13" "objects_684_created_2020-10-29T17:48:27.425Z" "objects_684_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_684_revoked_False" "objects_684_external_references_0_source_name_Threat Fabric Exobot" "objects_684_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_684_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_684_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_684_modified_2023-04-05T17:45:26.765Z" "objects_684_description_[Exobot](https://attack.mitre.org/software/S0522) has registered to receive the `BOOT_COMPLETED` broadcast intent.(Citation: Threat Fabric Exobot)" "objects_684_relationship_type_uses" "objects_684_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_684_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_684_x_mitre_deprecated_False" "objects_684_x_mitre_version_1.0" "objects_684_x_mitre_attack_spec_version_3.1.0" "objects_684_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_684_spec_version_2.1" "objects_684_x_mitre_domains_0_mobile-attack" "objects_685_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_685_id_relationship--3f392718-87c4-483b-b89f-4f0cc056d251" "objects_685_type_relationship" "objects_685_created_2020-07-20T13:58:53.610Z" "objects_685_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_685_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_685_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_685_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_685_modified_2020-09-24T15:12:24.302Z" "objects_685_description_[XLoader for iOS](https://attack.mitre.org/software/S0490) can obtain the device\u2019s UDID, version number, and product number.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_685_relationship_type_uses" "objects_685_source_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_685_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_685_x_mitre_version_1.0" "objects_685_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_685_spec_version_2.1" "objects_685_x_mitre_attack_spec_version_2.1.0" "objects_685_x_mitre_domains_0_mobile-attack" "objects_686_type_relationship" "objects_686_id_relationship--3f47f048-badd-4476-8534-d06e20c02ec6" "objects_686_created_2023-06-09T19:18:59.889Z" "objects_686_revoked_False" "objects_686_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_686_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_686_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_686_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_686_modified_2023-06-09T19:18:59.889Z" "objects_686_description_[Hornbill](https://attack.mitre.org/software/S1077) can use HTTP and HTTP POST to communicate information to the C2.(Citation: lookout_hornbill_sunbird_0221)" "objects_686_relationship_type_uses" "objects_686_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_686_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_686_x_mitre_deprecated_False" "objects_686_x_mitre_version_0.1" "objects_686_x_mitre_attack_spec_version_3.1.0" "objects_686_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_686_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_686_spec_version_2.1" "objects_686_x_mitre_domains_0_mobile-attack" "objects_687_type_relationship" "objects_687_id_relationship--3f5dbd48-5899-4e97-96a6-ad7e68b673cd" "objects_687_created_2023-03-20T18:43:03.117Z" "objects_687_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_687_revoked_False" "objects_687_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_687_modified_2023-08-08T22:30:26.847Z" "objects_687_description_Application vetting services could look for use of the accessibility service or features that typically require root access." "objects_687_relationship_type_detects" "objects_687_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_687_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_687_x_mitre_deprecated_False" "objects_687_x_mitre_version_0.1" "objects_687_x_mitre_attack_spec_version_3.1.0" "objects_687_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_687_spec_version_2.1" "objects_687_x_mitre_domains_0_mobile-attack" "objects_688_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_688_id_relationship--3f81a680-3151-4608-b83f-550756632013" "objects_688_type_relationship" "objects_688_created_2020-07-20T13:58:53.604Z" "objects_688_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_688_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_688_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_688_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_688_modified_2020-09-24T15:12:24.301Z" "objects_688_description_[XLoader for iOS](https://attack.mitre.org/software/S0490) can obtain the device\u2019s IMEM, ICCID, and MEID.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_688_relationship_type_uses" "objects_688_source_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_688_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_688_x_mitre_version_1.0" "objects_688_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_688_spec_version_2.1" "objects_688_x_mitre_attack_spec_version_2.1.0" "objects_688_x_mitre_domains_0_mobile-attack" "objects_689_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_689_id_relationship--3f973c3c-45f8-432a-9859-e8749f2e7418" "objects_689_type_relationship" "objects_689_created_2017-12-14T16:46:06.044Z" "objects_689_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_689_external_references_0_source_name_Lookout-PegasusAndroid" "objects_689_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_689_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_689_modified_2020-03-31T14:49:39.188Z" "objects_689_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses sensitive data in files, such as messages stored by the WhatsApp, Facebook, and Twitter applications. It also has the ability to access arbitrary filenames and retrieve directory listings.(Citation: Lookout-PegasusAndroid)" "objects_689_relationship_type_uses" "objects_689_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_689_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_689_x_mitre_version_1.0" "objects_689_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_689_spec_version_2.1" "objects_689_x_mitre_attack_spec_version_2.1.0" "objects_689_x_mitre_domains_0_mobile-attack" "objects_690_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_690_id_relationship--3fcd2177-2030-4781-bd19-8b9fa8c6e645" "objects_690_type_relationship" "objects_690_created_2021-02-08T16:36:20.655Z" "objects_690_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_690_external_references_0_source_name_BlackBerry Bahamut" "objects_690_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_690_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_690_modified_2021-05-24T13:16:56.410Z" "objects_690_description_[Windshift](https://attack.mitre.org/groups/G0112) has included phone call and audio recording capabilities in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_690_relationship_type_uses" "objects_690_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_690_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_690_x_mitre_version_1.0" "objects_690_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_690_spec_version_2.1" "objects_690_x_mitre_attack_spec_version_2.1.0" "objects_690_x_mitre_domains_0_mobile-attack" "objects_691_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_691_type_relationship" "objects_691_id_relationship--3fd2785f-f0eb-4aa9-8a10-e1c9a88b372a" "objects_691_created_2020-06-26T14:55:13.304Z" "objects_691_x_mitre_version_1.0" "objects_691_external_references_0_source_name_Cybereason EventBot" "objects_691_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_691_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_691_x_mitre_deprecated_False" "objects_691_revoked_False" "objects_691_description_[EventBot](https://attack.mitre.org/software/S0478) can display popups over running applications.(Citation: Cybereason EventBot)" "objects_691_modified_2022-04-12T10:01:44.682Z" "objects_691_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_691_relationship_type_uses" "objects_691_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_691_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_691_x_mitre_attack_spec_version_2.1.0" "objects_691_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_691_spec_version_2.1" "objects_691_x_mitre_domains_0_mobile-attack" "objects_692_type_relationship" "objects_692_id_relationship--3fdb8bfb-1b2d-4fac-bb41-d26a5ad18dbb" "objects_692_created_2023-08-16T16:44:30.692Z" "objects_692_revoked_False" "objects_692_external_references_0_source_name_cyble_chameleon_0423" "objects_692_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_692_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_692_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_692_modified_2023-08-16T16:44:30.692Z" "objects_692_description_[Chameleon](https://attack.mitre.org/software/S1083) can send stolen data over HTTP.(Citation: cyble_chameleon_0423)" "objects_692_relationship_type_uses" "objects_692_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_692_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_692_x_mitre_deprecated_False" "objects_692_x_mitre_version_0.1" "objects_692_x_mitre_attack_spec_version_3.1.0" "objects_692_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_692_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_692_spec_version_2.1" "objects_692_x_mitre_domains_0_mobile-attack" "objects_693_type_relationship" "objects_693_id_relationship--4009ff40-4616-4b1c-bff9-599e52ccab37" "objects_693_created_2020-01-27T17:05:58.263Z" "objects_693_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_693_revoked_False" "objects_693_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_693_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_693_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_693_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_693_modified_2023-04-05T17:28:34.373Z" "objects_693_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain the device\u2019s contact list.(Citation: Trend Micro Bouncing Golf 2019)" "objects_693_relationship_type_uses" "objects_693_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_693_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_693_x_mitre_deprecated_False" "objects_693_x_mitre_version_1.0" "objects_693_x_mitre_attack_spec_version_3.1.0" "objects_693_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_693_spec_version_2.1" "objects_693_x_mitre_domains_0_mobile-attack" "objects_694_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_694_id_relationship--4088b31b-d542-4935-84b4-82b592159591" "objects_694_type_relationship" "objects_694_created_2017-12-14T16:46:06.044Z" "objects_694_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_694_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_694_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_694_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_694_modified_2020-03-31T14:49:39.188Z" "objects_694_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can collect contacts and messages from popular applications, including Facebook Messenger, WhatsApp, Skype, Viber, Line, WeChat, Hangouts, Telegram, and BlackBerry Messenger.(Citation: TrendMicro-RCSAndroid)" "objects_694_relationship_type_uses" "objects_694_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_694_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_694_x_mitre_version_1.0" "objects_694_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_694_spec_version_2.1" "objects_694_x_mitre_attack_spec_version_2.1.0" "objects_694_x_mitre_domains_0_mobile-attack" "objects_695_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_695_type_relationship" "objects_695_id_relationship--40c9adb5-9d1a-4f51-8ef2-a80c2d78e4e4" "objects_695_created_2022-04-05T19:38:41.538Z" "objects_695_x_mitre_version_0.1" "objects_695_x_mitre_deprecated_False" "objects_695_revoked_False" "objects_695_description_If devices are enrolled using Apple User Enrollment or using a profile owner enrollment mode for Android, device controls prevent the enterprise from accessing the device\u2019s physical location. This is typically used for a Bring Your Own Device (BYOD) deployment. " "objects_695_modified_2022-04-05T19:38:41.538Z" "objects_695_relationship_type_mitigates" "objects_695_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_695_target_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_695_x_mitre_attack_spec_version_2.1.0" "objects_695_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_695_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_695_spec_version_2.1" "objects_695_x_mitre_domains_0_mobile-attack" "objects_696_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_696_type_relationship" "objects_696_id_relationship--40f30137-4db9-4596-b4c7-a12f1497fd92" "objects_696_created_2020-11-10T17:08:35.831Z" "objects_696_x_mitre_version_1.0" "objects_696_external_references_0_source_name_Lookout Uyghur Campaign" "objects_696_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_696_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_696_x_mitre_deprecated_False" "objects_696_revoked_False" "objects_696_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has performed rudimentary SSL certificate validation to verify C2 server authenticity before establishing a SSL connection.(Citation: Lookout Uyghur Campaign)" "objects_696_modified_2022-04-18T16:02:42.303Z" "objects_696_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_696_relationship_type_uses" "objects_696_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_696_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_696_x_mitre_attack_spec_version_2.1.0" "objects_696_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_696_spec_version_2.1" "objects_696_x_mitre_domains_0_mobile-attack" "objects_697_type_relationship" "objects_697_id_relationship--418168ad-fee9-42c8-ac27-11f7472a5f86" "objects_697_created_2019-09-03T19:45:48.498Z" "objects_697_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_697_revoked_False" "objects_697_external_references_0_source_name_SWB Exodus March 2019" "objects_697_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_697_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_697_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_697_modified_2023-04-05T17:09:08.738Z" "objects_697_description_[Exodus](https://attack.mitre.org/software/S0405) One checks in with the command and control server using HTTP POST requests.(Citation: SWB Exodus March 2019) " "objects_697_relationship_type_uses" "objects_697_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_697_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_697_x_mitre_deprecated_False" "objects_697_x_mitre_version_1.0" "objects_697_x_mitre_attack_spec_version_3.1.0" "objects_697_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_697_spec_version_2.1" "objects_697_x_mitre_domains_0_mobile-attack" "objects_698_type_relationship" "objects_698_id_relationship--41da5845-a1a8-4d10-8929-053be3496396" "objects_698_created_2022-04-20T17:46:43.542Z" "objects_698_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_698_revoked_False" "objects_698_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_698_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_698_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_698_external_references_1_source_name_Bitdefender - Triout 2018" "objects_698_external_references_1_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_698_external_references_1_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_698_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_698_modified_2023-04-05T20:39:57.165Z" "objects_698_description_[ViceLeaker](https://attack.mitre.org/software/S0418) uses HTTP data exfiltration.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_698_relationship_type_uses" "objects_698_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_698_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_698_x_mitre_deprecated_False" "objects_698_x_mitre_version_0.1" "objects_698_x_mitre_attack_spec_version_3.1.0" "objects_698_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_698_spec_version_2.1" "objects_698_x_mitre_domains_0_mobile-attack" "objects_699_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_699_type_relationship" "objects_699_id_relationship--4220ec84-3c30-462b-9bad-4fb4de42cfd4" "objects_699_created_2022-04-06T15:28:20.249Z" "objects_699_x_mitre_version_0.1" "objects_699_x_mitre_deprecated_False" "objects_699_revoked_False" "objects_699_description_Users should be instructed to not grant applications unexpected or unnecessary permissions. " "objects_699_modified_2022-04-06T15:28:20.249Z" "objects_699_relationship_type_mitigates" "objects_699_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_699_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_699_x_mitre_attack_spec_version_2.1.0" "objects_699_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_699_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_699_spec_version_2.1" "objects_699_x_mitre_domains_0_mobile-attack" "objects_700_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_700_type_relationship" "objects_700_id_relationship--42342d72-a37c-477e-b8f1-1768273fcb7f" "objects_700_created_2019-10-18T15:51:48.451Z" "objects_700_x_mitre_version_1.0" "objects_700_x_mitre_deprecated_False" "objects_700_revoked_False" "objects_700_description_Users should be advised not to grant consent for screen captures to occur unless expected. Users should avoid enabling USB debugging (Android Debug Bridge) unless explicitly required. " "objects_700_modified_2022-04-01T13:32:32.335Z" "objects_700_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_700_relationship_type_mitigates" "objects_700_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_700_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_700_x_mitre_attack_spec_version_2.1.0" "objects_700_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_700_spec_version_2.1" "objects_700_x_mitre_domains_0_mobile-attack" "objects_701_type_relationship" "objects_701_id_relationship--42510b9a-7e72-4a52-bc7a-6e1a7ebacff7" "objects_701_created_2023-08-16T16:33:12.493Z" "objects_701_revoked_False" "objects_701_external_references_0_source_name_cyble_chameleon_0423" "objects_701_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_701_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_701_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_701_modified_2023-08-16T16:33:12.493Z" "objects_701_description_[Chameleon](https://attack.mitre.org/software/S1083) has disguised itself as other applications, such as a cryptocurrency app called \u2018CoinSpot\u2019, and IKO bank in Poland. It has also used familiar icons, such as the Chrome and Bitcoin logos.(Citation: cyble_chameleon_0423) " "objects_701_relationship_type_uses" "objects_701_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_701_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_701_x_mitre_deprecated_False" "objects_701_x_mitre_version_0.1" "objects_701_x_mitre_attack_spec_version_3.1.0" "objects_701_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_701_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_701_spec_version_2.1" "objects_701_x_mitre_domains_0_mobile-attack" "objects_702_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_702_type_relationship" "objects_702_id_relationship--42536c96-ae61-41ab-a1bf-3e7d126a4000" "objects_702_created_2022-03-30T15:13:42.462Z" "objects_702_x_mitre_version_0.1" "objects_702_x_mitre_deprecated_False" "objects_702_revoked_False" "objects_702_description_" "objects_702_modified_2022-03-30T15:13:42.462Z" "objects_702_relationship_type_subtechnique-of" "objects_702_source_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_702_target_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_702_x_mitre_attack_spec_version_2.1.0" "objects_702_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_702_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_702_spec_version_2.1" "objects_702_x_mitre_domains_0_mobile-attack" "objects_703_type_relationship" "objects_703_id_relationship--42624ee9-1bf5-46aa-87d0-9fda0de9a06e" "objects_703_created_2020-06-26T15:32:24.921Z" "objects_703_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_703_revoked_False" "objects_703_external_references_0_source_name_Threat Fabric Cerberus" "objects_703_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_703_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_703_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_703_modified_2023-04-05T20:50:47.973Z" "objects_703_description_[Cerberus](https://attack.mitre.org/software/S0480) avoids being analyzed by only activating the malware after recording a certain number of steps from the accelerometer.(Citation: Threat Fabric Cerberus)" "objects_703_relationship_type_uses" "objects_703_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_703_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_703_x_mitre_deprecated_False" "objects_703_x_mitre_version_1.0" "objects_703_x_mitre_attack_spec_version_3.1.0" "objects_703_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_703_spec_version_2.1" "objects_703_x_mitre_domains_0_mobile-attack" "objects_704_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_704_id_relationship--429a4b02-f774-4b1e-aaef-5fd9c654dd09" "objects_704_type_relationship" "objects_704_created_2021-02-08T16:36:20.846Z" "objects_704_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_704_external_references_0_source_name_BlackBerry Bahamut" "objects_704_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_704_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_704_modified_2021-05-24T13:16:56.596Z" "objects_704_description_[Windshift](https://attack.mitre.org/groups/G0112) has exfiltrated local account data and calendar information as part of Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_704_relationship_type_uses" "objects_704_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_704_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_704_x_mitre_version_1.0" "objects_704_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_704_spec_version_2.1" "objects_704_x_mitre_attack_spec_version_2.1.0" "objects_704_x_mitre_domains_0_mobile-attack" "objects_705_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_705_type_relationship" "objects_705_id_relationship--42ae42eb-ea75-457a-bf39-4ea04304dd0b" "objects_705_created_2017-12-14T16:46:06.044Z" "objects_705_x_mitre_version_1.0" "objects_705_external_references_0_source_name_Gooligan Citation" "objects_705_external_references_0_url_http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/" "objects_705_external_references_0_description_Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016." "objects_705_x_mitre_deprecated_False" "objects_705_revoked_False" "objects_705_description_[Gooligan](https://attack.mitre.org/software/S0290) can install adware to generate revenue.(Citation: Gooligan Citation)" "objects_705_modified_2022-04-19T14:25:41.669Z" "objects_705_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_705_relationship_type_uses" "objects_705_source_ref_malware--20d56cd6-8dff-4871-9889-d32d254816de" "objects_705_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_705_x_mitre_attack_spec_version_2.1.0" "objects_705_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_705_spec_version_2.1" "objects_705_x_mitre_domains_0_mobile-attack" "objects_706_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_706_id_relationship--42f8d024-64a7-4bbf-8c05-2b0c7e667396" "objects_706_type_relationship" "objects_706_created_2020-12-14T15:02:35.304Z" "objects_706_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_706_external_references_0_source_name_Securelist Asacub" "objects_706_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_706_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_706_modified_2020-12-14T15:02:35.304Z" "objects_706_description_[Asacub](https://attack.mitre.org/software/S0540) has stored encrypted strings in the APK file.(Citation: Securelist Asacub)" "objects_706_relationship_type_uses" "objects_706_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_706_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_706_x_mitre_version_1.0" "objects_706_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_706_spec_version_2.1" "objects_706_x_mitre_attack_spec_version_2.1.0" "objects_706_x_mitre_domains_0_mobile-attack" "objects_707_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_707_id_relationship--430b2b14-9d63-401c-b76b-d0247ee7e27b" "objects_707_type_relationship" "objects_707_created_2020-07-20T13:27:33.549Z" "objects_707_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_707_external_references_0_source_name_Talos-WolfRAT" "objects_707_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_707_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_707_modified_2020-08-10T21:57:54.524Z" "objects_707_description_[WolfRAT](https://attack.mitre.org/software/S0489) can record the screen and take screenshots to capture messages from Line, Facebook Messenger, and WhatsApp.(Citation: Talos-WolfRAT)" "objects_707_relationship_type_uses" "objects_707_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_707_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_707_x_mitre_version_1.0" "objects_707_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_707_spec_version_2.1" "objects_707_x_mitre_attack_spec_version_2.1.0" "objects_707_x_mitre_domains_0_mobile-attack" "objects_708_type_relationship" "objects_708_id_relationship--433af79b-ce77-4a4c-84f7-6cdc34e70674" "objects_708_created_2023-01-18T19:56:01.025Z" "objects_708_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_708_revoked_False" "objects_708_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_708_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_708_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_708_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_708_modified_2023-03-27T18:48:53.396Z" "objects_708_description_[SharkBot](https://attack.mitre.org/software/S1055) can intercept SMS messages.(Citation: nccgroup_sharkbot_0322)" "objects_708_relationship_type_uses" "objects_708_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_708_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_708_x_mitre_deprecated_False" "objects_708_x_mitre_version_0.1" "objects_708_x_mitre_attack_spec_version_3.1.0" "objects_708_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_708_spec_version_2.1" "objects_708_x_mitre_domains_0_mobile-attack" "objects_709_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_709_id_relationship--433ba5b0-76eb-49e1-a2ed-e54994e94041" "objects_709_type_relationship" "objects_709_created_2018-10-17T00:14:20.652Z" "objects_709_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_709_external_references_0_source_name_Lookout-StealthMango" "objects_709_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_709_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_709_modified_2020-03-31T14:49:39.188Z" "objects_709_description_[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to gather cellular IDs.(Citation: Lookout-StealthMango)" "objects_709_relationship_type_uses" "objects_709_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_709_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_709_x_mitre_version_1.0" "objects_709_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_709_spec_version_2.1" "objects_709_x_mitre_attack_spec_version_2.1.0" "objects_709_x_mitre_domains_0_mobile-attack" "objects_710_type_relationship" "objects_710_id_relationship--437f719c-d602-4cb8-a2b9-c33e85ad7c50" "objects_710_created_2020-06-26T15:32:25.025Z" "objects_710_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_710_revoked_False" "objects_710_external_references_0_source_name_Threat Fabric Cerberus" "objects_710_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_710_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_710_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_710_modified_2023-04-05T17:52:43.629Z" "objects_710_description_[Cerberus](https://attack.mitre.org/software/S0480) can obtain the device\u2019s contact list.(Citation: Threat Fabric Cerberus)" "objects_710_relationship_type_uses" "objects_710_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_710_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_710_x_mitre_deprecated_False" "objects_710_x_mitre_version_1.0" "objects_710_x_mitre_attack_spec_version_3.1.0" "objects_710_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_710_spec_version_2.1" "objects_710_x_mitre_domains_0_mobile-attack" "objects_711_type_relationship" "objects_711_id_relationship--439d905b-1ad8-461a-ab0d-b2f426cb2c3a" "objects_711_created_2023-03-20T18:53:35.012Z" "objects_711_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_711_revoked_False" "objects_711_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_711_modified_2023-08-09T16:24:02.473Z" "objects_711_description_On Android, the user is presented with a permissions popup when an application requests access to external device storage." "objects_711_relationship_type_detects" "objects_711_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_711_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_711_x_mitre_deprecated_False" "objects_711_x_mitre_version_0.1" "objects_711_x_mitre_attack_spec_version_3.1.0" "objects_711_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_711_spec_version_2.1" "objects_711_x_mitre_domains_0_mobile-attack" "objects_712_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_712_id_relationship--43a62244-29f1-4f7f-bc9f-9b7b8e488b38" "objects_712_type_relationship" "objects_712_created_2020-05-11T16:37:36.616Z" "objects_712_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_712_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_712_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_712_external_references_0_source_name_ThreatFabric Ginp" "objects_712_modified_2020-05-11T16:37:36.616Z" "objects_712_description_ [Ginp](https://attack.mitre.org/software/S0423) can inject input to make itself the default SMS handler.(Citation: ThreatFabric Ginp) " "objects_712_relationship_type_uses" "objects_712_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_712_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_712_x_mitre_version_1.0" "objects_712_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_712_spec_version_2.1" "objects_712_x_mitre_attack_spec_version_2.1.0" "objects_712_x_mitre_domains_0_mobile-attack" "objects_713_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_713_id_relationship--43eeee7f-339a-4f6e-9df3-ccbf08ecf358" "objects_713_type_relationship" "objects_713_created_2020-11-10T17:08:35.664Z" "objects_713_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_713_external_references_0_source_name_Lookout Uyghur Campaign" "objects_713_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_713_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_713_modified_2020-12-01T19:48:44.840Z" "objects_713_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has looked for specific applications, such as MiCode.(Citation: Lookout Uyghur Campaign)" "objects_713_relationship_type_uses" "objects_713_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_713_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_713_x_mitre_version_1.0" "objects_713_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_713_spec_version_2.1" "objects_713_x_mitre_attack_spec_version_2.1.0" "objects_713_x_mitre_domains_0_mobile-attack" "objects_714_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_714_type_relationship" "objects_714_id_relationship--442dd700-2d7d-4cad-8282-9027e4f69133" "objects_714_created_2022-03-30T20:31:41.927Z" "objects_714_x_mitre_version_0.1" "objects_714_x_mitre_deprecated_False" "objects_714_revoked_False" "objects_714_description_New OS releases frequently contain additional limitations or controls around device location access." "objects_714_modified_2022-03-30T20:31:41.927Z" "objects_714_relationship_type_mitigates" "objects_714_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_714_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_714_x_mitre_attack_spec_version_2.1.0" "objects_714_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_714_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_714_spec_version_2.1" "objects_714_x_mitre_domains_0_mobile-attack" "objects_715_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_715_type_relationship" "objects_715_id_relationship--44304163-9a44-4760-bd04-0e14adb33299" "objects_715_created_2022-04-01T15:13:40.779Z" "objects_715_x_mitre_version_0.1" "objects_715_external_references_0_source_name_Trend Micro iOS URL Hijacking" "objects_715_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/ios-url-scheme-susceptible-to-hijacking/" "objects_715_external_references_0_description_L. Wu, Y. Zhou, M. Li. (2019, July 12). iOS URL Scheme Susceptible to Hijacking. Retrieved September 11, 2020." "objects_715_x_mitre_deprecated_False" "objects_715_revoked_False" "objects_715_description_iOS 11 introduced a first-come-first-served principle for URIs, allowing only the prior installed app to be launched via the URI.(Citation: Trend Micro iOS URL Hijacking) Android 6 introduced App Links." "objects_715_modified_2022-04-01T15:13:40.779Z" "objects_715_relationship_type_mitigates" "objects_715_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_715_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_715_x_mitre_attack_spec_version_2.1.0" "objects_715_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_715_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_715_spec_version_2.1" "objects_715_x_mitre_domains_0_mobile-attack" "objects_716_type_relationship" "objects_716_id_relationship--4449ac76-8329-4483-b152-99b990006cbc" "objects_716_created_2019-09-04T15:38:56.937Z" "objects_716_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_716_revoked_False" "objects_716_external_references_0_source_name_FlexiSpy-Features" "objects_716_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_716_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_716_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_716_modified_2023-04-05T19:58:10.115Z" "objects_716_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can collect a list of known Wi-Fi access points.(Citation: FlexiSpy-Features) " "objects_716_relationship_type_uses" "objects_716_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_716_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_716_x_mitre_deprecated_False" "objects_716_x_mitre_version_1.0" "objects_716_x_mitre_attack_spec_version_3.1.0" "objects_716_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_716_spec_version_2.1" "objects_716_x_mitre_domains_0_mobile-attack" "objects_717_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_717_type_relationship" "objects_717_id_relationship--4454a696-7619-40ee-971b-cbf646e4ee61" "objects_717_created_2017-12-14T16:46:06.044Z" "objects_717_x_mitre_version_1.0" "objects_717_external_references_0_source_name_Lookout-EnterpriseApps" "objects_717_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_717_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_717_x_mitre_deprecated_False" "objects_717_revoked_False" "objects_717_description_[PJApps](https://attack.mitre.org/software/S0291) has the capability to send messages to premium SMS messages.(Citation: Lookout-EnterpriseApps)" "objects_717_modified_2022-04-19T14:25:41.669Z" "objects_717_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_717_relationship_type_uses" "objects_717_source_ref_malware--c709da93-20c3-4d17-ab68-48cba76b2137" "objects_717_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_717_x_mitre_attack_spec_version_2.1.0" "objects_717_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_717_spec_version_2.1" "objects_717_x_mitre_domains_0_mobile-attack" "objects_718_type_relationship" "objects_718_id_relationship--44a673c9-7ce7-42a0-8ab4-60bbb5001ce2" "objects_718_created_2023-03-20T18:53:15.929Z" "objects_718_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_718_revoked_False" "objects_718_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_718_modified_2023-08-10T22:23:14.948Z" "objects_718_description_Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage." "objects_718_relationship_type_detects" "objects_718_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_718_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_718_x_mitre_deprecated_False" "objects_718_x_mitre_version_0.1" "objects_718_x_mitre_attack_spec_version_3.1.0" "objects_718_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_718_spec_version_2.1" "objects_718_x_mitre_domains_0_mobile-attack" "objects_719_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_719_id_relationship--44b63426-1ea7-456e-907b-0856e3eab0c3" "objects_719_type_relationship" "objects_719_created_2020-12-31T18:25:05.142Z" "objects_719_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_719_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_719_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_719_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_719_modified_2020-12-31T18:25:05.142Z" "objects_719_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has collected the device\u2019s location.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_719_relationship_type_uses" "objects_719_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_719_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_719_x_mitre_version_1.0" "objects_719_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_719_spec_version_2.1" "objects_719_x_mitre_attack_spec_version_2.1.0" "objects_719_x_mitre_domains_0_mobile-attack" "objects_720_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_720_type_relationship" "objects_720_id_relationship--44da429b-9dee-43c9-9397-445c6f9e647e" "objects_720_created_2022-03-30T19:54:59.651Z" "objects_720_x_mitre_version_0.1" "objects_720_x_mitre_deprecated_False" "objects_720_revoked_False" "objects_720_description_Android includes system partition integrity mechanisms that could detect unauthorized modifications. " "objects_720_modified_2022-03-30T19:54:59.651Z" "objects_720_relationship_type_mitigates" "objects_720_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_720_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_720_x_mitre_attack_spec_version_2.1.0" "objects_720_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_720_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_720_spec_version_2.1" "objects_720_x_mitre_domains_0_mobile-attack" "objects_721_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_721_type_relationship" "objects_721_id_relationship--450a1b75-efa5-4d7a-bcd5-d3e63723b408" "objects_721_created_2017-12-14T16:46:06.044Z" "objects_721_x_mitre_version_1.0" "objects_721_external_references_0_source_name_Lookout-Pegasus" "objects_721_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_721_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_721_x_mitre_deprecated_False" "objects_721_revoked_False" "objects_721_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) monitors the connection state and tracks which types of networks the phone is connected to, potentially to determine the bandwidth and ability to send full data across the network.(Citation: Lookout-Pegasus)" "objects_721_modified_2022-04-15T19:47:48.036Z" "objects_721_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_721_relationship_type_uses" "objects_721_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_721_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_721_x_mitre_attack_spec_version_2.1.0" "objects_721_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_721_spec_version_2.1" "objects_721_x_mitre_domains_0_mobile-attack" "objects_722_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_722_id_relationship--45253350-c802-4566-a72d-57d43d05fd63" "objects_722_type_relationship" "objects_722_created_2020-05-07T15:24:49.530Z" "objects_722_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_722_modified_2020-05-27T13:23:34.536Z" "objects_722_description_Security updates frequently contain patches to vulnerabilities." "objects_722_relationship_type_mitigates" "objects_722_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_722_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_722_x_mitre_version_1.0" "objects_722_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_722_spec_version_2.1" "objects_722_x_mitre_attack_spec_version_2.1.0" "objects_722_x_mitre_domains_0_mobile-attack" "objects_723_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_723_type_relationship" "objects_723_id_relationship--45505ae7-0e54-4279-82c3-f92f4a832ed9" "objects_723_created_2022-04-06T13:57:38.847Z" "objects_723_x_mitre_version_0.1" "objects_723_x_mitre_deprecated_False" "objects_723_revoked_False" "objects_723_description_" "objects_723_modified_2022-04-06T13:57:38.847Z" "objects_723_relationship_type_revoked-by" "objects_723_source_ref_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_723_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_723_x_mitre_attack_spec_version_2.1.0" "objects_723_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_723_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_723_spec_version_2.1" "objects_723_x_mitre_domains_0_mobile-attack" "objects_724_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_724_type_relationship" "objects_724_id_relationship--455b1287-5784-42b4-91fb-01dac007758d" "objects_724_created_2020-09-29T13:24:15.234Z" "objects_724_x_mitre_version_1.0" "objects_724_external_references_0_source_name_Lookout-Dendroid" "objects_724_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_724_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_724_x_mitre_deprecated_False" "objects_724_revoked_False" "objects_724_description_[Dendroid](https://attack.mitre.org/software/S0301) can open a dialog box to ask the user for passwords.(Citation: Lookout-Dendroid)" "objects_724_modified_2022-04-12T10:01:44.682Z" "objects_724_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_724_relationship_type_uses" "objects_724_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_724_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_724_x_mitre_attack_spec_version_2.1.0" "objects_724_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_724_spec_version_2.1" "objects_724_x_mitre_domains_0_mobile-attack" "objects_725_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_725_id_relationship--4586277d-bebd-4717-87c6-a31a9be741ed" "objects_725_type_relationship" "objects_725_created_2020-12-24T21:45:56.982Z" "objects_725_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_725_external_references_0_source_name_Lookout Uyghur Campaign" "objects_725_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_725_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_725_modified_2020-12-24T21:45:56.982Z" "objects_725_description_[SilkBean](https://attack.mitre.org/software/S0549) can get file lists on the SD card.(Citation: Lookout Uyghur Campaign)" "objects_725_relationship_type_uses" "objects_725_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_725_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_725_x_mitre_version_1.0" "objects_725_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_725_spec_version_2.1" "objects_725_x_mitre_attack_spec_version_2.1.0" "objects_725_x_mitre_domains_0_mobile-attack" "objects_726_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_726_type_relationship" "objects_726_id_relationship--45da5ed9-3a9b-4491-98cb-96db68e245bb" "objects_726_created_2020-12-14T14:52:03.184Z" "objects_726_x_mitre_version_1.0" "objects_726_external_references_0_source_name_Sophos Red Alert 2.0" "objects_726_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_726_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_726_x_mitre_deprecated_False" "objects_726_revoked_False" "objects_726_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has used malicious overlays to collect banking credentials.(Citation: Sophos Red Alert 2.0)" "objects_726_modified_2022-04-12T10:01:44.682Z" "objects_726_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_726_relationship_type_uses" "objects_726_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_726_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_726_x_mitre_attack_spec_version_2.1.0" "objects_726_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_726_spec_version_2.1" "objects_726_x_mitre_domains_0_mobile-attack" "objects_727_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_727_type_relationship" "objects_727_id_relationship--465b7a4a-32d5-475c-9fb9-6335c44fb0d1" "objects_727_created_2022-04-05T19:48:31.354Z" "objects_727_x_mitre_version_0.1" "objects_727_x_mitre_deprecated_False" "objects_727_revoked_False" "objects_727_description_" "objects_727_modified_2022-04-05T19:48:31.354Z" "objects_727_relationship_type_subtechnique-of" "objects_727_source_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_727_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_727_x_mitre_attack_spec_version_2.1.0" "objects_727_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_727_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_727_spec_version_2.1" "objects_727_x_mitre_domains_0_mobile-attack" "objects_728_type_relationship" "objects_728_id_relationship--465d14e7-eb9e-4794-9cb3-1de2cff86a8e" "objects_728_created_2020-01-27T17:05:58.335Z" "objects_728_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_728_revoked_False" "objects_728_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_728_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_728_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_728_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_728_modified_2023-04-05T17:28:07.442Z" "objects_728_description_[GolfSpy](https://attack.mitre.org/software/S0421) registers for the `USER_PRESENT` broadcast intent and uses it as a trigger to take photos with the front-facing camera.(Citation: Trend Micro Bouncing Golf 2019)" "objects_728_relationship_type_uses" "objects_728_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_728_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_728_x_mitre_deprecated_False" "objects_728_x_mitre_version_1.0" "objects_728_x_mitre_attack_spec_version_3.1.0" "objects_728_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_728_spec_version_2.1" "objects_728_x_mitre_domains_0_mobile-attack" "objects_729_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_729_id_relationship--4761145d-34ac-4b45-a0d6-a09b1907a196" "objects_729_type_relationship" "objects_729_created_2020-12-18T20:14:47.367Z" "objects_729_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_729_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_729_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_729_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_729_modified_2020-12-18T20:14:47.367Z" "objects_729_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) can inject clicks to launch applications, share posts on social media, and interact with WebViews to perform fraudulent actions.(Citation: WhiteOps TERRACOTTA)" "objects_729_relationship_type_uses" "objects_729_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_729_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_729_x_mitre_version_1.0" "objects_729_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_729_spec_version_2.1" "objects_729_x_mitre_attack_spec_version_2.1.0" "objects_729_x_mitre_domains_0_mobile-attack" "objects_730_type_relationship" "objects_730_id_relationship--476e269e-3c49-4fda-a54b-3f0cb577c5af" "objects_730_created_2020-12-14T14:52:03.322Z" "objects_730_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_730_revoked_False" "objects_730_external_references_0_source_name_Sophos Red Alert 2.0" "objects_730_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_730_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_730_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_730_modified_2023-04-05T17:52:58.974Z" "objects_730_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can collect the device\u2019s contact list.(Citation: Sophos Red Alert 2.0)" "objects_730_relationship_type_uses" "objects_730_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_730_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_730_x_mitre_deprecated_False" "objects_730_x_mitre_version_1.0" "objects_730_x_mitre_attack_spec_version_3.1.0" "objects_730_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_730_spec_version_2.1" "objects_730_x_mitre_domains_0_mobile-attack" "objects_731_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_731_type_relationship" "objects_731_id_relationship--477edf7d-cc1f-49b7-9d96-f88399808775" "objects_731_created_2022-04-05T20:15:43.660Z" "objects_731_x_mitre_version_0.1" "objects_731_x_mitre_deprecated_False" "objects_731_revoked_False" "objects_731_description_" "objects_731_modified_2022-04-05T20:15:43.660Z" "objects_731_relationship_type_subtechnique-of" "objects_731_source_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_731_target_ref_attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84" "objects_731_x_mitre_attack_spec_version_2.1.0" "objects_731_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_731_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_731_spec_version_2.1" "objects_731_x_mitre_domains_0_mobile-attack" "objects_732_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_732_id_relationship--4819f391-01de-4525-992b-7e4a4f6667de" "objects_732_type_relationship" "objects_732_created_2020-11-20T15:46:51.603Z" "objects_732_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_732_external_references_0_source_name_Symantec GoldenCup" "objects_732_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_732_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_732_modified_2020-11-20T15:46:51.603Z" "objects_732_description_[Golden Cup](https://attack.mitre.org/software/S0535) can take pictures with the camera.(Citation: Symantec GoldenCup)" "objects_732_relationship_type_uses" "objects_732_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_732_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_732_x_mitre_version_1.0" "objects_732_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_732_spec_version_2.1" "objects_732_x_mitre_attack_spec_version_2.1.0" "objects_732_x_mitre_domains_0_mobile-attack" "objects_733_type_relationship" "objects_733_id_relationship--481e5d33-eca4-453c-9fec-27ee01d50989" "objects_733_created_2023-02-28T21:45:41.365Z" "objects_733_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_733_revoked_False" "objects_733_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_733_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_733_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_733_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_733_modified_2023-03-29T21:26:12.006Z" "objects_733_description_[TangleBot](https://attack.mitre.org/software/S1069) can request permission to view files and media.(Citation: cloudmark_tanglebot_0921)" "objects_733_relationship_type_uses" "objects_733_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_733_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_733_x_mitre_deprecated_False" "objects_733_x_mitre_version_0.1" "objects_733_x_mitre_attack_spec_version_3.1.0" "objects_733_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_733_spec_version_2.1" "objects_733_x_mitre_domains_0_mobile-attack" "objects_734_type_relationship" "objects_734_id_relationship--48486680-530c-4ed9-aca3-94969aa262b6" "objects_734_created_2019-07-10T15:35:43.665Z" "objects_734_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_734_revoked_False" "objects_734_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_734_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_734_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_734_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_734_modified_2023-04-05T17:38:00.609Z" "objects_734_description_[Pallas](https://attack.mitre.org/software/S0399) accesses and exfiltrates the call log.(Citation: Lookout Dark Caracal Jan 2018)" "objects_734_relationship_type_uses" "objects_734_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_734_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_734_x_mitre_deprecated_False" "objects_734_x_mitre_version_1.0" "objects_734_x_mitre_attack_spec_version_3.1.0" "objects_734_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_734_spec_version_2.1" "objects_734_x_mitre_domains_0_mobile-attack" "objects_735_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_735_type_relationship" "objects_735_id_relationship--48552acc-5f1a-422f-90fa-37108446f36d" "objects_735_created_2022-03-30T19:14:20.374Z" "objects_735_x_mitre_version_0.1" "objects_735_x_mitre_deprecated_False" "objects_735_revoked_False" "objects_735_description_" "objects_735_modified_2022-03-30T19:14:20.374Z" "objects_735_relationship_type_revoked-by" "objects_735_source_ref_attack-pattern--039bc59c-ecc7-4997-b2b4-4ab728bd91aa" "objects_735_target_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_735_x_mitre_attack_spec_version_2.1.0" "objects_735_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_735_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_735_spec_version_2.1" "objects_735_x_mitre_domains_0_mobile-attack" "objects_736_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_736_type_relationship" "objects_736_id_relationship--48854999-1c12-4454-bb7c-051691a081f9" "objects_736_created_2022-03-28T19:25:49.640Z" "objects_736_x_mitre_version_0.1" "objects_736_x_mitre_deprecated_False" "objects_736_revoked_False" "objects_736_description_Ensure Verified Boot is enabled on devices with that capability." "objects_736_modified_2022-03-28T19:25:49.640Z" "objects_736_relationship_type_mitigates" "objects_736_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_736_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_736_x_mitre_attack_spec_version_2.1.0" "objects_736_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_736_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_736_spec_version_2.1" "objects_736_x_mitre_domains_0_mobile-attack" "objects_737_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_737_type_relationship" "objects_737_id_relationship--4896e256-fb04-403c-bbb7-2323b158a6e0" "objects_737_created_2022-03-30T19:52:05.143Z" "objects_737_x_mitre_version_0.1" "objects_737_x_mitre_deprecated_False" "objects_737_revoked_False" "objects_737_description_" "objects_737_modified_2022-03-30T19:52:05.143Z" "objects_737_relationship_type_subtechnique-of" "objects_737_source_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_737_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_737_x_mitre_attack_spec_version_2.1.0" "objects_737_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_737_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_737_spec_version_2.1" "objects_737_x_mitre_domains_0_mobile-attack" "objects_738_type_relationship" "objects_738_id_relationship--4897ef75-0035-4ae5-b325-de2f6b27565f" "objects_738_created_2023-09-21T22:31:28.428Z" "objects_738_revoked_False" "objects_738_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_738_modified_2023-09-21T22:31:28.428Z" "objects_738_description_Application vetting services may look for indications that the application\u2019s update includes malicious code at runtime. " "objects_738_relationship_type_detects" "objects_738_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_738_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_738_x_mitre_deprecated_False" "objects_738_x_mitre_version_0.1" "objects_738_x_mitre_attack_spec_version_3.1.0" "objects_738_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_738_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_738_spec_version_2.1" "objects_738_x_mitre_domains_0_mobile-attack" "objects_739_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_739_id_relationship--48c0d9f7-9293-4f38-8ae5-9f5342621f74" "objects_739_type_relationship" "objects_739_created_2021-01-05T20:16:20.511Z" "objects_739_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_739_external_references_0_source_name_Zscaler TikTok Spyware" "objects_739_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_739_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_739_modified_2021-01-05T20:16:20.511Z" "objects_739_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has contained an alarm that triggers every three minutes and timers for communicating with the C2.(Citation: Zscaler TikTok Spyware)" "objects_739_relationship_type_uses" "objects_739_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_739_target_ref_attack-pattern--00290ac5-551e-44aa-bbd8-c4b913488a6d" "objects_739_x_mitre_version_1.0" "objects_739_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_739_spec_version_2.1" "objects_739_x_mitre_attack_spec_version_2.1.0" "objects_739_x_mitre_domains_0_mobile-attack" "objects_740_type_relationship" "objects_740_id_relationship--48cd0af5-9ad1-44b3-beeb-d576974dadee" "objects_740_created_2023-09-28T17:19:00.464Z" "objects_740_revoked_False" "objects_740_external_references_0_source_name_Bleeipng Computer Escobar" "objects_740_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_740_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_740_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_740_modified_2023-09-28T17:19:00.464Z" "objects_740_description_[Escobar](https://attack.mitre.org/software/S1092) can request the `DISABLE_KEYGUARD` permission to disable the device lock screen password.(Citation: Bleeipng Computer Escobar)" "objects_740_relationship_type_uses" "objects_740_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_740_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_740_x_mitre_deprecated_False" "objects_740_x_mitre_version_0.1" "objects_740_x_mitre_attack_spec_version_3.2.0" "objects_740_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_740_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_740_spec_version_2.1" "objects_740_x_mitre_domains_0_mobile-attack" "objects_741_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_741_id_relationship--4920a041-86f7-495b-896c-4d964950ed7e" "objects_741_type_relationship" "objects_741_created_2020-12-17T20:15:22.454Z" "objects_741_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_741_external_references_0_source_name_Palo Alto HenBox" "objects_741_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_741_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_741_modified_2020-12-17T20:15:22.454Z" "objects_741_description_[HenBox](https://attack.mitre.org/software/S0544) has contained native libraries.(Citation: Palo Alto HenBox)" "objects_741_relationship_type_uses" "objects_741_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_741_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_741_x_mitre_version_1.0" "objects_741_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_741_spec_version_2.1" "objects_741_x_mitre_attack_spec_version_2.1.0" "objects_741_x_mitre_domains_0_mobile-attack" "objects_742_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_742_type_relationship" "objects_742_id_relationship--492d5699-f885-411a-8431-254fcf33fb12" "objects_742_created_2019-08-09T16:14:58.367Z" "objects_742_x_mitre_version_1.0" "objects_742_external_references_0_source_name_Android Capture Sensor 2019" "objects_742_external_references_0_url_https://developer.android.com/about/versions/pie/android-9.0-changes-all#bg-sensor-access" "objects_742_external_references_0_description_Android Developers. (, January). Android 9+ Privacy Changes . Retrieved August 27, 2019." "objects_742_x_mitre_deprecated_False" "objects_742_revoked_False" "objects_742_description_Android 9 and above restricts access to the mic, camera, and other device sensors from applications running in the background. iOS 14 and Android 12 introduced a visual indicator on the status bar (green dot) when an application is accessing the device\u2019s camera.(Citation: Android Capture Sensor 2019)" "objects_742_modified_2022-04-01T13:56:12.774Z" "objects_742_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_742_relationship_type_mitigates" "objects_742_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_742_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_742_x_mitre_attack_spec_version_2.1.0" "objects_742_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_742_spec_version_2.1" "objects_742_x_mitre_domains_0_mobile-attack" "objects_743_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_743_type_relationship" "objects_743_id_relationship--4943cca6-69b1-4565-ac09-87ebda04584c" "objects_743_created_2022-04-01T18:52:02.211Z" "objects_743_x_mitre_version_0.1" "objects_743_x_mitre_deprecated_False" "objects_743_revoked_False" "objects_743_description_Users should be taught the dangers of rooting or jailbreaking their device." "objects_743_modified_2022-04-01T18:52:02.211Z" "objects_743_relationship_type_mitigates" "objects_743_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_743_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_743_x_mitre_attack_spec_version_2.1.0" "objects_743_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_743_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_743_spec_version_2.1" "objects_743_x_mitre_domains_0_mobile-attack" "objects_744_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_744_id_relationship--496976ef-4a0c-4782-95e7-231bd44df162" "objects_744_type_relationship" "objects_744_created_2020-12-14T15:02:35.295Z" "objects_744_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_744_external_references_0_source_name_Securelist Asacub" "objects_744_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_744_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_744_modified_2020-12-14T15:02:35.295Z" "objects_744_description_[Asacub](https://attack.mitre.org/software/S0540) can collect various pieces of device information, including device model and OS version.(Citation: Securelist Asacub)" "objects_744_relationship_type_uses" "objects_744_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_744_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_744_x_mitre_version_1.0" "objects_744_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_744_spec_version_2.1" "objects_744_x_mitre_attack_spec_version_2.1.0" "objects_744_x_mitre_domains_0_mobile-attack" "objects_745_type_relationship" "objects_745_id_relationship--49c0c003-433c-467f-93b7-ca585aab8232" "objects_745_created_2023-08-16T16:46:17.841Z" "objects_745_revoked_False" "objects_745_external_references_0_source_name_cyble_chameleon_0423" "objects_745_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_745_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_745_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_745_modified_2023-08-16T16:46:17.841Z" "objects_745_description_[Chameleon](https://attack.mitre.org/software/S1083) can register as an `SMSBroadcast` receiver to monitor incoming SMS messages.(Citation: cyble_chameleon_0423)" "objects_745_relationship_type_uses" "objects_745_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_745_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_745_x_mitre_deprecated_False" "objects_745_x_mitre_version_0.1" "objects_745_x_mitre_attack_spec_version_3.1.0" "objects_745_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_745_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_745_spec_version_2.1" "objects_745_x_mitre_domains_0_mobile-attack" "objects_746_type_relationship" "objects_746_id_relationship--4a408dee-07da-4855-b2ff-be512480ccb5" "objects_746_created_2023-01-19T18:08:41.596Z" "objects_746_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_746_revoked_False" "objects_746_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_746_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_746_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_746_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_746_modified_2023-03-29T21:18:05.095Z" "objects_746_description_[TianySpy](https://attack.mitre.org/software/S1056) can gather device UDIDs.(Citation: trendmicro_tianyspy_0122) " "objects_746_relationship_type_uses" "objects_746_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_746_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_746_x_mitre_deprecated_False" "objects_746_x_mitre_version_0.1" "objects_746_x_mitre_attack_spec_version_3.1.0" "objects_746_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_746_spec_version_2.1" "objects_746_x_mitre_domains_0_mobile-attack" "objects_747_type_relationship" "objects_747_id_relationship--4a4aba6e-2dc4-43a5-bcac-876c89114a57" "objects_747_created_2023-03-20T18:43:49.345Z" "objects_747_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_747_revoked_False" "objects_747_external_references_0_source_name_Android-AppLinks" "objects_747_external_references_0_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_747_external_references_0_url_https://developer.android.com/training/app-links/index.html" "objects_747_external_references_1_source_name_IETF-OAuthNativeApps" "objects_747_external_references_1_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_747_external_references_1_url_https://tools.ietf.org/html/rfc8252" "objects_747_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_747_modified_2023-08-09T16:09:09.008Z" "objects_747_description_When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)" "objects_747_relationship_type_detects" "objects_747_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_747_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_747_x_mitre_deprecated_False" "objects_747_x_mitre_version_0.1" "objects_747_x_mitre_attack_spec_version_3.1.0" "objects_747_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_747_spec_version_2.1" "objects_747_x_mitre_domains_0_mobile-attack" "objects_748_type_relationship" "objects_748_id_relationship--4a608d3b-aa02-4563-8b6b-c64a491856f5" "objects_748_created_2023-03-03T16:26:20.400Z" "objects_748_revoked_False" "objects_748_external_references_0_source_name_paloalto_yispecter_1015" "objects_748_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_748_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_748_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_748_modified_2023-03-03T16:26:20.400Z" "objects_748_description_[YiSpecter](https://attack.mitre.org/software/S0311) has collected information about running processes.(Citation: paloalto_yispecter_1015)" "objects_748_relationship_type_uses" "objects_748_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_748_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_748_x_mitre_deprecated_False" "objects_748_x_mitre_version_0.1" "objects_748_x_mitre_attack_spec_version_3.1.0" "objects_748_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_748_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_748_spec_version_2.1" "objects_748_x_mitre_domains_0_mobile-attack" "objects_749_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_749_id_relationship--4a67b14a-e489-4e8f-b545-5bdf134e146e" "objects_749_type_relationship" "objects_749_created_2020-04-24T15:06:33.519Z" "objects_749_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_749_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_749_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_749_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_749_modified_2020-04-24T15:06:33.519Z" "objects_749_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect messages from GSM, WhatsApp, Telegram, Facebook, and Threema by reading the application\u2019s notification content.(Citation: TrendMicro Coronavirus Updates)" "objects_749_relationship_type_uses" "objects_749_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_749_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_749_x_mitre_version_1.0" "objects_749_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_749_spec_version_2.1" "objects_749_x_mitre_attack_spec_version_2.1.0" "objects_749_x_mitre_domains_0_mobile-attack" "objects_750_type_relationship" "objects_750_id_relationship--4a77c56b-ed2c-4e43-bd0f-7acf9cce1952" "objects_750_created_2020-04-24T17:46:31.564Z" "objects_750_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_750_revoked_False" "objects_750_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_750_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_750_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_750_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_750_modified_2023-04-05T20:25:55.378Z" "objects_750_description_[TrickMo](https://attack.mitre.org/software/S0427) can intercept SMS messages.(Citation: SecurityIntelligence TrickMo)" "objects_750_relationship_type_uses" "objects_750_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_750_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_750_x_mitre_deprecated_False" "objects_750_x_mitre_version_1.0" "objects_750_x_mitre_attack_spec_version_3.1.0" "objects_750_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_750_spec_version_2.1" "objects_750_x_mitre_domains_0_mobile-attack" "objects_751_type_relationship" "objects_751_id_relationship--4a936488-526c-40c1-b2d5-490052cb0e73" "objects_751_created_2020-12-31T18:25:05.162Z" "objects_751_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_751_revoked_False" "objects_751_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_751_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_751_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_751_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_751_modified_2023-04-05T21:22:53.698Z" "objects_751_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) can run bash commands.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_751_relationship_type_uses" "objects_751_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_751_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_751_x_mitre_deprecated_False" "objects_751_x_mitre_version_1.0" "objects_751_x_mitre_attack_spec_version_3.1.0" "objects_751_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_751_spec_version_2.1" "objects_751_x_mitre_domains_0_mobile-attack" "objects_752_type_relationship" "objects_752_id_relationship--4aae6ab8-2a67-4780-a69e-b15ecff7fc5d" "objects_752_created_2023-02-28T21:43:12.487Z" "objects_752_revoked_False" "objects_752_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_752_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_752_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_752_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_752_modified_2023-02-28T21:43:12.487Z" "objects_752_description_[TangleBot](https://attack.mitre.org/software/S1069) can make and block phone calls.(Citation: cloudmark_tanglebot_0921)" "objects_752_relationship_type_uses" "objects_752_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_752_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_752_x_mitre_deprecated_False" "objects_752_x_mitre_version_0.1" "objects_752_x_mitre_attack_spec_version_3.1.0" "objects_752_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_752_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_752_spec_version_2.1" "objects_752_x_mitre_domains_0_mobile-attack" "objects_753_type_relationship" "objects_753_id_relationship--4ab1867c-b924-4b0d-a332-c0e150a28d7d" "objects_753_created_2023-03-16T18:28:40.419Z" "objects_753_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_753_revoked_False" "objects_753_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_753_modified_2023-08-10T22:11:01.943Z" "objects_753_description_Application vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. " "objects_753_relationship_type_detects" "objects_753_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_753_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_753_x_mitre_deprecated_False" "objects_753_x_mitre_version_0.1" "objects_753_x_mitre_attack_spec_version_3.1.0" "objects_753_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_753_spec_version_2.1" "objects_753_x_mitre_domains_0_mobile-attack" "objects_754_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_754_id_relationship--4ad83f33-c64a-4ad6-ab6f-0548c9dde257" "objects_754_type_relationship" "objects_754_created_2020-10-29T17:48:27.469Z" "objects_754_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_754_external_references_0_source_name_Threat Fabric Exobot" "objects_754_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_754_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_754_modified_2020-10-29T17:48:27.469Z" "objects_754_description_[Exobot](https://attack.mitre.org/software/S0522) can forward SMS messages.(Citation: Threat Fabric Exobot)" "objects_754_relationship_type_uses" "objects_754_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_754_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_754_x_mitre_version_1.0" "objects_754_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_754_spec_version_2.1" "objects_754_x_mitre_attack_spec_version_2.1.0" "objects_754_x_mitre_domains_0_mobile-attack" "objects_755_type_relationship" "objects_755_id_relationship--4ae0c45f-4ff0-4296-aaf4-c3e0d2e355e3" "objects_755_created_2020-09-15T15:18:12.462Z" "objects_755_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_755_revoked_False" "objects_755_external_references_0_source_name_Cybereason FakeSpy" "objects_755_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_755_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_755_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_755_modified_2023-04-05T20:42:40.327Z" "objects_755_description_[FakeSpy](https://attack.mitre.org/software/S0509) can hide its icon if it detects that it is being run on an emulator.(Citation: Cybereason FakeSpy)" "objects_755_relationship_type_uses" "objects_755_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_755_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_755_x_mitre_deprecated_False" "objects_755_x_mitre_version_1.0" "objects_755_x_mitre_attack_spec_version_3.1.0" "objects_755_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_755_spec_version_2.1" "objects_755_x_mitre_domains_0_mobile-attack" "objects_756_type_relationship" "objects_756_id_relationship--4aec0738-2c76-4dc7-af8a-87785e658193" "objects_756_created_2021-10-01T14:42:49.152Z" "objects_756_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_756_revoked_False" "objects_756_external_references_0_source_name_SecureList BusyGasper" "objects_756_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_756_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_756_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_756_modified_2023-04-05T17:26:18.801Z" "objects_756_description_[BusyGasper](https://attack.mitre.org/software/S0655) can run shell commands.(Citation: SecureList BusyGasper)" "objects_756_relationship_type_uses" "objects_756_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_756_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_756_x_mitre_deprecated_False" "objects_756_x_mitre_version_1.0" "objects_756_x_mitre_attack_spec_version_3.1.0" "objects_756_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_756_spec_version_2.1" "objects_756_x_mitre_domains_0_mobile-attack" "objects_757_type_relationship" "objects_757_id_relationship--4af26643-880f-4c34-a4a8-23e89b950c9d" "objects_757_created_2019-09-04T15:38:56.883Z" "objects_757_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_757_revoked_False" "objects_757_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_757_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_757_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_757_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_757_modified_2023-04-05T20:18:38.582Z" "objects_757_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can collect the device calendars.(Citation: CyberMerchants-FlexiSpy)" "objects_757_relationship_type_uses" "objects_757_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_757_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_757_x_mitre_deprecated_False" "objects_757_x_mitre_version_1.0" "objects_757_x_mitre_attack_spec_version_3.1.0" "objects_757_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_757_spec_version_2.1" "objects_757_x_mitre_domains_0_mobile-attack" "objects_758_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_758_id_relationship--4b16e681-9542-4f32-b23a-f1b0caf44b6a" "objects_758_type_relationship" "objects_758_created_2020-12-24T21:55:56.726Z" "objects_758_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_758_external_references_0_source_name_Lookout Uyghur Campaign" "objects_758_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_758_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_758_modified_2020-12-24T21:55:56.726Z" "objects_758_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has downloaded additional code to root devices, such as TowelRoot.(Citation: Lookout Uyghur Campaign)" "objects_758_relationship_type_uses" "objects_758_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_758_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_758_x_mitre_version_1.0" "objects_758_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_758_spec_version_2.1" "objects_758_x_mitre_attack_spec_version_2.1.0" "objects_758_x_mitre_domains_0_mobile-attack" "objects_759_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_759_type_relationship" "objects_759_id_relationship--4b3cfd7c-5e41-4d9e-8879-b126ba66eaf1" "objects_759_created_2021-10-01T14:42:49.176Z" "objects_759_x_mitre_version_1.0" "objects_759_external_references_0_source_name_SecureList BusyGasper" "objects_759_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_759_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_759_x_mitre_deprecated_False" "objects_759_revoked_False" "objects_759_description_[BusyGasper](https://attack.mitre.org/software/S0655) can collect every user screen tap and compare the input to a hardcoded list of coordinates to translate the input to a character.(Citation: SecureList BusyGasper)" "objects_759_modified_2022-04-15T17:33:49.565Z" "objects_759_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_759_relationship_type_uses" "objects_759_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_759_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_759_x_mitre_attack_spec_version_2.1.0" "objects_759_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_759_spec_version_2.1" "objects_759_x_mitre_domains_0_mobile-attack" "objects_760_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_760_id_relationship--4b68bcb1-a512-40f7-9aee-235b3668f022" "objects_760_type_relationship" "objects_760_created_2020-01-27T17:05:58.271Z" "objects_760_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_760_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_760_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_760_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_760_modified_2020-01-27T17:05:58.271Z" "objects_760_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain clipboard contents.(Citation: Trend Micro Bouncing Golf 2019)" "objects_760_relationship_type_uses" "objects_760_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_760_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_760_x_mitre_version_1.0" "objects_760_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_760_spec_version_2.1" "objects_760_x_mitre_attack_spec_version_2.1.0" "objects_760_x_mitre_domains_0_mobile-attack" "objects_761_type_relationship" "objects_761_id_relationship--4b7e117b-0c82-49d0-bee6-119158b3355b" "objects_761_created_2023-02-28T20:32:37.800Z" "objects_761_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_761_revoked_False" "objects_761_external_references_0_source_name_proofpoint_flubot_0421" "objects_761_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_761_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_761_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_761_modified_2023-02-28T20:32:50.168Z" "objects_761_description_[FluBot](https://attack.mitre.org/software/S1067) can disable Google Play Protect to prevent detection.(Citation: proofpoint_flubot_0421)" "objects_761_relationship_type_uses" "objects_761_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_761_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_761_x_mitre_deprecated_False" "objects_761_x_mitre_version_0.1" "objects_761_x_mitre_attack_spec_version_3.1.0" "objects_761_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_761_spec_version_2.1" "objects_761_x_mitre_domains_0_mobile-attack" "objects_762_type_relationship" "objects_762_id_relationship--4b838636-bfa4-4592-b72f-3044946b8187" "objects_762_created_2020-09-14T14:13:45.236Z" "objects_762_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_762_revoked_False" "objects_762_external_references_0_source_name_Lookout eSurv" "objects_762_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_762_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_762_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_762_modified_2023-04-05T17:53:16.656Z" "objects_762_description_[eSurv](https://attack.mitre.org/software/S0507) can exfiltrate the device\u2019s contact list.(Citation: Lookout eSurv)" "objects_762_relationship_type_uses" "objects_762_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_762_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_762_x_mitre_deprecated_False" "objects_762_x_mitre_version_1.0" "objects_762_x_mitre_attack_spec_version_3.1.0" "objects_762_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_762_spec_version_2.1" "objects_762_x_mitre_domains_0_mobile-attack" "objects_763_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_763_id_relationship--4b8d027d-5da2-4a01-ad31-b6644a5cda61" "objects_763_type_relationship" "objects_763_created_2020-04-24T15:06:33.495Z" "objects_763_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_763_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_763_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_763_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_763_modified_2020-04-24T15:06:33.495Z" "objects_763_description_[Corona Updates](https://attack.mitre.org/software/S0425) can track the device\u2019s location.(Citation: TrendMicro Coronavirus Updates)" "objects_763_relationship_type_uses" "objects_763_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_763_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_763_x_mitre_version_1.0" "objects_763_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_763_spec_version_2.1" "objects_763_x_mitre_attack_spec_version_2.1.0" "objects_763_x_mitre_domains_0_mobile-attack" "objects_764_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_764_id_relationship--4bdda427-2fff-428d-ba19-4bee5d2508e1" "objects_764_type_relationship" "objects_764_created_2021-02-08T16:36:20.801Z" "objects_764_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_764_external_references_0_source_name_BlackBerry Bahamut" "objects_764_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_764_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_764_modified_2021-05-24T13:16:56.571Z" "objects_764_description_[Windshift](https://attack.mitre.org/groups/G0112) has included video recording in the malicious apps deployed as part of Operation BULL.(Citation: BlackBerry Bahamut)" "objects_764_relationship_type_uses" "objects_764_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_764_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_764_x_mitre_version_1.0" "objects_764_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_764_spec_version_2.1" "objects_764_x_mitre_attack_spec_version_2.1.0" "objects_764_x_mitre_domains_0_mobile-attack" "objects_765_type_relationship" "objects_765_id_relationship--4c035760-9bf2-40cd-87d1-f286afd76376" "objects_765_created_2023-07-21T19:41:45.173Z" "objects_765_revoked_False" "objects_765_external_references_0_source_name_lookout_bouldspy_0423" "objects_765_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_765_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_765_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_765_modified_2023-07-21T19:41:45.173Z" "objects_765_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can collect clipboard data.(Citation: lookout_bouldspy_0423)" "objects_765_relationship_type_uses" "objects_765_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_765_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_765_x_mitre_deprecated_False" "objects_765_x_mitre_version_0.1" "objects_765_x_mitre_attack_spec_version_3.1.0" "objects_765_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_765_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_765_spec_version_2.1" "objects_765_x_mitre_domains_0_mobile-attack" "objects_766_type_relationship" "objects_766_id_relationship--4c6f1475-3b92-4a37-8bb5-4dcc69660b11" "objects_766_created_2022-09-29T20:08:54.389Z" "objects_766_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_766_revoked_False" "objects_766_external_references_0_source_name_Cylance Dust Storm" "objects_766_external_references_0_description_Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021." "objects_766_external_references_0_url_https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf" "objects_766_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_766_modified_2022-09-30T18:38:37.195Z" "objects_766_description_During [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016), the threat actors used Android backdoors capable of exfiltrating specific files directly from the infected devices.(Citation: Cylance Dust Storm)" "objects_766_relationship_type_uses" "objects_766_source_ref_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_766_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_766_x_mitre_deprecated_False" "objects_766_x_mitre_version_0.1" "objects_766_x_mitre_attack_spec_version_2.1.0" "objects_766_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_766_spec_version_2.1" "objects_766_x_mitre_domains_0_mobile-attack" "objects_767_type_relationship" "objects_767_id_relationship--4c7e776d-ed19-4e5a-842c-81612f5c07bd" "objects_767_created_2019-09-03T19:45:48.503Z" "objects_767_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_767_revoked_False" "objects_767_external_references_0_source_name_SWB Exodus March 2019" "objects_767_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_767_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_767_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_767_modified_2023-04-05T17:10:38.937Z" "objects_767_description_[Exodus](https://attack.mitre.org/software/S0405) Two can download the address book.(Citation: SWB Exodus March 2019) " "objects_767_relationship_type_uses" "objects_767_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_767_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_767_x_mitre_deprecated_False" "objects_767_x_mitre_version_1.0" "objects_767_x_mitre_attack_spec_version_3.1.0" "objects_767_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_767_spec_version_2.1" "objects_767_x_mitre_domains_0_mobile-attack" "objects_768_type_relationship" "objects_768_id_relationship--4cb926c1-c242-45c2-be46-07c22435a8a5" "objects_768_created_2022-09-30T19:23:02.689Z" "objects_768_revoked_False" "objects_768_external_references_0_source_name_Cylance Dust Storm" "objects_768_external_references_0_description_Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021." "objects_768_external_references_0_url_https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf" "objects_768_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_768_modified_2022-09-30T19:23:02.689Z" "objects_768_description_During [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016), the threat actors used Android backdoors that would send information and data from a victim's mobile device to the C2 servers.(Citation: Cylance Dust Storm)" "objects_768_relationship_type_uses" "objects_768_source_ref_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_768_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_768_x_mitre_deprecated_False" "objects_768_x_mitre_version_0.1" "objects_768_x_mitre_attack_spec_version_2.1.0" "objects_768_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_768_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_768_spec_version_2.1" "objects_768_x_mitre_domains_0_mobile-attack" "objects_769_type_relationship" "objects_769_id_relationship--4cc8a16f-562a-42c7-b5d9-10e1088af89c" "objects_769_created_2019-09-03T20:08:00.687Z" "objects_769_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_769_revoked_False" "objects_769_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_769_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_769_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_769_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_769_modified_2023-04-05T17:31:38.319Z" "objects_769_description_[Gustuff](https://attack.mitre.org/software/S0406) can intercept two-factor authentication codes transmitted via SMS.(Citation: Talos Gustuff Apr 2019) " "objects_769_relationship_type_uses" "objects_769_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_769_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_769_x_mitre_deprecated_False" "objects_769_x_mitre_version_1.0" "objects_769_x_mitre_attack_spec_version_3.1.0" "objects_769_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_769_spec_version_2.1" "objects_769_x_mitre_domains_0_mobile-attack" "objects_770_type_relationship" "objects_770_id_relationship--4cccb708-b51b-4e71-94a1-78d6819eaac1" "objects_770_created_2023-03-20T15:16:19.428Z" "objects_770_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_770_revoked_False" "objects_770_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_770_modified_2023-08-07T22:16:55.879Z" "objects_770_description_Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells." "objects_770_relationship_type_detects" "objects_770_source_ref_x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077" "objects_770_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_770_x_mitre_deprecated_False" "objects_770_x_mitre_version_0.1" "objects_770_x_mitre_attack_spec_version_3.1.0" "objects_770_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_770_spec_version_2.1" "objects_770_x_mitre_domains_0_mobile-attack" "objects_771_type_relationship" "objects_771_id_relationship--4d431474-1dcc-4d0e-9906-129eb02f00b3" "objects_771_created_2023-02-06T19:43:43.574Z" "objects_771_revoked_False" "objects_771_external_references_0_source_name_threatfabric_sova_0921" "objects_771_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_771_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_771_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_771_modified_2023-02-06T19:43:43.574Z" "objects_771_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can uninstall itself.(Citation: threatfabric_sova_0921)" "objects_771_relationship_type_uses" "objects_771_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_771_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_771_x_mitre_deprecated_False" "objects_771_x_mitre_version_0.1" "objects_771_x_mitre_attack_spec_version_3.1.0" "objects_771_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_771_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_771_spec_version_2.1" "objects_771_x_mitre_domains_0_mobile-attack" "objects_772_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_772_id_relationship--4d4dfc26-3ab7-4798-abf2-be8dc278fdfa" "objects_772_type_relationship" "objects_772_created_2020-11-24T17:55:12.804Z" "objects_772_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_772_external_references_0_source_name_Talos GPlayed" "objects_772_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_772_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_772_modified_2020-11-24T17:55:12.804Z" "objects_772_description_[GPlayed](https://attack.mitre.org/software/S0536) has the capability to remotely load plugins and download and compile new .NET code.(Citation: Talos GPlayed) " "objects_772_relationship_type_uses" "objects_772_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_772_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_772_x_mitre_version_1.0" "objects_772_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_772_spec_version_2.1" "objects_772_x_mitre_attack_spec_version_2.1.0" "objects_772_x_mitre_domains_0_mobile-attack" "objects_773_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_773_id_relationship--4d542595-1eb0-45aa-9702-9d494142b390" "objects_773_type_relationship" "objects_773_created_2019-08-09T18:08:07.109Z" "objects_773_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_773_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_773_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_773_external_references_0_source_name_Kaspersky-Skygofree" "objects_773_modified_2020-03-31T14:49:39.188Z" "objects_773_description_[Skygofree](https://attack.mitre.org/software/S0327) can record video or capture photos when an infected device is in a specified location.(Citation: Kaspersky-Skygofree)" "objects_773_relationship_type_uses" "objects_773_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_773_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_773_x_mitre_version_1.0" "objects_773_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_773_spec_version_2.1" "objects_773_x_mitre_attack_spec_version_2.1.0" "objects_773_x_mitre_domains_0_mobile-attack" "objects_774_type_relationship" "objects_774_id_relationship--4d6a900d-d1c4-4a91-bded-c9062aae384b" "objects_774_created_2021-01-05T20:16:20.492Z" "objects_774_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_774_revoked_False" "objects_774_external_references_0_source_name_Zscaler TikTok Spyware" "objects_774_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_774_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_774_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_774_modified_2023-04-05T17:47:18.774Z" "objects_774_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has registered for device boot, incoming, and outgoing calls broadcast intents.(Citation: Zscaler TikTok Spyware)" "objects_774_relationship_type_uses" "objects_774_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_774_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_774_x_mitre_deprecated_False" "objects_774_x_mitre_version_1.0" "objects_774_x_mitre_attack_spec_version_3.1.0" "objects_774_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_774_spec_version_2.1" "objects_774_x_mitre_domains_0_mobile-attack" "objects_775_type_relationship" "objects_775_id_relationship--4d7e937d-7ea1-49cb-939c-5244815e51d7" "objects_775_created_2017-12-14T16:46:06.044Z" "objects_775_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_775_revoked_False" "objects_775_external_references_0_source_name_FireEye-RuMMS" "objects_775_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_775_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_775_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_775_modified_2023-04-05T20:03:03.296Z" "objects_775_description_[RuMMS](https://attack.mitre.org/software/S0313) uses HTTP for command and control.(Citation: FireEye-RuMMS)" "objects_775_relationship_type_uses" "objects_775_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_775_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_775_x_mitre_deprecated_False" "objects_775_x_mitre_version_1.0" "objects_775_x_mitre_attack_spec_version_3.1.0" "objects_775_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_775_spec_version_2.1" "objects_775_x_mitre_domains_0_mobile-attack" "objects_776_type_relationship" "objects_776_id_relationship--4d88c5ac-68c0-4304-9474-d07372d0ad99" "objects_776_created_2023-09-21T22:19:04.080Z" "objects_776_revoked_False" "objects_776_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_776_modified_2023-09-21T22:19:04.080Z" "objects_776_description_Enterprises can provision policies to mobile devices for application allow-listing, ensuring only approved applications are installed onto mobile devices. " "objects_776_relationship_type_mitigates" "objects_776_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_776_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_776_x_mitre_deprecated_False" "objects_776_x_mitre_version_0.1" "objects_776_x_mitre_attack_spec_version_3.1.0" "objects_776_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_776_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_776_spec_version_2.1" "objects_776_x_mitre_domains_0_mobile-attack" "objects_777_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_777_type_relationship" "objects_777_id_relationship--4de3f794-63df-4f9e-8bd8-59796d91aa36" "objects_777_created_2020-05-07T15:33:32.895Z" "objects_777_x_mitre_version_1.0" "objects_777_external_references_0_source_name_CheckPoint Agent Smith" "objects_777_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_777_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_777_x_mitre_deprecated_False" "objects_777_revoked_False" "objects_777_description_[Agent Smith](https://attack.mitre.org/software/S0440) shows fraudulent ads to generate revenue.(Citation: CheckPoint Agent Smith)" "objects_777_modified_2022-04-19T14:25:41.669Z" "objects_777_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_777_relationship_type_uses" "objects_777_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_777_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_777_x_mitre_attack_spec_version_2.1.0" "objects_777_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_777_spec_version_2.1" "objects_777_x_mitre_domains_0_mobile-attack" "objects_778_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_778_id_relationship--4df6a22e-489f-400c-b953-cc53bfb708a3" "objects_778_type_relationship" "objects_778_created_2020-09-14T14:13:45.296Z" "objects_778_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_778_external_references_0_source_name_Lookout eSurv" "objects_778_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_778_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_778_modified_2020-09-14T14:13:45.296Z" "objects_778_description_[eSurv](https://attack.mitre.org/software/S0507)\u2019s iOS version can collect device information.(Citation: Lookout eSurv)" "objects_778_relationship_type_uses" "objects_778_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_778_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_778_x_mitre_version_1.0" "objects_778_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_778_spec_version_2.1" "objects_778_x_mitre_attack_spec_version_2.1.0" "objects_778_x_mitre_domains_0_mobile-attack" "objects_779_type_relationship" "objects_779_id_relationship--4e68feca-083f-40ed-88d8-2b6a3935c949" "objects_779_created_2023-01-18T19:12:11.201Z" "objects_779_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_779_revoked_False" "objects_779_external_references_0_source_name_cyble_drinik_1022" "objects_779_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_779_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_779_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_779_modified_2023-03-27T17:53:38.271Z" "objects_779_description_[Drinik](https://attack.mitre.org/software/S1054) can use the Android `CallScreeningService` to silently block incoming calls.(Citation: cyble_drinik_1022)" "objects_779_relationship_type_uses" "objects_779_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_779_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_779_x_mitre_deprecated_False" "objects_779_x_mitre_version_0.1" "objects_779_x_mitre_attack_spec_version_3.1.0" "objects_779_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_779_spec_version_2.1" "objects_779_x_mitre_domains_0_mobile-attack" "objects_780_type_relationship" "objects_780_id_relationship--4e6b726d-9ef4-4eb6-b9a7-74059caee5b7" "objects_780_created_2020-07-20T13:27:33.440Z" "objects_780_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_780_revoked_False" "objects_780_external_references_0_source_name_Talos-WolfRAT" "objects_780_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_780_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_780_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_780_modified_2023-04-05T20:26:22.984Z" "objects_780_description_[WolfRAT](https://attack.mitre.org/software/S0489) can collect SMS messages.(Citation: Talos-WolfRAT)" "objects_780_relationship_type_uses" "objects_780_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_780_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_780_x_mitre_deprecated_False" "objects_780_x_mitre_version_1.0" "objects_780_x_mitre_attack_spec_version_3.1.0" "objects_780_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_780_spec_version_2.1" "objects_780_x_mitre_domains_0_mobile-attack" "objects_781_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_781_id_relationship--4e7a1b10-0f68-4a48-a13d-0c7bc13fb819" "objects_781_type_relationship" "objects_781_created_2019-08-07T15:57:13.412Z" "objects_781_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_781_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_781_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_781_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_781_modified_2020-03-31T14:49:39.188Z" "objects_781_description_[Riltok](https://attack.mitre.org/software/S0403) can retrieve a list of installed applications. Installed application names are then checked against an adversary-defined list of targeted applications.(Citation: Kaspersky Riltok June 2019)" "objects_781_relationship_type_uses" "objects_781_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_781_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_781_x_mitre_version_1.0" "objects_781_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_781_spec_version_2.1" "objects_781_x_mitre_attack_spec_version_2.1.0" "objects_781_x_mitre_domains_0_mobile-attack" "objects_782_type_relationship" "objects_782_id_relationship--4e9f021d-3cf4-4790-8f7d-f87f33133446" "objects_782_created_2020-12-14T14:52:03.294Z" "objects_782_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_782_revoked_False" "objects_782_external_references_0_source_name_Sophos Red Alert 2.0" "objects_782_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_782_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_782_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_782_modified_2023-04-05T20:26:37.661Z" "objects_782_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can collect SMS messages.(Citation: Sophos Red Alert 2.0)" "objects_782_relationship_type_uses" "objects_782_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_782_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_782_x_mitre_deprecated_False" "objects_782_x_mitre_version_1.0" "objects_782_x_mitre_attack_spec_version_3.1.0" "objects_782_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_782_spec_version_2.1" "objects_782_x_mitre_domains_0_mobile-attack" "objects_783_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_783_type_relationship" "objects_783_id_relationship--4ee57616-7205-490c-86c3-c27dcffd8689" "objects_783_created_2022-04-06T13:35:43.203Z" "objects_783_x_mitre_version_0.1" "objects_783_x_mitre_deprecated_False" "objects_783_revoked_False" "objects_783_description_Recent OS versions have limited access to certain APIs unless certain conditions are met, making [Data Manipulation](https://attack.mitre.org/techniques/T1641) more difficult" "objects_783_modified_2022-04-06T13:35:43.203Z" "objects_783_relationship_type_mitigates" "objects_783_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_783_target_ref_attack-pattern--c548d8c4-a0a3-4a24-bb79-2a84abbc7b36" "objects_783_x_mitre_attack_spec_version_2.1.0" "objects_783_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_783_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_783_spec_version_2.1" "objects_783_x_mitre_domains_0_mobile-attack" "objects_784_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_784_id_relationship--4efa4953-7854-4144-8837-d7831ccbe35d" "objects_784_type_relationship" "objects_784_created_2020-04-24T17:46:31.691Z" "objects_784_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_784_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_784_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_784_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_784_modified_2020-04-24T17:46:31.691Z" "objects_784_description_[TrickMo](https://attack.mitre.org/software/S0427) can collect a list of installed applications.(Citation: SecurityIntelligence TrickMo)" "objects_784_relationship_type_uses" "objects_784_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_784_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_784_x_mitre_version_1.0" "objects_784_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_784_spec_version_2.1" "objects_784_x_mitre_attack_spec_version_2.1.0" "objects_784_x_mitre_domains_0_mobile-attack" "objects_785_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_785_type_relationship" "objects_785_id_relationship--4f2ae057-ef0b-4995-b24d-348a76a74a4f" "objects_785_created_2017-12-14T16:46:06.044Z" "objects_785_x_mitre_version_1.0" "objects_785_external_references_0_source_name_Lookout-Pegasus" "objects_785_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_785_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_785_x_mitre_deprecated_False" "objects_785_revoked_False" "objects_785_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) uses SMS for command and control.(Citation: Lookout-Pegasus)" "objects_785_modified_2022-04-19T14:25:41.669Z" "objects_785_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_785_relationship_type_uses" "objects_785_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_785_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_785_x_mitre_attack_spec_version_2.1.0" "objects_785_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_785_spec_version_2.1" "objects_785_x_mitre_domains_0_mobile-attack" "objects_786_type_relationship" "objects_786_id_relationship--4f366c8c-9c70-44ed-baa8-d433d5dbfe49" "objects_786_created_2017-12-14T16:46:06.044Z" "objects_786_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_786_revoked_False" "objects_786_external_references_0_source_name_Lookout-PegasusAndroid" "objects_786_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_786_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_786_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_786_modified_2023-04-05T17:13:18.720Z" "objects_786_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses call logs.(Citation: Lookout-PegasusAndroid)" "objects_786_relationship_type_uses" "objects_786_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_786_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_786_x_mitre_deprecated_False" "objects_786_x_mitre_version_1.0" "objects_786_x_mitre_attack_spec_version_3.1.0" "objects_786_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_786_spec_version_2.1" "objects_786_x_mitre_domains_0_mobile-attack" "objects_787_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_787_id_relationship--4f6f4def-e76d-4d1b-9416-b6543e7dbc54" "objects_787_type_relationship" "objects_787_created_2021-10-01T14:42:48.744Z" "objects_787_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_787_external_references_0_source_name_SecureList BusyGasper" "objects_787_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_787_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_787_modified_2021-10-01T14:42:48.744Z" "objects_787_description_[BusyGasper](https://attack.mitre.org/software/S0655) can record audio.(Citation: SecureList BusyGasper)" "objects_787_relationship_type_uses" "objects_787_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_787_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_787_x_mitre_version_1.0" "objects_787_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_787_spec_version_2.1" "objects_787_x_mitre_attack_spec_version_2.1.0" "objects_787_x_mitre_domains_0_mobile-attack" "objects_788_type_relationship" "objects_788_id_relationship--4f812a57-efdc-463b-bf37-baa4bca7502b" "objects_788_created_2020-05-04T14:22:20.348Z" "objects_788_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_788_revoked_False" "objects_788_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_788_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_788_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_788_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_788_modified_2023-04-05T20:35:00.081Z" "objects_788_description_[TrickMo](https://attack.mitre.org/software/S0427) can uninstall itself from a device on command by abusing the accessibility service.(Citation: SecurityIntelligence TrickMo) " "objects_788_relationship_type_uses" "objects_788_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_788_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_788_x_mitre_deprecated_False" "objects_788_x_mitre_version_1.0" "objects_788_x_mitre_attack_spec_version_3.1.0" "objects_788_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_788_spec_version_2.1" "objects_788_x_mitre_domains_0_mobile-attack" "objects_789_type_relationship" "objects_789_id_relationship--4fc165fd-185e-4c70-b423-c242cf715510" "objects_789_created_2019-10-07T16:32:27.127Z" "objects_789_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_789_revoked_False" "objects_789_external_references_0_source_name_securelist rotexy 2018" "objects_789_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_789_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_789_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_789_modified_2023-04-05T16:55:21.480Z" "objects_789_description_[Rotexy](https://attack.mitre.org/software/S0411) checks if it is running in an analysis environment.(Citation: securelist rotexy 2018) " "objects_789_relationship_type_uses" "objects_789_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_789_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_789_x_mitre_deprecated_False" "objects_789_x_mitre_version_1.0" "objects_789_x_mitre_attack_spec_version_3.1.0" "objects_789_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_789_spec_version_2.1" "objects_789_x_mitre_domains_0_mobile-attack" "objects_790_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_790_type_relationship" "objects_790_id_relationship--4ff5f854-bfe9-45bc-b11a-196cf826b760" "objects_790_created_2022-03-30T14:41:20.735Z" "objects_790_x_mitre_version_0.1" "objects_790_external_references_0_source_name_Android Changes to System Broadcasts" "objects_790_external_references_0_url_https://developer.android.com/guide/components/broadcasts#changes-system-broadcasts" "objects_790_external_references_0_description_Google. (2019, December 27). Broadcasts Overview. Retrieved January 27, 2020." "objects_790_x_mitre_deprecated_False" "objects_790_revoked_False" "objects_790_description_Android 8 introduced additional limitations on the implicit intents that an application can register for.(Citation: Android Changes to System Broadcasts)" "objects_790_modified_2022-03-30T14:41:20.735Z" "objects_790_relationship_type_mitigates" "objects_790_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_790_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_790_x_mitre_attack_spec_version_2.1.0" "objects_790_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_790_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_790_spec_version_2.1" "objects_790_x_mitre_domains_0_mobile-attack" "objects_791_type_relationship" "objects_791_id_relationship--4ff9b16f-3643-4fa0-b107-f93a9bb847c3" "objects_791_created_2023-02-28T21:44:45.063Z" "objects_791_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_791_revoked_False" "objects_791_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_791_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_791_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_791_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_791_modified_2023-03-29T21:26:33.166Z" "objects_791_description_[TangleBot](https://attack.mitre.org/software/S1069) can use overlays to cover legitimate applications or screens.(Citation: cloudmark_tanglebot_0921)" "objects_791_relationship_type_uses" "objects_791_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_791_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_791_x_mitre_deprecated_False" "objects_791_x_mitre_version_0.1" "objects_791_x_mitre_attack_spec_version_3.1.0" "objects_791_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_791_spec_version_2.1" "objects_791_x_mitre_domains_0_mobile-attack" "objects_792_type_relationship" "objects_792_id_relationship--5012c647-9b58-4a4f-b64f-468c9b76a60c" "objects_792_created_2017-12-14T16:46:06.044Z" "objects_792_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_792_revoked_False" "objects_792_external_references_0_source_name_Zscaler-SpyNote" "objects_792_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_792_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_792_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_792_modified_2023-04-05T17:53:41.561Z" "objects_792_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) can view contacts.(Citation: Zscaler-SpyNote)" "objects_792_relationship_type_uses" "objects_792_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_792_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_792_x_mitre_deprecated_False" "objects_792_x_mitre_version_1.0" "objects_792_x_mitre_attack_spec_version_3.1.0" "objects_792_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_792_spec_version_2.1" "objects_792_x_mitre_domains_0_mobile-attack" "objects_793_type_relationship" "objects_793_id_relationship--502fc83c-ce03-4ce7-a202-095bbe0b492b" "objects_793_created_2023-07-21T19:51:08.375Z" "objects_793_revoked_False" "objects_793_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_793_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_793_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_793_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_793_modified_2023-07-21T19:51:08.375Z" "objects_793_description_[Fakecalls](https://attack.mitre.org/software/S1080) can access a device\u2019s location.(Citation: kaspersky_fakecalls_0422)" "objects_793_relationship_type_uses" "objects_793_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_793_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_793_x_mitre_deprecated_False" "objects_793_x_mitre_version_0.1" "objects_793_x_mitre_attack_spec_version_3.1.0" "objects_793_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_793_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_793_spec_version_2.1" "objects_793_x_mitre_domains_0_mobile-attack" "objects_794_type_relationship" "objects_794_id_relationship--503ca6f2-a747-43fb-8fc5-7be095dcb966" "objects_794_created_2023-08-04T18:31:30.237Z" "objects_794_revoked_False" "objects_794_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_794_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_794_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_794_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_794_modified_2023-08-04T18:31:30.237Z" "objects_794_description_[Sunbird](https://attack.mitre.org/software/S1082) can access images stored on external storage.(Citation: lookout_hornbill_sunbird_0221)" "objects_794_relationship_type_uses" "objects_794_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_794_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_794_x_mitre_deprecated_False" "objects_794_x_mitre_version_0.1" "objects_794_x_mitre_attack_spec_version_3.1.0" "objects_794_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_794_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_794_spec_version_2.1" "objects_794_x_mitre_domains_0_mobile-attack" "objects_795_type_relationship" "objects_795_id_relationship--506d657b-1634-442e-8179-7187f82feb3a" "objects_795_created_2020-12-24T21:55:56.691Z" "objects_795_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_795_revoked_False" "objects_795_external_references_0_source_name_Lookout Uyghur Campaign" "objects_795_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_795_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_795_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_795_modified_2023-04-05T17:38:17.926Z" "objects_795_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed the call logs.(Citation: Lookout Uyghur Campaign)" "objects_795_relationship_type_uses" "objects_795_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_795_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_795_x_mitre_deprecated_False" "objects_795_x_mitre_version_1.0" "objects_795_x_mitre_attack_spec_version_3.1.0" "objects_795_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_795_spec_version_2.1" "objects_795_x_mitre_domains_0_mobile-attack" "objects_796_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_796_id_relationship--5088a10e-03d2-4643-8df8-b7b601c2cc24" "objects_796_type_relationship" "objects_796_created_2020-01-27T17:05:58.267Z" "objects_796_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_796_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_796_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_796_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_796_modified_2020-01-27T17:05:58.267Z" "objects_796_description_[GolfSpy](https://attack.mitre.org/software/S0421) can track the device\u2019s location.(Citation: Trend Micro Bouncing Golf 2019)" "objects_796_relationship_type_uses" "objects_796_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_796_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_796_x_mitre_version_1.0" "objects_796_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_796_spec_version_2.1" "objects_796_x_mitre_attack_spec_version_2.1.0" "objects_796_x_mitre_domains_0_mobile-attack" "objects_797_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_797_id_relationship--50ad2a8c-ed45-4376-be31-8bafa26ba794" "objects_797_type_relationship" "objects_797_created_2020-04-08T15:41:19.451Z" "objects_797_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_797_external_references_0_source_name_Cofense Anubis" "objects_797_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_797_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_797_modified_2020-04-08T15:41:19.451Z" "objects_797_description_[Anubis](https://attack.mitre.org/software/S0422) can collect the device\u2019s ID.(Citation: Cofense Anubis)" "objects_797_relationship_type_uses" "objects_797_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_797_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_797_x_mitre_version_1.0" "objects_797_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_797_spec_version_2.1" "objects_797_x_mitre_attack_spec_version_2.1.0" "objects_797_x_mitre_domains_0_mobile-attack" "objects_798_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_798_id_relationship--50bab448-fee6-49e9-a296-498fe06eacc7" "objects_798_type_relationship" "objects_798_created_2019-11-21T16:42:48.490Z" "objects_798_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_798_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_798_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_798_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_798_modified_2019-11-21T16:42:48.490Z" "objects_798_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can obtain a list of installed applications.(Citation: SecureList - ViceLeaker 2019)" "objects_798_relationship_type_uses" "objects_798_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_798_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_798_x_mitre_version_1.0" "objects_798_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_798_spec_version_2.1" "objects_798_x_mitre_attack_spec_version_2.1.0" "objects_798_x_mitre_domains_0_mobile-attack" "objects_799_type_relationship" "objects_799_id_relationship--50c81a85-8c70-48df-a338-8622d2debc74" "objects_799_created_2018-10-17T00:14:20.652Z" "objects_799_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_799_revoked_False" "objects_799_external_references_0_source_name_Lookout-StealthMango" "objects_799_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_799_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_799_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_799_modified_2023-04-05T17:38:39.008Z" "objects_799_description_[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to gather call logs.(Citation: Lookout-StealthMango)" "objects_799_relationship_type_uses" "objects_799_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_799_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_799_x_mitre_deprecated_False" "objects_799_x_mitre_version_1.0" "objects_799_x_mitre_attack_spec_version_3.1.0" "objects_799_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_799_spec_version_2.1" "objects_799_x_mitre_domains_0_mobile-attack" "objects_800_type_relationship" "objects_800_id_relationship--50d8e788-d405-45e8-b6b7-0f02f353cc97" "objects_800_created_2023-09-28T17:20:00.981Z" "objects_800_revoked_False" "objects_800_external_references_0_source_name_Bleeipng Computer Escobar" "objects_800_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_800_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_800_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_800_modified_2023-09-28T17:20:00.981Z" "objects_800_description_[Escobar](https://attack.mitre.org/software/S1092) can request coarse and fine location permissions to track the device.(Citation: Bleeipng Computer Escobar)" "objects_800_relationship_type_uses" "objects_800_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_800_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_800_x_mitre_deprecated_False" "objects_800_x_mitre_version_0.1" "objects_800_x_mitre_attack_spec_version_3.2.0" "objects_800_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_800_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_800_spec_version_2.1" "objects_800_x_mitre_domains_0_mobile-attack" "objects_801_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_801_id_relationship--50f03c00-5488-49fe-a527-a8776e526523" "objects_801_type_relationship" "objects_801_created_2020-11-24T17:55:12.820Z" "objects_801_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_801_external_references_0_source_name_Talos GPlayed" "objects_801_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_801_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_801_modified_2020-11-24T17:55:12.820Z" "objects_801_description_[GPlayed](https://attack.mitre.org/software/S0536) can collect a list of installed applications.(Citation: Talos GPlayed)" "objects_801_relationship_type_uses" "objects_801_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_801_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_801_x_mitre_version_1.0" "objects_801_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_801_spec_version_2.1" "objects_801_x_mitre_attack_spec_version_2.1.0" "objects_801_x_mitre_domains_0_mobile-attack" "objects_802_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_802_id_relationship--5107be8a-b5fc-4442-af0d-2c92e086a912" "objects_802_type_relationship" "objects_802_created_2020-05-11T16:13:43.062Z" "objects_802_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_802_external_references_0_source_name_CheckPoint Agent Smith" "objects_802_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_802_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_802_modified_2020-05-11T16:13:43.062Z" "objects_802_description_[Agent Smith](https://attack.mitre.org/software/S0440) checks if a targeted application is running in user-space prior to infection.(Citation: CheckPoint Agent Smith) " "objects_802_relationship_type_uses" "objects_802_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_802_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_802_x_mitre_version_1.0" "objects_802_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_802_spec_version_2.1" "objects_802_x_mitre_attack_spec_version_2.1.0" "objects_802_x_mitre_domains_0_mobile-attack" "objects_803_type_relationship" "objects_803_id_relationship--51457698-e98b-435a-88c2-75a82cdc2bda" "objects_803_created_2018-10-17T00:14:20.652Z" "objects_803_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_803_revoked_False" "objects_803_external_references_0_source_name_Lookout-StealthMango" "objects_803_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_803_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_803_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_803_modified_2023-04-05T17:38:56.380Z" "objects_803_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uploads call logs.(Citation: Lookout-StealthMango)" "objects_803_relationship_type_uses" "objects_803_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_803_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_803_x_mitre_deprecated_False" "objects_803_x_mitre_version_1.0" "objects_803_x_mitre_attack_spec_version_3.1.0" "objects_803_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_803_spec_version_2.1" "objects_803_x_mitre_domains_0_mobile-attack" "objects_804_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_804_type_relationship" "objects_804_id_relationship--5151b976-cfcf-4771-a75a-995d49bcc1ab" "objects_804_created_2022-04-11T20:06:38.811Z" "objects_804_x_mitre_version_0.1" "objects_804_x_mitre_deprecated_False" "objects_804_revoked_False" "objects_804_description_Mobile security products that are part of the Samsung Knox for Mobile Threat Defense program could examine running applications while the device is idle, potentially detecting malicious applications that are running primarily when the device is not being used." "objects_804_modified_2022-04-11T20:06:38.811Z" "objects_804_relationship_type_mitigates" "objects_804_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_804_target_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_804_x_mitre_attack_spec_version_2.1.0" "objects_804_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_804_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_804_spec_version_2.1" "objects_804_x_mitre_domains_0_mobile-attack" "objects_805_type_relationship" "objects_805_id_relationship--51757971-17ac-40c3-bae7-78365579db49" "objects_805_created_2017-12-14T16:46:06.044Z" "objects_805_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_805_revoked_False" "objects_805_external_references_0_source_name_TrendMicro-Obad" "objects_805_external_references_0_description_Veo Zhang. (2013, June 13). Cybercriminals Improve Android Malware Stealth Routines with OBAD. Retrieved December 9, 2016." "objects_805_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-improve-android-malware-stealth-routines-with-obad/" "objects_805_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_805_modified_2023-04-05T17:02:27.188Z" "objects_805_description_[OBAD](https://attack.mitre.org/software/S0286) abuses device administrator access to make it more difficult for users to remove the application.(Citation: TrendMicro-Obad)" "objects_805_relationship_type_uses" "objects_805_source_ref_malware--ca4f63b9-a358-4214-bb26-8c912318cfde" "objects_805_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_805_x_mitre_deprecated_False" "objects_805_x_mitre_version_1.0" "objects_805_x_mitre_attack_spec_version_3.1.0" "objects_805_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_805_spec_version_2.1" "objects_805_x_mitre_domains_0_mobile-attack" "objects_806_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_806_id_relationship--51b0a4fb-a308-4694-9437-95702a50ebd5" "objects_806_type_relationship" "objects_806_created_2020-09-11T16:22:03.231Z" "objects_806_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_806_external_references_0_source_name_Lookout ViperRAT" "objects_806_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_806_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_806_modified_2020-09-11T16:22:03.231Z" "objects_806_description_[ViperRAT](https://attack.mitre.org/software/S0506) can take photos with the device camera.(Citation: Lookout ViperRAT)" "objects_806_relationship_type_uses" "objects_806_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_806_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_806_x_mitre_version_1.0" "objects_806_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_806_spec_version_2.1" "objects_806_x_mitre_attack_spec_version_2.1.0" "objects_806_x_mitre_domains_0_mobile-attack" "objects_807_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_807_type_relationship" "objects_807_id_relationship--51bf6ffc-85c7-4910-8821-9736a1ec60f1" "objects_807_created_2019-09-04T15:38:57.037Z" "objects_807_x_mitre_version_1.0" "objects_807_external_references_0_source_name_FlexiSpy-Features" "objects_807_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_807_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_807_x_mitre_deprecated_False" "objects_807_revoked_False" "objects_807_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can record keystrokes and analyze them for keywords.(Citation: FlexiSpy-Features)" "objects_807_modified_2022-04-15T17:34:17.813Z" "objects_807_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_807_relationship_type_uses" "objects_807_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_807_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_807_x_mitre_attack_spec_version_2.1.0" "objects_807_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_807_spec_version_2.1" "objects_807_x_mitre_domains_0_mobile-attack" "objects_808_type_relationship" "objects_808_id_relationship--51d31e17-6c80-4ab3-9e8e-6231483e0999" "objects_808_created_2020-11-24T17:55:12.818Z" "objects_808_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_808_revoked_False" "objects_808_external_references_0_source_name_Talos GPlayed" "objects_808_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_808_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_808_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_808_modified_2023-04-05T17:21:12.197Z" "objects_808_description_[GPlayed](https://attack.mitre.org/software/S0536) can register for the `BOOT_COMPLETED` broadcast intent.(Citation: Talos GPlayed)" "objects_808_relationship_type_uses" "objects_808_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_808_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_808_x_mitre_deprecated_False" "objects_808_x_mitre_version_1.0" "objects_808_x_mitre_attack_spec_version_3.1.0" "objects_808_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_808_spec_version_2.1" "objects_808_x_mitre_domains_0_mobile-attack" "objects_809_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_809_type_relationship" "objects_809_id_relationship--51f75dd5-b584-482f-8f7f-dbee2d5cf6f3" "objects_809_created_2019-10-18T15:51:48.487Z" "objects_809_x_mitre_version_1.0" "objects_809_x_mitre_deprecated_False" "objects_809_revoked_False" "objects_809_description_Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as keyboard registration or accessibility service access." "objects_809_modified_2022-04-05T19:42:51.306Z" "objects_809_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_809_relationship_type_mitigates" "objects_809_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_809_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_809_x_mitre_attack_spec_version_2.1.0" "objects_809_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_809_spec_version_2.1" "objects_809_x_mitre_domains_0_mobile-attack" "objects_810_type_relationship" "objects_810_id_relationship--520c7112-9768-42c5-8917-1950efd182f9" "objects_810_created_2023-02-06T19:38:45.607Z" "objects_810_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_810_revoked_False" "objects_810_external_references_0_source_name_threatfabric_sova_0921" "objects_810_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_810_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_810_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_810_modified_2023-03-29T21:33:30.155Z" "objects_810_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can use keylogging to capture user input.(Citation: threatfabric_sova_0921)" "objects_810_relationship_type_uses" "objects_810_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_810_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_810_x_mitre_deprecated_False" "objects_810_x_mitre_version_0.1" "objects_810_x_mitre_attack_spec_version_3.1.0" "objects_810_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_810_spec_version_2.1" "objects_810_x_mitre_domains_0_mobile-attack" "objects_811_type_relationship" "objects_811_id_relationship--52649ab6-8d1c-41d0-9804-3fd4b6a1ba48" "objects_811_created_2023-03-16T18:37:55.715Z" "objects_811_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_811_revoked_False" "objects_811_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_811_modified_2023-08-09T14:52:23.577Z" "objects_811_description_On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications. \n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies." "objects_811_relationship_type_detects" "objects_811_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_811_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_811_x_mitre_deprecated_False" "objects_811_x_mitre_version_0.1" "objects_811_x_mitre_attack_spec_version_3.1.0" "objects_811_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_811_spec_version_2.1" "objects_811_x_mitre_domains_0_mobile-attack" "objects_812_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_812_type_relationship" "objects_812_id_relationship--526ce88f-ee58-4a55-a1b2-b72e1b5971aa" "objects_812_created_2022-04-01T16:52:36.974Z" "objects_812_x_mitre_version_0.1" "objects_812_x_mitre_deprecated_False" "objects_812_revoked_False" "objects_812_description_" "objects_812_modified_2022-04-01T16:52:36.974Z" "objects_812_relationship_type_revoked-by" "objects_812_source_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_812_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_812_x_mitre_attack_spec_version_2.1.0" "objects_812_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_812_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_812_spec_version_2.1" "objects_812_x_mitre_domains_0_mobile-attack" "objects_813_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_813_id_relationship--529107fd-6420-4573-8dbf-cdcd49c2708c" "objects_813_type_relationship" "objects_813_created_2020-06-26T14:55:13.307Z" "objects_813_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_813_external_references_0_source_name_Cybereason EventBot" "objects_813_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_813_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_813_modified_2020-06-26T14:55:13.307Z" "objects_813_description_[EventBot](https://attack.mitre.org/software/S0478) can gather device network information.(Citation: Cybereason EventBot) " "objects_813_relationship_type_uses" "objects_813_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_813_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_813_x_mitre_version_1.0" "objects_813_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_813_spec_version_2.1" "objects_813_x_mitre_attack_spec_version_2.1.0" "objects_813_x_mitre_domains_0_mobile-attack" "objects_814_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_814_id_relationship--52ad5145-3b04-4cc8-bed8-4a14501afe25" "objects_814_type_relationship" "objects_814_created_2020-09-11T15:55:43.774Z" "objects_814_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_814_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_814_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_814_external_references_0_source_name_Lookout-StealthMango" "objects_814_modified_2020-09-11T15:55:43.774Z" "objects_814_description_[Stealth Mango](https://attack.mitre.org/software/S0328) deletes incoming SMS messages from specified numbers, including those that contain particular strings.(Citation: Lookout-StealthMango)" "objects_814_relationship_type_uses" "objects_814_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_814_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_814_x_mitre_version_1.0" "objects_814_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_814_spec_version_2.1" "objects_814_x_mitre_attack_spec_version_2.1.0" "objects_814_x_mitre_domains_0_mobile-attack" "objects_815_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_815_id_relationship--52f7e464-db89-4201-aea8-38d9b44bbd1b" "objects_815_type_relationship" "objects_815_created_2020-12-18T20:14:47.314Z" "objects_815_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_815_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_815_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_815_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_815_modified_2020-12-18T20:14:47.314Z" "objects_815_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has utilized foreground services.(Citation: WhiteOps TERRACOTTA)" "objects_815_relationship_type_uses" "objects_815_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_815_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_815_x_mitre_version_1.0" "objects_815_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_815_spec_version_2.1" "objects_815_x_mitre_attack_spec_version_2.1.0" "objects_815_x_mitre_domains_0_mobile-attack" "objects_816_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_816_id_relationship--53364899-1ea5-47fa-afde-c210aed64120" "objects_816_type_relationship" "objects_816_created_2019-07-10T15:47:19.659Z" "objects_816_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_816_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_816_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_816_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_816_modified_2019-07-16T15:35:21.086Z" "objects_816_description_(Citation: Lookout Dark Caracal Jan 2018)" "objects_816_relationship_type_uses" "objects_816_source_ref_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_816_target_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_816_x_mitre_version_1.0" "objects_816_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_816_spec_version_2.1" "objects_816_x_mitre_attack_spec_version_2.1.0" "objects_816_x_mitre_domains_0_mobile-attack" "objects_817_type_relationship" "objects_817_id_relationship--533e5ce5-138c-4bfc-9a59-eb0ced8e6e1a" "objects_817_created_2023-10-10T15:33:59.484Z" "objects_817_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_817_revoked_False" "objects_817_external_references_0_source_name_Lookout Uyghur Campaign" "objects_817_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_817_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_817_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_817_modified_2023-10-10T15:33:59.484Z" "objects_817_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has impersonated several apps, including official Google apps, chat apps, VPN apps, and popular games.(Citation: Lookout Uyghur Campaign)" "objects_817_relationship_type_uses" "objects_817_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_817_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_817_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_817_x_mitre_deprecated_False" "objects_817_x_mitre_version_1.0" "objects_817_x_mitre_attack_spec_version_2.1.0" "objects_817_spec_version_2.1" "objects_817_x_mitre_domains_0_mobile-attack" "objects_818_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_818_type_relationship" "objects_818_id_relationship--535d2425-21aa-4fe5-ae6d-5b677f459020" "objects_818_created_2022-03-28T19:41:37.162Z" "objects_818_x_mitre_version_0.1" "objects_818_x_mitre_deprecated_False" "objects_818_revoked_False" "objects_818_description_Security updates may contain patches for devices that were compromised at the supply chain level." "objects_818_modified_2022-03-28T19:41:37.162Z" "objects_818_relationship_type_mitigates" "objects_818_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_818_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_818_x_mitre_attack_spec_version_2.1.0" "objects_818_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_818_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_818_spec_version_2.1" "objects_818_x_mitre_domains_0_mobile-attack" "objects_819_type_relationship" "objects_819_id_relationship--53ebd5b6-e60e-4aa4-a342-de586917f06d" "objects_819_created_2023-03-20T18:38:36.873Z" "objects_819_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_819_revoked_False" "objects_819_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_819_modified_2023-08-10T22:26:05.065Z" "objects_819_description_The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions." "objects_819_relationship_type_detects" "objects_819_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_819_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_819_x_mitre_deprecated_False" "objects_819_x_mitre_version_0.1" "objects_819_x_mitre_attack_spec_version_3.1.0" "objects_819_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_819_spec_version_2.1" "objects_819_x_mitre_domains_0_mobile-attack" "objects_820_type_relationship" "objects_820_id_relationship--54151897-cc7e-4f92-af50-bed41ea78d92" "objects_820_created_2017-12-14T16:46:06.044Z" "objects_820_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_820_revoked_False" "objects_820_external_references_0_source_name_Kaspersky-MobileMalware" "objects_820_external_references_0_description_Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016." "objects_820_external_references_0_url_https://securelist.com/mobile-malware-evolution-2013/58335/" "objects_820_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_820_modified_2023-04-05T20:03:20.968Z" "objects_820_description_[Trojan-SMS.AndroidOS.FakeInst.a](https://attack.mitre.org/software/S0306) uses Google Cloud Messaging (GCM) for command and control.(Citation: Kaspersky-MobileMalware)" "objects_820_relationship_type_uses" "objects_820_source_ref_malware--28e39395-91e7-4f02-b694-5e079c964da9" "objects_820_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_820_x_mitre_deprecated_False" "objects_820_x_mitre_version_1.0" "objects_820_x_mitre_attack_spec_version_3.1.0" "objects_820_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_820_spec_version_2.1" "objects_820_x_mitre_domains_0_mobile-attack" "objects_821_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_821_id_relationship--5417959b-9478-49fb-b779-3c82a10ad080" "objects_821_type_relationship" "objects_821_created_2020-12-17T20:15:22.498Z" "objects_821_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_821_external_references_0_source_name_Palo Alto HenBox" "objects_821_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_821_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_821_modified_2020-12-17T20:15:22.498Z" "objects_821_description_[HenBox](https://attack.mitre.org/software/S0544) can obtain a list of running apps.(Citation: Palo Alto HenBox)" "objects_821_relationship_type_uses" "objects_821_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_821_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_821_x_mitre_version_1.0" "objects_821_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_821_spec_version_2.1" "objects_821_x_mitre_attack_spec_version_2.1.0" "objects_821_x_mitre_domains_0_mobile-attack" "objects_822_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_822_type_relationship" "objects_822_id_relationship--544e8fc3-c656-4081-9b4f-8a5d60926f47" "objects_822_created_2022-04-01T17:08:41.293Z" "objects_822_x_mitre_version_0.1" "objects_822_x_mitre_deprecated_False" "objects_822_revoked_False" "objects_822_description_If devices are enrolled using Apple User Enrollment or using a profile owner enrollment mode for Android, device controls prevent the enterprise from accessing the device\u2019s physical location. This is typically used for a Bring Your Own Device (BYOD) deployment. " "objects_822_modified_2022-04-01T17:08:41.293Z" "objects_822_relationship_type_mitigates" "objects_822_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_822_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_822_x_mitre_attack_spec_version_2.1.0" "objects_822_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_822_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_822_spec_version_2.1" "objects_822_x_mitre_domains_0_mobile-attack" "objects_823_type_relationship" "objects_823_id_relationship--545d9313-3fcc-4d4a-b9d2-7555430df8f2" "objects_823_created_2019-09-04T14:28:15.482Z" "objects_823_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_823_revoked_False" "objects_823_external_references_0_source_name_Lookout-Monokle" "objects_823_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_823_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_823_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_823_modified_2023-04-05T21:28:58.447Z" "objects_823_description_[Monokle](https://attack.mitre.org/software/S0407) can reset the user's password/PIN.(Citation: Lookout-Monokle)" "objects_823_relationship_type_uses" "objects_823_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_823_target_ref_attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2" "objects_823_x_mitre_deprecated_False" "objects_823_x_mitre_version_1.0" "objects_823_x_mitre_attack_spec_version_3.1.0" "objects_823_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_823_spec_version_2.1" "objects_823_x_mitre_domains_0_mobile-attack" "objects_824_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_824_type_relationship" "objects_824_id_relationship--5482462c-08bc-4e28-bc20-bfbbc60f3f81" "objects_824_created_2022-04-05T20:03:46.789Z" "objects_824_x_mitre_version_0.1" "objects_824_x_mitre_deprecated_False" "objects_824_revoked_False" "objects_824_description_" "objects_824_modified_2022-04-05T20:03:46.789Z" "objects_824_relationship_type_revoked-by" "objects_824_source_ref_attack-pattern--60623164-ccd8-4508-a141-b5a34820b3de" "objects_824_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_824_x_mitre_attack_spec_version_2.1.0" "objects_824_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_824_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_824_spec_version_2.1" "objects_824_x_mitre_domains_0_mobile-attack" "objects_825_type_relationship" "objects_825_id_relationship--54bfecbc-4d1d-4bca-bb9c-652d09b29515" "objects_825_created_2023-06-09T19:10:48.877Z" "objects_825_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_825_revoked_False" "objects_825_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_825_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_825_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_825_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_825_modified_2023-08-04T19:14:31.727Z" "objects_825_description_[Hornbill](https://attack.mitre.org/software/S1077) can collect the device ID, model, manufacturer, and Android version. It can also check available storage space and if the screen is locked.(Citation: lookout_hornbill_sunbird_0221)" "objects_825_relationship_type_uses" "objects_825_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_825_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_825_x_mitre_deprecated_False" "objects_825_x_mitre_version_0.1" "objects_825_x_mitre_attack_spec_version_3.1.0" "objects_825_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_825_spec_version_2.1" "objects_825_x_mitre_domains_0_mobile-attack" "objects_826_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_826_type_relationship" "objects_826_id_relationship--54ce9375-cc0f-456e-ac22-e6fe822a6cec" "objects_826_created_2022-04-01T15:54:48.924Z" "objects_826_x_mitre_version_0.1" "objects_826_x_mitre_deprecated_False" "objects_826_revoked_False" "objects_826_description_Applications very rarely require administrator permission. Developers should be cautioned against using this higher degree of access to avoid being flagged as a potentially malicious application. " "objects_826_modified_2022-04-01T15:54:48.924Z" "objects_826_relationship_type_mitigates" "objects_826_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_826_target_ref_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_826_x_mitre_attack_spec_version_2.1.0" "objects_826_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_826_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_826_spec_version_2.1" "objects_826_x_mitre_domains_0_mobile-attack" "objects_827_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_827_id_relationship--54dac52d-5279-407f-b7b4-5484ae90b98c" "objects_827_type_relationship" "objects_827_created_2021-02-17T20:43:52.402Z" "objects_827_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_827_external_references_0_source_name_Lookout FrozenCell" "objects_827_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_827_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_827_modified_2021-02-17T20:43:52.402Z" "objects_827_description_[FrozenCell](https://attack.mitre.org/software/S0577) has downloaded and installed additional applications.(Citation: Lookout FrozenCell)" "objects_827_relationship_type_uses" "objects_827_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_827_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_827_x_mitre_version_1.0" "objects_827_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_827_spec_version_2.1" "objects_827_x_mitre_attack_spec_version_2.1.0" "objects_827_x_mitre_domains_0_mobile-attack" "objects_828_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_828_type_relationship" "objects_828_id_relationship--554ec347-c8b2-43da-876b-36608dcc543d" "objects_828_created_2017-10-25T14:48:53.746Z" "objects_828_x_mitre_version_1.0" "objects_828_external_references_0_source_name_TelephonyManager" "objects_828_external_references_0_url_https://developer.android.com/reference/android/telephony/TelephonyManager.html" "objects_828_external_references_0_description_Android. (n.d.). TelephonyManager. Retrieved December 21, 2016." "objects_828_x_mitre_deprecated_False" "objects_828_revoked_False" "objects_828_description_Android 10 introduced changes that prevent normal applications from accessing sensitive device identifiers.(Citation: TelephonyManager) " "objects_828_modified_2022-03-30T21:04:59.921Z" "objects_828_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_828_relationship_type_mitigates" "objects_828_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_828_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_828_x_mitre_attack_spec_version_2.1.0" "objects_828_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_828_spec_version_2.1" "objects_828_x_mitre_domains_0_mobile-attack" "objects_829_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_829_type_relationship" "objects_829_id_relationship--557e6d99-d7d8-4e2f-bc01-66b0754de089" "objects_829_created_2022-03-28T19:41:27.610Z" "objects_829_x_mitre_version_0.1" "objects_829_x_mitre_deprecated_False" "objects_829_revoked_False" "objects_829_description_Application developers should be cautious when selecting third-party libraries to integrate into their application." "objects_829_modified_2022-03-28T19:41:27.610Z" "objects_829_relationship_type_mitigates" "objects_829_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_829_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_829_x_mitre_attack_spec_version_2.1.0" "objects_829_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_829_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_829_spec_version_2.1" "objects_829_x_mitre_domains_0_mobile-attack" "objects_830_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_830_id_relationship--55afe9a0-d261-48ea-b5a8-0b1685ff2f15" "objects_830_type_relationship" "objects_830_created_2020-04-24T15:06:33.319Z" "objects_830_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_830_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_830_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_830_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_830_modified_2020-04-24T15:06:33.319Z" "objects_830_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect voice notes, device accounts, and gallery images.(Citation: TrendMicro Coronavirus Updates)" "objects_830_relationship_type_uses" "objects_830_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_830_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_830_x_mitre_version_1.0" "objects_830_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_830_spec_version_2.1" "objects_830_x_mitre_attack_spec_version_2.1.0" "objects_830_x_mitre_domains_0_mobile-attack" "objects_831_type_relationship" "objects_831_id_relationship--55b3df0f-252d-4208-bdb8-91fa1e1119b4" "objects_831_created_2021-01-05T20:16:20.507Z" "objects_831_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_831_revoked_False" "objects_831_external_references_0_source_name_Zscaler TikTok Spyware" "objects_831_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_831_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_831_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_831_modified_2023-04-05T21:23:12.919Z" "objects_831_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can execute commands .(Citation: Zscaler TikTok Spyware)" "objects_831_relationship_type_uses" "objects_831_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_831_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_831_x_mitre_deprecated_False" "objects_831_x_mitre_version_1.0" "objects_831_x_mitre_attack_spec_version_3.1.0" "objects_831_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_831_spec_version_2.1" "objects_831_x_mitre_domains_0_mobile-attack" "objects_832_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_832_type_relationship" "objects_832_id_relationship--5619e263-d48c-47a5-ab68-8677fe080a15" "objects_832_created_2022-03-30T14:42:27.821Z" "objects_832_x_mitre_version_0.1" "objects_832_x_mitre_deprecated_False" "objects_832_revoked_False" "objects_832_description_" "objects_832_modified_2022-03-30T14:42:27.821Z" "objects_832_relationship_type_subtechnique-of" "objects_832_source_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_832_target_ref_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_832_x_mitre_attack_spec_version_2.1.0" "objects_832_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_832_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_832_spec_version_2.1" "objects_832_x_mitre_domains_0_mobile-attack" "objects_833_type_relationship" "objects_833_id_relationship--56551987-326a-46ad-a34a-59bb7ab793a9" "objects_833_created_2020-12-14T14:52:03.266Z" "objects_833_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_833_revoked_False" "objects_833_external_references_0_source_name_Sophos Red Alert 2.0" "objects_833_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_833_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_833_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_833_modified_2023-04-05T21:24:07.828Z" "objects_833_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can request device administrator permissions.(Citation: Sophos Red Alert 2.0)" "objects_833_relationship_type_uses" "objects_833_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_833_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_833_x_mitre_deprecated_False" "objects_833_x_mitre_version_1.0" "objects_833_x_mitre_attack_spec_version_3.1.0" "objects_833_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_833_spec_version_2.1" "objects_833_x_mitre_domains_0_mobile-attack" "objects_834_type_relationship" "objects_834_id_relationship--56758bb5-230e-43ac-9851-167c296c3dfa" "objects_834_created_2023-03-20T18:38:27.730Z" "objects_834_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_834_revoked_False" "objects_834_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_834_modified_2023-08-10T22:25:29.731Z" "objects_834_description_During the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. " "objects_834_relationship_type_detects" "objects_834_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_834_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_834_x_mitre_deprecated_False" "objects_834_x_mitre_version_0.1" "objects_834_x_mitre_attack_spec_version_3.1.0" "objects_834_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_834_spec_version_2.1" "objects_834_x_mitre_domains_0_mobile-attack" "objects_835_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_835_type_relationship" "objects_835_id_relationship--56a255a5-9fa2-45bb-8848-fd0a68514467" "objects_835_created_2022-04-11T20:06:56.034Z" "objects_835_x_mitre_version_0.1" "objects_835_x_mitre_deprecated_False" "objects_835_revoked_False" "objects_835_description_" "objects_835_modified_2022-04-11T20:06:56.034Z" "objects_835_relationship_type_revoked-by" "objects_835_source_ref_attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d" "objects_835_target_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_835_x_mitre_attack_spec_version_2.1.0" "objects_835_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_835_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_835_spec_version_2.1" "objects_835_x_mitre_domains_0_mobile-attack" "objects_836_type_relationship" "objects_836_id_relationship--56c8af86-2924-46f8-a1d7-8309ee6f0282" "objects_836_created_2023-07-21T19:36:35.822Z" "objects_836_revoked_False" "objects_836_external_references_0_source_name_lookout_bouldspy_0423" "objects_836_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_836_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_836_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_836_modified_2023-07-21T19:36:35.822Z" "objects_836_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can collect network information, such as IP address, SIM card info, and Wi-Fi info.(Citation: lookout_bouldspy_0423)" "objects_836_relationship_type_uses" "objects_836_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_836_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_836_x_mitre_deprecated_False" "objects_836_x_mitre_version_0.1" "objects_836_x_mitre_attack_spec_version_3.1.0" "objects_836_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_836_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_836_spec_version_2.1" "objects_836_x_mitre_domains_0_mobile-attack" "objects_837_type_relationship" "objects_837_id_relationship--5706742b-733d-44e9-a032-62b81ba05bcf" "objects_837_created_2020-06-02T14:32:31.897Z" "objects_837_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_837_revoked_False" "objects_837_external_references_0_source_name_Google Project Zero Insomnia" "objects_837_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_837_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_837_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_837_modified_2023-04-05T20:26:52.491Z" "objects_837_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can retrieve SMS messages and iMessages.(Citation: Google Project Zero Insomnia)" "objects_837_relationship_type_uses" "objects_837_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_837_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_837_x_mitre_deprecated_False" "objects_837_x_mitre_version_1.0" "objects_837_x_mitre_attack_spec_version_3.1.0" "objects_837_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_837_spec_version_2.1" "objects_837_x_mitre_domains_0_mobile-attack" "objects_838_type_relationship" "objects_838_id_relationship--57293fc9-8838-4acd-a16f-48f516d0921e" "objects_838_created_2020-04-08T15:51:25.122Z" "objects_838_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_838_revoked_False" "objects_838_external_references_0_source_name_ThreatFabric Ginp" "objects_838_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_838_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_838_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_838_modified_2023-04-05T17:29:51.699Z" "objects_838_description_[Ginp](https://attack.mitre.org/software/S0423) hides its icon after installation.(Citation: ThreatFabric Ginp)" "objects_838_relationship_type_uses" "objects_838_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_838_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_838_x_mitre_deprecated_False" "objects_838_x_mitre_version_1.0" "objects_838_x_mitre_attack_spec_version_3.1.0" "objects_838_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_838_spec_version_2.1" "objects_838_x_mitre_domains_0_mobile-attack" "objects_839_type_relationship" "objects_839_id_relationship--576dfa89-d400-4cac-b32d-8ee85a9de5d7" "objects_839_created_2023-03-20T18:57:42.922Z" "objects_839_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_839_revoked_False" "objects_839_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_839_modified_2023-08-10T22:17:40.405Z" "objects_839_description_Application vetting services can look for the use of the Android `MediaProjectionManager` class, applying extra scrutiny to applications that use the class." "objects_839_relationship_type_detects" "objects_839_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_839_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_839_x_mitre_deprecated_False" "objects_839_x_mitre_version_0.1" "objects_839_x_mitre_attack_spec_version_3.1.0" "objects_839_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_839_spec_version_2.1" "objects_839_x_mitre_domains_0_mobile-attack" "objects_840_type_relationship" "objects_840_id_relationship--57881f4b-8463-430c-912a-0e3c961e7784" "objects_840_created_2023-07-21T19:52:30.528Z" "objects_840_revoked_False" "objects_840_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_840_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_840_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_840_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_840_modified_2023-07-21T19:52:30.529Z" "objects_840_description_[Fakecalls](https://attack.mitre.org/software/S1080) can copy and exfiltrate a device\u2019s contact list.(Citation: kaspersky_fakecalls_0422)" "objects_840_relationship_type_uses" "objects_840_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_840_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_840_x_mitre_deprecated_False" "objects_840_x_mitre_version_0.1" "objects_840_x_mitre_attack_spec_version_3.1.0" "objects_840_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_840_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_840_spec_version_2.1" "objects_840_x_mitre_domains_0_mobile-attack" "objects_841_type_relationship" "objects_841_id_relationship--57a069a0-399f-43ab-9efc-50432a41b26b" "objects_841_created_2020-12-24T21:55:56.743Z" "objects_841_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_841_revoked_False" "objects_841_external_references_0_source_name_Lookout Uyghur Campaign" "objects_841_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_841_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_841_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_841_modified_2023-04-05T20:36:12.585Z" "objects_841_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has deleted or renamed specific files.(Citation: Lookout Uyghur Campaign)" "objects_841_relationship_type_uses" "objects_841_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_841_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_841_x_mitre_deprecated_False" "objects_841_x_mitre_version_1.0" "objects_841_x_mitre_attack_spec_version_3.1.0" "objects_841_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_841_spec_version_2.1" "objects_841_x_mitre_domains_0_mobile-attack" "objects_842_type_relationship" "objects_842_id_relationship--57a5ae72-6932-45e6-83f2-609943902b35" "objects_842_created_2023-03-20T18:50:33.248Z" "objects_842_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_842_revoked_False" "objects_842_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_842_modified_2023-08-09T16:30:03.505Z" "objects_842_description_In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. " "objects_842_relationship_type_detects" "objects_842_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_842_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_842_x_mitre_deprecated_False" "objects_842_x_mitre_version_0.1" "objects_842_x_mitre_attack_spec_version_3.1.0" "objects_842_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_842_spec_version_2.1" "objects_842_x_mitre_domains_0_mobile-attack" "objects_843_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_843_type_relationship" "objects_843_id_relationship--57df3046-2f14-4bb8-93e9-84a9c8b46791" "objects_843_created_2022-03-30T19:33:17.520Z" "objects_843_x_mitre_version_0.1" "objects_843_x_mitre_deprecated_False" "objects_843_revoked_False" "objects_843_description_Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge." "objects_843_modified_2022-03-30T19:33:17.520Z" "objects_843_relationship_type_mitigates" "objects_843_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_843_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_843_x_mitre_attack_spec_version_2.1.0" "objects_843_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_843_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_843_spec_version_2.1" "objects_843_x_mitre_domains_0_mobile-attack" "objects_844_type_relationship" "objects_844_id_relationship--57e441f8-6799-4d1b-8e2a-13d8ac1c8e78" "objects_844_created_2023-02-28T20:37:59.846Z" "objects_844_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_844_revoked_False" "objects_844_external_references_0_source_name_proofpoint_flubot_0421" "objects_844_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_844_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_844_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_844_modified_2023-03-31T22:08:37.122Z" "objects_844_description_[FluBot](https://attack.mitre.org/software/S1067) can obfuscated class, string, and method names in newer malware versions.(Citation: proofpoint_flubot_0421)" "objects_844_relationship_type_uses" "objects_844_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_844_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_844_x_mitre_deprecated_False" "objects_844_x_mitre_version_0.1" "objects_844_x_mitre_attack_spec_version_3.1.0" "objects_844_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_844_spec_version_2.1" "objects_844_x_mitre_domains_0_mobile-attack" "objects_845_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_845_id_relationship--58c0fe4b-612d-4fc6-973f-16914b0f4b72" "objects_845_type_relationship" "objects_845_created_2020-11-24T17:55:12.900Z" "objects_845_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_845_external_references_0_source_name_Talos GPlayed" "objects_845_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_845_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_845_modified_2020-11-24T17:55:12.900Z" "objects_845_description_[GPlayed](https://attack.mitre.org/software/S0536) can collect the device\u2019s IMEI, phone number, and country.(Citation: Talos GPlayed)" "objects_845_relationship_type_uses" "objects_845_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_845_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_845_x_mitre_version_1.0" "objects_845_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_845_spec_version_2.1" "objects_845_x_mitre_attack_spec_version_2.1.0" "objects_845_x_mitre_domains_0_mobile-attack" "objects_846_type_relationship" "objects_846_id_relationship--58c15bce-1593-4be1-ae56-7e7b2634fc56" "objects_846_created_2020-06-26T15:32:25.045Z" "objects_846_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_846_revoked_False" "objects_846_external_references_0_source_name_Threat Fabric Cerberus" "objects_846_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_846_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_846_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_846_modified_2023-04-05T20:27:05.040Z" "objects_846_description_[Cerberus](https://attack.mitre.org/software/S0480) can collect SMS messages from a device.(Citation: Threat Fabric Cerberus)" "objects_846_relationship_type_uses" "objects_846_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_846_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_846_x_mitre_deprecated_False" "objects_846_x_mitre_version_1.0" "objects_846_x_mitre_attack_spec_version_3.1.0" "objects_846_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_846_spec_version_2.1" "objects_846_x_mitre_domains_0_mobile-attack" "objects_847_type_relationship" "objects_847_id_relationship--58c857f8-4f40-48e0-b3ac-41944d82b576" "objects_847_created_2020-12-24T22:04:27.991Z" "objects_847_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_847_revoked_False" "objects_847_external_references_0_source_name_Lookout Uyghur Campaign" "objects_847_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_847_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_847_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_847_modified_2023-04-05T17:54:02.223Z" "objects_847_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has collected a list of contacts.(Citation: Lookout Uyghur Campaign)" "objects_847_relationship_type_uses" "objects_847_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_847_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_847_x_mitre_deprecated_False" "objects_847_x_mitre_version_1.0" "objects_847_x_mitre_attack_spec_version_3.1.0" "objects_847_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_847_spec_version_2.1" "objects_847_x_mitre_domains_0_mobile-attack" "objects_848_type_relationship" "objects_848_id_relationship--592331d2-60a7-4264-b844-fbeb89b6386c" "objects_848_created_2023-03-20T18:58:56.942Z" "objects_848_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_848_revoked_False" "objects_848_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_848_modified_2023-08-14T16:53:16.626Z" "objects_848_description_The user can view the default SMS handler in system settings." "objects_848_relationship_type_detects" "objects_848_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_848_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_848_x_mitre_deprecated_False" "objects_848_x_mitre_version_0.1" "objects_848_x_mitre_attack_spec_version_3.1.0" "objects_848_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_848_spec_version_2.1" "objects_848_x_mitre_domains_0_mobile-attack" "objects_849_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_849_id_relationship--5977289e-d38f-4974-912b-2151fc00c850" "objects_849_type_relationship" "objects_849_created_2020-11-20T16:37:28.524Z" "objects_849_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_849_external_references_0_source_name_Symantec GoldenCup" "objects_849_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_849_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_849_modified_2020-11-20T16:37:28.524Z" "objects_849_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect the device\u2019s phone number and IMSI.(Citation: Symantec GoldenCup)" "objects_849_relationship_type_uses" "objects_849_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_849_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_849_x_mitre_version_1.0" "objects_849_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_849_spec_version_2.1" "objects_849_x_mitre_attack_spec_version_2.1.0" "objects_849_x_mitre_domains_0_mobile-attack" "objects_850_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_850_type_relationship" "objects_850_id_relationship--59aaa62b-a629-42c8-9bd2-8e75810135a9" "objects_850_created_2022-04-05T19:52:32.201Z" "objects_850_x_mitre_version_0.1" "objects_850_x_mitre_deprecated_False" "objects_850_revoked_False" "objects_850_description_" "objects_850_modified_2022-04-05T19:52:32.201Z" "objects_850_relationship_type_revoked-by" "objects_850_source_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_850_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_850_x_mitre_attack_spec_version_2.1.0" "objects_850_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_850_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_850_spec_version_2.1" "objects_850_x_mitre_domains_0_mobile-attack" "objects_851_type_relationship" "objects_851_id_relationship--59c2bfb5-a55b-43d3-b1e9-3fbaff0fb7fc" "objects_851_created_2023-03-20T18:14:50.401Z" "objects_851_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_851_revoked_False" "objects_851_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_851_modified_2023-08-08T22:35:46.046Z" "objects_851_description_Mobile security products can use attestation to detect compromised devices." "objects_851_relationship_type_detects" "objects_851_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_851_target_ref_attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9" "objects_851_x_mitre_deprecated_False" "objects_851_x_mitre_version_0.1" "objects_851_x_mitre_attack_spec_version_3.1.0" "objects_851_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_851_spec_version_2.1" "objects_851_x_mitre_domains_0_mobile-attack" "objects_852_type_relationship" "objects_852_id_relationship--59d463d3-3a41-4269-be9a-7a69f44eca78" "objects_852_created_2020-10-29T19:21:23.215Z" "objects_852_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_852_revoked_False" "objects_852_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_852_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_852_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_852_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_852_modified_2023-04-05T20:03:47.434Z" "objects_852_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has communicated with the C2 server using HTTP.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_852_relationship_type_uses" "objects_852_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_852_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_852_x_mitre_deprecated_False" "objects_852_x_mitre_version_1.0" "objects_852_x_mitre_attack_spec_version_3.1.0" "objects_852_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_852_spec_version_2.1" "objects_852_x_mitre_domains_0_mobile-attack" "objects_853_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_853_type_relationship" "objects_853_id_relationship--59e225fa-b181-4906-9f0b-ef8f6ce7f2ef" "objects_853_created_2022-04-05T20:14:17.442Z" "objects_853_x_mitre_version_0.1" "objects_853_x_mitre_deprecated_False" "objects_853_revoked_False" "objects_853_description_" "objects_853_modified_2022-04-05T20:14:17.442Z" "objects_853_relationship_type_subtechnique-of" "objects_853_source_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_853_target_ref_attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84" "objects_853_x_mitre_attack_spec_version_2.1.0" "objects_853_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_853_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_853_spec_version_2.1" "objects_853_x_mitre_domains_0_mobile-attack" "objects_854_type_relationship" "objects_854_id_relationship--5a036fb8-9f72-4383-91c5-0f47b33b2c9d" "objects_854_created_2019-07-10T15:35:43.658Z" "objects_854_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_854_revoked_False" "objects_854_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_854_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_854_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_854_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_854_modified_2023-04-05T19:57:40.371Z" "objects_854_description_[Pallas](https://attack.mitre.org/software/S0399) gathers and exfiltrates data about nearby Wi-Fi access points.(Citation: Lookout Dark Caracal Jan 2018)" "objects_854_relationship_type_uses" "objects_854_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_854_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_854_x_mitre_deprecated_False" "objects_854_x_mitre_version_1.0" "objects_854_x_mitre_attack_spec_version_3.1.0" "objects_854_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_854_spec_version_2.1" "objects_854_x_mitre_domains_0_mobile-attack" "objects_855_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_855_type_relationship" "objects_855_id_relationship--5a18e6c3-4bbf-4418-8815-55ebf283c8a1" "objects_855_created_2020-10-29T17:48:27.272Z" "objects_855_x_mitre_version_1.0" "objects_855_external_references_0_source_name_Threat Fabric Exobot" "objects_855_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_855_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_855_x_mitre_deprecated_False" "objects_855_revoked_False" "objects_855_description_[Exobot](https://attack.mitre.org/software/S0522) can obtain a list of installed applications and can detect if an antivirus application is running, and close it if it is.(Citation: Threat Fabric Exobot)" "objects_855_modified_2022-04-15T16:53:00.735Z" "objects_855_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_855_relationship_type_uses" "objects_855_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_855_target_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_855_x_mitre_attack_spec_version_2.1.0" "objects_855_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_855_spec_version_2.1" "objects_855_x_mitre_domains_0_mobile-attack" "objects_856_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_856_id_relationship--5a277966-4559-487e-bdfb-7be6366ccdb6" "objects_856_type_relationship" "objects_856_created_2019-09-03T19:45:48.508Z" "objects_856_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_856_external_references_0_source_name_SWB Exodus March 2019" "objects_856_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_856_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_856_modified_2020-03-31T14:49:39.188Z" "objects_856_description_ [Exodus](https://attack.mitre.org/software/S0405) Two can take pictures with the device cameras.(Citation: SWB Exodus March 2019) " "objects_856_relationship_type_uses" "objects_856_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_856_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_856_x_mitre_version_1.0" "objects_856_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_856_spec_version_2.1" "objects_856_x_mitre_attack_spec_version_2.1.0" "objects_856_x_mitre_domains_0_mobile-attack" "objects_857_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_857_id_relationship--5a2bff26-f5e5-41f9-b3da-a558988ef3f3" "objects_857_type_relationship" "objects_857_created_2020-06-26T14:55:13.351Z" "objects_857_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_857_external_references_0_source_name_Cybereason EventBot" "objects_857_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_857_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_857_modified_2020-06-26T14:55:13.351Z" "objects_857_description_[EventBot](https://attack.mitre.org/software/S0478) can collect a list of installed applications.(Citation: Cybereason EventBot)" "objects_857_relationship_type_uses" "objects_857_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_857_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_857_x_mitre_version_1.0" "objects_857_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_857_spec_version_2.1" "objects_857_x_mitre_attack_spec_version_2.1.0" "objects_857_x_mitre_domains_0_mobile-attack" "objects_858_type_relationship" "objects_858_id_relationship--5a50d9da-3fa5-443e-8367-8a0520d58cae" "objects_858_created_2020-12-24T22:04:27.902Z" "objects_858_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_858_revoked_False" "objects_858_external_references_0_source_name_Lookout Uyghur Campaign" "objects_858_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_858_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_858_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_858_modified_2023-04-05T20:04:02.992Z" "objects_858_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has used HTTP POST requests for C2.(Citation: Lookout Uyghur Campaign)" "objects_858_relationship_type_uses" "objects_858_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_858_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_858_x_mitre_deprecated_False" "objects_858_x_mitre_version_1.0" "objects_858_x_mitre_attack_spec_version_3.1.0" "objects_858_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_858_spec_version_2.1" "objects_858_x_mitre_domains_0_mobile-attack" "objects_859_type_relationship" "objects_859_id_relationship--5a64b957-32fb-4dd6-84ae-48a2c74c560f" "objects_859_created_2023-03-20T15:56:34.418Z" "objects_859_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_859_revoked_False" "objects_859_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_859_modified_2023-08-08T15:27:56.357Z" "objects_859_description_Application vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\u2019s manifest. This indicates it can prompt the user for device administrator permissions." "objects_859_relationship_type_detects" "objects_859_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_859_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_859_x_mitre_deprecated_False" "objects_859_x_mitre_version_0.1" "objects_859_x_mitre_attack_spec_version_3.1.0" "objects_859_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_859_spec_version_2.1" "objects_859_x_mitre_domains_0_mobile-attack" "objects_860_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_860_type_relationship" "objects_860_id_relationship--5a6df1dd-9aa4-4f67-9195-8c3a9f5c0f7a" "objects_860_created_2017-12-14T16:46:06.044Z" "objects_860_x_mitre_version_1.0" "objects_860_external_references_0_source_name_Tripwire-MazarBOT" "objects_860_external_references_0_url_https://www.tripwire.com/state-of-security/security-data-protection/android-malware-sms/" "objects_860_external_references_0_description_Graham Cluley. (2016, February 16). Android users warned of malware attack spreading via SMS. Retrieved December 23, 2016." "objects_860_x_mitre_deprecated_False" "objects_860_revoked_False" "objects_860_description_[MazarBOT](https://attack.mitre.org/software/S0303) can send messages to premium-rate numbers.(Citation: Tripwire-MazarBOT)" "objects_860_modified_2022-04-19T14:25:41.669Z" "objects_860_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_860_relationship_type_uses" "objects_860_source_ref_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_860_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_860_x_mitre_attack_spec_version_2.1.0" "objects_860_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_860_spec_version_2.1" "objects_860_x_mitre_domains_0_mobile-attack" "objects_861_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_861_type_relationship" "objects_861_id_relationship--5a7295a2-ad95-4362-8b2c-9265ad5c73b0" "objects_861_created_2018-10-17T00:14:20.652Z" "objects_861_x_mitre_version_1.0" "objects_861_external_references_0_source_name_Lookout-StealthMango" "objects_861_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_861_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_861_x_mitre_deprecated_False" "objects_861_revoked_False" "objects_861_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uses commands received from text messages for C2.(Citation: Lookout-StealthMango)" "objects_861_modified_2022-04-19T14:25:41.669Z" "objects_861_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_861_relationship_type_uses" "objects_861_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_861_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_861_x_mitre_attack_spec_version_2.1.0" "objects_861_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_861_spec_version_2.1" "objects_861_x_mitre_domains_0_mobile-attack" "objects_862_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_862_id_relationship--5a96d87e-f70e-49dc-a272-c98aad672ce0" "objects_862_type_relationship" "objects_862_created_2019-09-15T15:32:17.563Z" "objects_862_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_862_modified_2020-07-09T14:07:02.315Z" "objects_862_description_Application developers could be encouraged to avoid placing sensitive data in notification text." "objects_862_relationship_type_mitigates" "objects_862_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_862_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_862_x_mitre_version_1.0" "objects_862_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_862_spec_version_2.1" "objects_862_x_mitre_attack_spec_version_2.1.0" "objects_862_x_mitre_domains_0_mobile-attack" "objects_863_type_relationship" "objects_863_id_relationship--5aa167b8-4166-440b-b49f-bf1bab597237" "objects_863_created_2019-11-21T16:42:48.441Z" "objects_863_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_863_revoked_False" "objects_863_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_863_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_863_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_863_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_863_modified_2023-04-05T17:39:13.309Z" "objects_863_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can collect the device\u2019s call log.(Citation: SecureList - ViceLeaker 2019)" "objects_863_relationship_type_uses" "objects_863_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_863_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_863_x_mitre_deprecated_False" "objects_863_x_mitre_version_1.0" "objects_863_x_mitre_attack_spec_version_3.1.0" "objects_863_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_863_spec_version_2.1" "objects_863_x_mitre_domains_0_mobile-attack" "objects_864_type_relationship" "objects_864_id_relationship--5b04c8d0-c026-4838-9383-e4146de36d4d" "objects_864_created_2023-03-16T18:33:19.941Z" "objects_864_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_864_revoked_False" "objects_864_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_864_modified_2023-08-09T15:34:11.221Z" "objects_864_description_Application vetting services could detect usage of standard clipboard APIs." "objects_864_relationship_type_detects" "objects_864_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_864_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_864_x_mitre_deprecated_False" "objects_864_x_mitre_version_0.1" "objects_864_x_mitre_attack_spec_version_3.1.0" "objects_864_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_864_spec_version_2.1" "objects_864_x_mitre_domains_0_mobile-attack" "objects_865_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_865_type_relationship" "objects_865_id_relationship--5b235ed4-548d-49f2-ae01-1874666e6747" "objects_865_created_2022-03-30T19:51:56.543Z" "objects_865_x_mitre_version_0.1" "objects_865_x_mitre_deprecated_False" "objects_865_revoked_False" "objects_865_description_" "objects_865_modified_2022-03-30T19:51:56.543Z" "objects_865_relationship_type_subtechnique-of" "objects_865_source_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_865_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_865_x_mitre_attack_spec_version_2.1.0" "objects_865_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_865_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_865_spec_version_2.1" "objects_865_x_mitre_domains_0_mobile-attack" "objects_866_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_866_id_relationship--5b37d94a-64a3-432a-b340-1c9a4f553d02" "objects_866_type_relationship" "objects_866_created_2020-12-17T20:15:22.452Z" "objects_866_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_866_external_references_0_source_name_Palo Alto HenBox" "objects_866_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_866_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_866_modified_2020-12-17T20:15:22.452Z" "objects_866_description_[HenBox](https://attack.mitre.org/software/S0544) has obfuscated components using XOR, ZIP with a single-byte key or ZIP/Zlib compression wrapped with RC4 encryption.(Citation: Palo Alto HenBox)" "objects_866_relationship_type_uses" "objects_866_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_866_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_866_x_mitre_version_1.0" "objects_866_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_866_spec_version_2.1" "objects_866_x_mitre_attack_spec_version_2.1.0" "objects_866_x_mitre_domains_0_mobile-attack" "objects_867_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_867_id_relationship--5b5586b9-75ee-476f-b3eb-49878254302c" "objects_867_type_relationship" "objects_867_created_2019-07-16T14:33:12.117Z" "objects_867_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_867_external_references_0_source_name_Google Triada June 2019" "objects_867_external_references_0_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_867_external_references_0_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_867_modified_2020-04-27T16:52:49.643Z" "objects_867_description_[Triada](https://attack.mitre.org/software/S0424) is able to modify code within the com.android.systemui application to gain access to `GET_REAL_TASKS` permissions. This permission enables access to information about applications currently on the foreground and other recently used apps.(Citation: Google Triada June 2019) " "objects_867_relationship_type_uses" "objects_867_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_867_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_867_x_mitre_version_1.0" "objects_867_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_867_spec_version_2.1" "objects_867_x_mitre_attack_spec_version_2.1.0" "objects_867_x_mitre_domains_0_mobile-attack" "objects_868_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_868_id_relationship--5b670281-0054-42b4-8e54-ea01a692f5bf" "objects_868_type_relationship" "objects_868_created_2021-10-01T14:42:48.900Z" "objects_868_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_868_external_references_0_source_name_SecureList BusyGasper" "objects_868_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_868_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_868_modified_2021-10-01T14:42:48.900Z" "objects_868_description_[BusyGasper](https://attack.mitre.org/software/S0655) can open a hidden menu when a specific phone number is called from the infected device.(Citation: SecureList BusyGasper)" "objects_868_relationship_type_uses" "objects_868_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_868_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_868_x_mitre_version_1.0" "objects_868_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_868_spec_version_2.1" "objects_868_x_mitre_attack_spec_version_2.1.0" "objects_868_x_mitre_domains_0_mobile-attack" "objects_869_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_869_id_relationship--5b87bb01-9587-42bd-aa6b-30158ca8f55f" "objects_869_type_relationship" "objects_869_created_2020-04-08T15:41:19.427Z" "objects_869_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_869_external_references_0_source_name_Cofense Anubis" "objects_869_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_869_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_869_modified_2020-09-11T15:42:15.628Z" "objects_869_description_[Anubis](https://attack.mitre.org/software/S0422) can send, receive, and delete SMS messages.(Citation: Cofense Anubis)" "objects_869_relationship_type_uses" "objects_869_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_869_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_869_x_mitre_version_1.0" "objects_869_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_869_spec_version_2.1" "objects_869_x_mitre_attack_spec_version_2.1.0" "objects_869_x_mitre_domains_0_mobile-attack" "objects_870_type_relationship" "objects_870_id_relationship--5b9a2c93-95bf-4f39-aeac-b2af051faca9" "objects_870_created_2023-08-23T22:50:55.591Z" "objects_870_revoked_False" "objects_870_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_870_modified_2023-08-23T22:50:55.591Z" "objects_870_description_Application vetting services may detect API calls to `performGlobalAction(int)`. " "objects_870_relationship_type_detects" "objects_870_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_870_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_870_x_mitre_deprecated_False" "objects_870_x_mitre_version_0.1" "objects_870_x_mitre_attack_spec_version_3.1.0" "objects_870_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_870_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_870_spec_version_2.1" "objects_870_x_mitre_domains_0_mobile-attack" "objects_871_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_871_id_relationship--5c1e3aa9-160d-49fd-83a2-2ed2f8c5435c" "objects_871_type_relationship" "objects_871_created_2021-02-17T20:43:52.324Z" "objects_871_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_871_external_references_0_source_name_Lookout FrozenCell" "objects_871_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_871_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_871_modified_2021-02-17T20:43:52.324Z" "objects_871_description_[FrozenCell](https://attack.mitre.org/software/S0577) has collected phone metadata such as cell location, mobile country code (MCC), and mobile network code (MNC).(Citation: Lookout FrozenCell)" "objects_871_relationship_type_uses" "objects_871_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_871_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_871_x_mitre_version_1.0" "objects_871_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_871_spec_version_2.1" "objects_871_x_mitre_attack_spec_version_2.1.0" "objects_871_x_mitre_domains_0_mobile-attack" "objects_872_type_relationship" "objects_872_id_relationship--5c447471-2b97-4d96-b75f-1cbb574b39cf" "objects_872_created_2023-03-20T15:46:49.646Z" "objects_872_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_872_revoked_False" "objects_872_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_872_modified_2023-08-09T15:39:37.117Z" "objects_872_description_Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations." "objects_872_relationship_type_detects" "objects_872_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_872_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_872_x_mitre_deprecated_False" "objects_872_x_mitre_version_0.1" "objects_872_x_mitre_attack_spec_version_3.1.0" "objects_872_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_872_spec_version_2.1" "objects_872_x_mitre_domains_0_mobile-attack" "objects_873_type_relationship" "objects_873_id_relationship--5c746ac8-4034-4ae3-98c3-66d89f5a6d6a" "objects_873_created_2020-07-27T14:14:56.996Z" "objects_873_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_873_revoked_False" "objects_873_external_references_0_source_name_Google Security Zen" "objects_873_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_873_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_873_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_873_modified_2023-04-05T21:19:00.199Z" "objects_873_description_[Zen](https://attack.mitre.org/software/S0494) can inject code into the Setup Wizard at runtime to extract CAPTCHA images. [Zen](https://attack.mitre.org/software/S0494) can inject code into the `libc` of running processes to infect them with the malware.(Citation: Google Security Zen)" "objects_873_relationship_type_uses" "objects_873_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_873_target_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_873_x_mitre_deprecated_False" "objects_873_x_mitre_version_1.0" "objects_873_x_mitre_attack_spec_version_3.1.0" "objects_873_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_873_spec_version_2.1" "objects_873_x_mitre_domains_0_mobile-attack" "objects_874_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_874_id_relationship--5c7508ae-5d05-49fd-a489-b944d3b45dd0" "objects_874_type_relationship" "objects_874_created_2020-12-24T22:04:27.997Z" "objects_874_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_874_external_references_0_source_name_Lookout Uyghur Campaign" "objects_874_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_874_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_874_modified_2020-12-24T22:04:27.997Z" "objects_874_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has tracked location.(Citation: Lookout Uyghur Campaign)" "objects_874_relationship_type_uses" "objects_874_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_874_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_874_x_mitre_version_1.0" "objects_874_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_874_spec_version_2.1" "objects_874_x_mitre_attack_spec_version_2.1.0" "objects_874_x_mitre_domains_0_mobile-attack" "objects_875_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_875_id_relationship--5ced57a7-b674-40d4-98b8-a090963a6ade" "objects_875_type_relationship" "objects_875_created_2018-10-17T00:14:20.652Z" "objects_875_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_875_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_875_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_875_external_references_0_source_name_PaloAlto-SpyDealer" "objects_875_modified_2020-03-31T14:49:39.188Z" "objects_875_description_[SpyDealer](https://attack.mitre.org/software/S0324) abuses Accessibility features to steal messages from popular apps such as WeChat, Skype, Viber, and QQ.(Citation: PaloAlto-SpyDealer)" "objects_875_relationship_type_uses" "objects_875_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_875_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_875_x_mitre_version_1.0" "objects_875_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_875_spec_version_2.1" "objects_875_x_mitre_attack_spec_version_2.1.0" "objects_875_x_mitre_domains_0_mobile-attack" "objects_876_type_relationship" "objects_876_id_relationship--5d0fdc8a-af17-4334-88e6-111aa290b22f" "objects_876_created_2023-03-20T18:43:14.051Z" "objects_876_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_876_revoked_False" "objects_876_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_876_modified_2023-08-08T21:18:54.014Z" "objects_876_description_The user can see a list of applications that can use accessibility services in the device settings." "objects_876_relationship_type_detects" "objects_876_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_876_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_876_x_mitre_deprecated_False" "objects_876_x_mitre_version_0.1" "objects_876_x_mitre_attack_spec_version_3.1.0" "objects_876_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_876_spec_version_2.1" "objects_876_x_mitre_domains_0_mobile-attack" "objects_877_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_877_id_relationship--5d2a3a9f-2467-4ac6-ab64-ffe91ec584da" "objects_877_type_relationship" "objects_877_created_2021-09-24T14:52:41.308Z" "objects_877_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_877_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_877_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_877_external_references_0_source_name_Lookout-Monokle" "objects_877_modified_2021-09-24T14:52:41.308Z" "objects_877_description_ [Monokle](https://attack.mitre.org/software/S0407) can hook itself to appear invisible to the Process Manager.(Citation: Lookout-Monokle) " "objects_877_relationship_type_uses" "objects_877_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_877_target_ref_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_877_x_mitre_version_1.0" "objects_877_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_877_spec_version_2.1" "objects_877_x_mitre_attack_spec_version_2.1.0" "objects_877_x_mitre_domains_0_mobile-attack" "objects_878_type_relationship" "objects_878_id_relationship--5d37400f-80f9-4500-9357-185650e5a7b2" "objects_878_created_2023-02-06T18:54:13.573Z" "objects_878_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_878_revoked_False" "objects_878_external_references_0_source_name_lookout_abstractemu_1021" "objects_878_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_878_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_878_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_878_modified_2023-03-27T17:14:02.866Z" "objects_878_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can use HTTP to communicate with the C2 server.(Citation: lookout_abstractemu_1021)" "objects_878_relationship_type_uses" "objects_878_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_878_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_878_x_mitre_deprecated_False" "objects_878_x_mitre_version_0.1" "objects_878_x_mitre_attack_spec_version_3.1.0" "objects_878_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_878_spec_version_2.1" "objects_878_x_mitre_domains_0_mobile-attack" "objects_879_type_relationship" "objects_879_id_relationship--5dc4eaca-ff82-412a-a8dd-168de1857d8c" "objects_879_created_2023-01-18T21:38:58.113Z" "objects_879_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_879_revoked_False" "objects_879_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_879_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_879_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_879_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_879_modified_2023-03-27T18:49:16.069Z" "objects_879_description_[SharkBot](https://attack.mitre.org/software/S1055) can use input injection via Accessibility Services to simulate user touch inputs, prevent applications from opening, change device settings, and bypass MFA protections.(Citation: nccgroup_sharkbot_0322)" "objects_879_relationship_type_uses" "objects_879_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_879_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_879_x_mitre_deprecated_False" "objects_879_x_mitre_version_0.1" "objects_879_x_mitre_attack_spec_version_3.1.0" "objects_879_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_879_spec_version_2.1" "objects_879_x_mitre_domains_0_mobile-attack" "objects_880_type_relationship" "objects_880_id_relationship--5dd9e0aa-e4dc-4776-9580-5a765c2cc08d" "objects_880_created_2023-02-06T18:52:40.543Z" "objects_880_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_880_revoked_False" "objects_880_external_references_0_source_name_lookout_abstractemu_1021" "objects_880_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_880_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_880_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_880_modified_2023-03-27T17:14:41.449Z" "objects_880_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can intercept SMS messages containing two factor authentication codes.(Citation: lookout_abstractemu_1021)" "objects_880_relationship_type_uses" "objects_880_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_880_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_880_x_mitre_deprecated_False" "objects_880_x_mitre_version_0.1" "objects_880_x_mitre_attack_spec_version_3.1.0" "objects_880_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_880_spec_version_2.1" "objects_880_x_mitre_domains_0_mobile-attack" "objects_881_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_881_type_relationship" "objects_881_id_relationship--5de0caa8-81f8-453c-b70c-a74e7ea9e5c2" "objects_881_created_2022-03-30T19:12:31.481Z" "objects_881_x_mitre_version_0.1" "objects_881_x_mitre_deprecated_False" "objects_881_revoked_False" "objects_881_description_" "objects_881_modified_2022-03-30T19:12:31.481Z" "objects_881_relationship_type_subtechnique-of" "objects_881_source_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_881_target_ref_attack-pattern--b7c0e45f-0206-4f75-96e7-fe7edad3aaff" "objects_881_x_mitre_attack_spec_version_2.1.0" "objects_881_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_881_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_881_spec_version_2.1" "objects_881_x_mitre_domains_0_mobile-attack" "objects_882_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_882_id_relationship--5e360913-4986-4423-8d3c-46d3202b7787" "objects_882_type_relationship" "objects_882_created_2019-09-04T14:28:15.471Z" "objects_882_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_882_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_882_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_882_external_references_0_source_name_Lookout-Monokle" "objects_882_modified_2020-03-31T14:49:39.188Z" "objects_882_description_[Monokle](https://attack.mitre.org/software/S0407) can retrieve the salt used when storing the user\u2019s password, aiding an adversary in computing the user\u2019s plaintext password/PIN from the stored password hash. [Monokle](https://attack.mitre.org/software/S0407) can also capture the user\u2019s dictionary, user-defined shortcuts, and browser history, enabling profiling of the user and their activities.(Citation: Lookout-Monokle)" "objects_882_relationship_type_uses" "objects_882_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_882_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_882_x_mitre_version_1.0" "objects_882_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_882_spec_version_2.1" "objects_882_x_mitre_attack_spec_version_2.1.0" "objects_882_x_mitre_domains_0_mobile-attack" "objects_883_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_883_type_relationship" "objects_883_id_relationship--5e74f4f8-5057-42f4-9796-aee60122cf6d" "objects_883_created_2019-09-23T13:36:08.451Z" "objects_883_x_mitre_version_1.0" "objects_883_external_references_0_source_name_securelist rotexy 2018" "objects_883_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_883_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_883_x_mitre_deprecated_False" "objects_883_revoked_False" "objects_883_description_[Rotexy](https://attack.mitre.org/software/S0411) procedurally generates subdomains for command and control communication.(Citation: securelist rotexy 2018)" "objects_883_modified_2022-04-12T10:01:44.682Z" "objects_883_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_883_relationship_type_uses" "objects_883_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_883_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_883_x_mitre_attack_spec_version_2.1.0" "objects_883_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_883_spec_version_2.1" "objects_883_x_mitre_domains_0_mobile-attack" "objects_884_type_relationship" "objects_884_id_relationship--5e95ca90-bf75-4031-a28f-f8565c02185c" "objects_884_created_2020-11-24T17:55:12.883Z" "objects_884_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_884_revoked_False" "objects_884_external_references_0_source_name_Talos GPlayed" "objects_884_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_884_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_884_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_884_modified_2023-04-05T17:23:49.569Z" "objects_884_description_[GPlayed](https://attack.mitre.org/software/S0536) can lock the user out of the device by showing a persistent overlay.(Citation: Talos GPlayed)" "objects_884_relationship_type_uses" "objects_884_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_884_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_884_x_mitre_deprecated_False" "objects_884_x_mitre_version_1.0" "objects_884_x_mitre_attack_spec_version_3.1.0" "objects_884_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_884_spec_version_2.1" "objects_884_x_mitre_domains_0_mobile-attack" "objects_885_type_relationship" "objects_885_id_relationship--5ec3fcbb-d2ac-44ba-a2d4-99e7ddacf3a2" "objects_885_created_2023-03-20T18:59:57.364Z" "objects_885_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_885_revoked_False" "objects_885_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_885_modified_2023-08-08T17:05:08.407Z" "objects_885_description_The user can examine the list of all installed applications in the device settings. " "objects_885_relationship_type_detects" "objects_885_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_885_target_ref_attack-pattern--fc53309d-ebd5-4573-9242-57024ebdad4f" "objects_885_x_mitre_deprecated_False" "objects_885_x_mitre_version_0.1" "objects_885_x_mitre_attack_spec_version_3.1.0" "objects_885_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_885_spec_version_2.1" "objects_885_x_mitre_domains_0_mobile-attack" "objects_886_type_relationship" "objects_886_id_relationship--6001f77a-da30-4ebc-85fd-5bf9afe5f0a1" "objects_886_created_2023-03-15T16:24:12.588Z" "objects_886_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_886_revoked_False" "objects_886_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_886_modified_2023-08-08T15:26:59.132Z" "objects_886_description_Application vetting services can detect when an application requests administrator permission." "objects_886_relationship_type_detects" "objects_886_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_886_target_ref_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_886_x_mitre_deprecated_False" "objects_886_x_mitre_version_0.1" "objects_886_x_mitre_attack_spec_version_3.1.0" "objects_886_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_886_spec_version_2.1" "objects_886_x_mitre_domains_0_mobile-attack" "objects_887_type_relationship" "objects_887_id_relationship--603df08f-22d3-4418-9151-4b3a3c9c7c24" "objects_887_created_2023-03-15T16:40:37.553Z" "objects_887_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_887_revoked_False" "objects_887_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_887_modified_2023-08-10T21:03:10.023Z" "objects_887_description_Mobile security products can potentially detect rogue Wi-Fi access points if the adversary is attempting to decrypt traffic using an untrusted SSL certificate. " "objects_887_relationship_type_detects" "objects_887_source_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_887_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_887_x_mitre_deprecated_False" "objects_887_x_mitre_version_0.1" "objects_887_x_mitre_attack_spec_version_3.1.0" "objects_887_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_887_spec_version_2.1" "objects_887_x_mitre_domains_0_mobile-attack" "objects_888_type_relationship" "objects_888_id_relationship--605d95a1-0493-418e-9d81-de58531c4421" "objects_888_created_2020-04-24T15:12:11.217Z" "objects_888_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_888_revoked_False" "objects_888_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_888_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_888_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_888_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_888_modified_2023-04-05T20:04:31.136Z" "objects_888_description_[Concipit1248](https://attack.mitre.org/software/S0426) communicates with the C2 server using HTTP requests.(Citation: TrendMicro Coronavirus Updates)" "objects_888_relationship_type_uses" "objects_888_source_ref_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_888_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_888_x_mitre_deprecated_False" "objects_888_x_mitre_version_1.0" "objects_888_x_mitre_attack_spec_version_3.1.0" "objects_888_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_888_spec_version_2.1" "objects_888_x_mitre_domains_0_mobile-attack" "objects_889_type_relationship" "objects_889_id_relationship--60782df8-1e96-48eb-a6b7-843c94b32b59" "objects_889_created_2023-02-06T19:43:17.802Z" "objects_889_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_889_revoked_False" "objects_889_external_references_0_source_name_threatfabric_sova_0921" "objects_889_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_889_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_889_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_889_modified_2023-03-29T21:33:52.290Z" "objects_889_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can hide its application icon.(Citation: threatfabric_sova_0921)" "objects_889_relationship_type_uses" "objects_889_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_889_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_889_x_mitre_deprecated_False" "objects_889_x_mitre_version_0.1" "objects_889_x_mitre_attack_spec_version_3.1.0" "objects_889_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_889_spec_version_2.1" "objects_889_x_mitre_domains_0_mobile-attack" "objects_890_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_890_type_relationship" "objects_890_id_relationship--6086e1e2-1b39-4ff2-910e-4a4eb86d57b7" "objects_890_created_2017-12-14T16:46:06.044Z" "objects_890_x_mitre_version_1.0" "objects_890_external_references_0_source_name_Lookout-BrainTest" "objects_890_external_references_0_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_890_external_references_0_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_890_x_mitre_deprecated_False" "objects_890_revoked_False" "objects_890_description_[BrainTest](https://attack.mitre.org/software/S0293) provided capabilities that allowed developers to use compromised devices to post positive reviews on their own malicious applications as well as download other malicious applications they had submitted to the Play Store.(Citation: Lookout-BrainTest)" "objects_890_modified_2022-04-19T14:25:41.669Z" "objects_890_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_890_relationship_type_uses" "objects_890_source_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_890_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_890_x_mitre_attack_spec_version_2.1.0" "objects_890_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_890_spec_version_2.1" "objects_890_x_mitre_domains_0_mobile-attack" "objects_891_type_relationship" "objects_891_id_relationship--609ec9f8-f702-444b-b837-72a0880d429b" "objects_891_created_2023-09-22T19:17:01.704Z" "objects_891_revoked_False" "objects_891_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_891_modified_2023-09-22T19:17:01.704Z" "objects_891_description_The user may view applications with administrator access through the device settings and may also notice if user data is inexplicably missing. " "objects_891_relationship_type_detects" "objects_891_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_891_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_891_x_mitre_deprecated_False" "objects_891_x_mitre_version_0.1" "objects_891_x_mitre_attack_spec_version_3.1.0" "objects_891_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_891_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_891_spec_version_2.1" "objects_891_x_mitre_domains_0_mobile-attack" "objects_892_type_relationship" "objects_892_id_relationship--60ad088f-3133-4b0c-a441-e1e06fff1765" "objects_892_created_2023-02-06T19:37:56.416Z" "objects_892_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_892_revoked_False" "objects_892_external_references_0_source_name_threatfabric_sova_0921" "objects_892_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_892_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_892_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_892_modified_2023-03-29T21:34:29.147Z" "objects_892_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can gather data about the device.(Citation: threatfabric_sova_0921)" "objects_892_relationship_type_uses" "objects_892_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_892_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_892_x_mitre_deprecated_False" "objects_892_x_mitre_version_0.1" "objects_892_x_mitre_attack_spec_version_3.1.0" "objects_892_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_892_spec_version_2.1" "objects_892_x_mitre_domains_0_mobile-attack" "objects_893_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_893_id_relationship--60db521a-ae2d-4a9a-8c6d-47a5528f1ecb" "objects_893_type_relationship" "objects_893_created_2020-01-27T17:05:58.308Z" "objects_893_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_893_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_893_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_893_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_893_modified_2020-01-27T17:05:58.308Z" "objects_893_description_[GolfSpy](https://attack.mitre.org/software/S0421) encodes its configurations using a customized algorithm.(Citation: Trend Micro Bouncing Golf 2019)" "objects_893_relationship_type_uses" "objects_893_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_893_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_893_x_mitre_version_1.0" "objects_893_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_893_spec_version_2.1" "objects_893_x_mitre_attack_spec_version_2.1.0" "objects_893_x_mitre_domains_0_mobile-attack" "objects_894_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_894_type_relationship" "objects_894_id_relationship--60e2ebd0-90dc-4131-ba4f-adc9b49ec113" "objects_894_created_2020-06-26T15:32:25.032Z" "objects_894_x_mitre_version_1.0" "objects_894_external_references_0_source_name_Threat Fabric Cerberus" "objects_894_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_894_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_894_x_mitre_deprecated_False" "objects_894_revoked_False" "objects_894_description_[Cerberus](https://attack.mitre.org/software/S0480) can generate fake notifications and launch overlay attacks against attacker-specified applications.(Citation: Threat Fabric Cerberus)" "objects_894_modified_2022-04-12T10:01:44.682Z" "objects_894_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_894_relationship_type_uses" "objects_894_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_894_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_894_x_mitre_attack_spec_version_2.1.0" "objects_894_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_894_spec_version_2.1" "objects_894_x_mitre_domains_0_mobile-attack" "objects_895_type_relationship" "objects_895_id_relationship--60ecd154-e907-419a-b41d-1a9a1f59e7c3" "objects_895_created_2019-07-10T15:35:43.712Z" "objects_895_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_895_revoked_False" "objects_895_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_895_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_895_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_895_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_895_modified_2023-04-05T20:36:27.557Z" "objects_895_description_[Pallas](https://attack.mitre.org/software/S0399) has the ability to delete attacker-specified files from compromised devices.(Citation: Lookout Dark Caracal Jan 2018)" "objects_895_relationship_type_uses" "objects_895_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_895_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_895_x_mitre_deprecated_False" "objects_895_x_mitre_version_1.0" "objects_895_x_mitre_attack_spec_version_3.1.0" "objects_895_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_895_spec_version_2.1" "objects_895_x_mitre_domains_0_mobile-attack" "objects_896_type_relationship" "objects_896_id_relationship--61071d73-fcdf-4820-afd0-e3f0983e0a71" "objects_896_created_2019-07-10T15:42:09.606Z" "objects_896_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_896_revoked_False" "objects_896_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_896_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_896_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_896_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_896_modified_2023-04-05T17:01:46.513Z" "objects_896_description_[Dark Caracal](https://attack.mitre.org/groups/G0070) controls implants using standard HTTP communication.(Citation: Lookout Dark Caracal Jan 2018) " "objects_896_relationship_type_uses" "objects_896_source_ref_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_896_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_896_x_mitre_deprecated_False" "objects_896_x_mitre_version_1.0" "objects_896_x_mitre_attack_spec_version_3.1.0" "objects_896_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_896_spec_version_2.1" "objects_896_x_mitre_domains_0_mobile-attack" "objects_897_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_897_id_relationship--61550ef4-41f0-4354-af5c-f47db8aca654" "objects_897_type_relationship" "objects_897_created_2020-06-02T14:32:31.910Z" "objects_897_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_897_external_references_0_source_name_Google Project Zero Insomnia" "objects_897_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_897_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_897_modified_2020-06-02T14:32:31.910Z" "objects_897_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can collect the device\u2019s phone number, ICCID, IMEI, and the currently active network interface (Wi-Fi or cellular).(Citation: Google Project Zero Insomnia)" "objects_897_relationship_type_uses" "objects_897_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_897_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_897_x_mitre_version_1.0" "objects_897_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_897_spec_version_2.1" "objects_897_x_mitre_attack_spec_version_2.1.0" "objects_897_x_mitre_domains_0_mobile-attack" "objects_898_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_898_id_relationship--6176a297-3097-42e2-b1c2-815e7fd8c81c" "objects_898_type_relationship" "objects_898_created_2020-01-21T15:29:27.041Z" "objects_898_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_898_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_898_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_898_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_898_modified_2020-01-21T15:29:27.041Z" "objects_898_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can download attacker-specified files.(Citation: SecureList - ViceLeaker 2019)" "objects_898_relationship_type_uses" "objects_898_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_898_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_898_x_mitre_version_1.0" "objects_898_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_898_spec_version_2.1" "objects_898_x_mitre_attack_spec_version_2.1.0" "objects_898_x_mitre_domains_0_mobile-attack" "objects_899_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_899_type_relationship" "objects_899_id_relationship--6209cccd-2877-4941-ac0c-bec3ba7a5544" "objects_899_created_2022-04-05T19:40:25.071Z" "objects_899_x_mitre_version_0.1" "objects_899_x_mitre_deprecated_False" "objects_899_revoked_False" "objects_899_description_" "objects_899_modified_2022-04-05T19:40:25.071Z" "objects_899_relationship_type_revoked-by" "objects_899_source_ref_attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a" "objects_899_target_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_899_x_mitre_attack_spec_version_2.1.0" "objects_899_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_899_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_899_spec_version_2.1" "objects_899_x_mitre_domains_0_mobile-attack" "objects_900_type_relationship" "objects_900_id_relationship--62623afc-8222-4d59-b5d0-7bc1ccc7fadc" "objects_900_created_2023-02-06T19:41:40.104Z" "objects_900_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_900_revoked_False" "objects_900_external_references_0_source_name_threatfabric_sova_0921" "objects_900_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_900_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_900_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_900_modified_2023-03-29T21:35:04.072Z" "objects_900_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can silently intercept and manipulate notifications. [S.O.V.A.](https://attack.mitre.org/software/S1062) can also inject cookies via push notifications.(Citation: threatfabric_sova_0921)" "objects_900_relationship_type_uses" "objects_900_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_900_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_900_x_mitre_deprecated_False" "objects_900_x_mitre_version_0.1" "objects_900_x_mitre_attack_spec_version_3.1.0" "objects_900_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_900_spec_version_2.1" "objects_900_x_mitre_domains_0_mobile-attack" "objects_901_type_relationship" "objects_901_id_relationship--626d4c6c-97e4-4aa3-922b-c1a81e677213" "objects_901_created_2023-03-20T15:32:36.972Z" "objects_901_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_901_revoked_False" "objects_901_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_901_modified_2023-08-07T17:18:06.656Z" "objects_901_description_Application vetting services can detect malicious code in applications." "objects_901_relationship_type_detects" "objects_901_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_901_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_901_x_mitre_deprecated_False" "objects_901_x_mitre_version_0.1" "objects_901_x_mitre_attack_spec_version_3.1.0" "objects_901_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_901_spec_version_2.1" "objects_901_x_mitre_domains_0_mobile-attack" "objects_902_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_902_type_relationship" "objects_902_id_relationship--628435f7-7d1e-40f1-a29a-7c5861b14c7d" "objects_902_created_2022-03-30T20:13:40.625Z" "objects_902_x_mitre_version_0.1" "objects_902_x_mitre_deprecated_False" "objects_902_revoked_False" "objects_902_description_Users should be shown what a synthetic activity looks like so they can scrutinize them in the future." "objects_902_modified_2022-03-30T20:13:40.625Z" "objects_902_relationship_type_mitigates" "objects_902_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_902_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_902_x_mitre_attack_spec_version_2.1.0" "objects_902_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_902_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_902_spec_version_2.1" "objects_902_x_mitre_domains_0_mobile-attack" "objects_903_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_903_id_relationship--6294e276-e4ac-4097-a5cd-3b81e0d4498f" "objects_903_type_relationship" "objects_903_created_2020-12-14T15:02:35.287Z" "objects_903_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_903_external_references_0_source_name_Securelist Asacub" "objects_903_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_903_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_903_modified_2020-12-14T15:02:35.290Z" "objects_903_description_[Asacub](https://attack.mitre.org/software/S0540) has implemented functions in native code.(Citation: Securelist Asacub)" "objects_903_relationship_type_uses" "objects_903_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_903_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_903_x_mitre_version_1.0" "objects_903_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_903_spec_version_2.1" "objects_903_x_mitre_attack_spec_version_2.1.0" "objects_903_x_mitre_domains_0_mobile-attack" "objects_904_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_904_type_relationship" "objects_904_id_relationship--62cc60d9-1581-4a0f-b7e2-a18d386511e6" "objects_904_created_2022-03-30T13:48:43.977Z" "objects_904_x_mitre_version_0.1" "objects_904_x_mitre_deprecated_False" "objects_904_revoked_False" "objects_904_description_Mobile security products can typically detect jailbroken or rooted devices. " "objects_904_modified_2022-03-30T13:48:43.977Z" "objects_904_relationship_type_mitigates" "objects_904_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_904_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_904_x_mitre_attack_spec_version_2.1.0" "objects_904_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_904_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_904_spec_version_2.1" "objects_904_x_mitre_domains_0_mobile-attack" "objects_905_type_relationship" "objects_905_id_relationship--6315b6ec-35f8-4b28-8603-664664311a33" "objects_905_created_2023-08-16T16:44:53.770Z" "objects_905_revoked_False" "objects_905_external_references_0_source_name_cyble_chameleon_0423" "objects_905_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_905_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_905_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_905_modified_2023-08-16T16:44:53.770Z" "objects_905_description_[Chameleon](https://attack.mitre.org/software/S1083) can read the name of application packages.(Citation: cyble_chameleon_0423)" "objects_905_relationship_type_uses" "objects_905_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_905_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_905_x_mitre_deprecated_False" "objects_905_x_mitre_version_0.1" "objects_905_x_mitre_attack_spec_version_3.1.0" "objects_905_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_905_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_905_spec_version_2.1" "objects_905_x_mitre_domains_0_mobile-attack" "objects_906_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_906_id_relationship--634071ce-d386-4143-8e6e-b88bc077de6d" "objects_906_type_relationship" "objects_906_created_2020-07-27T14:14:56.961Z" "objects_906_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_906_external_references_0_source_name_Google Security Zen" "objects_906_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_906_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_906_modified_2020-08-10T22:18:20.782Z" "objects_906_description_[Zen](https://attack.mitre.org/software/S0494) can dynamically load executable code from remote sources.(Citation: Google Security Zen)" "objects_906_relationship_type_uses" "objects_906_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_906_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_906_x_mitre_version_1.0" "objects_906_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_906_spec_version_2.1" "objects_906_x_mitre_attack_spec_version_2.1.0" "objects_906_x_mitre_domains_0_mobile-attack" "objects_907_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_907_id_relationship--638f3d4b-f1d4-4c61-91a0-7c125ef8437a" "objects_907_type_relationship" "objects_907_created_2017-12-14T16:46:06.044Z" "objects_907_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_907_external_references_0_source_name_Lookout-Pegasus" "objects_907_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_907_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_907_modified_2020-03-31T14:49:39.188Z" "objects_907_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) was distributed through a web site by exploiting vulnerabilities in the Safari web browser on iOS devices.(Citation: Lookout-Pegasus)" "objects_907_relationship_type_uses" "objects_907_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_907_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_907_x_mitre_version_1.0" "objects_907_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_907_spec_version_2.1" "objects_907_x_mitre_attack_spec_version_2.1.0" "objects_907_x_mitre_domains_0_mobile-attack" "objects_908_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_908_id_relationship--63e67cba-4eae-4495-8897-2610103a0c41" "objects_908_type_relationship" "objects_908_created_2017-12-14T16:46:06.044Z" "objects_908_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_908_external_references_0_source_name_Lookout-Pegasus" "objects_908_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_908_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_908_modified_2020-03-31T14:49:39.188Z" "objects_908_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) exploits iOS vulnerabilities to escalate privileges.(Citation: Lookout-Pegasus)" "objects_908_relationship_type_uses" "objects_908_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_908_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_908_x_mitre_version_1.0" "objects_908_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_908_spec_version_2.1" "objects_908_x_mitre_attack_spec_version_2.1.0" "objects_908_x_mitre_domains_0_mobile-attack" "objects_909_type_relationship" "objects_909_id_relationship--642a2599-a50c-480c-8e07-2a3a217f4a46" "objects_909_created_2023-07-21T19:52:13.807Z" "objects_909_revoked_False" "objects_909_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_909_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_909_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_909_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_909_modified_2023-07-21T19:52:13.807Z" "objects_909_description_[Fakecalls](https://attack.mitre.org/software/S1080) can turn on a device\u2019s microphone to capture audio.(Citation: kaspersky_fakecalls_0422)" "objects_909_relationship_type_uses" "objects_909_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_909_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_909_x_mitre_deprecated_False" "objects_909_x_mitre_version_0.1" "objects_909_x_mitre_attack_spec_version_3.1.0" "objects_909_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_909_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_909_spec_version_2.1" "objects_909_x_mitre_domains_0_mobile-attack" "objects_910_type_relationship" "objects_910_id_relationship--64489abc-5c2f-4620-833d-9ac010040955" "objects_910_created_2023-08-14T16:19:54.684Z" "objects_910_revoked_False" "objects_910_external_references_0_source_name_unit42_strat_aged_domain_det" "objects_910_external_references_0_description_Chen, Z. et al. (2021, December 29). Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends. Retrieved July 31, 2023." "objects_910_external_references_0_url_https://unit42.paloaltonetworks.com/strategically-aged-domain-detection/" "objects_910_external_references_1_source_name_Data Driven Security DGA" "objects_910_external_references_1_description_Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019." "objects_910_external_references_1_url_https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/" "objects_910_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_910_modified_2023-08-14T16:19:54.684Z" "objects_910_description_Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more.(Citation: Data Driven Security DGA) Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant.(Citation: unit42_strat_aged_domain_det) Content delivery network (CDN) domains may trigger these detections due to the format of their domain names." "objects_910_relationship_type_detects" "objects_910_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_910_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_910_x_mitre_deprecated_False" "objects_910_x_mitre_version_0.1" "objects_910_x_mitre_attack_spec_version_3.1.0" "objects_910_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_910_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_910_spec_version_2.1" "objects_910_x_mitre_domains_0_mobile-attack" "objects_911_type_relationship" "objects_911_id_relationship--644a19d3-c94f-40d9-87ac-02ef20b14eda" "objects_911_created_2023-02-06T19:02:00.135Z" "objects_911_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_911_revoked_False" "objects_911_external_references_0_source_name_lookout_abstractemu_1021" "objects_911_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_911_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_911_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_911_modified_2023-03-27T17:16:28.481Z" "objects_911_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can grant itself microphone permissions.(Citation: lookout_abstractemu_1021)" "objects_911_relationship_type_uses" "objects_911_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_911_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_911_x_mitre_deprecated_False" "objects_911_x_mitre_version_0.1" "objects_911_x_mitre_attack_spec_version_3.1.0" "objects_911_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_911_spec_version_2.1" "objects_911_x_mitre_domains_0_mobile-attack" "objects_912_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_912_id_relationship--64ddcf35-dbf0-4b9f-bf07-1e0bde8bbe65" "objects_912_type_relationship" "objects_912_created_2021-04-19T17:05:42.574Z" "objects_912_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_912_external_references_0_source_name_Lookout Uyghur Campaign" "objects_912_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_912_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_912_modified_2021-04-19T17:05:42.574Z" "objects_912_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has collected files from the infected device.(Citation: Lookout Uyghur Campaign)\t" "objects_912_relationship_type_uses" "objects_912_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_912_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_912_x_mitre_version_1.0" "objects_912_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_912_spec_version_2.1" "objects_912_x_mitre_attack_spec_version_2.1.0" "objects_912_x_mitre_domains_0_mobile-attack" "objects_913_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_913_id_relationship--6556536c-d5ea-4a3d-ae48-4016d4d762ff" "objects_913_type_relationship" "objects_913_created_2019-09-04T14:28:16.478Z" "objects_913_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_913_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_913_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_913_external_references_0_source_name_Lookout-Monokle" "objects_913_modified_2020-03-31T14:49:39.188Z" "objects_913_description_[Monokle](https://attack.mitre.org/software/S0407) can record the screen as the user unlocks the device and can take screenshots of any application in the foreground. [Monokle](https://attack.mitre.org/software/S0407) can also abuse accessibility features to read the screen to capture data from a large number of popular applications.(Citation: Lookout-Monokle)" "objects_913_relationship_type_uses" "objects_913_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_913_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_913_x_mitre_version_1.0" "objects_913_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_913_spec_version_2.1" "objects_913_x_mitre_attack_spec_version_2.1.0" "objects_913_x_mitre_domains_0_mobile-attack" "objects_914_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_914_id_relationship--657f1d8c-3982-4ee5-95dc-c8ec3164cb2e" "objects_914_type_relationship" "objects_914_created_2020-07-15T20:20:59.382Z" "objects_914_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_914_external_references_0_source_name_Bitdefender Mandrake" "objects_914_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_914_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_914_modified_2020-07-15T20:20:59.382Z" "objects_914_description_[Mandrake](https://attack.mitre.org/software/S0485) has communicated with the C2 server over TCP port 7777.(Citation: Bitdefender Mandrake)" "objects_914_relationship_type_uses" "objects_914_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_914_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_914_x_mitre_version_1.0" "objects_914_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_914_spec_version_2.1" "objects_914_x_mitre_attack_spec_version_2.1.0" "objects_914_x_mitre_domains_0_mobile-attack" "objects_915_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_915_id_relationship--65803bfa-7601-44ad-95ea-64d8bfd778a4" "objects_915_type_relationship" "objects_915_created_2020-04-08T15:51:25.157Z" "objects_915_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_915_external_references_0_source_name_ThreatFabric Ginp" "objects_915_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_915_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_915_modified_2020-04-08T15:51:25.157Z" "objects_915_description_[Ginp](https://attack.mitre.org/software/S0423) can capture device screenshots and stream them back to the C2.(Citation: ThreatFabric Ginp)" "objects_915_relationship_type_uses" "objects_915_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_915_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_915_x_mitre_version_1.0" "objects_915_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_915_spec_version_2.1" "objects_915_x_mitre_attack_spec_version_2.1.0" "objects_915_x_mitre_domains_0_mobile-attack" "objects_916_type_relationship" "objects_916_id_relationship--6588186c-2fa1-408d-bef4-2d63ccf49c28" "objects_916_created_2023-10-10T15:33:58.533Z" "objects_916_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_916_revoked_False" "objects_916_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_916_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_916_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_916_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_916_modified_2023-10-10T15:33:58.533Z" "objects_916_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has masqueraded as popular South Korean applications.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_916_relationship_type_uses" "objects_916_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_916_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_916_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_916_x_mitre_deprecated_False" "objects_916_x_mitre_version_1.0" "objects_916_x_mitre_attack_spec_version_2.1.0" "objects_916_spec_version_2.1" "objects_916_x_mitre_domains_0_mobile-attack" "objects_917_type_relationship" "objects_917_id_relationship--6588914f-d270-47d3-b889-046564ad616f" "objects_917_created_2023-08-16T16:35:21.853Z" "objects_917_revoked_False" "objects_917_external_references_0_source_name_cyble_chameleon_0423" "objects_917_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_917_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_917_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_917_modified_2023-08-16T16:35:21.853Z" "objects_917_description_[Chameleon](https://attack.mitre.org/software/S1083) can gather SMS messages.(Citation: cyble_chameleon_0423)" "objects_917_relationship_type_uses" "objects_917_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_917_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_917_x_mitre_deprecated_False" "objects_917_x_mitre_version_0.1" "objects_917_x_mitre_attack_spec_version_3.1.0" "objects_917_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_917_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_917_spec_version_2.1" "objects_917_x_mitre_domains_0_mobile-attack" "objects_918_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_918_id_relationship--65a24b75-4bb0-441a-8cb2-a34077b13f61" "objects_918_type_relationship" "objects_918_created_2020-01-27T17:05:58.201Z" "objects_918_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_918_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_918_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_918_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_918_modified_2020-03-26T20:50:07.154Z" "objects_918_description_[GolfSpy](https://attack.mitre.org/software/S0421) can collect local accounts on the device, pictures, bookmarks/histories of the default browser, and files stored on the SD card. [GolfSpy](https://attack.mitre.org/software/S0421) can list image, audio, video, and other files stored on the device. [GolfSpy](https://attack.mitre.org/software/S0421) can copy arbitrary files from the device.(Citation: Trend Micro Bouncing Golf 2019)" "objects_918_relationship_type_uses" "objects_918_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_918_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_918_x_mitre_version_1.0" "objects_918_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_918_spec_version_2.1" "objects_918_x_mitre_attack_spec_version_2.1.0" "objects_918_x_mitre_domains_0_mobile-attack" "objects_919_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_919_id_relationship--65acbbe2-48e1-4fba-a781-39fb040a711d" "objects_919_type_relationship" "objects_919_created_2019-09-03T19:45:48.505Z" "objects_919_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_919_external_references_0_source_name_SWB Exodus March 2019" "objects_919_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_919_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_919_modified_2020-03-31T14:49:39.188Z" "objects_919_description_ [Exodus](https://attack.mitre.org/software/S0405) One, after checking in, sends a POST request and then downloads [Exodus](https://attack.mitre.org/software/S0405) Two, the second stage binaries.(Citation: SWB Exodus March 2019) " "objects_919_relationship_type_uses" "objects_919_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_919_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_919_x_mitre_version_1.0" "objects_919_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_919_spec_version_2.1" "objects_919_x_mitre_attack_spec_version_2.1.0" "objects_919_x_mitre_domains_0_mobile-attack" "objects_920_type_relationship" "objects_920_id_relationship--65dc7cc1-e047-4087-8b2b-7d0d0f67576a" "objects_920_created_2023-08-16T16:34:14.088Z" "objects_920_revoked_False" "objects_920_external_references_0_source_name_cyble_chameleon_0423" "objects_920_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_920_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_920_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_920_modified_2023-08-16T16:34:14.088Z" "objects_920_description_[Chameleon](https://attack.mitre.org/software/S1083) can perform overlay attacks against a device by injecting HTML phishing pages into a webview.(Citation: cyble_chameleon_0423)" "objects_920_relationship_type_uses" "objects_920_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_920_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_920_x_mitre_deprecated_False" "objects_920_x_mitre_version_0.1" "objects_920_x_mitre_attack_spec_version_3.1.0" "objects_920_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_920_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_920_spec_version_2.1" "objects_920_x_mitre_domains_0_mobile-attack" "objects_921_type_relationship" "objects_921_id_relationship--6603a556-9732-4f8b-ac9c-5c3949b251ed" "objects_921_created_2023-09-21T22:20:53.256Z" "objects_921_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_921_revoked_False" "objects_921_external_references_0_source_name_app_hibernation" "objects_921_external_references_0_description_Android Developers. (2023, August 28). App hibernation. Retrieved September 21, 2023." "objects_921_external_references_0_url_https://developer.android.com/topic/performance/app-hibernation" "objects_921_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_921_modified_2023-09-21T22:25:08.129Z" "objects_921_description_Android 11 and above implement application hibernation, which can hibernate an application that has not been used for a few months and can reset the application\u2019s permission requests.(Citation: app_hibernation)" "objects_921_relationship_type_mitigates" "objects_921_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_921_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_921_x_mitre_deprecated_False" "objects_921_x_mitre_version_0.1" "objects_921_x_mitre_attack_spec_version_3.1.0" "objects_921_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_921_spec_version_2.1" "objects_921_x_mitre_domains_0_mobile-attack" "objects_922_type_relationship" "objects_922_id_relationship--6609b892-d388-4b8a-ac21-5cbf12e0d574" "objects_922_created_2023-10-10T15:33:58.701Z" "objects_922_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_922_revoked_False" "objects_922_external_references_0_source_name_Forbes Cerberus" "objects_922_external_references_0_description_Z. Doffman. (2019, August 16). Warning As Devious New Android Malware Hides In Fake Adobe Flash Player Installations (Updated). Retrieved June 26, 2020." "objects_922_external_references_0_url_https://www.forbes.com/sites/zakdoffman/2019/08/16/dangerous-new-android-trojan-hides-from-malware-researchers-and-taunts-them-on-twitter/#1563fef26d9c" "objects_922_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_922_modified_2023-10-10T15:33:58.701Z" "objects_922_description_[Cerberus](https://attack.mitre.org/software/S0480) has pretended to be an Adobe Flash Player installer.(Citation: Forbes Cerberus)" "objects_922_relationship_type_uses" "objects_922_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_922_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_922_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_922_x_mitre_deprecated_False" "objects_922_x_mitre_version_1.0" "objects_922_x_mitre_attack_spec_version_2.1.0" "objects_922_spec_version_2.1" "objects_922_x_mitre_domains_0_mobile-attack" "objects_923_type_relationship" "objects_923_id_relationship--66132260-65d1-4bf5-8200-abdb2014be6f" "objects_923_created_2020-09-15T15:18:12.465Z" "objects_923_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_923_revoked_False" "objects_923_external_references_0_source_name_Cybereason FakeSpy" "objects_923_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_923_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_923_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_923_modified_2023-04-05T20:51:12.881Z" "objects_923_description_[FakeSpy](https://attack.mitre.org/software/S0509) can detect if it is running in an emulator and adjust its behavior accordingly.(Citation: Cybereason FakeSpy)" "objects_923_relationship_type_uses" "objects_923_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_923_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_923_x_mitre_deprecated_False" "objects_923_x_mitre_version_1.0" "objects_923_x_mitre_attack_spec_version_3.1.0" "objects_923_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_923_spec_version_2.1" "objects_923_x_mitre_domains_0_mobile-attack" "objects_924_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_924_type_relationship" "objects_924_id_relationship--6661823b-4fdd-4879-ad5d-64c9a4b12519" "objects_924_created_2022-04-05T17:03:53.457Z" "objects_924_x_mitre_version_0.1" "objects_924_x_mitre_deprecated_False" "objects_924_revoked_False" "objects_924_description_" "objects_924_modified_2022-04-05T17:03:53.457Z" "objects_924_relationship_type_subtechnique-of" "objects_924_source_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_924_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_924_x_mitre_attack_spec_version_2.1.0" "objects_924_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_924_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_924_spec_version_2.1" "objects_924_x_mitre_domains_0_mobile-attack" "objects_925_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_925_id_relationship--66ba3094-7c14-41b9-b7c1-814d026156b9" "objects_925_type_relationship" "objects_925_created_2020-09-11T15:58:40.846Z" "objects_925_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_925_external_references_0_source_name_Talos-WolfRAT" "objects_925_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_925_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_925_modified_2020-09-11T15:58:40.846Z" "objects_925_description_[WolfRAT](https://attack.mitre.org/software/S0489) can delete and send SMS messages.(Citation: Talos-WolfRAT)" "objects_925_relationship_type_uses" "objects_925_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_925_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_925_x_mitre_version_1.0" "objects_925_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_925_spec_version_2.1" "objects_925_x_mitre_attack_spec_version_2.1.0" "objects_925_x_mitre_domains_0_mobile-attack" "objects_926_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_926_id_relationship--66c7fdcf-b9ef-429e-81b2-e97e971cfb42" "objects_926_type_relationship" "objects_926_created_2020-11-10T17:08:35.593Z" "objects_926_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_926_external_references_0_source_name_Lookout Uyghur Campaign" "objects_926_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_926_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_926_modified_2020-11-10T17:08:35.593Z" "objects_926_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has seen native libraries used in some reported samples (Citation: Lookout Uyghur Campaign)" "objects_926_relationship_type_uses" "objects_926_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_926_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_926_x_mitre_version_1.0" "objects_926_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_926_spec_version_2.1" "objects_926_x_mitre_attack_spec_version_2.1.0" "objects_926_x_mitre_domains_0_mobile-attack" "objects_927_type_relationship" "objects_927_id_relationship--66fb8a34-9d48-4599-a56e-19b057380030" "objects_927_created_2023-03-20T18:46:08.304Z" "objects_927_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_927_revoked_False" "objects_927_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_927_modified_2023-08-08T15:04:38.833Z" "objects_927_description_Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. " "objects_927_relationship_type_detects" "objects_927_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_927_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_927_x_mitre_deprecated_False" "objects_927_x_mitre_version_0.1" "objects_927_x_mitre_attack_spec_version_3.1.0" "objects_927_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_927_spec_version_2.1" "objects_927_x_mitre_domains_0_mobile-attack" "objects_928_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_928_id_relationship--670a0995-a789-4674-9e91-c74316cdef90" "objects_928_type_relationship" "objects_928_created_2020-09-11T14:54:16.621Z" "objects_928_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_928_external_references_0_source_name_Lookout Desert Scorpion" "objects_928_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_928_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_928_modified_2020-09-11T14:54:16.621Z" "objects_928_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can record audio from phone calls and the device microphone.(Citation: Lookout Desert Scorpion)" "objects_928_relationship_type_uses" "objects_928_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_928_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_928_x_mitre_version_1.0" "objects_928_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_928_spec_version_2.1" "objects_928_x_mitre_attack_spec_version_2.1.0" "objects_928_x_mitre_domains_0_mobile-attack" "objects_929_type_relationship" "objects_929_id_relationship--67aa692c-24e4-483e-996e-02ce1e861ec8" "objects_929_created_2023-02-28T20:37:29.206Z" "objects_929_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_929_revoked_False" "objects_929_external_references_0_source_name_proofpoint_flubot_0421" "objects_929_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_929_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_929_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_929_modified_2023-03-31T22:09:02.129Z" "objects_929_description_[FluBot](https://attack.mitre.org/software/S1067) can add display overlays onto banking apps to capture credit card information.(Citation: proofpoint_flubot_0421)" "objects_929_relationship_type_uses" "objects_929_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_929_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_929_x_mitre_deprecated_False" "objects_929_x_mitre_version_0.1" "objects_929_x_mitre_attack_spec_version_3.1.0" "objects_929_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_929_spec_version_2.1" "objects_929_x_mitre_domains_0_mobile-attack" "objects_930_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_930_type_relationship" "objects_930_id_relationship--67c2b73d-cd51-4894-a7bd-fdd5d14b33a2" "objects_930_created_2019-09-03T20:08:00.704Z" "objects_930_x_mitre_version_1.0" "objects_930_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_930_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_930_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_930_x_mitre_deprecated_False" "objects_930_revoked_False" "objects_930_description_[Gustuff](https://attack.mitre.org/software/S0406) code is both obfuscated and packed with an FTT packer.(Citation: Talos Gustuff Apr 2019)" "objects_930_modified_2022-04-15T17:18:58.074Z" "objects_930_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_930_relationship_type_uses" "objects_930_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_930_target_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_930_x_mitre_attack_spec_version_2.1.0" "objects_930_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_930_spec_version_2.1" "objects_930_x_mitre_domains_0_mobile-attack" "objects_931_type_relationship" "objects_931_id_relationship--67db22d4-6f89-40c6-b31b-737c1e3dec3f" "objects_931_created_2021-01-20T16:01:19.488Z" "objects_931_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_931_revoked_False" "objects_931_external_references_0_source_name_Trend Micro Anubis" "objects_931_external_references_0_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_931_external_references_0_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_931_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_931_modified_2023-04-05T17:17:07.374Z" "objects_931_description_[Anubis](https://attack.mitre.org/software/S0422) has used motion sensor data to attempt to determine if it is running in an emulator.(Citation: Trend Micro Anubis)" "objects_931_relationship_type_uses" "objects_931_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_931_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_931_x_mitre_deprecated_False" "objects_931_x_mitre_version_1.0" "objects_931_x_mitre_attack_spec_version_3.1.0" "objects_931_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_931_spec_version_2.1" "objects_931_x_mitre_domains_0_mobile-attack" "objects_932_type_relationship" "objects_932_id_relationship--681161b2-4e30-4d49-8524-6cc0d94585cb" "objects_932_created_2023-03-16T13:33:26.925Z" "objects_932_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_932_revoked_False" "objects_932_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_932_modified_2023-08-14T16:34:55.830Z" "objects_932_description_Many properly configured firewalls may naturally block bidirectional command and control traffic." "objects_932_relationship_type_detects" "objects_932_source_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_932_target_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_932_x_mitre_deprecated_False" "objects_932_x_mitre_version_0.1" "objects_932_x_mitre_attack_spec_version_3.1.0" "objects_932_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_932_spec_version_2.1" "objects_932_x_mitre_domains_0_mobile-attack" "objects_933_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_933_type_relationship" "objects_933_id_relationship--681d5e61-9412-4c58-bef1-c6ef7bffcb0c" "objects_933_created_2018-10-17T00:14:20.652Z" "objects_933_x_mitre_version_1.0" "objects_933_x_mitre_deprecated_False" "objects_933_revoked_False" "objects_933_description_" "objects_933_modified_2022-07-07T14:00:00.188Z" "objects_933_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_933_relationship_type_revoked-by" "objects_933_source_ref_attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f" "objects_933_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_933_x_mitre_attack_spec_version_2.1.0" "objects_933_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_933_spec_version_2.1" "objects_933_x_mitre_domains_0_mobile-attack" "objects_934_type_relationship" "objects_934_id_relationship--6846dc09-b66a-42d3-aea2-c80b51f22952" "objects_934_created_2023-02-28T21:42:31.008Z" "objects_934_revoked_False" "objects_934_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_934_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_934_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_934_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_934_modified_2023-02-28T21:42:31.008Z" "objects_934_description_[TangleBot](https://attack.mitre.org/software/S1069) can record audio using the device microphone.(Citation: cloudmark_tanglebot_0921)" "objects_934_relationship_type_uses" "objects_934_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_934_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_934_x_mitre_deprecated_False" "objects_934_x_mitre_version_0.1" "objects_934_x_mitre_attack_spec_version_3.1.0" "objects_934_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_934_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_934_spec_version_2.1" "objects_934_x_mitre_domains_0_mobile-attack" "objects_935_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_935_id_relationship--684c17bb-2075-4e1f-9fcb-17408511222d" "objects_935_type_relationship" "objects_935_created_2021-09-20T13:54:19.957Z" "objects_935_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_935_external_references_0_source_name_Lookout Uyghur Campaign" "objects_935_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_935_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_935_modified_2021-09-20T13:54:19.957Z" "objects_935_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can silently accept an incoming phone call.(Citation: Lookout Uyghur Campaign)" "objects_935_relationship_type_uses" "objects_935_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_935_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_935_x_mitre_version_1.0" "objects_935_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_935_spec_version_2.1" "objects_935_x_mitre_attack_spec_version_2.1.0" "objects_935_x_mitre_domains_0_mobile-attack" "objects_936_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_936_type_relationship" "objects_936_id_relationship--6885280e-5423-422a-94f1-e91d557e043e" "objects_936_created_2018-10-17T00:14:20.652Z" "objects_936_x_mitre_version_1.0" "objects_936_external_references_0_source_name_PaloAlto-XcodeGhost1" "objects_936_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/" "objects_936_external_references_0_description_Claud Xiao. (2015, September 17). Novel Malware XcodeGhost Modifies Xcode, Infects Apple iOS Apps and Hits App Store. Retrieved December 21, 2016." "objects_936_external_references_1_source_name_PaloAlto-XcodeGhost" "objects_936_external_references_1_url_http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/" "objects_936_external_references_1_description_Claud Xiao. (2015, September 18). Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps. Retrieved December 21, 2016." "objects_936_x_mitre_deprecated_False" "objects_936_revoked_False" "objects_936_description_[XcodeGhost](https://attack.mitre.org/software/S0297) was injected into apps by a modified version of Xcode (Apple's software development tool).(Citation: PaloAlto-XcodeGhost1)(Citation: PaloAlto-XcodeGhost)" "objects_936_modified_2022-04-15T15:10:16.607Z" "objects_936_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_936_relationship_type_uses" "objects_936_source_ref_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_936_target_ref_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_936_x_mitre_attack_spec_version_2.1.0" "objects_936_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_936_spec_version_2.1" "objects_936_x_mitre_domains_0_mobile-attack" "objects_937_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_937_type_relationship" "objects_937_id_relationship--68c17e9b-1fda-49dd-982b-566d473cc32b" "objects_937_created_2022-04-06T15:51:11.939Z" "objects_937_x_mitre_version_0.1" "objects_937_x_mitre_deprecated_False" "objects_937_revoked_False" "objects_937_description_" "objects_937_modified_2022-04-06T15:51:11.939Z" "objects_937_relationship_type_revoked-by" "objects_937_source_ref_attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3" "objects_937_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_937_x_mitre_attack_spec_version_2.1.0" "objects_937_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_937_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_937_spec_version_2.1" "objects_937_x_mitre_domains_0_mobile-attack" "objects_938_type_relationship" "objects_938_id_relationship--68e5789c-9f60-421e-9c79-fae207a29e83" "objects_938_created_2017-12-14T16:46:06.044Z" "objects_938_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_938_revoked_False" "objects_938_external_references_0_source_name_Kaspersky-WUC" "objects_938_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_938_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_938_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_938_modified_2023-04-05T20:27:20.839Z" "objects_938_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) stole SMS message content.(Citation: Kaspersky-WUC)" "objects_938_relationship_type_uses" "objects_938_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_938_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_938_x_mitre_deprecated_False" "objects_938_x_mitre_version_1.0" "objects_938_x_mitre_attack_spec_version_3.1.0" "objects_938_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_938_spec_version_2.1" "objects_938_x_mitre_domains_0_mobile-attack" "objects_939_type_relationship" "objects_939_id_relationship--6920d0d0-27f4-4d29-8622-c8a92090eec3" "objects_939_created_2020-07-20T13:27:33.486Z" "objects_939_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_939_revoked_False" "objects_939_external_references_0_source_name_Talos-WolfRAT" "objects_939_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_939_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_939_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_939_modified_2023-04-05T17:54:25.851Z" "objects_939_description_[WolfRAT](https://attack.mitre.org/software/S0489) can collect the device\u2019s contact list.(Citation: Talos-WolfRAT)" "objects_939_relationship_type_uses" "objects_939_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_939_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_939_x_mitre_deprecated_False" "objects_939_x_mitre_version_1.0" "objects_939_x_mitre_attack_spec_version_3.1.0" "objects_939_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_939_spec_version_2.1" "objects_939_x_mitre_domains_0_mobile-attack" "objects_940_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_940_id_relationship--6935752c-e400-4dfa-863f-1d44a8f6dd50" "objects_940_type_relationship" "objects_940_created_2021-09-20T13:50:02.036Z" "objects_940_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_940_external_references_0_source_name_Cofense Anubis" "objects_940_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_940_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_940_modified_2021-09-20T13:50:02.036Z" "objects_940_description_[Anubis](https://attack.mitre.org/software/S0422) can make phone calls.(Citation: Cofense Anubis)" "objects_940_relationship_type_uses" "objects_940_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_940_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_940_x_mitre_version_1.0" "objects_940_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_940_spec_version_2.1" "objects_940_x_mitre_attack_spec_version_2.1.0" "objects_940_x_mitre_domains_0_mobile-attack" "objects_941_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_941_id_relationship--694857ba-92e8-462e-8900-a9f6fdcf495d" "objects_941_type_relationship" "objects_941_created_2020-12-31T18:25:05.133Z" "objects_941_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_941_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_941_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_941_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_941_modified_2020-12-31T18:25:05.133Z" "objects_941_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has encrypted its DEX payload.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_941_relationship_type_uses" "objects_941_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_941_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_941_x_mitre_version_1.0" "objects_941_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_941_spec_version_2.1" "objects_941_x_mitre_attack_spec_version_2.1.0" "objects_941_x_mitre_domains_0_mobile-attack" "objects_942_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_942_type_relationship" "objects_942_id_relationship--6961eec4-8e31-4be1-88d9-dca682e38b8c" "objects_942_created_2019-08-09T18:02:06.688Z" "objects_942_x_mitre_version_1.0" "objects_942_external_references_0_source_name_Zscaler-SuperMarioRun" "objects_942_external_references_0_url_https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat" "objects_942_external_references_0_description_Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." "objects_942_x_mitre_deprecated_False" "objects_942_revoked_False" "objects_942_description_[DroidJack](https://attack.mitre.org/software/S0320) can capture video using device cameras.(Citation: Zscaler-SuperMarioRun)" "objects_942_modified_2022-05-20T17:13:16.507Z" "objects_942_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_942_relationship_type_uses" "objects_942_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_942_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_942_x_mitre_attack_spec_version_2.1.0" "objects_942_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_942_spec_version_2.1" "objects_942_x_mitre_domains_0_mobile-attack" "objects_943_type_relationship" "objects_943_id_relationship--69718f1d-7761-41ae-b9d0-12c45f6b4ac4" "objects_943_created_2017-12-14T16:46:06.044Z" "objects_943_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_943_revoked_False" "objects_943_external_references_0_source_name_Lookout-Pegasus" "objects_943_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_943_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_943_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_943_modified_2023-04-05T17:33:51.882Z" "objects_943_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) modifies the system partition to maintain persistence.(Citation: Lookout-Pegasus)" "objects_943_relationship_type_uses" "objects_943_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_943_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_943_x_mitre_deprecated_False" "objects_943_x_mitre_version_1.0" "objects_943_x_mitre_attack_spec_version_3.1.0" "objects_943_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_943_spec_version_2.1" "objects_943_x_mitre_domains_0_mobile-attack" "objects_944_type_relationship" "objects_944_id_relationship--697f5584-667f-4489-a535-586dd1a8b48c" "objects_944_created_2023-10-10T15:33:59.823Z" "objects_944_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_944_revoked_False" "objects_944_external_references_0_source_name_Lookout Uyghur Campaign" "objects_944_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_944_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_944_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_944_modified_2023-10-10T15:33:59.823Z" "objects_944_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has inserted trojan functionality into legitimate apps, including popular apps within the Uyghur community, VPNs, instant messaging apps, social networking, games, adult media, and Google searching.(Citation: Lookout Uyghur Campaign)" "objects_944_relationship_type_uses" "objects_944_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_944_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_944_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_944_x_mitre_deprecated_False" "objects_944_x_mitre_version_1.0" "objects_944_x_mitre_attack_spec_version_2.1.0" "objects_944_spec_version_2.1" "objects_944_x_mitre_domains_0_mobile-attack" "objects_945_type_relationship" "objects_945_id_relationship--69bb264a-3f44-4132-9248-dd80a9f5efa2" "objects_945_created_2017-12-14T16:46:06.044Z" "objects_945_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_945_revoked_False" "objects_945_external_references_0_source_name_CheckPoint-Charger" "objects_945_external_references_0_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_945_external_references_0_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_945_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_945_modified_2023-04-05T21:17:53.923Z" "objects_945_description_[Charger](https://attack.mitre.org/software/S0323) locks the device if it is granted admin permissions, displaying a message demanding a ransom payment.(Citation: CheckPoint-Charger)" "objects_945_relationship_type_uses" "objects_945_source_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_945_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_945_x_mitre_deprecated_False" "objects_945_x_mitre_version_1.0" "objects_945_x_mitre_attack_spec_version_3.1.0" "objects_945_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_945_spec_version_2.1" "objects_945_x_mitre_domains_0_mobile-attack" "objects_946_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_946_type_relationship" "objects_946_id_relationship--69de3f7e-faa7-4342-b755-4777a68fd89b" "objects_946_created_2017-12-14T16:46:06.044Z" "objects_946_x_mitre_version_1.0" "objects_946_external_references_0_source_name_Zscaler-SuperMarioRun" "objects_946_external_references_0_url_https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat" "objects_946_external_references_0_description_Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." "objects_946_x_mitre_deprecated_False" "objects_946_revoked_False" "objects_946_description_[DroidJack](https://attack.mitre.org/software/S0320) is capable of recording device phone calls.(Citation: Zscaler-SuperMarioRun)" "objects_946_modified_2022-05-20T17:13:16.508Z" "objects_946_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_946_relationship_type_uses" "objects_946_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_946_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_946_x_mitre_attack_spec_version_2.1.0" "objects_946_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_946_spec_version_2.1" "objects_946_x_mitre_domains_0_mobile-attack" "objects_947_type_relationship" "objects_947_id_relationship--6a1d8b2f-9007-46ba-b559-356b81632cee" "objects_947_created_2023-10-10T15:33:58.444Z" "objects_947_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_947_revoked_False" "objects_947_external_references_0_source_name_Zscaler TikTok Spyware" "objects_947_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_947_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_947_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_947_modified_2023-10-10T15:33:58.444Z" "objects_947_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has masqueraded as TikTok.(Citation: Zscaler TikTok Spyware)" "objects_947_relationship_type_uses" "objects_947_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_947_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_947_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_947_x_mitre_deprecated_False" "objects_947_x_mitre_version_1.0" "objects_947_x_mitre_attack_spec_version_2.1.0" "objects_947_spec_version_2.1" "objects_947_x_mitre_domains_0_mobile-attack" "objects_948_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_948_id_relationship--6a4fd7bd-b73b-403b-aff9-8be6bc0afc7b" "objects_948_type_relationship" "objects_948_created_2020-09-14T14:13:45.259Z" "objects_948_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_948_external_references_0_source_name_Lookout eSurv" "objects_948_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_948_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_948_modified_2020-09-14T14:13:45.259Z" "objects_948_description_[eSurv](https://attack.mitre.org/software/S0507) can exfiltrate device pictures.(Citation: Lookout eSurv)" "objects_948_relationship_type_uses" "objects_948_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_948_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_948_x_mitre_version_1.0" "objects_948_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_948_spec_version_2.1" "objects_948_x_mitre_attack_spec_version_2.1.0" "objects_948_x_mitre_domains_0_mobile-attack" "objects_949_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_949_type_relationship" "objects_949_id_relationship--6a5926f3-8c44-4806-83c2-e8ed0be36bc2" "objects_949_created_2022-04-01T15:13:55.124Z" "objects_949_x_mitre_version_0.1" "objects_949_x_mitre_deprecated_False" "objects_949_revoked_False" "objects_949_description_Users should be instructed to not open links in applications they don\u2019t recognize." "objects_949_modified_2022-04-01T15:13:55.124Z" "objects_949_relationship_type_mitigates" "objects_949_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_949_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_949_x_mitre_attack_spec_version_2.1.0" "objects_949_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_949_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_949_spec_version_2.1" "objects_949_x_mitre_domains_0_mobile-attack" "objects_950_type_relationship" "objects_950_id_relationship--6a5f151f-36cb-496a-9d0c-d726f1b00d4e" "objects_950_created_2023-03-16T18:26:45.940Z" "objects_950_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_950_revoked_False" "objects_950_external_references_0_source_name_Android-VerifiedBoot" "objects_950_external_references_0_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_950_external_references_0_url_https://source.android.com/security/verifiedboot/" "objects_950_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_950_modified_2023-08-08T15:21:42.253Z" "objects_950_description_On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. " "objects_950_relationship_type_detects" "objects_950_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_950_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_950_x_mitre_deprecated_False" "objects_950_x_mitre_version_0.1" "objects_950_x_mitre_attack_spec_version_3.1.0" "objects_950_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_950_spec_version_2.1" "objects_950_x_mitre_domains_0_mobile-attack" "objects_951_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_951_id_relationship--6a715733-cde6-4903-b967-35562b584c6f" "objects_951_type_relationship" "objects_951_created_2020-06-02T14:32:31.878Z" "objects_951_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_951_external_references_0_source_name_Google Project Zero Insomnia" "objects_951_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_951_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_951_modified_2020-06-02T14:32:31.878Z" "objects_951_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can obtain a list of installed non-Apple applications.(Citation: Google Project Zero Insomnia)" "objects_951_relationship_type_uses" "objects_951_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_951_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_951_x_mitre_version_1.0" "objects_951_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_951_spec_version_2.1" "objects_951_x_mitre_attack_spec_version_2.1.0" "objects_951_x_mitre_domains_0_mobile-attack" "objects_952_type_relationship" "objects_952_id_relationship--6a813057-5fe0-46b5-89a3-c804d223568c" "objects_952_created_2023-08-04T18:30:16.933Z" "objects_952_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_952_revoked_False" "objects_952_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_952_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_952_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_952_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_952_modified_2023-09-26T12:54:10.319Z" "objects_952_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate the victim device ID, model, manufacturer, and Android version.(Citation: lookout_hornbill_sunbird_0221)" "objects_952_relationship_type_uses" "objects_952_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_952_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_952_x_mitre_deprecated_False" "objects_952_x_mitre_version_0.1" "objects_952_x_mitre_attack_spec_version_3.1.0" "objects_952_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_952_spec_version_2.1" "objects_952_x_mitre_domains_0_mobile-attack" "objects_953_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_953_id_relationship--6a821e14-8247-408b-af37-9cecbba616ec" "objects_953_type_relationship" "objects_953_created_2020-05-07T15:33:32.945Z" "objects_953_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_953_external_references_0_source_name_CheckPoint Agent Smith" "objects_953_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_953_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_953_modified_2020-05-07T15:33:32.945Z" "objects_953_description_[Agent Smith](https://attack.mitre.org/software/S0440) obtains the device\u2019s application list.(Citation: CheckPoint Agent Smith)" "objects_953_relationship_type_uses" "objects_953_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_953_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_953_x_mitre_version_1.0" "objects_953_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_953_spec_version_2.1" "objects_953_x_mitre_attack_spec_version_2.1.0" "objects_953_x_mitre_domains_0_mobile-attack" "objects_954_type_relationship" "objects_954_id_relationship--6ac2d9a5-248b-42c5-af71-3ffad7bc7f3e" "objects_954_created_2023-09-21T22:18:06.516Z" "objects_954_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_954_revoked_False" "objects_954_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_954_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_954_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_954_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_954_modified_2023-09-22T19:39:19.069Z" "objects_954_description_[SharkBot](https://attack.mitre.org/software/S1055) initially poses as a benign application, then malware is downloaded and executed after an application update.(Citation: nccgroup_sharkbot_0322)" "objects_954_relationship_type_uses" "objects_954_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_954_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_954_x_mitre_deprecated_False" "objects_954_x_mitre_version_0.1" "objects_954_x_mitre_attack_spec_version_3.1.0" "objects_954_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_954_spec_version_2.1" "objects_954_x_mitre_domains_0_mobile-attack" "objects_955_type_relationship" "objects_955_id_relationship--6ad4f199-99fe-4366-87be-7a462f6c89b0" "objects_955_created_2023-06-09T19:11:38.612Z" "objects_955_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_955_revoked_False" "objects_955_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_955_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_955_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_955_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_955_modified_2023-09-22T20:48:41.487Z" "objects_955_description_[Hornbill](https://attack.mitre.org/software/S1077) can access a device\u2019s location and check if GPS is enabled. [Hornbill](https://attack.mitre.org/software/S1077) has logic to only log location changes greater than 70 meters.(Citation: lookout_hornbill_sunbird_0221)" "objects_955_relationship_type_uses" "objects_955_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_955_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_955_x_mitre_deprecated_False" "objects_955_x_mitre_version_0.1" "objects_955_x_mitre_attack_spec_version_3.1.0" "objects_955_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_955_spec_version_2.1" "objects_955_x_mitre_domains_0_mobile-attack" "objects_956_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_956_id_relationship--6b41d649-bcd0-4427-baa1-15a145bace6e" "objects_956_type_relationship" "objects_956_created_2018-10-17T00:14:20.652Z" "objects_956_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_956_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_956_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_956_external_references_0_source_name_PaloAlto-SpyDealer" "objects_956_modified_2020-03-31T14:49:39.188Z" "objects_956_description_[SpyDealer](https://attack.mitre.org/software/S0324) downloads and executes root exploits from a remote server.(Citation: PaloAlto-SpyDealer)" "objects_956_relationship_type_uses" "objects_956_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_956_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_956_x_mitre_version_1.0" "objects_956_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_956_spec_version_2.1" "objects_956_x_mitre_attack_spec_version_2.1.0" "objects_956_x_mitre_domains_0_mobile-attack" "objects_957_type_relationship" "objects_957_id_relationship--6b64d3f4-96d6-48e5-a57e-b5cf897670f9" "objects_957_created_2021-01-05T20:16:20.500Z" "objects_957_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_957_revoked_False" "objects_957_external_references_0_source_name_Zscaler TikTok Spyware" "objects_957_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_957_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_957_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_957_modified_2023-04-05T20:27:33.948Z" "objects_957_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can collect SMS messages from the device.(Citation: Zscaler TikTok Spyware)" "objects_957_relationship_type_uses" "objects_957_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_957_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_957_x_mitre_deprecated_False" "objects_957_x_mitre_version_1.0" "objects_957_x_mitre_attack_spec_version_3.1.0" "objects_957_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_957_spec_version_2.1" "objects_957_x_mitre_domains_0_mobile-attack" "objects_958_type_relationship" "objects_958_id_relationship--6b74d347-4d28-401f-9ac2-b3e1c9428bab" "objects_958_created_2023-01-18T19:16:15.534Z" "objects_958_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_958_revoked_False" "objects_958_external_references_0_source_name_cyble_drinik_1022" "objects_958_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_958_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_958_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_958_modified_2023-03-27T17:54:10.458Z" "objects_958_description_[Drinik](https://attack.mitre.org/software/S1054) can use keylogging to steal user banking credentials.(Citation: cyble_drinik_1022)" "objects_958_relationship_type_uses" "objects_958_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_958_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_958_x_mitre_deprecated_False" "objects_958_x_mitre_version_0.1" "objects_958_x_mitre_attack_spec_version_3.1.0" "objects_958_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_958_spec_version_2.1" "objects_958_x_mitre_domains_0_mobile-attack" "objects_959_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_959_type_relationship" "objects_959_id_relationship--6ba09d73-4ed5-4a37-8191-fc54a8f01696" "objects_959_created_2022-03-28T19:38:23.189Z" "objects_959_x_mitre_version_0.1" "objects_959_x_mitre_deprecated_False" "objects_959_revoked_False" "objects_959_description_" "objects_959_modified_2022-03-28T19:38:23.190Z" "objects_959_relationship_type_subtechnique-of" "objects_959_source_ref_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_959_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_959_x_mitre_attack_spec_version_2.1.0" "objects_959_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_959_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_959_spec_version_2.1" "objects_959_x_mitre_domains_0_mobile-attack" "objects_960_type_relationship" "objects_960_id_relationship--6bb4de7d-1ef9-4bc8-8d34-62e176d4188a" "objects_960_created_2023-03-03T15:42:28.475Z" "objects_960_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_960_revoked_False" "objects_960_external_references_0_source_name_lookout_abstractemu_1021" "objects_960_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_960_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_960_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_960_modified_2023-03-27T17:17:24.417Z" "objects_960_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can send large amounts of device data over its C2 channel, including the device\u2019s manufacturer, model, version and serial number, telephone number, and IP address.(Citation: lookout_abstractemu_1021)" "objects_960_relationship_type_uses" "objects_960_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_960_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_960_x_mitre_deprecated_False" "objects_960_x_mitre_version_0.1" "objects_960_x_mitre_attack_spec_version_3.1.0" "objects_960_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_960_spec_version_2.1" "objects_960_x_mitre_domains_0_mobile-attack" "objects_961_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_961_type_relationship" "objects_961_id_relationship--6c0105f3-e919-499d-b080-d127394d2837" "objects_961_created_2022-03-30T18:14:23.210Z" "objects_961_x_mitre_version_0.1" "objects_961_x_mitre_deprecated_False" "objects_961_revoked_False" "objects_961_description_Typically, insecure or malicious configuration settings are not installed without the user's consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning). " "objects_961_modified_2022-03-30T18:14:23.210Z" "objects_961_relationship_type_mitigates" "objects_961_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_961_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_961_x_mitre_attack_spec_version_2.1.0" "objects_961_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_961_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_961_spec_version_2.1" "objects_961_x_mitre_domains_0_mobile-attack" "objects_962_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_962_id_relationship--6c35f99c-153d-4023-a29a-821488ce5418" "objects_962_type_relationship" "objects_962_created_2020-04-08T15:41:19.383Z" "objects_962_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_962_external_references_0_source_name_Cofense Anubis" "objects_962_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_962_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_962_modified_2020-04-08T15:41:19.383Z" "objects_962_description_[Anubis](https://attack.mitre.org/software/S0422) can collect a list of installed applications to compare to a list of targeted applications.(Citation: Cofense Anubis)" "objects_962_relationship_type_uses" "objects_962_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_962_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_962_x_mitre_version_1.0" "objects_962_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_962_spec_version_2.1" "objects_962_x_mitre_attack_spec_version_2.1.0" "objects_962_x_mitre_domains_0_mobile-attack" "objects_963_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_963_id_relationship--6c859d6b-28b1-409d-90ea-d4eba64edf82" "objects_963_type_relationship" "objects_963_created_2020-09-11T16:22:03.301Z" "objects_963_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_963_external_references_0_source_name_Lookout ViperRAT" "objects_963_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_963_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_963_modified_2020-09-11T16:22:03.301Z" "objects_963_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect system information, including brand, manufacturer, and serial number.(Citation: Lookout ViperRAT)" "objects_963_relationship_type_uses" "objects_963_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_963_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_963_x_mitre_version_1.0" "objects_963_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_963_spec_version_2.1" "objects_963_x_mitre_attack_spec_version_2.1.0" "objects_963_x_mitre_domains_0_mobile-attack" "objects_964_type_relationship" "objects_964_id_relationship--6c887e1b-ff9a-4d7f-baec-7d19e1c982bd" "objects_964_created_2023-08-07T22:48:30.275Z" "objects_964_revoked_False" "objects_964_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_964_modified_2023-08-07T22:48:30.275Z" "objects_964_description_Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells." "objects_964_relationship_type_detects" "objects_964_source_ref_x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077" "objects_964_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_964_x_mitre_deprecated_False" "objects_964_x_mitre_version_0.1" "objects_964_x_mitre_attack_spec_version_3.1.0" "objects_964_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_964_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_964_spec_version_2.1" "objects_964_x_mitre_domains_0_mobile-attack" "objects_965_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_965_id_relationship--6ca3e3d9-2db9-4bed-98a0-417ff1e6a78e" "objects_965_type_relationship" "objects_965_created_2021-02-08T16:36:20.692Z" "objects_965_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_965_external_references_0_source_name_BlackBerry Bahamut" "objects_965_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_965_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_965_modified_2021-05-24T13:16:56.443Z" "objects_965_description_[Windshift](https://attack.mitre.org/groups/G0112) has included system information enumeration in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_965_relationship_type_uses" "objects_965_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_965_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_965_x_mitre_version_1.0" "objects_965_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_965_spec_version_2.1" "objects_965_x_mitre_attack_spec_version_2.1.0" "objects_965_x_mitre_domains_0_mobile-attack" "objects_966_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_966_id_relationship--6cace9e3-f095-4914-bddc-24cec8bcc859" "objects_966_type_relationship" "objects_966_created_2020-09-24T15:34:51.276Z" "objects_966_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_966_external_references_0_source_name_Lookout-Dendroid" "objects_966_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_966_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_966_modified_2020-09-24T15:34:51.276Z" "objects_966_description_[Dendroid](https://attack.mitre.org/software/S0301) can collect the device\u2019s photos, browser history, bookmarks, and accounts stored on the device.(Citation: Lookout-Dendroid)" "objects_966_relationship_type_uses" "objects_966_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_966_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_966_x_mitre_version_1.0" "objects_966_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_966_spec_version_2.1" "objects_966_x_mitre_attack_spec_version_2.1.0" "objects_966_x_mitre_domains_0_mobile-attack" "objects_967_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_967_id_relationship--6ce36374-2ff6-4b41-8493-148416153232" "objects_967_type_relationship" "objects_967_created_2020-07-20T13:27:33.443Z" "objects_967_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_967_external_references_0_source_name_Talos-WolfRAT" "objects_967_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_967_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_967_modified_2020-08-10T21:57:54.526Z" "objects_967_description_[WolfRAT](https://attack.mitre.org/software/S0489) can collect user account, photos, browser history, and arbitrary files.(Citation: Talos-WolfRAT)" "objects_967_relationship_type_uses" "objects_967_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_967_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_967_x_mitre_version_1.0" "objects_967_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_967_spec_version_2.1" "objects_967_x_mitre_attack_spec_version_2.1.0" "objects_967_x_mitre_domains_0_mobile-attack" "objects_968_type_relationship" "objects_968_id_relationship--6d2c7743-fc75-4524-b217-13867ca1dd10" "objects_968_created_2019-09-03T20:08:00.649Z" "objects_968_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_968_revoked_False" "objects_968_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_968_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_968_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_968_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_968_modified_2023-04-05T17:32:04.659Z" "objects_968_description_[Gustuff](https://attack.mitre.org/software/S0406) can collect the contact list.(Citation: Talos Gustuff Apr 2019) " "objects_968_relationship_type_uses" "objects_968_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_968_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_968_x_mitre_deprecated_False" "objects_968_x_mitre_version_1.0" "objects_968_x_mitre_attack_spec_version_3.1.0" "objects_968_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_968_spec_version_2.1" "objects_968_x_mitre_domains_0_mobile-attack" "objects_969_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_969_id_relationship--6d659130-545b-4917-891c-6c1b7d54ed07" "objects_969_type_relationship" "objects_969_created_2021-01-05T20:16:20.505Z" "objects_969_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_969_external_references_0_source_name_Zscaler TikTok Spyware" "objects_969_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_969_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_969_modified_2021-01-05T20:16:20.505Z" "objects_969_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can send SMS messages.(Citation: Zscaler TikTok Spyware)" "objects_969_relationship_type_uses" "objects_969_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_969_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_969_x_mitre_version_1.0" "objects_969_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_969_spec_version_2.1" "objects_969_x_mitre_attack_spec_version_2.1.0" "objects_969_x_mitre_domains_0_mobile-attack" "objects_970_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_970_type_relationship" "objects_970_id_relationship--6d88242f-e45b-481c-bd41-b66a662618ce" "objects_970_created_2022-04-06T13:57:24.730Z" "objects_970_x_mitre_version_0.1" "objects_970_x_mitre_deprecated_False" "objects_970_revoked_False" "objects_970_description_" "objects_970_modified_2022-04-06T13:57:24.730Z" "objects_970_relationship_type_revoked-by" "objects_970_source_ref_attack-pattern--76c12fc8-a4eb-45d6-a3b7-e371a7248f69" "objects_970_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_970_x_mitre_attack_spec_version_2.1.0" "objects_970_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_970_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_970_spec_version_2.1" "objects_970_x_mitre_domains_0_mobile-attack" "objects_971_type_relationship" "objects_971_id_relationship--6d910b1c-df72-4fcb-9d9e-0bb666c9c108" "objects_971_created_2023-03-20T18:57:17.059Z" "objects_971_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_971_revoked_False" "objects_971_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_971_modified_2023-08-14T20:53:47.270Z" "objects_971_description_On Android, the user can review which applications can use premium SMS features in the \"Special access\" page within application settings. " "objects_971_relationship_type_detects" "objects_971_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_971_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_971_x_mitre_deprecated_False" "objects_971_x_mitre_version_0.1" "objects_971_x_mitre_attack_spec_version_3.1.0" "objects_971_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_971_spec_version_2.1" "objects_971_x_mitre_domains_0_mobile-attack" "objects_972_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_972_id_relationship--6de29595-e63e-4d7e-992f-b4622b7b8e23" "objects_972_type_relationship" "objects_972_created_2020-09-11T14:54:16.566Z" "objects_972_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_972_external_references_0_source_name_Lookout Desert Scorpion" "objects_972_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_972_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_972_modified_2020-09-11T14:54:16.566Z" "objects_972_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can collect device metadata and can check if the device is rooted.(Citation: Lookout Desert Scorpion)" "objects_972_relationship_type_uses" "objects_972_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_972_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_972_x_mitre_version_1.0" "objects_972_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_972_spec_version_2.1" "objects_972_x_mitre_attack_spec_version_2.1.0" "objects_972_x_mitre_domains_0_mobile-attack" "objects_973_type_relationship" "objects_973_id_relationship--6e811d89-6526-480f-be40-1ad6483182ff" "objects_973_created_2023-10-10T15:33:58.801Z" "objects_973_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_973_revoked_False" "objects_973_external_references_0_source_name_Talos GPlayed" "objects_973_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_973_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_973_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_973_modified_2023-10-10T15:33:58.801Z" "objects_973_description_[GPlayed](https://attack.mitre.org/software/S0536) has used the Play Store icon as well as the name \u201cGoogle Play Marketplace\u201d.(Citation: Talos GPlayed)" "objects_973_relationship_type_uses" "objects_973_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_973_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_973_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_973_x_mitre_deprecated_False" "objects_973_x_mitre_version_1.0" "objects_973_x_mitre_attack_spec_version_2.1.0" "objects_973_spec_version_2.1" "objects_973_x_mitre_domains_0_mobile-attack" "objects_974_type_relationship" "objects_974_id_relationship--6ee69225-7c42-49e6-bfe4-c7009c82e76a" "objects_974_created_2023-03-20T18:44:36.073Z" "objects_974_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_974_revoked_False" "objects_974_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_974_modified_2023-08-09T15:56:10.432Z" "objects_974_description_The user can view and manage installed third-party keyboards." "objects_974_relationship_type_detects" "objects_974_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_974_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_974_x_mitre_deprecated_False" "objects_974_x_mitre_version_0.1" "objects_974_x_mitre_attack_spec_version_3.1.0" "objects_974_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_974_spec_version_2.1" "objects_974_x_mitre_domains_0_mobile-attack" "objects_975_type_relationship" "objects_975_id_relationship--6f240b1d-de8f-465d-a0f1-f75e828493c3" "objects_975_created_2023-08-04T18:29:05.423Z" "objects_975_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_975_revoked_False" "objects_975_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_975_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_975_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_975_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_975_modified_2023-09-22T20:42:54.574Z" "objects_975_description_(Citation: lookout_hornbill_sunbird_0221)" "objects_975_relationship_type_uses" "objects_975_source_ref_intrusion-set--6eded342-33e5-4451-b6b2-e1c62863129f" "objects_975_target_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_975_x_mitre_deprecated_False" "objects_975_x_mitre_version_0.1" "objects_975_x_mitre_attack_spec_version_3.1.0" "objects_975_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_975_spec_version_2.1" "objects_975_x_mitre_domains_0_mobile-attack" "objects_976_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_976_id_relationship--6f27a13d-b353-47f3-8a71-a13e8c4c3d60" "objects_976_type_relationship" "objects_976_created_2020-09-11T14:54:16.585Z" "objects_976_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_976_external_references_0_source_name_Lookout Desert Scorpion" "objects_976_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_976_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_976_modified_2021-04-19T17:11:50.418Z" "objects_976_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can collect attacker-specified files, including files located on external storage.(Citation: Lookout Desert Scorpion)\t" "objects_976_relationship_type_uses" "objects_976_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_976_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_976_x_mitre_version_1.0" "objects_976_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_976_spec_version_2.1" "objects_976_x_mitre_attack_spec_version_2.1.0" "objects_976_x_mitre_domains_0_mobile-attack" "objects_977_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_977_id_relationship--6f30b02b-5d88-453d-af1e-305a75bfaf87" "objects_977_type_relationship" "objects_977_created_2020-06-26T15:12:40.098Z" "objects_977_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_977_external_references_0_source_name_ESET DEFENSOR ID" "objects_977_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_977_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_977_modified_2020-06-26T15:12:40.098Z" "objects_977_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) can retrieve a list of installed applications.(Citation: ESET DEFENSOR ID)" "objects_977_relationship_type_uses" "objects_977_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_977_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_977_x_mitre_version_1.0" "objects_977_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_977_spec_version_2.1" "objects_977_x_mitre_attack_spec_version_2.1.0" "objects_977_x_mitre_domains_0_mobile-attack" "objects_978_type_relationship" "objects_978_id_relationship--6f63395f-a826-45e2-8d3b-dccd6375f54d" "objects_978_created_2019-07-10T15:25:57.585Z" "objects_978_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_978_revoked_False" "objects_978_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_978_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_978_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_978_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_978_modified_2023-04-05T17:39:29.860Z" "objects_978_description_[FinFisher](https://attack.mitre.org/software/S0182) accesses and exfiltrates the call log.(Citation: Lookout Dark Caracal Jan 2018)" "objects_978_relationship_type_uses" "objects_978_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_978_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_978_x_mitre_deprecated_False" "objects_978_x_mitre_version_1.0" "objects_978_x_mitre_attack_spec_version_3.1.0" "objects_978_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_978_spec_version_2.1" "objects_978_x_mitre_domains_0_mobile-attack" "objects_979_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_979_id_relationship--6f9f892e-56ec-480b-aa40-337f20f2bb9c" "objects_979_type_relationship" "objects_979_created_2020-11-10T17:08:35.624Z" "objects_979_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_979_external_references_0_source_name_Lookout Uyghur Campaign" "objects_979_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_979_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_979_modified_2020-11-10T17:08:35.624Z" "objects_979_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can dynamically load additional functionality.(Citation: Lookout Uyghur Campaign)" "objects_979_relationship_type_uses" "objects_979_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_979_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_979_x_mitre_version_1.0" "objects_979_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_979_spec_version_2.1" "objects_979_x_mitre_attack_spec_version_2.1.0" "objects_979_x_mitre_domains_0_mobile-attack" "objects_980_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_980_type_relationship" "objects_980_id_relationship--6faacfdd-d17d-4c6e-a33e-5fdea2cc3998" "objects_980_created_2020-04-08T15:41:19.385Z" "objects_980_x_mitre_version_1.0" "objects_980_external_references_0_source_name_Cofense Anubis" "objects_980_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_980_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_980_x_mitre_deprecated_False" "objects_980_revoked_False" "objects_980_description_[Anubis](https://attack.mitre.org/software/S0422) can create overlays to capture user credentials for targeted applications.(Citation: Cofense Anubis)" "objects_980_modified_2022-04-12T10:01:44.682Z" "objects_980_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_980_relationship_type_uses" "objects_980_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_980_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_980_x_mitre_attack_spec_version_2.1.0" "objects_980_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_980_spec_version_2.1" "objects_980_x_mitre_domains_0_mobile-attack" "objects_981_type_relationship" "objects_981_id_relationship--7017085c-c612-48b2-b655-e18d7822d0e7" "objects_981_created_2018-10-17T00:14:20.652Z" "objects_981_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_981_revoked_False" "objects_981_external_references_0_source_name_PaloAlto-SpyDealer" "objects_981_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_981_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_981_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_981_modified_2023-04-05T17:39:48.895Z" "objects_981_description_[SpyDealer](https://attack.mitre.org/software/S0324) harvests phone call history from victims.(Citation: PaloAlto-SpyDealer)" "objects_981_relationship_type_uses" "objects_981_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_981_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_981_x_mitre_deprecated_False" "objects_981_x_mitre_version_1.0" "objects_981_x_mitre_attack_spec_version_3.1.0" "objects_981_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_981_spec_version_2.1" "objects_981_x_mitre_domains_0_mobile-attack" "objects_982_type_relationship" "objects_982_id_relationship--70367e5c-15e0-4bcd-b538-7a90c4eefd30" "objects_982_created_2018-10-17T00:14:20.652Z" "objects_982_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_982_revoked_False" "objects_982_external_references_0_source_name_PaloAlto-SpyDealer" "objects_982_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_982_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_982_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_982_modified_2023-04-05T21:26:35.443Z" "objects_982_description_[SpyDealer](https://attack.mitre.org/software/S0324) maintains persistence by installing an Android application package (APK) on the system partition.(Citation: PaloAlto-SpyDealer)" "objects_982_relationship_type_uses" "objects_982_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_982_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_982_x_mitre_deprecated_False" "objects_982_x_mitre_version_1.0" "objects_982_x_mitre_attack_spec_version_3.1.0" "objects_982_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_982_spec_version_2.1" "objects_982_x_mitre_domains_0_mobile-attack" "objects_983_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_983_id_relationship--706c698c-aa8d-4fac-a6c1-2e047c3f965c" "objects_983_type_relationship" "objects_983_created_2017-12-14T16:46:06.044Z" "objects_983_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_983_external_references_0_source_name_Lookout-BrainTest" "objects_983_external_references_0_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_983_external_references_0_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_983_modified_2020-03-31T14:49:39.188Z" "objects_983_description_Original samples of [BrainTest](https://attack.mitre.org/software/S0293) download their exploit packs for rooting from a remote server after installation.(Citation: Lookout-BrainTest)" "objects_983_relationship_type_uses" "objects_983_source_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_983_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_983_x_mitre_version_1.0" "objects_983_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_983_spec_version_2.1" "objects_983_x_mitre_attack_spec_version_2.1.0" "objects_983_x_mitre_domains_0_mobile-attack" "objects_984_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_984_id_relationship--70ec9e67-b755-41ee-a1db-71d250a90b4e" "objects_984_type_relationship" "objects_984_created_2020-01-14T17:47:08.826Z" "objects_984_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_984_external_references_0_source_name_SecureList DVMap June 2017" "objects_984_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_984_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_984_modified_2020-01-14T17:47:08.826Z" "objects_984_description_[Dvmap](https://attack.mitre.org/software/S0420) checks the Android version to determine which system library to patch.(Citation: SecureList DVMap June 2017)" "objects_984_relationship_type_uses" "objects_984_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_984_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_984_x_mitre_version_1.0" "objects_984_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_984_spec_version_2.1" "objects_984_x_mitre_attack_spec_version_2.1.0" "objects_984_x_mitre_domains_0_mobile-attack" "objects_985_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_985_id_relationship--70f8cbed-b20d-4ff2-ad02-8d78e7d49159" "objects_985_type_relationship" "objects_985_created_2017-12-14T16:46:06.044Z" "objects_985_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_985_external_references_0_source_name_PaloAlto-Xbot" "objects_985_external_references_0_description_Cong Zheng, Claud Xiao and Zhi Xu. (2016, February 18). New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom. Retrieved December 21, 2016." "objects_985_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/" "objects_985_modified_2020-03-31T14:49:39.188Z" "objects_985_description_[Xbot](https://attack.mitre.org/software/S0298) can encrypt the victim's files in external storage (e.g., SD card) and then request a PayPal cash card as ransom.(Citation: PaloAlto-Xbot)" "objects_985_relationship_type_uses" "objects_985_source_ref_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_985_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_985_x_mitre_version_1.0" "objects_985_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_985_spec_version_2.1" "objects_985_x_mitre_attack_spec_version_2.1.0" "objects_985_x_mitre_domains_0_mobile-attack" "objects_986_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_986_id_relationship--70fa8498-6117-4e15-ae3c-f53d63996826" "objects_986_type_relationship" "objects_986_created_2020-06-26T15:32:25.050Z" "objects_986_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_986_external_references_0_source_name_Threat Fabric Cerberus" "objects_986_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_986_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_986_modified_2020-06-26T15:32:25.050Z" "objects_986_description_[Cerberus](https://attack.mitre.org/software/S0480) can collect the device\u2019s location.(Citation: Threat Fabric Cerberus)" "objects_986_relationship_type_uses" "objects_986_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_986_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_986_x_mitre_version_1.0" "objects_986_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_986_spec_version_2.1" "objects_986_x_mitre_attack_spec_version_2.1.0" "objects_986_x_mitre_domains_0_mobile-attack" "objects_987_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_987_id_relationship--71490fdb-e271-4a67-b932-5288924b1dae" "objects_987_type_relationship" "objects_987_created_2018-10-17T00:14:20.652Z" "objects_987_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_987_external_references_0_source_name_PaloAlto-DualToy" "objects_987_external_references_0_description_Claud Xiao. (2016, September 13). DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices. Retrieved January 24, 2017." "objects_987_external_references_0_url_https://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/" "objects_987_modified_2020-03-31T14:49:39.188Z" "objects_987_description_[DualToy](https://attack.mitre.org/software/S0315) collects the connected iOS device\u2019s information including IMEI, IMSI, ICCID, serial number and phone number.(Citation: PaloAlto-DualToy)" "objects_987_relationship_type_uses" "objects_987_source_ref_malware--507fe748-5e4a-4b45-9e9f-8b1115f4e878" "objects_987_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_987_x_mitre_version_1.0" "objects_987_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_987_spec_version_2.1" "objects_987_x_mitre_attack_spec_version_2.1.0" "objects_987_x_mitre_domains_0_mobile-attack" "objects_988_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_988_id_relationship--716f68ee-1e77-4254-8f67-d8f3c71db678" "objects_988_type_relationship" "objects_988_created_2021-09-20T13:59:00.498Z" "objects_988_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_988_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_988_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_988_external_references_0_source_name_Lookout-Monokle" "objects_988_modified_2021-09-20T13:59:00.498Z" "objects_988_description_[Monokle](https://attack.mitre.org/software/S0407) can be controlled via phone call from a set of \"control phones.\"(Citation: Lookout-Monokle)" "objects_988_relationship_type_uses" "objects_988_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_988_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_988_x_mitre_version_1.0" "objects_988_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_988_spec_version_2.1" "objects_988_x_mitre_attack_spec_version_2.1.0" "objects_988_x_mitre_domains_0_mobile-attack" "objects_989_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_989_type_relationship" "objects_989_id_relationship--718a612e-50c5-40ab-9081-b88cefeafcb6" "objects_989_created_2021-04-26T15:33:55.905Z" "objects_989_x_mitre_version_1.0" "objects_989_external_references_0_source_name_CitizenLab Circles" "objects_989_external_references_0_url_https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/" "objects_989_external_references_0_description_Bill Marczak, John Scott-Railton, Siddharth Prakash Rao, Siena Anstis, and Ron Deibert. (2020, December 1). Running in Circles Uncovering the Clients of Cyberespionage Firm Circles. Retrieved December 23, 2020." "objects_989_x_mitre_deprecated_False" "objects_989_revoked_False" "objects_989_description_[Circles](https://attack.mitre.org/software/S0602) can track the location of mobile devices.(Citation: CitizenLab Circles)" "objects_989_modified_2022-04-12T10:01:44.682Z" "objects_989_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_989_relationship_type_uses" "objects_989_source_ref_malware--c6a07c89-a24c-4c7e-9e3e-6153cc595e24" "objects_989_target_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_989_x_mitre_attack_spec_version_2.1.0" "objects_989_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_989_spec_version_2.1" "objects_989_x_mitre_domains_0_mobile-attack" "objects_990_type_relationship" "objects_990_id_relationship--721cc30c-74cf-4eed-89a8-7a8e63e6c0e1" "objects_990_created_2017-12-14T16:46:06.044Z" "objects_990_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_990_revoked_False" "objects_990_external_references_0_source_name_Tripwire-MazarBOT" "objects_990_external_references_0_description_Graham Cluley. (2016, February 16). Android users warned of malware attack spreading via SMS. Retrieved December 23, 2016." "objects_990_external_references_0_url_https://www.tripwire.com/state-of-security/security-data-protection/android-malware-sms/" "objects_990_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_990_modified_2023-04-05T20:27:47.788Z" "objects_990_description_[MazarBOT](https://attack.mitre.org/software/S0303) can intercept two-factor authentication codes sent by online banking apps.(Citation: Tripwire-MazarBOT)" "objects_990_relationship_type_uses" "objects_990_source_ref_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_990_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_990_x_mitre_deprecated_False" "objects_990_x_mitre_version_1.0" "objects_990_x_mitre_attack_spec_version_3.1.0" "objects_990_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_990_spec_version_2.1" "objects_990_x_mitre_domains_0_mobile-attack" "objects_991_type_relationship" "objects_991_id_relationship--724e1b64-7c9b-4a8f-a2ab-3f9cab539e68" "objects_991_created_2023-10-10T19:19:38.654Z" "objects_991_revoked_False" "objects_991_external_references_0_source_name_lookout_bouldspy_0423" "objects_991_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_991_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_991_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_991_modified_2023-10-10T19:19:38.654Z" "objects_991_description_[BOULDSPY](https://attack.mitre.org/software/S1079) has exfiltrated cached data from infected devices.(Citation: lookout_bouldspy_0423)" "objects_991_relationship_type_uses" "objects_991_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_991_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_991_x_mitre_deprecated_False" "objects_991_x_mitre_version_0.1" "objects_991_x_mitre_attack_spec_version_3.2.0" "objects_991_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_991_spec_version_2.1" "objects_991_x_mitre_domains_0_mobile-attack" "objects_992_type_relationship" "objects_992_id_relationship--7258542e-029b-45b9-be69-6e76d9c93b35" "objects_992_created_2020-09-14T13:35:45.886Z" "objects_992_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_992_revoked_False" "objects_992_external_references_0_source_name_ESET-Twitoor" "objects_992_external_references_0_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_992_external_references_0_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_992_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_992_modified_2023-04-05T20:43:03.565Z" "objects_992_description_[Twitoor](https://attack.mitre.org/software/S0302) can hide its presence on the system.(Citation: ESET-Twitoor)" "objects_992_relationship_type_uses" "objects_992_source_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_992_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_992_x_mitre_deprecated_False" "objects_992_x_mitre_version_1.0" "objects_992_x_mitre_attack_spec_version_3.1.0" "objects_992_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_992_spec_version_2.1" "objects_992_x_mitre_domains_0_mobile-attack" "objects_993_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_993_type_relationship" "objects_993_id_relationship--7260c8fe-6b3b-48a2-889f-f329fb5b4ef0" "objects_993_created_2017-10-25T14:48:53.741Z" "objects_993_x_mitre_version_1.0" "objects_993_x_mitre_deprecated_False" "objects_993_revoked_False" "objects_993_description_Security architecture improvements in each new version of Android and iOS make it more difficult to escalate privileges. Additionally, newer versions of Android have strengthened the sandboxing applied to applications, restricting their ability to enumerate file system contents." "objects_993_modified_2022-03-30T20:25:46.994Z" "objects_993_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_993_relationship_type_mitigates" "objects_993_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_993_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_993_x_mitre_attack_spec_version_2.1.0" "objects_993_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_993_spec_version_2.1" "objects_993_x_mitre_domains_0_mobile-attack" "objects_994_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_994_id_relationship--72a5350f-f0cf-4f44-82d5-28a25492c6af" "objects_994_type_relationship" "objects_994_created_2020-04-24T15:06:33.531Z" "objects_994_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_994_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_994_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_994_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_994_modified_2020-04-24T17:55:55.049Z" "objects_994_description_[Corona Updates](https://attack.mitre.org/software/S0425) can take pictures using the camera and can record MP4 files.(Citation: TrendMicro Coronavirus Updates)" "objects_994_relationship_type_uses" "objects_994_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_994_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_994_x_mitre_version_1.0" "objects_994_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_994_spec_version_2.1" "objects_994_x_mitre_attack_spec_version_2.1.0" "objects_994_x_mitre_domains_0_mobile-attack" "objects_995_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_995_id_relationship--72a88d43-4144-444e-8f71-ac0d19ae3710" "objects_995_type_relationship" "objects_995_created_2020-09-14T14:13:45.256Z" "objects_995_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_995_external_references_0_source_name_Lookout eSurv" "objects_995_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_995_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_995_modified_2020-09-14T14:13:45.256Z" "objects_995_description_[eSurv](https://attack.mitre.org/software/S0507) can track the device\u2019s location.(Citation: Lookout eSurv)" "objects_995_relationship_type_uses" "objects_995_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_995_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_995_x_mitre_version_1.0" "objects_995_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_995_spec_version_2.1" "objects_995_x_mitre_attack_spec_version_2.1.0" "objects_995_x_mitre_domains_0_mobile-attack" "objects_996_type_relationship" "objects_996_id_relationship--73410b22-5aca-4b86-8efc-98c1ad75399a" "objects_996_created_2023-10-10T15:33:59.572Z" "objects_996_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_996_revoked_False" "objects_996_external_references_0_source_name_Talos-WolfRAT" "objects_996_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_996_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_996_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_996_modified_2023-10-10T15:33:59.572Z" "objects_996_description_[WolfRAT](https://attack.mitre.org/software/S0489) has masqueraded as \u201cGoogle service\u201d, \u201cGooglePlay\u201d, and \u201cFlash update\u201d.(Citation: Talos-WolfRAT)" "objects_996_relationship_type_uses" "objects_996_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_996_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_996_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_996_x_mitre_deprecated_False" "objects_996_x_mitre_version_1.0" "objects_996_x_mitre_attack_spec_version_2.1.0" "objects_996_spec_version_2.1" "objects_996_x_mitre_domains_0_mobile-attack" "objects_997_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_997_id_relationship--734fa2bf-17af-4e54-8d83-4cf9759e4ba9" "objects_997_type_relationship" "objects_997_created_2020-09-11T15:52:12.520Z" "objects_997_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_997_external_references_0_source_name_Bitdefender Mandrake" "objects_997_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_997_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_997_modified_2020-09-11T15:52:12.520Z" "objects_997_description_[Mandrake](https://attack.mitre.org/software/S0485) can block, forward, hide, and send SMS messages.(Citation: Bitdefender Mandrake)" "objects_997_relationship_type_uses" "objects_997_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_997_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_997_x_mitre_version_1.0" "objects_997_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_997_spec_version_2.1" "objects_997_x_mitre_attack_spec_version_2.1.0" "objects_997_x_mitre_domains_0_mobile-attack" "objects_998_type_relationship" "objects_998_id_relationship--73d22490-4043-42d7-ad25-74e4a642bf6a" "objects_998_created_2023-03-20T18:41:45.186Z" "objects_998_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_998_revoked_False" "objects_998_external_references_0_source_name_CSRIC5-WG10-FinalReport" "objects_998_external_references_0_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_998_external_references_0_url_https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_998_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_998_modified_2023-08-15T15:06:03.429Z" "objects_998_description_Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation.(Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members." "objects_998_relationship_type_detects" "objects_998_source_ref_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_998_target_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_998_x_mitre_deprecated_False" "objects_998_x_mitre_version_0.1" "objects_998_x_mitre_attack_spec_version_3.1.0" "objects_998_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_998_spec_version_2.1" "objects_998_x_mitre_domains_0_mobile-attack" "objects_999_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_999_type_relationship" "objects_999_id_relationship--73d78f2c-dd3b-469c-a622-e2e89cb521d3" "objects_999_created_2018-10-17T00:14:20.652Z" "objects_999_x_mitre_version_1.0" "objects_999_x_mitre_deprecated_False" "objects_999_revoked_False" "objects_999_description_Enterprises can provision policies to mobile devices that require a minimum complexity (length, character requirements, etc.) for the device passcode, and cause the device to wipe all data if an incorrect passcode is entered too many times. Both policies would mitigate brute-force, guessing, or shoulder surfing of the device passcode. Enterprises can also provision policies to disable biometric authentication, however, biometric authentication can help make using a longer, more complex passcode more practical because it does not need to be entered as frequently. " "objects_999_modified_2022-03-28T19:20:30.375Z" "objects_999_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_999_relationship_type_mitigates" "objects_999_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_999_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_999_x_mitre_attack_spec_version_2.1.0" "objects_999_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_999_spec_version_2.1" "objects_999_x_mitre_domains_0_mobile-attack" "objects_1000_type_relationship" "objects_1000_id_relationship--74080f4f-1de2-464f-8ec1-0635fc142273" "objects_1000_created_2023-08-08T16:23:41.141Z" "objects_1000_revoked_False" "objects_1000_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1000_modified_2023-08-08T16:23:41.141Z" "objects_1000_description_Application vetting services may be able to list domains and/or IP addresses that applications communicate with. " "objects_1000_relationship_type_detects" "objects_1000_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1000_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1000_x_mitre_deprecated_False" "objects_1000_x_mitre_version_0.1" "objects_1000_x_mitre_attack_spec_version_3.1.0" "objects_1000_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1000_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1000_spec_version_2.1" "objects_1000_x_mitre_domains_0_mobile-attack" "objects_1001_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1001_id_relationship--740ea19e-d248-44e5-a0e5-3e9420df9dc8" "objects_1001_type_relationship" "objects_1001_created_2020-04-24T17:46:31.613Z" "objects_1001_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1001_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1001_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1001_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1001_modified_2020-04-24T17:46:31.613Z" "objects_1001_description_[TrickMo](https://attack.mitre.org/software/S0427) can inject input to set itself as the default SMS handler, and to automatically click through pop-ups without giving the user any time to react.(Citation: SecurityIntelligence TrickMo)" "objects_1001_relationship_type_uses" "objects_1001_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1001_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1001_x_mitre_version_1.0" "objects_1001_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1001_spec_version_2.1" "objects_1001_x_mitre_attack_spec_version_2.1.0" "objects_1001_x_mitre_domains_0_mobile-attack" "objects_1002_type_relationship" "objects_1002_id_relationship--746eaf98-bd95-4e9a-a4ed-0e3f20402276" "objects_1002_created_2023-10-10T15:33:57.989Z" "objects_1002_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1002_revoked_False" "objects_1002_external_references_0_source_name_Lookout-Dendroid" "objects_1002_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1002_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1002_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1002_modified_2023-10-10T15:33:57.989Z" "objects_1002_description_[Dendroid](https://attack.mitre.org/software/S0301) can be bound to legitimate applications prior to installation on devices.(Citation: Lookout-Dendroid)" "objects_1002_relationship_type_uses" "objects_1002_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1002_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1002_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1002_x_mitre_deprecated_False" "objects_1002_x_mitre_version_1.0" "objects_1002_x_mitre_attack_spec_version_2.1.0" "objects_1002_spec_version_2.1" "objects_1002_x_mitre_domains_0_mobile-attack" "objects_1003_type_relationship" "objects_1003_id_relationship--749dcdbd-9be9-403b-850f-8ee5452b7aed" "objects_1003_created_2023-03-20T18:58:56.347Z" "objects_1003_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1003_revoked_False" "objects_1003_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1003_modified_2023-08-08T16:30:21.044Z" "objects_1003_description_Application vetting services can detect unnecessary and potentially abused location permissions." "objects_1003_relationship_type_detects" "objects_1003_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1003_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1003_x_mitre_deprecated_False" "objects_1003_x_mitre_version_0.1" "objects_1003_x_mitre_attack_spec_version_3.1.0" "objects_1003_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1003_spec_version_2.1" "objects_1003_x_mitre_domains_0_mobile-attack" "objects_1004_type_relationship" "objects_1004_id_relationship--74a137c7-b3f8-421f-bc52-bf9f0785d0ba" "objects_1004_created_2023-09-22T19:15:56.498Z" "objects_1004_revoked_False" "objects_1004_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1004_modified_2023-09-22T19:15:56.498Z" "objects_1004_description_Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting file deletion processes. " "objects_1004_relationship_type_detects" "objects_1004_source_ref_x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0" "objects_1004_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_1004_x_mitre_deprecated_False" "objects_1004_x_mitre_version_0.1" "objects_1004_x_mitre_attack_spec_version_3.1.0" "objects_1004_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1004_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1004_spec_version_2.1" "objects_1004_x_mitre_domains_0_mobile-attack" "objects_1005_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1005_type_relationship" "objects_1005_id_relationship--74c3c88c-956b-4bc7-9ea2-585e7366fe69" "objects_1005_created_2020-04-08T15:51:25.078Z" "objects_1005_x_mitre_version_1.0" "objects_1005_external_references_0_source_name_ThreatFabric Ginp" "objects_1005_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1005_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1005_x_mitre_deprecated_False" "objects_1005_revoked_False" "objects_1005_description_[Ginp](https://attack.mitre.org/software/S0423) can use a multi-step phishing overlay to capture banking credentials and then credit card numbers after login.(Citation: ThreatFabric Ginp)" "objects_1005_modified_2022-04-12T10:01:44.682Z" "objects_1005_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1005_relationship_type_uses" "objects_1005_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1005_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1005_x_mitre_attack_spec_version_2.1.0" "objects_1005_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1005_spec_version_2.1" "objects_1005_x_mitre_domains_0_mobile-attack" "objects_1006_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1006_type_relationship" "objects_1006_id_relationship--74c8c9e7-cd8b-4f3a-830d-a7e6e9668330" "objects_1006_created_2022-04-01T15:01:53.321Z" "objects_1006_x_mitre_version_0.1" "objects_1006_x_mitre_deprecated_False" "objects_1006_revoked_False" "objects_1006_description_Mobile security products can take appropriate action when jailbroken devices are detected, potentially limiting the adversary\u2019s access to password stores." "objects_1006_modified_2022-04-01T15:01:53.321Z" "objects_1006_relationship_type_mitigates" "objects_1006_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1006_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1006_x_mitre_attack_spec_version_2.1.0" "objects_1006_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1006_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1006_spec_version_2.1" "objects_1006_x_mitre_domains_0_mobile-attack" "objects_1007_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1007_id_relationship--74eb8469-1cce-40f8-8b6b-486338e8cfbe" "objects_1007_type_relationship" "objects_1007_created_2020-07-15T20:20:59.282Z" "objects_1007_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1007_external_references_0_source_name_Bitdefender Mandrake" "objects_1007_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1007_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1007_modified_2020-07-15T20:20:59.282Z" "objects_1007_description_[Mandrake](https://attack.mitre.org/software/S0485) can record the screen.(Citation: Bitdefender Mandrake)" "objects_1007_relationship_type_uses" "objects_1007_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1007_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1007_x_mitre_version_1.0" "objects_1007_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1007_spec_version_2.1" "objects_1007_x_mitre_attack_spec_version_2.1.0" "objects_1007_x_mitre_domains_0_mobile-attack" "objects_1008_type_relationship" "objects_1008_id_relationship--75400f2e-8a9a-4bc6-a40b-f860b38868b6" "objects_1008_created_2023-03-16T13:31:29.822Z" "objects_1008_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1008_revoked_False" "objects_1008_external_references_0_source_name_Android Privacy Indicators" "objects_1008_external_references_0_description_Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022." "objects_1008_external_references_0_url_https://source.android.com/devices/tech/config/privacy-indicators" "objects_1008_external_references_1_source_name_iOS Mic Spyware" "objects_1008_external_references_1_description_ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022." "objects_1008_external_references_1_url_https://blog.zecops.com/research/how-ios-malware-can-spy-on-users-silently/" "objects_1008_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1008_modified_2023-08-10T21:08:37.537Z" "objects_1008_description_In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\n\n\nIn Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)" "objects_1008_relationship_type_detects" "objects_1008_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1008_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1008_x_mitre_deprecated_False" "objects_1008_x_mitre_version_0.1" "objects_1008_x_mitre_attack_spec_version_3.1.0" "objects_1008_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1008_spec_version_2.1" "objects_1008_x_mitre_domains_0_mobile-attack" "objects_1009_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1009_id_relationship--75472bf8-c7fd-4fc7-a11e-74189bc23b78" "objects_1009_type_relationship" "objects_1009_created_2019-10-10T15:17:00.972Z" "objects_1009_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1009_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_1009_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_1009_external_references_0_source_name_FlexiSpy-Features" "objects_1009_modified_2020-03-31T14:49:39.188Z" "objects_1009_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can monitor device photos and can also access browser history and bookmarks.(Citation: FlexiSpy-Features)" "objects_1009_relationship_type_uses" "objects_1009_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1009_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1009_x_mitre_version_1.0" "objects_1009_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1009_spec_version_2.1" "objects_1009_x_mitre_attack_spec_version_2.1.0" "objects_1009_x_mitre_domains_0_mobile-attack" "objects_1010_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1010_type_relationship" "objects_1010_id_relationship--75770898-93a7-45e3-bdb2-03172004a88f" "objects_1010_created_2022-03-30T14:49:47.451Z" "objects_1010_x_mitre_version_0.1" "objects_1010_external_references_0_source_name_Android-VerifiedBoot" "objects_1010_external_references_0_url_https://source.android.com/security/verifiedboot/" "objects_1010_external_references_0_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_1010_x_mitre_deprecated_False" "objects_1010_revoked_False" "objects_1010_description_Android Verified Boot can detect unauthorized modifications made to the system partition, which could lead to execution flow hijacking.(Citation: Android-VerifiedBoot) " "objects_1010_modified_2022-03-30T14:49:47.451Z" "objects_1010_relationship_type_mitigates" "objects_1010_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_1010_target_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_1010_x_mitre_attack_spec_version_2.1.0" "objects_1010_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1010_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1010_spec_version_2.1" "objects_1010_x_mitre_domains_0_mobile-attack" "objects_1011_type_relationship" "objects_1011_id_relationship--75989cf6-c023-4ed3-9d23-a83f55690186" "objects_1011_created_2023-02-28T21:43:36.886Z" "objects_1011_revoked_False" "objects_1011_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_1011_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_1011_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_1011_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1011_modified_2023-02-28T21:43:36.886Z" "objects_1011_description_[TangleBot](https://attack.mitre.org/software/S1069) can read incoming text messages.(Citation: cloudmark_tanglebot_0921)" "objects_1011_relationship_type_uses" "objects_1011_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_1011_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1011_x_mitre_deprecated_False" "objects_1011_x_mitre_version_0.1" "objects_1011_x_mitre_attack_spec_version_3.1.0" "objects_1011_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1011_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1011_spec_version_2.1" "objects_1011_x_mitre_domains_0_mobile-attack" "objects_1012_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1012_id_relationship--759a2e09-32b6-4857-9b6d-adf5dcee142b" "objects_1012_type_relationship" "objects_1012_created_2020-12-14T15:02:35.286Z" "objects_1012_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1012_external_references_0_source_name_Securelist Asacub" "objects_1012_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1012_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1012_modified_2020-12-14T15:02:35.286Z" "objects_1012_description_[Asacub](https://attack.mitre.org/software/S0540) can collect various pieces of device network configuration information, such as mobile network operator.(Citation: Securelist Asacub)" "objects_1012_relationship_type_uses" "objects_1012_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1012_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1012_x_mitre_version_1.0" "objects_1012_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1012_spec_version_2.1" "objects_1012_x_mitre_attack_spec_version_2.1.0" "objects_1012_x_mitre_domains_0_mobile-attack" "objects_1013_type_relationship" "objects_1013_id_relationship--75a8614f-bf92-455d-b2ef-7085aff9a64d" "objects_1013_created_2023-08-16T16:33:56.014Z" "objects_1013_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1013_revoked_False" "objects_1013_external_references_0_source_name_cyble_chameleon_0423" "objects_1013_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_1013_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_1013_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1013_modified_2023-09-15T19:16:57.874Z" "objects_1013_description_[Chameleon](https://attack.mitre.org/software/S1083) can log keystrokes and gather the lock screen password of an infected device by abusing Accessibility Services.(Citation: cyble_chameleon_0423)" "objects_1013_relationship_type_uses" "objects_1013_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_1013_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1013_x_mitre_deprecated_False" "objects_1013_x_mitre_version_0.1" "objects_1013_x_mitre_attack_spec_version_3.1.0" "objects_1013_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1013_spec_version_2.1" "objects_1013_x_mitre_domains_0_mobile-attack" "objects_1014_type_relationship" "objects_1014_id_relationship--75ed2348-279f-4485-97a3-9a5ada27d799" "objects_1014_created_2023-02-06T19:06:17.406Z" "objects_1014_revoked_False" "objects_1014_external_references_0_source_name_lookout_abstractemu_1021" "objects_1014_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1014_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1014_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1014_modified_2023-02-06T19:06:17.406Z" "objects_1014_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can disable Play Protect.(Citation: lookout_abstractemu_1021)" "objects_1014_relationship_type_uses" "objects_1014_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1014_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1014_x_mitre_deprecated_False" "objects_1014_x_mitre_version_0.1" "objects_1014_x_mitre_attack_spec_version_3.1.0" "objects_1014_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1014_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1014_spec_version_2.1" "objects_1014_x_mitre_domains_0_mobile-attack" "objects_1015_type_relationship" "objects_1015_id_relationship--760037f0-f027-41bb-adf8-1ced6c7085be" "objects_1015_created_2023-10-10T15:33:59.225Z" "objects_1015_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1015_revoked_False" "objects_1015_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_1015_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_1015_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_1015_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1015_modified_2023-10-10T15:33:59.225Z" "objects_1015_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has mimicked Facebook and Google icons on the \u201cRecent apps\u201d screen to avoid discovery and uses the `com.google.xxx` package name to avoid detection.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_1015_relationship_type_uses" "objects_1015_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_1015_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1015_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1015_x_mitre_deprecated_False" "objects_1015_x_mitre_version_1.0" "objects_1015_x_mitre_attack_spec_version_2.1.0" "objects_1015_spec_version_2.1" "objects_1015_x_mitre_domains_0_mobile-attack" "objects_1016_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1016_id_relationship--760faa7b-06cb-48b7-9103-1c52f2ca408f" "objects_1016_type_relationship" "objects_1016_created_2020-11-10T17:08:35.644Z" "objects_1016_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1016_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1016_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1016_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1016_modified_2020-11-10T17:08:35.644Z" "objects_1016_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has gathered device metadata, including model, manufacturer, SD card size, disk usage, memory, CPU, and serial number.(Citation: Lookout Uyghur Campaign)" "objects_1016_relationship_type_uses" "objects_1016_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1016_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1016_x_mitre_version_1.0" "objects_1016_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1016_spec_version_2.1" "objects_1016_x_mitre_attack_spec_version_2.1.0" "objects_1016_x_mitre_domains_0_mobile-attack" "objects_1017_type_relationship" "objects_1017_id_relationship--764ba23e-9902-4a60-8ec3-e0ae1abf92ce" "objects_1017_created_2023-09-22T19:16:35.609Z" "objects_1017_revoked_False" "objects_1017_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1017_modified_2023-09-22T19:16:35.609Z" "objects_1017_description_The user is prompted for approval when an application requests device administrator permissions." "objects_1017_relationship_type_detects" "objects_1017_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_1017_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_1017_x_mitre_deprecated_False" "objects_1017_x_mitre_version_0.1" "objects_1017_x_mitre_attack_spec_version_3.1.0" "objects_1017_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1017_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1017_spec_version_2.1" "objects_1017_x_mitre_domains_0_mobile-attack" "objects_1018_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1018_type_relationship" "objects_1018_id_relationship--7657a4d4-1ba3-4b66-83f7-6db5eab14847" "objects_1018_created_2022-04-06T13:30:03.526Z" "objects_1018_x_mitre_version_0.1" "objects_1018_x_mitre_deprecated_False" "objects_1018_revoked_False" "objects_1018_description_Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it." "objects_1018_modified_2022-04-06T13:30:03.527Z" "objects_1018_relationship_type_mitigates" "objects_1018_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1018_target_ref_attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2" "objects_1018_x_mitre_attack_spec_version_2.1.0" "objects_1018_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1018_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1018_spec_version_2.1" "objects_1018_x_mitre_domains_0_mobile-attack" "objects_1019_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1019_id_relationship--7696b512-ba2f-4310-86e1-7c528529fc5e" "objects_1019_type_relationship" "objects_1019_created_2020-09-15T15:18:12.425Z" "objects_1019_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1019_external_references_0_source_name_Cybereason FakeSpy" "objects_1019_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1019_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1019_modified_2020-09-15T15:18:12.425Z" "objects_1019_description_[FakeSpy](https://attack.mitre.org/software/S0509) stores its malicious code in encrypted asset files that are decrypted at runtime. Newer versions of [FakeSpy](https://attack.mitre.org/software/S0509) encrypt the C2 address.(Citation: Cybereason FakeSpy)" "objects_1019_relationship_type_uses" "objects_1019_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1019_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1019_x_mitre_version_1.0" "objects_1019_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1019_spec_version_2.1" "objects_1019_x_mitre_attack_spec_version_2.1.0" "objects_1019_x_mitre_domains_0_mobile-attack" "objects_1020_type_relationship" "objects_1020_id_relationship--76cc66f4-ce85-4873-a63e-879b4a14a540" "objects_1020_created_2023-03-03T16:23:20.764Z" "objects_1020_revoked_False" "objects_1020_external_references_0_source_name_paloalto_yispecter_1015" "objects_1020_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1020_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1020_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1020_modified_2023-03-03T16:23:20.764Z" "objects_1020_description_[YiSpecter](https://attack.mitre.org/software/S0311) has connected to the C2 server via HTTP.(Citation: paloalto_yispecter_1015)" "objects_1020_relationship_type_uses" "objects_1020_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1020_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1020_x_mitre_deprecated_False" "objects_1020_x_mitre_version_0.1" "objects_1020_x_mitre_attack_spec_version_3.1.0" "objects_1020_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1020_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1020_spec_version_2.1" "objects_1020_x_mitre_domains_0_mobile-attack" "objects_1021_type_relationship" "objects_1021_id_relationship--76f852f3-f218-40e2-8fa1-6fb15c4cbf98" "objects_1021_created_2023-10-10T15:33:59.661Z" "objects_1021_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1021_revoked_False" "objects_1021_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1021_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1021_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1021_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1021_modified_2023-10-10T15:33:59.661Z" "objects_1021_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has masqueraded as legitimate media player, social media, and VPN applications.(Citation: Sophos Red Alert 2.0)" "objects_1021_relationship_type_uses" "objects_1021_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1021_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1021_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1021_x_mitre_deprecated_False" "objects_1021_x_mitre_version_1.0" "objects_1021_x_mitre_attack_spec_version_2.1.0" "objects_1021_spec_version_2.1" "objects_1021_x_mitre_domains_0_mobile-attack" "objects_1022_type_relationship" "objects_1022_id_relationship--7793a066-d72b-4a60-9579-e16369ea7185" "objects_1022_created_2023-03-20T18:57:55.221Z" "objects_1022_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1022_revoked_False" "objects_1022_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1022_modified_2023-08-10T22:22:25.132Z" "objects_1022_description_The user can view a list of apps with accessibility service privileges in the device settings." "objects_1022_relationship_type_detects" "objects_1022_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1022_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1022_x_mitre_deprecated_False" "objects_1022_x_mitre_version_0.1" "objects_1022_x_mitre_attack_spec_version_3.1.0" "objects_1022_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1022_spec_version_2.1" "objects_1022_x_mitre_domains_0_mobile-attack" "objects_1023_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1023_id_relationship--77efa84c-5ef0-4554-b774-2dbfcca74087" "objects_1023_type_relationship" "objects_1023_created_2020-10-29T19:20:58.116Z" "objects_1023_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1023_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_1023_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_1023_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_1023_modified_2020-10-29T19:20:58.116Z" "objects_1023_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has checked to see how many apps are installed, and specifically if Facebook or FB Messenger are installed.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_1023_relationship_type_uses" "objects_1023_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_1023_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1023_x_mitre_version_1.0" "objects_1023_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1023_spec_version_2.1" "objects_1023_x_mitre_attack_spec_version_2.1.0" "objects_1023_x_mitre_domains_0_mobile-attack" "objects_1024_type_relationship" "objects_1024_id_relationship--7825f4b1-75ca-4377-b8f6-0dda9311d889" "objects_1024_created_2023-08-04T18:30:58.116Z" "objects_1024_revoked_False" "objects_1024_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1024_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1024_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1024_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1024_modified_2023-08-04T18:30:58.116Z" "objects_1024_description_[Sunbird](https://attack.mitre.org/software/S1082) can access a device\u2019s location.(Citation: lookout_hornbill_sunbird_0221)" "objects_1024_relationship_type_uses" "objects_1024_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1024_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1024_x_mitre_deprecated_False" "objects_1024_x_mitre_version_0.1" "objects_1024_x_mitre_attack_spec_version_3.1.0" "objects_1024_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1024_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1024_spec_version_2.1" "objects_1024_x_mitre_domains_0_mobile-attack" "objects_1025_type_relationship" "objects_1025_id_relationship--78417fce-5aaa-4ad3-a2f1-279fa18bfe45" "objects_1025_created_2023-02-06T19:47:26.528Z" "objects_1025_revoked_False" "objects_1025_external_references_0_source_name_threatfabric_sova_0921" "objects_1025_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1025_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1025_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1025_modified_2023-02-06T19:47:26.528Z" "objects_1025_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) has been distributed in obfuscated and packed form.(Citation: threatfabric_sova_0921)" "objects_1025_relationship_type_uses" "objects_1025_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1025_target_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_1025_x_mitre_deprecated_False" "objects_1025_x_mitre_version_0.1" "objects_1025_x_mitre_attack_spec_version_3.1.0" "objects_1025_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1025_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1025_spec_version_2.1" "objects_1025_x_mitre_domains_0_mobile-attack" "objects_1026_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1026_id_relationship--7850d933-120b-4ae6-998d-8dc4dfd6d164" "objects_1026_type_relationship" "objects_1026_created_2020-01-27T17:49:05.664Z" "objects_1026_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1026_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1026_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1026_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1026_modified_2020-01-27T17:49:05.664Z" "objects_1026_description_(Citation: Trend Micro Bouncing Golf 2019)" "objects_1026_relationship_type_uses" "objects_1026_source_ref_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_1026_target_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1026_x_mitre_version_1.0" "objects_1026_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1026_spec_version_2.1" "objects_1026_x_mitre_attack_spec_version_2.1.0" "objects_1026_x_mitre_domains_0_mobile-attack" "objects_1027_type_relationship" "objects_1027_id_relationship--789699c2-44f1-4280-bf86-ab23e6a13e84" "objects_1027_created_2018-10-17T00:14:20.652Z" "objects_1027_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1027_revoked_False" "objects_1027_external_references_0_source_name_Lookout-StealthMango" "objects_1027_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1027_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1027_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1027_modified_2023-04-05T20:18:51.813Z" "objects_1027_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uploads calendar events and reminders.(Citation: Lookout-StealthMango)" "objects_1027_relationship_type_uses" "objects_1027_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1027_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1027_x_mitre_deprecated_False" "objects_1027_x_mitre_version_1.0" "objects_1027_x_mitre_attack_spec_version_3.1.0" "objects_1027_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1027_spec_version_2.1" "objects_1027_x_mitre_domains_0_mobile-attack" "objects_1028_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1028_id_relationship--789cb76e-27b0-4762-a2f7-3ff32ce0762d" "objects_1028_type_relationship" "objects_1028_created_2017-12-14T16:46:06.044Z" "objects_1028_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1028_external_references_0_source_name_Lookout-EnterpriseApps" "objects_1028_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_1028_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_1028_modified_2020-03-31T14:49:39.188Z" "objects_1028_description_[PJApps](https://attack.mitre.org/software/S0291) has the capability to collect and leak the victim's phone number, mobile device unique identifier (IMEI).(Citation: Lookout-EnterpriseApps)" "objects_1028_relationship_type_uses" "objects_1028_source_ref_malware--c709da93-20c3-4d17-ab68-48cba76b2137" "objects_1028_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1028_x_mitre_version_1.0" "objects_1028_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1028_spec_version_2.1" "objects_1028_x_mitre_attack_spec_version_2.1.0" "objects_1028_x_mitre_domains_0_mobile-attack" "objects_1029_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1029_id_relationship--789dd0f9-527c-49b3-93b7-851ce4961f0f" "objects_1029_type_relationship" "objects_1029_created_2019-09-03T19:45:48.492Z" "objects_1029_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1029_external_references_0_source_name_SWB Exodus March 2019" "objects_1029_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1029_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1029_modified_2020-03-31T14:49:39.188Z" "objects_1029_description_ [Exodus](https://attack.mitre.org/software/S0405) One queries the device for its IMEI code and the phone number in order to validate the target of a new infection.(Citation: SWB Exodus March 2019) " "objects_1029_relationship_type_uses" "objects_1029_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1029_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1029_x_mitre_version_1.0" "objects_1029_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1029_spec_version_2.1" "objects_1029_x_mitre_attack_spec_version_2.1.0" "objects_1029_x_mitre_domains_0_mobile-attack" "objects_1030_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1030_id_relationship--78cc0d6d-6347-45a4-a18c-ca76150aa7a9" "objects_1030_type_relationship" "objects_1030_created_2017-12-14T16:46:06.044Z" "objects_1030_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1030_external_references_0_source_name_Lookout-BrainTest" "objects_1030_external_references_0_description_Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016." "objects_1030_external_references_0_url_https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/" "objects_1030_modified_2020-03-31T14:49:39.188Z" "objects_1030_description_[BrainTest](https://attack.mitre.org/software/S0293) stores a secondary Android app package (APK) in its assets directory in encrypted form, and decrypts the payload at runtime.(Citation: Lookout-BrainTest)" "objects_1030_relationship_type_uses" "objects_1030_source_ref_malware--e13d084c-382f-40fd-aa9a-98d69e20301e" "objects_1030_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1030_x_mitre_version_1.0" "objects_1030_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1030_spec_version_2.1" "objects_1030_x_mitre_attack_spec_version_2.1.0" "objects_1030_x_mitre_domains_0_mobile-attack" "objects_1031_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1031_id_relationship--78fc4506-5c80-4638-8f51-44a2e28f7aaf" "objects_1031_type_relationship" "objects_1031_created_2020-09-11T15:43:49.309Z" "objects_1031_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1031_external_references_0_source_name_Threat Fabric Cerberus" "objects_1031_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1031_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1031_modified_2020-09-11T15:43:49.309Z" "objects_1031_description_[Cerberus](https://attack.mitre.org/software/S0480) can send SMS messages from a device.(Citation: Threat Fabric Cerberus)" "objects_1031_relationship_type_uses" "objects_1031_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1031_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1031_x_mitre_version_1.0" "objects_1031_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1031_spec_version_2.1" "objects_1031_x_mitre_attack_spec_version_2.1.0" "objects_1031_x_mitre_domains_0_mobile-attack" "objects_1032_type_relationship" "objects_1032_id_relationship--794c3cb4-1a1f-4d7e-969f-c97dfcd006c7" "objects_1032_created_2020-11-24T17:55:12.889Z" "objects_1032_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1032_revoked_False" "objects_1032_external_references_0_source_name_Talos GPlayed" "objects_1032_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1032_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1032_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1032_modified_2023-04-05T17:22:27.554Z" "objects_1032_description_[GPlayed](https://attack.mitre.org/software/S0536) can request device administrator permissions.(Citation: Talos GPlayed)" "objects_1032_relationship_type_uses" "objects_1032_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1032_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1032_x_mitre_deprecated_False" "objects_1032_x_mitre_version_1.0" "objects_1032_x_mitre_attack_spec_version_3.1.0" "objects_1032_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1032_spec_version_2.1" "objects_1032_x_mitre_domains_0_mobile-attack" "objects_1033_type_relationship" "objects_1033_id_relationship--7965128c-89d6-411e-b765-c60e0cae96c6" "objects_1033_created_2023-02-06T19:40:36.807Z" "objects_1033_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1033_revoked_False" "objects_1033_external_references_0_source_name_threatfabric_sova_0921" "objects_1033_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1033_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1033_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1033_modified_2023-03-29T21:36:23.084Z" "objects_1033_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can manipulate clipboard data to replace cryptocurrency addresses.(Citation: threatfabric_sova_0921)" "objects_1033_relationship_type_uses" "objects_1033_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1033_target_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_1033_x_mitre_deprecated_False" "objects_1033_x_mitre_version_0.1" "objects_1033_x_mitre_attack_spec_version_3.1.0" "objects_1033_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1033_spec_version_2.1" "objects_1033_x_mitre_domains_0_mobile-attack" "objects_1034_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1034_type_relationship" "objects_1034_id_relationship--79c3fe5d-585b-401a-8bb4-84bfdc7252a1" "objects_1034_created_2022-04-06T13:52:46.831Z" "objects_1034_x_mitre_version_0.1" "objects_1034_x_mitre_deprecated_False" "objects_1034_revoked_False" "objects_1034_description_Android 7 changed how the Device Administrator password APIs function." "objects_1034_modified_2022-04-06T13:52:46.831Z" "objects_1034_relationship_type_mitigates" "objects_1034_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1034_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_1034_x_mitre_attack_spec_version_2.1.0" "objects_1034_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1034_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1034_spec_version_2.1" "objects_1034_x_mitre_domains_0_mobile-attack" "objects_1035_type_relationship" "objects_1035_id_relationship--79ef0025-3e1c-4914-9873-19808c2a5bec" "objects_1035_created_2023-02-28T21:44:22.373Z" "objects_1035_revoked_False" "objects_1035_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_1035_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_1035_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_1035_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1035_modified_2023-02-28T21:44:22.373Z" "objects_1035_description_[TangleBot](https://attack.mitre.org/software/S1069) can record the screen and stream the data off the device.(Citation: cloudmark_tanglebot_0921)" "objects_1035_relationship_type_uses" "objects_1035_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_1035_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1035_x_mitre_deprecated_False" "objects_1035_x_mitre_version_0.1" "objects_1035_x_mitre_attack_spec_version_3.1.0" "objects_1035_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1035_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1035_spec_version_2.1" "objects_1035_x_mitre_domains_0_mobile-attack" "objects_1036_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1036_id_relationship--79f04c05-8299-4e5e-b4c1-3f82637fa47a" "objects_1036_type_relationship" "objects_1036_created_2018-10-17T00:14:20.652Z" "objects_1036_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1036_modified_2018-10-17T00:14:20.652Z" "objects_1036_relationship_type_revoked-by" "objects_1036_source_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_1036_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_1036_x_mitre_version_1.0" "objects_1036_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1036_spec_version_2.1" "objects_1036_x_mitre_attack_spec_version_2.1.0" "objects_1036_x_mitre_domains_0_mobile-attack" "objects_1037_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1037_id_relationship--7a50961b-9be4-4042-a6a0-878b612c520e" "objects_1037_type_relationship" "objects_1037_created_2019-07-10T15:25:57.602Z" "objects_1037_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1037_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1037_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1037_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1037_modified_2020-03-31T14:49:39.188Z" "objects_1037_description_[FinFisher](https://attack.mitre.org/software/S0182) uses the device microphone to record phone conversations.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1037_relationship_type_uses" "objects_1037_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_1037_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1037_x_mitre_version_1.0" "objects_1037_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1037_spec_version_2.1" "objects_1037_x_mitre_attack_spec_version_2.1.0" "objects_1037_x_mitre_domains_0_mobile-attack" "objects_1038_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1038_id_relationship--7a8e1611-1a7e-45a0-b518-6efd744fce4f" "objects_1038_type_relationship" "objects_1038_created_2020-12-24T22:04:28.002Z" "objects_1038_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1038_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1038_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1038_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1038_modified_2020-12-24T22:04:28.002Z" "objects_1038_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has sent messages to an attacker-controlled number.(Citation: Lookout Uyghur Campaign)" "objects_1038_relationship_type_uses" "objects_1038_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1038_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1038_x_mitre_version_1.0" "objects_1038_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1038_spec_version_2.1" "objects_1038_x_mitre_attack_spec_version_2.1.0" "objects_1038_x_mitre_domains_0_mobile-attack" "objects_1039_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1039_id_relationship--7accde36-cb29-43c6-8c66-6486efd867a8" "objects_1039_type_relationship" "objects_1039_created_2018-10-17T00:14:20.652Z" "objects_1039_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1039_external_references_0_source_name_Lookout-StealthMango" "objects_1039_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1039_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1039_modified_2020-03-31T14:49:39.188Z" "objects_1039_description_[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to gather GPS coordinates.(Citation: Lookout-StealthMango)" "objects_1039_relationship_type_uses" "objects_1039_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_1039_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1039_x_mitre_version_1.0" "objects_1039_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1039_spec_version_2.1" "objects_1039_x_mitre_attack_spec_version_2.1.0" "objects_1039_x_mitre_domains_0_mobile-attack" "objects_1040_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1040_id_relationship--7af7d094-3a49-4e5e-99d0-385c79f95f06" "objects_1040_type_relationship" "objects_1040_created_2017-12-14T16:46:06.044Z" "objects_1040_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1040_external_references_0_source_name_Lookout-Pegasus" "objects_1040_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1040_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1040_modified_2020-03-31T14:49:39.188Z" "objects_1040_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) monitors the victim for status and disables other access to the phone by other jailbreaking software.(Citation: Lookout-Pegasus)" "objects_1040_relationship_type_uses" "objects_1040_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1040_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1040_x_mitre_version_1.0" "objects_1040_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1040_spec_version_2.1" "objects_1040_x_mitre_attack_spec_version_2.1.0" "objects_1040_x_mitre_domains_0_mobile-attack" "objects_1041_type_relationship" "objects_1041_id_relationship--7b1477bc-8fd0-45ce-8eaa-b3b307f18024" "objects_1041_created_2022-04-15T18:11:06.097Z" "objects_1041_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1041_revoked_False" "objects_1041_external_references_0_source_name_Skycure-Profiles" "objects_1041_external_references_0_description_Yair Amit. (2013, March 12). Malicious Profiles - The Sleeping Giant of iOS Security. Retrieved December 22, 2016." "objects_1041_external_references_0_url_https://www.skycure.com/blog/malicious-profiles-the-sleeping-giant-of-ios-security/" "objects_1041_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1041_modified_2023-04-05T21:28:11.000Z" "objects_1041_description_Most [KeyRaider](https://attack.mitre.org/software/S0288) samples hook SSLRead and SSLWrite functions in the itunesstored process to intercept device communication with the Apple App Store.(Citation: Skycure-Profiles)" "objects_1041_relationship_type_uses" "objects_1041_source_ref_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_1041_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1041_x_mitre_deprecated_False" "objects_1041_x_mitre_version_0.1" "objects_1041_x_mitre_attack_spec_version_3.1.0" "objects_1041_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1041_spec_version_2.1" "objects_1041_x_mitre_domains_0_mobile-attack" "objects_1042_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1042_type_relationship" "objects_1042_id_relationship--7b3fa5cb-bd70-47e0-acfb-7db99e29e70f" "objects_1042_created_2022-04-01T18:49:19.284Z" "objects_1042_x_mitre_version_0.1" "objects_1042_x_mitre_deprecated_False" "objects_1042_revoked_False" "objects_1042_description_Recent versions of Android modified how device administrator applications are uninstalled, making it easier for the user to remove them. Android 7 introduced updates that revoke standard device administrators\u2019 ability to reset the device\u2019s passcode." "objects_1042_modified_2022-04-01T18:49:19.284Z" "objects_1042_relationship_type_mitigates" "objects_1042_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1042_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_1042_x_mitre_attack_spec_version_2.1.0" "objects_1042_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1042_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1042_spec_version_2.1" "objects_1042_x_mitre_domains_0_mobile-attack" "objects_1043_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1043_type_relationship" "objects_1043_id_relationship--7b45e72f-5741-4942-aa28-ee7abb6f7046" "objects_1043_created_2022-04-05T17:14:35.469Z" "objects_1043_x_mitre_version_0.1" "objects_1043_x_mitre_deprecated_False" "objects_1043_revoked_False" "objects_1043_description_" "objects_1043_modified_2022-04-05T17:14:35.469Z" "objects_1043_relationship_type_subtechnique-of" "objects_1043_source_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1043_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_1043_x_mitre_attack_spec_version_2.1.0" "objects_1043_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1043_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1043_spec_version_2.1" "objects_1043_x_mitre_domains_0_mobile-attack" "objects_1044_type_relationship" "objects_1044_id_relationship--7b611c76-0ea1-49c5-9b9a-2e504a0bbe14" "objects_1044_created_2020-06-26T15:32:25.043Z" "objects_1044_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1044_revoked_False" "objects_1044_external_references_0_source_name_Threat Fabric Cerberus" "objects_1044_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1044_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1044_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1044_modified_2023-04-05T20:53:04.417Z" "objects_1044_description_[Cerberus](https://attack.mitre.org/software/S0480) disables Google Play Protect to prevent its discovery and deletion in the future.(Citation: Threat Fabric Cerberus)" "objects_1044_relationship_type_uses" "objects_1044_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1044_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1044_x_mitre_deprecated_False" "objects_1044_x_mitre_version_1.0" "objects_1044_x_mitre_attack_spec_version_3.1.0" "objects_1044_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1044_spec_version_2.1" "objects_1044_x_mitre_domains_0_mobile-attack" "objects_1045_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1045_type_relationship" "objects_1045_id_relationship--7b679dbf-4e31-4d0b-9e13-eb8c3b98b7fb" "objects_1045_created_2019-08-09T16:19:02.782Z" "objects_1045_x_mitre_version_1.0" "objects_1045_external_references_0_source_name_Android Capture Sensor 2019" "objects_1045_external_references_0_url_https://developer.android.com/about/versions/pie/android-9.0-changes-all#bg-sensor-access" "objects_1045_external_references_0_description_Android Developers. (, January). Android 9+ Privacy Changes . Retrieved August 27, 2019." "objects_1045_x_mitre_deprecated_False" "objects_1045_revoked_False" "objects_1045_description_Android 9 and above restricts access to microphone, camera, and other sensors from background applications.(Citation: Android Capture Sensor 2019) " "objects_1045_modified_2022-04-01T15:21:13.296Z" "objects_1045_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1045_relationship_type_mitigates" "objects_1045_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1045_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1045_x_mitre_attack_spec_version_2.1.0" "objects_1045_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1045_spec_version_2.1" "objects_1045_x_mitre_domains_0_mobile-attack" "objects_1046_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1046_id_relationship--7b8c3ae2-7e52-4f1d-ad30-788b367a7531" "objects_1046_type_relationship" "objects_1046_created_2019-08-07T15:57:13.417Z" "objects_1046_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1046_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_1046_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_1046_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_1046_modified_2020-03-31T14:49:39.188Z" "objects_1046_description_[Riltok](https://attack.mitre.org/software/S0403) can query various details about the device, including phone number, country, mobile operator, model, root availability, and operating system version.(Citation: Kaspersky Riltok June 2019)" "objects_1046_relationship_type_uses" "objects_1046_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_1046_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1046_x_mitre_version_1.0" "objects_1046_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1046_spec_version_2.1" "objects_1046_x_mitre_attack_spec_version_2.1.0" "objects_1046_x_mitre_domains_0_mobile-attack" "objects_1047_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1047_id_relationship--7ba30703-c3aa-425a-9482-9e9941fd7038" "objects_1047_type_relationship" "objects_1047_created_2020-12-24T21:45:56.961Z" "objects_1047_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1047_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1047_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1047_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1047_modified_2020-12-24T21:45:56.961Z" "objects_1047_description_[SilkBean](https://attack.mitre.org/software/S0549) can access the camera on the device.(Citation: Lookout Uyghur Campaign)" "objects_1047_relationship_type_uses" "objects_1047_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1047_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1047_x_mitre_version_1.0" "objects_1047_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1047_spec_version_2.1" "objects_1047_x_mitre_attack_spec_version_2.1.0" "objects_1047_x_mitre_domains_0_mobile-attack" "objects_1048_type_relationship" "objects_1048_id_relationship--7ba4fb2e-99ff-41ff-8b07-f02e9f74e890" "objects_1048_created_2023-01-18T19:09:40.955Z" "objects_1048_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1048_revoked_False" "objects_1048_external_references_0_source_name_cyble_drinik_1022" "objects_1048_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1048_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1048_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1048_modified_2023-03-27T17:58:45.439Z" "objects_1048_description_[Drinik](https://attack.mitre.org/software/S1054) can record the screen via the `MediaProjection` library to harvest user credentials, including biometric PINs.(Citation: cyble_drinik_1022)" "objects_1048_relationship_type_uses" "objects_1048_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1048_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1048_x_mitre_deprecated_False" "objects_1048_x_mitre_version_0.1" "objects_1048_x_mitre_attack_spec_version_3.1.0" "objects_1048_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1048_spec_version_2.1" "objects_1048_x_mitre_domains_0_mobile-attack" "objects_1049_type_relationship" "objects_1049_id_relationship--7baa3cab-c4f8-4b91-a6c3-189ad7a6416c" "objects_1049_created_2017-12-14T16:46:06.044Z" "objects_1049_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1049_revoked_False" "objects_1049_external_references_0_source_name_Lookout-Pegasus" "objects_1049_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1049_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1049_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1049_modified_2023-04-05T17:34:08.372Z" "objects_1049_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) gathers contacts from the system by dumping the victim's address book.(Citation: Lookout-Pegasus)" "objects_1049_relationship_type_uses" "objects_1049_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1049_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1049_x_mitre_deprecated_False" "objects_1049_x_mitre_version_1.0" "objects_1049_x_mitre_attack_spec_version_3.1.0" "objects_1049_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1049_spec_version_2.1" "objects_1049_x_mitre_domains_0_mobile-attack" "objects_1050_type_relationship" "objects_1050_id_relationship--7bbbd2aa-104f-443a-907e-6e1fbcf0a73e" "objects_1050_created_2023-07-21T19:34:29.630Z" "objects_1050_revoked_False" "objects_1050_external_references_0_source_name_lookout_bouldspy_0423" "objects_1050_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1050_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1050_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1050_modified_2023-07-21T19:34:29.630Z" "objects_1050_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can take and exfiltrate screenshots.(Citation: lookout_bouldspy_0423)" "objects_1050_relationship_type_uses" "objects_1050_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1050_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1050_x_mitre_deprecated_False" "objects_1050_x_mitre_version_0.1" "objects_1050_x_mitre_attack_spec_version_3.1.0" "objects_1050_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1050_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1050_spec_version_2.1" "objects_1050_x_mitre_domains_0_mobile-attack" "objects_1051_type_relationship" "objects_1051_id_relationship--7bc6460d-b36e-41ed-baa0-82d54ec19e57" "objects_1051_created_2023-08-04T18:58:19.825Z" "objects_1051_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1051_revoked_False" "objects_1051_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1051_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1051_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1051_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1051_modified_2023-08-04T18:58:58.480Z" "objects_1051_description_[Hornbill](https://attack.mitre.org/software/S1077) can exfiltrate data back to the C2 server using HTTP.(Citation: lookout_hornbill_sunbird_0221) " "objects_1051_relationship_type_uses" "objects_1051_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1051_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1051_x_mitre_deprecated_False" "objects_1051_x_mitre_version_0.1" "objects_1051_x_mitre_attack_spec_version_3.1.0" "objects_1051_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1051_spec_version_2.1" "objects_1051_x_mitre_domains_0_mobile-attack" "objects_1052_type_relationship" "objects_1052_id_relationship--7bf2e05e-496f-49d1-8a37-48cc3ff8d6cc" "objects_1052_created_2020-04-08T15:41:19.400Z" "objects_1052_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1052_revoked_False" "objects_1052_external_references_0_source_name_Cofense Anubis" "objects_1052_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1052_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1052_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1052_modified_2023-04-05T17:17:41.320Z" "objects_1052_description_[Anubis](https://attack.mitre.org/software/S0422) can modify administrator settings and disable Play Protect.(Citation: Cofense Anubis)" "objects_1052_relationship_type_uses" "objects_1052_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1052_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1052_x_mitre_deprecated_False" "objects_1052_x_mitre_version_1.0" "objects_1052_x_mitre_attack_spec_version_3.1.0" "objects_1052_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1052_spec_version_2.1" "objects_1052_x_mitre_domains_0_mobile-attack" "objects_1053_type_relationship" "objects_1053_id_relationship--7c4a4766-cb63-4a3c-85ef-a1dba3be4a47" "objects_1053_created_2023-06-09T19:19:56.840Z" "objects_1053_revoked_False" "objects_1053_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1053_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1053_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1053_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1053_modified_2023-06-09T19:19:56.840Z" "objects_1053_description_[Hornbill](https://attack.mitre.org/software/S1077) has monitored for SMS and WhatsApp notifications.(Citation: lookout_hornbill_sunbird_0221)" "objects_1053_relationship_type_uses" "objects_1053_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1053_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1053_x_mitre_deprecated_False" "objects_1053_x_mitre_version_0.1" "objects_1053_x_mitre_attack_spec_version_3.1.0" "objects_1053_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1053_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1053_spec_version_2.1" "objects_1053_x_mitre_domains_0_mobile-attack" "objects_1054_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1054_id_relationship--7c6207c7-d738-4a17-8380-595c86574b64" "objects_1054_type_relationship" "objects_1054_created_2020-09-11T16:22:03.298Z" "objects_1054_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1054_external_references_0_source_name_Lookout ViperRAT" "objects_1054_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1054_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1054_modified_2020-09-11T16:22:03.298Z" "objects_1054_description_[ViperRAT](https://attack.mitre.org/software/S0506) can track the device\u2019s location.(Citation: Lookout ViperRAT)" "objects_1054_relationship_type_uses" "objects_1054_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1054_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1054_x_mitre_version_1.0" "objects_1054_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1054_spec_version_2.1" "objects_1054_x_mitre_attack_spec_version_2.1.0" "objects_1054_x_mitre_domains_0_mobile-attack" "objects_1055_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1055_type_relationship" "objects_1055_id_relationship--7cae8c80-c603-4352-a704-f3a2f4aa4a56" "objects_1055_created_2019-09-03T20:08:00.737Z" "objects_1055_x_mitre_version_1.0" "objects_1055_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1055_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1055_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1055_x_mitre_deprecated_False" "objects_1055_revoked_False" "objects_1055_description_[Gustuff](https://attack.mitre.org/software/S0406) abuses accessibility features to intercept all interactions between a user and the device.(Citation: Talos Gustuff Apr 2019)" "objects_1055_modified_2022-04-15T17:39:08.123Z" "objects_1055_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1055_relationship_type_uses" "objects_1055_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1055_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1055_x_mitre_attack_spec_version_2.1.0" "objects_1055_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1055_spec_version_2.1" "objects_1055_x_mitre_domains_0_mobile-attack" "objects_1056_type_relationship" "objects_1056_id_relationship--7d2f869d-a117-4b1f-a783-c6d3fc002562" "objects_1056_created_2023-07-21T19:38:52.085Z" "objects_1056_revoked_False" "objects_1056_external_references_0_source_name_lookout_bouldspy_0423" "objects_1056_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1056_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1056_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1056_modified_2023-07-21T19:38:52.085Z" "objects_1056_description_[BOULDSPY](https://attack.mitre.org/software/S1079) uses unencrypted HTTP traffic between the victim and C2 infrastructure.(Citation: lookout_bouldspy_0423)" "objects_1056_relationship_type_uses" "objects_1056_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1056_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1056_x_mitre_deprecated_False" "objects_1056_x_mitre_version_0.1" "objects_1056_x_mitre_attack_spec_version_3.1.0" "objects_1056_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1056_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1056_spec_version_2.1" "objects_1056_x_mitre_domains_0_mobile-attack" "objects_1057_type_relationship" "objects_1057_id_relationship--7d481598-ece7-469c-b231-619a804c25e5" "objects_1057_created_2017-12-14T16:46:06.044Z" "objects_1057_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1057_revoked_False" "objects_1057_external_references_0_source_name_Lookout-Pegasus" "objects_1057_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1057_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1057_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1057_modified_2023-04-05T17:34:25.318Z" "objects_1057_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) captures SMS messages that the victim sends or receives.(Citation: Lookout-Pegasus)" "objects_1057_relationship_type_uses" "objects_1057_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1057_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1057_x_mitre_deprecated_False" "objects_1057_x_mitre_version_1.0" "objects_1057_x_mitre_attack_spec_version_3.1.0" "objects_1057_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1057_spec_version_2.1" "objects_1057_x_mitre_domains_0_mobile-attack" "objects_1058_type_relationship" "objects_1058_id_relationship--7d6bba99-ea81-42bc-b02a-e5e98b34a688" "objects_1058_created_2020-05-07T15:33:32.910Z" "objects_1058_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1058_revoked_False" "objects_1058_external_references_0_source_name_CheckPoint Agent Smith" "objects_1058_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1058_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1058_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1058_modified_2023-04-05T17:19:44.427Z" "objects_1058_description_[Agent Smith](https://attack.mitre.org/software/S0440) can hide its icon from the application launcher.(Citation: CheckPoint Agent Smith)" "objects_1058_relationship_type_uses" "objects_1058_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1058_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1058_x_mitre_deprecated_False" "objects_1058_x_mitre_version_1.0" "objects_1058_x_mitre_attack_spec_version_3.1.0" "objects_1058_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1058_spec_version_2.1" "objects_1058_x_mitre_domains_0_mobile-attack" "objects_1059_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1059_type_relationship" "objects_1059_id_relationship--7db33293-6971-4c0d-88e0-18f505ebd943" "objects_1059_created_2022-04-05T20:11:51.188Z" "objects_1059_x_mitre_version_0.1" "objects_1059_x_mitre_deprecated_False" "objects_1059_revoked_False" "objects_1059_description_Recent OS versions have made it more difficult for applications to register as VPN providers. " "objects_1059_modified_2022-04-05T20:11:51.188Z" "objects_1059_relationship_type_mitigates" "objects_1059_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1059_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1059_x_mitre_attack_spec_version_2.1.0" "objects_1059_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1059_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1059_spec_version_2.1" "objects_1059_x_mitre_domains_0_mobile-attack" "objects_1060_type_relationship" "objects_1060_id_relationship--7de1af68-d893-40a0-b27a-c9010f5cdc62" "objects_1060_created_2023-03-20T18:57:14.194Z" "objects_1060_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1060_revoked_False" "objects_1060_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1060_modified_2023-08-09T14:49:51.309Z" "objects_1060_description_Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise." "objects_1060_relationship_type_detects" "objects_1060_source_ref_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_1060_target_ref_attack-pattern--5ca3c7ec-55b2-4587-9376-cf6c96f8047a" "objects_1060_x_mitre_deprecated_False" "objects_1060_x_mitre_version_0.1" "objects_1060_x_mitre_attack_spec_version_3.1.0" "objects_1060_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1060_spec_version_2.1" "objects_1060_x_mitre_domains_0_mobile-attack" "objects_1061_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1061_id_relationship--7ded1b79-cf7c-435d-b6ed-2c8872f9393f" "objects_1061_type_relationship" "objects_1061_created_2020-12-24T22:04:28.005Z" "objects_1061_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1061_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1061_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1061_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1061_modified_2020-12-24T22:04:28.005Z" "objects_1061_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has taken photos with the device camera.(Citation: Lookout Uyghur Campaign)" "objects_1061_relationship_type_uses" "objects_1061_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1061_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1061_x_mitre_version_1.0" "objects_1061_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1061_spec_version_2.1" "objects_1061_x_mitre_attack_spec_version_2.1.0" "objects_1061_x_mitre_domains_0_mobile-attack" "objects_1062_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1062_type_relationship" "objects_1062_id_relationship--7defdb15-65d1-40ca-a9da-5c0484892484" "objects_1062_created_2020-04-24T17:46:31.616Z" "objects_1062_x_mitre_version_1.0" "objects_1062_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1062_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1062_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1062_x_mitre_deprecated_False" "objects_1062_revoked_False" "objects_1062_description_[TrickMo](https://attack.mitre.org/software/S0427) can be controlled via encrypted SMS message.(Citation: SecurityIntelligence TrickMo)" "objects_1062_modified_2022-04-19T14:25:41.669Z" "objects_1062_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1062_relationship_type_uses" "objects_1062_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1062_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1062_x_mitre_attack_spec_version_2.1.0" "objects_1062_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1062_spec_version_2.1" "objects_1062_x_mitre_domains_0_mobile-attack" "objects_1063_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1063_type_relationship" "objects_1063_id_relationship--7e00d3ac-a97a-4db0-9699-7474d81413a8" "objects_1063_created_2018-10-17T00:14:20.652Z" "objects_1063_x_mitre_version_1.0" "objects_1063_x_mitre_deprecated_False" "objects_1063_revoked_False" "objects_1063_description_" "objects_1063_modified_2022-07-07T14:00:00.188Z" "objects_1063_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1063_relationship_type_revoked-by" "objects_1063_source_ref_attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881" "objects_1063_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1063_x_mitre_attack_spec_version_2.1.0" "objects_1063_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1063_spec_version_2.1" "objects_1063_x_mitre_domains_0_mobile-attack" "objects_1064_type_relationship" "objects_1064_id_relationship--7e2d9773-1320-4c8f-a595-2b92bf0fd8ed" "objects_1064_created_2019-07-10T15:35:43.668Z" "objects_1064_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1064_revoked_False" "objects_1064_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1064_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1064_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1064_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1064_modified_2023-04-05T17:55:00.294Z" "objects_1064_description_[Pallas](https://attack.mitre.org/software/S0399) accesses the device contact list.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1064_relationship_type_uses" "objects_1064_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1064_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1064_x_mitre_deprecated_False" "objects_1064_x_mitre_version_1.0" "objects_1064_x_mitre_attack_spec_version_3.1.0" "objects_1064_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1064_spec_version_2.1" "objects_1064_x_mitre_domains_0_mobile-attack" "objects_1065_type_relationship" "objects_1065_id_relationship--7e8956e3-7d90-412d-a82f-d61e43239923" "objects_1065_created_2023-03-20T18:44:01.387Z" "objects_1065_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1065_revoked_False" "objects_1065_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1065_modified_2023-08-14T16:21:32.437Z" "objects_1065_description_Application vetting services may indicate precisely what content was requested during application execution." "objects_1065_relationship_type_detects" "objects_1065_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1065_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1065_x_mitre_deprecated_False" "objects_1065_x_mitre_version_0.1" "objects_1065_x_mitre_attack_spec_version_3.1.0" "objects_1065_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1065_spec_version_2.1" "objects_1065_x_mitre_domains_0_mobile-attack" "objects_1066_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1066_id_relationship--7ec3ee9a-6710-46ed-aecb-c0f2a64739ad" "objects_1066_type_relationship" "objects_1066_created_2020-11-20T16:37:28.429Z" "objects_1066_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1066_external_references_0_source_name_Symantec GoldenCup" "objects_1066_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1066_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1066_modified_2020-11-20T16:37:28.429Z" "objects_1066_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect images, videos, and attacker-specified files.(Citation: Symantec GoldenCup)" "objects_1066_relationship_type_uses" "objects_1066_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1066_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1066_x_mitre_version_1.0" "objects_1066_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1066_spec_version_2.1" "objects_1066_x_mitre_attack_spec_version_2.1.0" "objects_1066_x_mitre_domains_0_mobile-attack" "objects_1067_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1067_id_relationship--7ee49e53-e75d-4e65-a71f-79919ebb08f4" "objects_1067_type_relationship" "objects_1067_created_2020-04-08T15:41:19.340Z" "objects_1067_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1067_external_references_0_source_name_Cofense Anubis" "objects_1067_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1067_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1067_modified_2020-04-08T18:55:29.238Z" "objects_1067_description_[Anubis](https://attack.mitre.org/software/S0422) can use its ransomware module to encrypt device data and hold it for ransom.(Citation: Cofense Anubis)" "objects_1067_relationship_type_uses" "objects_1067_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1067_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_1067_x_mitre_version_1.0" "objects_1067_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1067_spec_version_2.1" "objects_1067_x_mitre_attack_spec_version_2.1.0" "objects_1067_x_mitre_domains_0_mobile-attack" "objects_1068_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1068_type_relationship" "objects_1068_id_relationship--7ef9f4cf-863b-4bc4-bdaf-55055263c030" "objects_1068_created_2022-03-30T20:42:04.251Z" "objects_1068_x_mitre_version_0.1" "objects_1068_x_mitre_deprecated_False" "objects_1068_revoked_False" "objects_1068_description_Users should be advised to be extra scrutinous of applications that request location, and to deny any permissions requests for applications they do not recognize." "objects_1068_modified_2022-03-30T20:42:04.251Z" "objects_1068_relationship_type_mitigates" "objects_1068_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1068_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1068_x_mitre_attack_spec_version_2.1.0" "objects_1068_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1068_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1068_spec_version_2.1" "objects_1068_x_mitre_domains_0_mobile-attack" "objects_1069_type_relationship" "objects_1069_id_relationship--7f4e1ac1-145e-4983-b735-7f70003893aa" "objects_1069_created_2023-08-04T18:29:35.223Z" "objects_1069_revoked_False" "objects_1069_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1069_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1069_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1069_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1069_modified_2023-08-04T18:29:35.223Z" "objects_1069_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate call logs.(Citation: lookout_hornbill_sunbird_0221)" "objects_1069_relationship_type_uses" "objects_1069_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1069_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1069_x_mitre_deprecated_False" "objects_1069_x_mitre_version_0.1" "objects_1069_x_mitre_attack_spec_version_3.1.0" "objects_1069_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1069_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1069_spec_version_2.1" "objects_1069_x_mitre_domains_0_mobile-attack" "objects_1070_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1070_type_relationship" "objects_1070_id_relationship--7fcfc36b-bebc-481f-b9af-b65008b045ec" "objects_1070_created_2018-10-17T00:14:20.652Z" "objects_1070_x_mitre_version_1.0" "objects_1070_external_references_0_source_name_BankInfoSecurity-BackDoor" "objects_1070_external_references_0_url_http://www.bankinfosecurity.com/did-chinese-spyware-linger-in-us-phones-a-9534" "objects_1070_external_references_0_description_Jeremy Kirk. (2016, November 16). Why Did Chinese Spyware Linger in U.S. Phones?. Retrieved February 6, 2017." "objects_1070_external_references_1_source_name_NYTimes-BackDoor" "objects_1070_external_references_1_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_1070_external_references_1_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_1070_x_mitre_deprecated_False" "objects_1070_revoked_False" "objects_1070_description_[Adups](https://attack.mitre.org/software/S0309) was pre-installed on Android devices from some vendors.(Citation: NYTimes-BackDoor)(Citation: BankInfoSecurity-BackDoor)" "objects_1070_modified_2022-04-19T15:46:20.166Z" "objects_1070_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1070_relationship_type_uses" "objects_1070_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_1070_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1070_x_mitre_attack_spec_version_2.1.0" "objects_1070_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1070_spec_version_2.1" "objects_1070_x_mitre_domains_0_mobile-attack" "objects_1071_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1071_type_relationship" "objects_1071_id_relationship--7fe8ab9f-b207-4c39-ab5c-e929a1c949f9" "objects_1071_created_2019-07-16T14:33:12.113Z" "objects_1071_x_mitre_version_1.0" "objects_1071_external_references_0_source_name_Krebs-Triada June 2019" "objects_1071_external_references_0_url_https://krebsonsecurity.com/2019/06/tracing-the-supply-chain-attack-on-android-2/" "objects_1071_external_references_0_description_Krebs, B. (2019, June 25). Tracing the Supply Chain Attack on Android. Retrieved July 16, 2019." "objects_1071_external_references_1_source_name_Google Triada June 2019" "objects_1071_external_references_1_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_1071_external_references_1_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_1071_x_mitre_deprecated_False" "objects_1071_revoked_False" "objects_1071_description_[Triada](https://attack.mitre.org/software/S0424) was added into the Android system by a third-party vendor identified as Yehuo or Blazefire during the production process.(Citation: Google Triada June 2019)(Citation: Krebs-Triada June 2019)" "objects_1071_modified_2022-04-19T15:47:32.152Z" "objects_1071_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1071_relationship_type_uses" "objects_1071_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_1071_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1071_x_mitre_attack_spec_version_2.1.0" "objects_1071_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1071_spec_version_2.1" "objects_1071_x_mitre_domains_0_mobile-attack" "objects_1072_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1072_id_relationship--806a9338-be20-4eef-aa54-067633ac0e58" "objects_1072_type_relationship" "objects_1072_created_2020-04-08T15:41:19.421Z" "objects_1072_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1072_external_references_0_source_name_Cofense Anubis" "objects_1072_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1072_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1072_modified_2020-04-08T15:41:19.421Z" "objects_1072_description_[Anubis](https://attack.mitre.org/software/S0422) can retrieve the device\u2019s GPS location.(Citation: Cofense Anubis)" "objects_1072_relationship_type_uses" "objects_1072_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1072_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1072_x_mitre_version_1.0" "objects_1072_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1072_spec_version_2.1" "objects_1072_x_mitre_attack_spec_version_2.1.0" "objects_1072_x_mitre_domains_0_mobile-attack" "objects_1073_type_relationship" "objects_1073_id_relationship--80778a1e-715d-477b-87fa-e92181b31659" "objects_1073_created_2020-12-24T21:45:56.967Z" "objects_1073_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1073_revoked_False" "objects_1073_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1073_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1073_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1073_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1073_modified_2023-04-05T17:15:22.472Z" "objects_1073_description_[SilkBean](https://attack.mitre.org/software/S0549) can delete various piece of device data, such as contacts, call logs, applications, SMS messages, email, plugins, and files in external storage.(Citation: Lookout Uyghur Campaign)" "objects_1073_relationship_type_uses" "objects_1073_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1073_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1073_x_mitre_deprecated_False" "objects_1073_x_mitre_version_1.0" "objects_1073_x_mitre_attack_spec_version_3.1.0" "objects_1073_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1073_spec_version_2.1" "objects_1073_x_mitre_domains_0_mobile-attack" "objects_1074_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1074_id_relationship--80ac52f9-ffa4-4b6e-b420-95d1b69ae9d9" "objects_1074_type_relationship" "objects_1074_created_2021-01-05T20:16:20.502Z" "objects_1074_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1074_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1074_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1074_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1074_modified_2021-01-05T20:16:20.502Z" "objects_1074_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can take screenshots.(Citation: Zscaler TikTok Spyware)" "objects_1074_relationship_type_uses" "objects_1074_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1074_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1074_x_mitre_version_1.0" "objects_1074_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1074_spec_version_2.1" "objects_1074_x_mitre_attack_spec_version_2.1.0" "objects_1074_x_mitre_domains_0_mobile-attack" "objects_1075_type_relationship" "objects_1075_id_relationship--812490b8-2160-47e9-9e1e-c1749b7ee86d" "objects_1075_created_2023-09-28T17:40:03.722Z" "objects_1075_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1075_revoked_False" "objects_1075_external_references_0_source_name_Zimperium FlyTrap" "objects_1075_external_references_0_description_A. Yaswant. (2021, August 9). FlyTrap Android Malware Compromises Thousands of Facebook Accounts. Retrieved September 28, 2023." "objects_1075_external_references_0_url_https://www.zimperium.com/blog/flytrap-android-malware-compromises-thousands-of-facebook-accounts/" "objects_1075_external_references_1_source_name_Trend Micro FlyTrap" "objects_1075_external_references_1_description_Trend Micro. (2021, August 17). FlyTrap Android Malware Is Taking Over Facebook Accounts \u2014 Protect Yourself With a Malware Scanner. Retrieved September 28, 2023." "objects_1075_external_references_1_url_https://news.trendmicro.com/2021/08/17/flytrap-android-malware-is-taking-over-facebook-accounts-protect-yourself-with-a-malware-scanner/" "objects_1075_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1075_modified_2023-10-10T19:13:17.011Z" "objects_1075_description_[FlyTrap](https://attack.mitre.org/software/S1093) can collect Facebook account information, such as Facebook ID, email address, cookies, and login tokens.(Citation: Trend Micro FlyTrap)(Citation: Zimperium FlyTrap)" "objects_1075_relationship_type_uses" "objects_1075_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_1075_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1075_x_mitre_deprecated_False" "objects_1075_x_mitre_version_0.1" "objects_1075_x_mitre_attack_spec_version_3.2.0" "objects_1075_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1075_spec_version_2.1" "objects_1075_x_mitre_domains_0_mobile-attack" "objects_1076_type_relationship" "objects_1076_id_relationship--81722aad-f503-4a74-91d5-1843adf8a995" "objects_1076_created_2023-08-16T16:36:04.747Z" "objects_1076_revoked_False" "objects_1076_external_references_0_source_name_cyble_chameleon_0423" "objects_1076_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_1076_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_1076_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1076_modified_2023-08-16T16:36:04.747Z" "objects_1076_description_[Chameleon](https://attack.mitre.org/software/S1083) can prevent application removal by abusing Accessibility Services.(Citation: cyble_chameleon_0423)" "objects_1076_relationship_type_uses" "objects_1076_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_1076_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1076_x_mitre_deprecated_False" "objects_1076_x_mitre_version_0.1" "objects_1076_x_mitre_attack_spec_version_3.1.0" "objects_1076_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1076_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1076_spec_version_2.1" "objects_1076_x_mitre_domains_0_mobile-attack" "objects_1077_type_relationship" "objects_1077_id_relationship--818b8c2b-bd23-4a83-9970-d42063608699" "objects_1077_created_2020-04-24T15:06:33.393Z" "objects_1077_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1077_revoked_False" "objects_1077_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1077_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1077_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1077_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1077_modified_2023-04-05T19:49:04.950Z" "objects_1077_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect device contacts.(Citation: TrendMicro Coronavirus Updates)" "objects_1077_relationship_type_uses" "objects_1077_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1077_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1077_x_mitre_deprecated_False" "objects_1077_x_mitre_version_1.0" "objects_1077_x_mitre_attack_spec_version_3.1.0" "objects_1077_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1077_spec_version_2.1" "objects_1077_x_mitre_domains_0_mobile-attack" "objects_1078_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1078_id_relationship--81db3270-4cb8-4982-8ff8-c28a874e8421" "objects_1078_type_relationship" "objects_1078_created_2017-12-14T16:46:06.044Z" "objects_1078_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1078_external_references_0_source_name_TrendMicro-DressCode" "objects_1078_external_references_0_description_Echo Duan. (2016, September 29). DressCode and its Potential Impact for Enterprises. Retrieved December 22, 2016." "objects_1078_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/" "objects_1078_modified_2020-03-31T14:49:39.188Z" "objects_1078_description_[DressCode](https://attack.mitre.org/software/S0300) sets up a \"general purpose tunnel\" that can be used by an adversary to compromise enterprise networks that the mobile device is connected to.(Citation: TrendMicro-DressCode)" "objects_1078_relationship_type_uses" "objects_1078_source_ref_malware--ff742eeb-1f90-4f5a-8b92-9d40fffd99ca" "objects_1078_target_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_1078_x_mitre_version_1.0" "objects_1078_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1078_spec_version_2.1" "objects_1078_x_mitre_attack_spec_version_2.1.0" "objects_1078_x_mitre_domains_0_mobile-attack" "objects_1079_type_relationship" "objects_1079_id_relationship--81dbe111-0f02-49a1-9bba-42a31e6bb416" "objects_1079_created_2023-03-20T18:52:56.247Z" "objects_1079_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1079_revoked_False" "objects_1079_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1079_modified_2023-08-08T22:33:23.699Z" "objects_1079_description_Mobile security products can detect which applications can request device administrator permissions. Application vetting services could be extra scrutinous of applications that request device administrator permissions." "objects_1079_relationship_type_detects" "objects_1079_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1079_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1079_x_mitre_deprecated_False" "objects_1079_x_mitre_version_0.1" "objects_1079_x_mitre_attack_spec_version_3.1.0" "objects_1079_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1079_spec_version_2.1" "objects_1079_x_mitre_domains_0_mobile-attack" "objects_1080_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1080_type_relationship" "objects_1080_id_relationship--81e1311e-4fe1-4177-ae12-1d50037c5e4f" "objects_1080_created_2020-06-02T14:32:31.906Z" "objects_1080_x_mitre_version_1.0" "objects_1080_external_references_0_source_name_Volexity Insomnia" "objects_1080_external_references_0_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_1080_external_references_0_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_1080_x_mitre_deprecated_False" "objects_1080_revoked_False" "objects_1080_description_[INSOMNIA](https://attack.mitre.org/software/S0463) has communicated with the C2 using HTTPS requests over ports 43111, 43223, and 43773.(Citation: Volexity Insomnia)" "objects_1080_modified_2022-04-20T16:40:05.898Z" "objects_1080_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1080_relationship_type_uses" "objects_1080_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1080_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1080_x_mitre_attack_spec_version_2.1.0" "objects_1080_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1080_spec_version_2.1" "objects_1080_x_mitre_domains_0_mobile-attack" "objects_1081_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1081_id_relationship--81fb62ac-ba04-48d2-8817-52d0652f61a0" "objects_1081_type_relationship" "objects_1081_created_2018-10-17T00:14:20.652Z" "objects_1081_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1081_external_references_0_source_name_CheckPoint-Judy" "objects_1081_external_references_0_description_CheckPoint. (2017, May 25). The Judy Malware: Possibly the largest malware campaign found on Google Play. Retrieved September 18, 2018." "objects_1081_external_references_0_url_https://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/" "objects_1081_modified_2020-03-31T14:49:39.188Z" "objects_1081_description_[Judy](https://attack.mitre.org/software/S0325) bypasses Google Play's protections by downloading a malicious payload at runtime after installation.(Citation: CheckPoint-Judy)" "objects_1081_relationship_type_uses" "objects_1081_source_ref_malware--172444ab-97fc-4d94-b142-179452bfb760" "objects_1081_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1081_x_mitre_version_1.0" "objects_1081_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1081_spec_version_2.1" "objects_1081_x_mitre_attack_spec_version_2.1.0" "objects_1081_x_mitre_domains_0_mobile-attack" "objects_1082_type_relationship" "objects_1082_id_relationship--8244700e-6f96-463a-a9c3-810c489a2c60" "objects_1082_created_2023-03-20T15:20:24.554Z" "objects_1082_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1082_revoked_False" "objects_1082_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1082_modified_2023-08-08T14:54:57.884Z" "objects_1082_description_Application vetting services could detect applications trying to modify files in protected parts of the operating system." "objects_1082_relationship_type_detects" "objects_1082_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1082_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1082_x_mitre_deprecated_False" "objects_1082_x_mitre_version_0.1" "objects_1082_x_mitre_attack_spec_version_3.1.0" "objects_1082_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1082_spec_version_2.1" "objects_1082_x_mitre_domains_0_mobile-attack" "objects_1083_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1083_id_relationship--82555171-8b78-40f3-84d9-058359ae808a" "objects_1083_type_relationship" "objects_1083_created_2020-09-24T15:34:51.244Z" "objects_1083_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1083_external_references_0_source_name_Lookout-Dendroid" "objects_1083_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1083_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1083_modified_2020-09-24T15:34:51.244Z" "objects_1083_description_[Dendroid](https://attack.mitre.org/software/S0301) can send and block SMS messages.(Citation: Lookout-Dendroid)" "objects_1083_relationship_type_uses" "objects_1083_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1083_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1083_x_mitre_version_1.0" "objects_1083_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1083_spec_version_2.1" "objects_1083_x_mitre_attack_spec_version_2.1.0" "objects_1083_x_mitre_domains_0_mobile-attack" "objects_1084_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1084_type_relationship" "objects_1084_id_relationship--825ffecc-090f-44c8-87be-f7b72e07f987" "objects_1084_created_2022-04-01T18:43:15.716Z" "objects_1084_x_mitre_version_0.1" "objects_1084_x_mitre_deprecated_False" "objects_1084_revoked_False" "objects_1084_description_Mobile security software can typically detect if a device has been rooted or jailbroken and can inform the user, who can then take appropriate action." "objects_1084_modified_2022-04-01T18:43:15.716Z" "objects_1084_relationship_type_mitigates" "objects_1084_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1084_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1084_x_mitre_attack_spec_version_2.1.0" "objects_1084_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1084_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1084_spec_version_2.1" "objects_1084_x_mitre_domains_0_mobile-attack" "objects_1085_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1085_type_relationship" "objects_1085_id_relationship--828417ec-c444-41c8-95b4-c339c5ecf62b" "objects_1085_created_2022-03-30T20:48:00.360Z" "objects_1085_x_mitre_version_0.1" "objects_1085_x_mitre_deprecated_False" "objects_1085_revoked_False" "objects_1085_description_iOS users should be instructed to not download applications from unofficial sources, as applications distributed via the Apple App Store cannot list installed applications on a device." "objects_1085_modified_2022-03-30T20:48:00.360Z" "objects_1085_relationship_type_mitigates" "objects_1085_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1085_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1085_x_mitre_attack_spec_version_2.1.0" "objects_1085_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1085_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1085_spec_version_2.1" "objects_1085_x_mitre_domains_0_mobile-attack" "objects_1086_type_relationship" "objects_1086_id_relationship--82a51cc3-7a91-43b0-9147-df5983e52b41" "objects_1086_created_2020-12-14T15:02:35.208Z" "objects_1086_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1086_revoked_False" "objects_1086_external_references_0_source_name_Securelist Asacub" "objects_1086_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1086_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1086_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1086_modified_2023-04-05T20:08:11.798Z" "objects_1086_description_[Asacub](https://attack.mitre.org/software/S0540) has communicated with the C2 using HTTP POST requests.(Citation: Securelist Asacub)" "objects_1086_relationship_type_uses" "objects_1086_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1086_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1086_x_mitre_deprecated_False" "objects_1086_x_mitre_version_1.0" "objects_1086_x_mitre_attack_spec_version_3.1.0" "objects_1086_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1086_spec_version_2.1" "objects_1086_x_mitre_domains_0_mobile-attack" "objects_1087_type_relationship" "objects_1087_id_relationship--82b58c75-239e-4dac-b848-bc1f3354adc4" "objects_1087_created_2023-03-20T18:41:18.288Z" "objects_1087_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1087_revoked_False" "objects_1087_external_references_0_source_name_Samsung Knox Mobile Threat Defense" "objects_1087_external_references_0_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_1087_external_references_0_url_https://partner.samsungknox.com/mtd" "objects_1087_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1087_modified_2023-08-07T22:14:04.455Z" "objects_1087_description_Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)" "objects_1087_relationship_type_detects" "objects_1087_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1087_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_1087_x_mitre_deprecated_False" "objects_1087_x_mitre_version_0.1" "objects_1087_x_mitre_attack_spec_version_3.1.0" "objects_1087_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1087_spec_version_2.1" "objects_1087_x_mitre_domains_0_mobile-attack" "objects_1088_type_relationship" "objects_1088_id_relationship--82e93a9e-6968-497f-8043-a08d0f35bd32" "objects_1088_created_2023-10-10T15:33:57.378Z" "objects_1088_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1088_revoked_False" "objects_1088_external_references_0_source_name_Trend Micro Anubis" "objects_1088_external_references_0_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_1088_external_references_0_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_1088_external_references_1_source_name_Cofense Anubis" "objects_1088_external_references_1_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1088_external_references_1_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1088_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1088_modified_2023-10-10T15:33:57.378Z" "objects_1088_description_[Anubis](https://attack.mitre.org/software/S0422) has requested accessibility service privileges while masquerading as \"Google Play Protect\" and has disguised additional malicious application installs as legitimate system updates.(Citation: Cofense Anubis)(Citation: Trend Micro Anubis)" "objects_1088_relationship_type_uses" "objects_1088_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1088_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1088_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1088_x_mitre_deprecated_False" "objects_1088_x_mitre_version_1.0" "objects_1088_x_mitre_attack_spec_version_2.1.0" "objects_1088_spec_version_2.1" "objects_1088_x_mitre_domains_0_mobile-attack" "objects_1089_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1089_type_relationship" "objects_1089_id_relationship--82f12052-783e-40e4-8079-d9c030c310fd" "objects_1089_created_2022-03-30T20:08:40.223Z" "objects_1089_x_mitre_version_0.1" "objects_1089_x_mitre_deprecated_False" "objects_1089_revoked_False" "objects_1089_description_Android and iOS include system partition integrity mechanisms that could detect unauthorized modifications. " "objects_1089_modified_2022-03-30T20:08:40.223Z" "objects_1089_relationship_type_mitigates" "objects_1089_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_1089_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_1089_x_mitre_attack_spec_version_2.1.0" "objects_1089_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1089_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1089_spec_version_2.1" "objects_1089_x_mitre_domains_0_mobile-attack" "objects_1090_type_relationship" "objects_1090_id_relationship--82f51cc6-6ce4-459e-b598-7b2b77983469" "objects_1090_created_2020-04-24T15:06:33.526Z" "objects_1090_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1090_revoked_False" "objects_1090_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1090_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1090_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1090_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1090_modified_2023-04-05T20:28:18.530Z" "objects_1090_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect SMS messages.(Citation: TrendMicro Coronavirus Updates)" "objects_1090_relationship_type_uses" "objects_1090_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1090_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1090_x_mitre_deprecated_False" "objects_1090_x_mitre_version_1.0" "objects_1090_x_mitre_attack_spec_version_3.1.0" "objects_1090_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1090_spec_version_2.1" "objects_1090_x_mitre_domains_0_mobile-attack" "objects_1091_type_relationship" "objects_1091_id_relationship--83358774-0857-429c-9f7a-151403e52881" "objects_1091_created_2023-10-10T15:33:59.912Z" "objects_1091_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1091_revoked_False" "objects_1091_external_references_0_source_name_Threat Fabric Exobot" "objects_1091_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1091_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1091_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1091_modified_2023-10-10T15:33:59.912Z" "objects_1091_description_[Exobot](https://attack.mitre.org/software/S0522) has used names like WhatsApp and Netflix.(Citation: Threat Fabric Exobot)" "objects_1091_relationship_type_uses" "objects_1091_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1091_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1091_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1091_x_mitre_deprecated_False" "objects_1091_x_mitre_version_1.0" "objects_1091_x_mitre_attack_spec_version_2.1.0" "objects_1091_spec_version_2.1" "objects_1091_x_mitre_domains_0_mobile-attack" "objects_1092_type_relationship" "objects_1092_id_relationship--833b4c44-7370-4b27-b9b2-a058c27dcf8c" "objects_1092_created_2017-12-14T16:46:06.044Z" "objects_1092_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1092_revoked_False" "objects_1092_external_references_0_source_name_PaloAlto-Xbot" "objects_1092_external_references_0_description_Cong Zheng, Claud Xiao and Zhi Xu. (2016, February 18). New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom. Retrieved December 21, 2016." "objects_1092_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/" "objects_1092_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1092_modified_2023-04-05T20:28:32.568Z" "objects_1092_description_[Xbot](https://attack.mitre.org/software/S0298) steals all SMS message and contact information as well as intercepts and parses certain SMS messages.(Citation: PaloAlto-Xbot)" "objects_1092_relationship_type_uses" "objects_1092_source_ref_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_1092_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1092_x_mitre_deprecated_False" "objects_1092_x_mitre_version_1.0" "objects_1092_x_mitre_attack_spec_version_3.1.0" "objects_1092_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1092_spec_version_2.1" "objects_1092_x_mitre_domains_0_mobile-attack" "objects_1093_type_relationship" "objects_1093_id_relationship--834c9a7e-6520-486d-ba60-c3a8b2f9eb1a" "objects_1093_created_2018-10-17T00:14:20.652Z" "objects_1093_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1093_revoked_False" "objects_1093_external_references_0_source_name_TrendMicro-XLoader" "objects_1093_external_references_0_description_Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018." "objects_1093_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing/" "objects_1093_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1093_modified_2023-04-05T20:28:46.820Z" "objects_1093_description_[XLoader for Android](https://attack.mitre.org/software/S0318) collects SMS messages.(Citation: TrendMicro-XLoader)" "objects_1093_relationship_type_uses" "objects_1093_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1093_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1093_x_mitre_deprecated_False" "objects_1093_x_mitre_version_1.0" "objects_1093_x_mitre_attack_spec_version_3.1.0" "objects_1093_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1093_spec_version_2.1" "objects_1093_x_mitre_domains_0_mobile-attack" "objects_1094_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1094_id_relationship--83991b5c-59b9-4fe5-9ef2-39c6ddc8b835" "objects_1094_type_relationship" "objects_1094_created_2017-12-14T16:46:06.044Z" "objects_1094_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1094_external_references_0_source_name_Kaspersky-WUC" "objects_1094_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_1094_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_1094_modified_2020-03-31T14:49:39.188Z" "objects_1094_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) gathered system information including phone number, OS version, phone model, and SDK version.(Citation: Kaspersky-WUC)" "objects_1094_relationship_type_uses" "objects_1094_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_1094_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1094_x_mitre_version_1.0" "objects_1094_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1094_spec_version_2.1" "objects_1094_x_mitre_attack_spec_version_2.1.0" "objects_1094_x_mitre_domains_0_mobile-attack" "objects_1095_type_relationship" "objects_1095_id_relationship--83d95d05-7545-4295-894b-f33a2ba1063b" "objects_1095_created_2020-12-17T20:15:22.492Z" "objects_1095_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1095_revoked_False" "objects_1095_external_references_0_source_name_Palo Alto HenBox" "objects_1095_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1095_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1095_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1095_modified_2023-04-05T17:47:45.408Z" "objects_1095_description_[HenBox](https://attack.mitre.org/software/S0544) has registered several broadcast receivers.(Citation: Palo Alto HenBox)" "objects_1095_relationship_type_uses" "objects_1095_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1095_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1095_x_mitre_deprecated_False" "objects_1095_x_mitre_version_1.0" "objects_1095_x_mitre_attack_spec_version_3.1.0" "objects_1095_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1095_spec_version_2.1" "objects_1095_x_mitre_domains_0_mobile-attack" "objects_1096_type_relationship" "objects_1096_id_relationship--848581bc-bf8f-40e2-871e-cd67042b4adf" "objects_1096_created_2023-01-18T19:14:40.120Z" "objects_1096_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1096_revoked_False" "objects_1096_external_references_0_source_name_cyble_drinik_1022" "objects_1096_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1096_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1096_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1096_modified_2023-03-27T17:59:26.448Z" "objects_1096_description_[Drinik](https://attack.mitre.org/software/S1054) can use overlays to steal user banking credentials entered into legitimate sites.(Citation: cyble_drinik_1022)" "objects_1096_relationship_type_uses" "objects_1096_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1096_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1096_x_mitre_deprecated_False" "objects_1096_x_mitre_version_0.1" "objects_1096_x_mitre_attack_spec_version_3.1.0" "objects_1096_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1096_spec_version_2.1" "objects_1096_x_mitre_domains_0_mobile-attack" "objects_1097_type_relationship" "objects_1097_id_relationship--8499ffce-1045-4a8a-9e09-ec53d535a021" "objects_1097_created_2023-10-10T15:33:58.887Z" "objects_1097_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1097_revoked_False" "objects_1097_external_references_0_source_name_Palo Alto HenBox" "objects_1097_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1097_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1097_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1097_modified_2023-10-10T15:33:58.887Z" "objects_1097_description_[HenBox](https://attack.mitre.org/software/S0544) has masqueraded as VPN and Android system apps.(Citation: Palo Alto HenBox)" "objects_1097_relationship_type_uses" "objects_1097_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1097_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1097_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1097_x_mitre_deprecated_False" "objects_1097_x_mitre_version_1.0" "objects_1097_x_mitre_attack_spec_version_2.1.0" "objects_1097_spec_version_2.1" "objects_1097_x_mitre_domains_0_mobile-attack" "objects_1098_type_relationship" "objects_1098_id_relationship--84dbe7c6-421b-4bfb-b022-6c585c2e50c4" "objects_1098_created_2023-10-10T15:33:59.401Z" "objects_1098_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1098_revoked_False" "objects_1098_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1098_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1098_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1098_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1098_modified_2023-10-10T15:33:59.401Z" "objects_1098_description_[Bouncing Golf](https://attack.mitre.org/groups/G0097) distributed malware as repackaged legitimate applications, with the malicious code in the `com.golf` package.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1098_relationship_type_uses" "objects_1098_source_ref_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_1098_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1098_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1098_x_mitre_deprecated_False" "objects_1098_x_mitre_version_1.0" "objects_1098_x_mitre_attack_spec_version_2.1.0" "objects_1098_spec_version_2.1" "objects_1098_x_mitre_domains_0_mobile-attack" "objects_1099_type_relationship" "objects_1099_id_relationship--8570b7ef-a84d-480e-b1ca-b15f15d12103" "objects_1099_created_2019-09-23T13:36:08.341Z" "objects_1099_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1099_revoked_False" "objects_1099_external_references_0_source_name_securelist rotexy 2018" "objects_1099_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1099_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1099_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1099_modified_2023-04-05T16:58:27.974Z" "objects_1099_description_[Rotexy](https://attack.mitre.org/software/S0411) can communicate with the command and control server using JSON payloads sent in HTTP POST request bodies. It can also communicate by using JSON messages sent through Google Cloud Messaging.(Citation: securelist rotexy 2018)" "objects_1099_relationship_type_uses" "objects_1099_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1099_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1099_x_mitre_deprecated_False" "objects_1099_x_mitre_version_1.0" "objects_1099_x_mitre_attack_spec_version_3.1.0" "objects_1099_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1099_spec_version_2.1" "objects_1099_x_mitre_domains_0_mobile-attack" "objects_1100_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1100_id_relationship--85c7e956-3ce5-4495-b52e-385ae2ee4f9b" "objects_1100_type_relationship" "objects_1100_created_2017-12-14T16:46:06.044Z" "objects_1100_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1100_external_references_0_source_name_CheckPoint-Charger" "objects_1100_external_references_0_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_1100_external_references_0_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_1100_modified_2020-03-31T14:49:39.188Z" "objects_1100_description_[Charger](https://attack.mitre.org/software/S0323) checks the local settings of the device and does not run its malicious logic if the device is located in Ukraine, Russia, or Belarus.(Citation: CheckPoint-Charger)" "objects_1100_relationship_type_uses" "objects_1100_source_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_1100_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1100_x_mitre_version_1.0" "objects_1100_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1100_spec_version_2.1" "objects_1100_x_mitre_attack_spec_version_2.1.0" "objects_1100_x_mitre_domains_0_mobile-attack" "objects_1101_type_relationship" "objects_1101_id_relationship--85e0d8c5-b9d6-4a10-963a-aeb54eba4f02" "objects_1101_created_2020-06-26T15:32:25.144Z" "objects_1101_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1101_revoked_False" "objects_1101_external_references_0_source_name_CheckPoint Cerberus" "objects_1101_external_references_0_description_A. Hazum, B. Melnykov, C. Efrati, D. Golubenko, I. Wernik, L. Kuperman, O. Mana. (2020, April 29). First seen in the wild \u2013 Malware uses Corporate MDM as attack vector. Retrieved June 26, 2020." "objects_1101_external_references_0_url_https://research.checkpoint.com/2020/mobile-as-attack-vector-using-mdm/" "objects_1101_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1101_modified_2023-04-05T20:10:26.480Z" "objects_1101_description_[Cerberus](https://attack.mitre.org/software/S0480) communicates with the C2 server using HTTP.(Citation: CheckPoint Cerberus)" "objects_1101_relationship_type_uses" "objects_1101_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1101_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1101_x_mitre_deprecated_False" "objects_1101_x_mitre_version_1.0" "objects_1101_x_mitre_attack_spec_version_3.1.0" "objects_1101_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1101_spec_version_2.1" "objects_1101_x_mitre_domains_0_mobile-attack" "objects_1102_type_relationship" "objects_1102_id_relationship--8611661c-04b4-4a82-9669-2d0e26b7b3f3" "objects_1102_created_2020-07-15T20:20:59.287Z" "objects_1102_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1102_revoked_False" "objects_1102_external_references_0_source_name_Bitdefender Mandrake" "objects_1102_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1102_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1102_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1102_modified_2023-04-05T20:53:17.865Z" "objects_1102_description_[Mandrake](https://attack.mitre.org/software/S0485) can disable Play Protect.(Citation: Bitdefender Mandrake)" "objects_1102_relationship_type_uses" "objects_1102_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1102_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1102_x_mitre_deprecated_False" "objects_1102_x_mitre_version_1.0" "objects_1102_x_mitre_attack_spec_version_3.1.0" "objects_1102_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1102_spec_version_2.1" "objects_1102_x_mitre_domains_0_mobile-attack" "objects_1103_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1103_type_relationship" "objects_1103_id_relationship--86170d29-0e41-44d0-94b0-de7d23718302" "objects_1103_created_2022-04-05T19:42:39.957Z" "objects_1103_x_mitre_version_0.1" "objects_1103_external_references_0_source_name_Android 12 Features" "objects_1103_external_references_0_url_https://developer.android.com/about/versions/12/features" "objects_1103_external_references_0_description_Google. (2022, April 4). Features and APIs Overview. Retrieved April 5, 2022." "objects_1103_x_mitre_deprecated_False" "objects_1103_revoked_False" "objects_1103_description_The `HIDE_OVERLAY_WINDOWS` permission was introduced in Android 12 allowing apps to hide overlay windows of type `TYPE_APPLICATION_OVERLAY` drawn by other apps with the `SYSTEM_ALERT_WINDOW` permission, preventing other applications from creating overlay windows on top of the current application.(Citation: Android 12 Features)" "objects_1103_modified_2022-04-05T19:51:47.956Z" "objects_1103_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1103_relationship_type_mitigates" "objects_1103_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1103_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_1103_x_mitre_attack_spec_version_2.1.0" "objects_1103_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1103_spec_version_2.1" "objects_1103_x_mitre_domains_0_mobile-attack" "objects_1104_type_relationship" "objects_1104_id_relationship--8634a732-1c5e-4931-a24f-cdcc2f81c788" "objects_1104_created_2020-05-07T15:33:32.903Z" "objects_1104_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1104_revoked_False" "objects_1104_external_references_0_source_name_CheckPoint Agent Smith" "objects_1104_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1104_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1104_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1104_modified_2023-04-05T17:20:05.166Z" "objects_1104_description_[Agent Smith](https://attack.mitre.org/software/S0440) deletes infected applications\u2019 update packages when they are detected on the system, preventing updates.(Citation: CheckPoint Agent Smith)" "objects_1104_relationship_type_uses" "objects_1104_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1104_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1104_x_mitre_deprecated_False" "objects_1104_x_mitre_version_1.0" "objects_1104_x_mitre_attack_spec_version_3.1.0" "objects_1104_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1104_spec_version_2.1" "objects_1104_x_mitre_domains_0_mobile-attack" "objects_1105_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1105_type_relationship" "objects_1105_id_relationship--8650e2e8-d8bd-472d-8b9b-54befbea05b8" "objects_1105_created_2022-04-05T19:49:59.027Z" "objects_1105_x_mitre_version_0.1" "objects_1105_x_mitre_deprecated_False" "objects_1105_revoked_False" "objects_1105_description_" "objects_1105_modified_2022-04-05T19:49:59.027Z" "objects_1105_relationship_type_subtechnique-of" "objects_1105_source_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_1105_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1105_x_mitre_attack_spec_version_2.1.0" "objects_1105_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1105_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1105_spec_version_2.1" "objects_1105_x_mitre_domains_0_mobile-attack" "objects_1106_type_relationship" "objects_1106_id_relationship--867b4929-20f2-47cd-9ab3-43a5a6ea98b5" "objects_1106_created_2023-06-09T19:19:38.523Z" "objects_1106_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1106_revoked_False" "objects_1106_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1106_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1106_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1106_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1106_modified_2023-08-04T19:11:52.875Z" "objects_1106_description_[Hornbill](https://attack.mitre.org/software/S1077) has a list of file extensions that it may use to log certain operations (creation, open, close, modification, movement, deletion) on files of those types.(Citation: lookout_hornbill_sunbird_0221)" "objects_1106_relationship_type_uses" "objects_1106_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1106_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1106_x_mitre_deprecated_False" "objects_1106_x_mitre_version_0.1" "objects_1106_x_mitre_attack_spec_version_3.1.0" "objects_1106_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1106_spec_version_2.1" "objects_1106_x_mitre_domains_0_mobile-attack" "objects_1107_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1107_type_relationship" "objects_1107_id_relationship--86afe8cc-6d6d-4952-8fee-619e95d53a7f" "objects_1107_created_2022-04-06T13:39:39.883Z" "objects_1107_x_mitre_version_0.1" "objects_1107_x_mitre_deprecated_False" "objects_1107_revoked_False" "objects_1107_description_" "objects_1107_modified_2022-04-06T13:39:39.883Z" "objects_1107_relationship_type_subtechnique-of" "objects_1107_source_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_1107_target_ref_attack-pattern--c548d8c4-a0a3-4a24-bb79-2a84abbc7b36" "objects_1107_x_mitre_attack_spec_version_2.1.0" "objects_1107_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1107_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1107_spec_version_2.1" "objects_1107_x_mitre_domains_0_mobile-attack" "objects_1108_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1108_id_relationship--86e3c37c-1e4a-450c-850b-c80be8156fe3" "objects_1108_type_relationship" "objects_1108_created_2020-05-04T14:04:56.189Z" "objects_1108_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1108_external_references_0_source_name_Google Bread" "objects_1108_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_1108_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_1108_modified_2020-05-04T15:40:21.081Z" "objects_1108_description_[Bread](https://attack.mitre.org/software/S0432) collects the device\u2019s IMEI, carrier, mobile country code, and mobile network code.(Citation: Google Bread)" "objects_1108_relationship_type_uses" "objects_1108_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1108_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1108_x_mitre_version_1.0" "objects_1108_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1108_spec_version_2.1" "objects_1108_x_mitre_attack_spec_version_2.1.0" "objects_1108_x_mitre_domains_0_mobile-attack" "objects_1109_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1109_type_relationship" "objects_1109_id_relationship--8726b157-3575-450f-bb7f-f17bb18e6aef" "objects_1109_created_2022-03-30T20:41:43.314Z" "objects_1109_x_mitre_version_0.1" "objects_1109_x_mitre_deprecated_False" "objects_1109_revoked_False" "objects_1109_description_New OS releases frequently contain additional limitations or controls around device location access." "objects_1109_modified_2022-03-30T20:41:43.314Z" "objects_1109_relationship_type_mitigates" "objects_1109_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1109_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1109_x_mitre_attack_spec_version_2.1.0" "objects_1109_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1109_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1109_spec_version_2.1" "objects_1109_x_mitre_domains_0_mobile-attack" "objects_1110_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1110_id_relationship--873b98de-d7cf-471b-9aa2-229eb03c9165" "objects_1110_type_relationship" "objects_1110_created_2020-09-15T15:18:12.459Z" "objects_1110_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1110_external_references_0_source_name_Cybereason FakeSpy" "objects_1110_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1110_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1110_modified_2020-09-15T15:18:12.459Z" "objects_1110_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect device information, including OS version and device model.(Citation: Cybereason FakeSpy)" "objects_1110_relationship_type_uses" "objects_1110_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1110_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1110_x_mitre_version_1.0" "objects_1110_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1110_spec_version_2.1" "objects_1110_x_mitre_attack_spec_version_2.1.0" "objects_1110_x_mitre_domains_0_mobile-attack" "objects_1111_type_relationship" "objects_1111_id_relationship--875dc21d-92c3-45bf-be37-faa44f4449bf" "objects_1111_created_2020-06-02T14:32:31.891Z" "objects_1111_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1111_revoked_False" "objects_1111_external_references_0_source_name_Google Project Zero Insomnia" "objects_1111_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_1111_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_1111_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1111_modified_2023-04-05T19:51:44.262Z" "objects_1111_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can collect the device\u2019s contact list.(Citation: Google Project Zero Insomnia)" "objects_1111_relationship_type_uses" "objects_1111_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1111_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1111_x_mitre_deprecated_False" "objects_1111_x_mitre_version_1.0" "objects_1111_x_mitre_attack_spec_version_3.1.0" "objects_1111_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1111_spec_version_2.1" "objects_1111_x_mitre_domains_0_mobile-attack" "objects_1112_type_relationship" "objects_1112_id_relationship--876fc8ee-aeae-4d4b-b4ce-541b432e5298" "objects_1112_created_2020-12-14T15:02:35.297Z" "objects_1112_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1112_revoked_False" "objects_1112_external_references_0_source_name_Securelist Asacub" "objects_1112_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1112_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1112_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1112_modified_2023-04-05T18:06:30.456Z" "objects_1112_description_[Asacub](https://attack.mitre.org/software/S0540) can collect the device\u2019s contact list.(Citation: Securelist Asacub)" "objects_1112_relationship_type_uses" "objects_1112_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1112_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1112_x_mitre_deprecated_False" "objects_1112_x_mitre_version_1.0" "objects_1112_x_mitre_attack_spec_version_3.1.0" "objects_1112_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1112_spec_version_2.1" "objects_1112_x_mitre_domains_0_mobile-attack" "objects_1113_type_relationship" "objects_1113_id_relationship--886849fc-f83c-4d69-b700-bfad0def765d" "objects_1113_created_2023-03-16T18:32:30.054Z" "objects_1113_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1113_revoked_False" "objects_1113_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1113_modified_2023-08-10T22:12:27.186Z" "objects_1113_description_On Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary." "objects_1113_relationship_type_detects" "objects_1113_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1113_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1113_x_mitre_deprecated_False" "objects_1113_x_mitre_version_0.1" "objects_1113_x_mitre_attack_spec_version_3.1.0" "objects_1113_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1113_spec_version_2.1" "objects_1113_x_mitre_domains_0_mobile-attack" "objects_1114_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1114_id_relationship--8870c211-820a-46a1-96fc-02f4e6eaec03" "objects_1114_type_relationship" "objects_1114_created_2020-11-10T16:50:39.134Z" "objects_1114_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1114_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1114_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1114_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1114_modified_2021-04-19T15:40:36.387Z" "objects_1114_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has collected device network information, including 16-bit GSM Cell Identity, 16-bit Location Area Code, Mobile Country Code (MCC), and Mobile Network Code (MNC). [CarbonSteal](https://attack.mitre.org/software/S0529) has also called `netcfg` to get stats.(Citation: Lookout Uyghur Campaign)" "objects_1114_relationship_type_uses" "objects_1114_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1114_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1114_x_mitre_version_1.0" "objects_1114_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1114_spec_version_2.1" "objects_1114_x_mitre_attack_spec_version_2.1.0" "objects_1114_x_mitre_domains_0_mobile-attack" "objects_1115_type_relationship" "objects_1115_id_relationship--88de8869-2b01-4702-8518-e4e78fde44d9" "objects_1115_created_2023-07-12T20:45:18.766Z" "objects_1115_revoked_False" "objects_1115_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1115_modified_2023-07-12T20:45:18.766Z" "objects_1115_description_" "objects_1115_relationship_type_subtechnique-of" "objects_1115_source_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1115_target_ref_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_1115_x_mitre_deprecated_False" "objects_1115_x_mitre_version_0.1" "objects_1115_x_mitre_attack_spec_version_3.1.0" "objects_1115_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1115_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1115_spec_version_2.1" "objects_1115_x_mitre_domains_0_mobile-attack" "objects_1116_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1116_type_relationship" "objects_1116_id_relationship--88ded3fb-759e-4e96-946b-e7148c54856e" "objects_1116_created_2022-04-08T16:29:30.371Z" "objects_1116_x_mitre_version_0.1" "objects_1116_x_mitre_deprecated_False" "objects_1116_revoked_False" "objects_1116_description_" "objects_1116_modified_2022-04-08T16:29:30.371Z" "objects_1116_relationship_type_subtechnique-of" "objects_1116_source_ref_attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9" "objects_1116_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1116_x_mitre_attack_spec_version_2.1.0" "objects_1116_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1116_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1116_spec_version_2.1" "objects_1116_x_mitre_domains_0_mobile-attack" "objects_1117_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1117_type_relationship" "objects_1117_id_relationship--88e33687-e999-42c8-b46b-49d2adfa17d0" "objects_1117_created_2022-04-01T15:02:04.528Z" "objects_1117_x_mitre_version_0.1" "objects_1117_x_mitre_deprecated_False" "objects_1117_revoked_False" "objects_1117_description_Apple regularly provides security updates for known OS vulnerabilities. " "objects_1117_modified_2022-04-01T15:02:04.528Z" "objects_1117_relationship_type_mitigates" "objects_1117_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1117_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1117_x_mitre_attack_spec_version_2.1.0" "objects_1117_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1117_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1117_spec_version_2.1" "objects_1117_x_mitre_domains_0_mobile-attack" "objects_1118_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1118_id_relationship--88ea5004-8bdb-4af4-a2dc-a8c56236ff03" "objects_1118_type_relationship" "objects_1118_created_2020-12-17T20:15:22.449Z" "objects_1118_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1118_external_references_0_source_name_Palo Alto HenBox" "objects_1118_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1118_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1118_modified_2020-12-17T20:15:22.449Z" "objects_1118_description_[HenBox](https://attack.mitre.org/software/S0544) can access the device\u2019s microphone.(Citation: Palo Alto HenBox)" "objects_1118_relationship_type_uses" "objects_1118_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1118_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1118_x_mitre_version_1.0" "objects_1118_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1118_spec_version_2.1" "objects_1118_x_mitre_attack_spec_version_2.1.0" "objects_1118_x_mitre_domains_0_mobile-attack" "objects_1119_type_relationship" "objects_1119_id_relationship--891edea2-817c-4eeb-9991-b6e095c269a8" "objects_1119_created_2020-06-02T14:32:31.903Z" "objects_1119_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1119_revoked_False" "objects_1119_external_references_0_source_name_Google Project Zero Insomnia" "objects_1119_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_1119_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_1119_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1119_modified_2023-04-05T17:40:06.957Z" "objects_1119_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can retrieve the call history.(Citation: Google Project Zero Insomnia)" "objects_1119_relationship_type_uses" "objects_1119_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1119_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1119_x_mitre_deprecated_False" "objects_1119_x_mitre_version_1.0" "objects_1119_x_mitre_attack_spec_version_3.1.0" "objects_1119_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1119_spec_version_2.1" "objects_1119_x_mitre_domains_0_mobile-attack" "objects_1120_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1120_id_relationship--8936c564-b11a-4c9e-a32a-76e7d7e0c8b0" "objects_1120_type_relationship" "objects_1120_created_2020-04-24T15:12:11.185Z" "objects_1120_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1120_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1120_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1120_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1120_modified_2020-04-24T15:12:11.185Z" "objects_1120_description_[Concipit1248](https://attack.mitre.org/software/S0426) requests permissions to use the device camera.(Citation: TrendMicro Coronavirus Updates)" "objects_1120_relationship_type_uses" "objects_1120_source_ref_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_1120_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1120_x_mitre_version_1.0" "objects_1120_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1120_spec_version_2.1" "objects_1120_x_mitre_attack_spec_version_2.1.0" "objects_1120_x_mitre_domains_0_mobile-attack" "objects_1121_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1121_id_relationship--89565753-23c4-422d-a9ba-39f4101cd819" "objects_1121_type_relationship" "objects_1121_created_2020-11-20T16:37:28.485Z" "objects_1121_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1121_external_references_0_source_name_Symantec GoldenCup" "objects_1121_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1121_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1121_modified_2020-11-20T16:37:28.485Z" "objects_1121_description_[Golden Cup](https://attack.mitre.org/software/S0535) can track the device\u2019s location.(Citation: Symantec GoldenCup)" "objects_1121_relationship_type_uses" "objects_1121_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1121_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1121_x_mitre_version_1.0" "objects_1121_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1121_spec_version_2.1" "objects_1121_x_mitre_attack_spec_version_2.1.0" "objects_1121_x_mitre_domains_0_mobile-attack" "objects_1122_type_relationship" "objects_1122_id_relationship--89d0de37-87ba-4aa8-832a-a2305e658a7d" "objects_1122_created_2023-03-20T15:55:09.279Z" "objects_1122_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1122_revoked_False" "objects_1122_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1122_modified_2023-08-14T16:44:32.659Z" "objects_1122_description_Application vetting services may be able to detect if an application attempts to encrypt files, although this may be benign behavior." "objects_1122_relationship_type_detects" "objects_1122_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1122_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_1122_x_mitre_deprecated_False" "objects_1122_x_mitre_version_0.1" "objects_1122_x_mitre_attack_spec_version_3.1.0" "objects_1122_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1122_spec_version_2.1" "objects_1122_x_mitre_domains_0_mobile-attack" "objects_1123_type_relationship" "objects_1123_id_relationship--8a255d63-a770-4b9d-911c-bd906733ceef" "objects_1123_created_2023-01-18T19:24:36.689Z" "objects_1123_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1123_revoked_False" "objects_1123_external_references_0_source_name_cyble_drinik_1022" "objects_1123_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1123_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1123_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1123_modified_2023-03-27T18:05:42.846Z" "objects_1123_description_[Drinik](https://attack.mitre.org/software/S1054) has C2 commands that can move the malware in and out of the foreground. (Citation: cyble_drinik_1022)" "objects_1123_relationship_type_uses" "objects_1123_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1123_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_1123_x_mitre_deprecated_False" "objects_1123_x_mitre_version_0.1" "objects_1123_x_mitre_attack_spec_version_3.1.0" "objects_1123_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1123_spec_version_2.1" "objects_1123_x_mitre_domains_0_mobile-attack" "objects_1124_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1124_type_relationship" "objects_1124_id_relationship--8a55c28d-9cdd-4b6f-91e7-bcb3b05f6724" "objects_1124_created_2022-04-01T15:02:21.344Z" "objects_1124_x_mitre_version_0.1" "objects_1124_x_mitre_deprecated_False" "objects_1124_revoked_False" "objects_1124_description_Device attestation can often detect jailbroken devices. " "objects_1124_modified_2022-04-01T15:02:21.344Z" "objects_1124_relationship_type_mitigates" "objects_1124_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1124_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1124_x_mitre_attack_spec_version_2.1.0" "objects_1124_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1124_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1124_spec_version_2.1" "objects_1124_x_mitre_domains_0_mobile-attack" "objects_1125_type_relationship" "objects_1125_id_relationship--8a89f675-4e43-4fe1-8bbd-8e49e07d11be" "objects_1125_created_2023-07-21T19:35:34.846Z" "objects_1125_revoked_False" "objects_1125_external_references_0_source_name_lookout_bouldspy_0423" "objects_1125_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1125_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1125_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1125_modified_2023-07-21T19:35:34.846Z" "objects_1125_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can access browser history and bookmarks, and can list all files and folders on the device.(Citation: lookout_bouldspy_0423)" "objects_1125_relationship_type_uses" "objects_1125_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1125_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1125_x_mitre_deprecated_False" "objects_1125_x_mitre_version_0.1" "objects_1125_x_mitre_attack_spec_version_3.1.0" "objects_1125_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1125_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1125_spec_version_2.1" "objects_1125_x_mitre_domains_0_mobile-attack" "objects_1126_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1126_id_relationship--8a961514-3372-4c3e-b7ee-e3d053c3d5f3" "objects_1126_type_relationship" "objects_1126_created_2020-09-11T14:54:16.615Z" "objects_1126_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1126_external_references_0_source_name_Lookout Desert Scorpion" "objects_1126_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1126_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1126_modified_2020-09-11T14:54:16.615Z" "objects_1126_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can record videos.(Citation: Lookout Desert Scorpion)" "objects_1126_relationship_type_uses" "objects_1126_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1126_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1126_x_mitre_version_1.0" "objects_1126_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1126_spec_version_2.1" "objects_1126_x_mitre_attack_spec_version_2.1.0" "objects_1126_x_mitre_domains_0_mobile-attack" "objects_1127_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1127_id_relationship--8b27a786-b4d9-4014-a249-3725442f9f1d" "objects_1127_type_relationship" "objects_1127_created_2021-01-05T20:16:20.499Z" "objects_1127_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1127_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1127_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1127_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1127_modified_2021-01-05T20:16:20.499Z" "objects_1127_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can obtain a list of installed applications.(Citation: Zscaler TikTok Spyware)" "objects_1127_relationship_type_uses" "objects_1127_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1127_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1127_x_mitre_version_1.0" "objects_1127_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1127_spec_version_2.1" "objects_1127_x_mitre_attack_spec_version_2.1.0" "objects_1127_x_mitre_domains_0_mobile-attack" "objects_1128_type_relationship" "objects_1128_id_relationship--8b2c2716-a62b-4c3a-a211-d72bb5ed29b9" "objects_1128_created_2020-09-11T14:54:16.649Z" "objects_1128_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1128_revoked_False" "objects_1128_external_references_0_source_name_Lookout Desert Scorpion" "objects_1128_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1128_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1128_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1128_modified_2023-04-05T19:52:05.260Z" "objects_1128_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can collect the device\u2019s contact list.(Citation: Lookout Desert Scorpion)" "objects_1128_relationship_type_uses" "objects_1128_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1128_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1128_x_mitre_deprecated_False" "objects_1128_x_mitre_version_1.0" "objects_1128_x_mitre_attack_spec_version_3.1.0" "objects_1128_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1128_spec_version_2.1" "objects_1128_x_mitre_domains_0_mobile-attack" "objects_1129_type_relationship" "objects_1129_id_relationship--8b3e74ad-7cc4-4ed2-84d2-c745e6997711" "objects_1129_created_2023-02-06T20:12:17.434Z" "objects_1129_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1129_revoked_False" "objects_1129_external_references_0_source_name_cyble_drinik_1022" "objects_1129_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1129_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1129_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1129_modified_2023-03-27T18:04:59.445Z" "objects_1129_description_[Drinik](https://attack.mitre.org/software/S1054) can request the `READ_CALL_LOG` permission.(Citation: cyble_drinik_1022)" "objects_1129_relationship_type_uses" "objects_1129_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1129_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1129_x_mitre_deprecated_False" "objects_1129_x_mitre_version_0.1" "objects_1129_x_mitre_attack_spec_version_3.1.0" "objects_1129_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1129_spec_version_2.1" "objects_1129_x_mitre_domains_0_mobile-attack" "objects_1130_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1130_id_relationship--8b66543e-2ea1-4ff7-84d9-f8f431f53781" "objects_1130_type_relationship" "objects_1130_created_2020-04-24T15:06:33.503Z" "objects_1130_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1130_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1130_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1130_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1130_modified_2020-04-24T15:06:33.503Z" "objects_1130_description_[Corona Updates](https://attack.mitre.org/software/S0425) can record MP4 files and monitor calls.(Citation: TrendMicro Coronavirus Updates)" "objects_1130_relationship_type_uses" "objects_1130_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1130_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1130_x_mitre_version_1.0" "objects_1130_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1130_spec_version_2.1" "objects_1130_x_mitre_attack_spec_version_2.1.0" "objects_1130_x_mitre_domains_0_mobile-attack" "objects_1131_type_relationship" "objects_1131_id_relationship--8b8a9c44-c8a4-4f30-a3d8-a23310f6c090" "objects_1131_created_2023-03-20T18:58:30.773Z" "objects_1131_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1131_revoked_False" "objects_1131_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1131_modified_2023-08-08T16:43:56.718Z" "objects_1131_description_On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background." "objects_1131_relationship_type_detects" "objects_1131_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1131_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1131_x_mitre_deprecated_False" "objects_1131_x_mitre_version_0.1" "objects_1131_x_mitre_attack_spec_version_3.1.0" "objects_1131_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1131_spec_version_2.1" "objects_1131_x_mitre_domains_0_mobile-attack" "objects_1132_type_relationship" "objects_1132_id_relationship--8bc0abc2-a413-4c05-b2b8-2a92d9cc5556" "objects_1132_created_2019-09-04T15:38:56.678Z" "objects_1132_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1132_revoked_False" "objects_1132_external_references_0_source_name_FlexiSpy-Features" "objects_1132_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_1132_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_1132_external_references_1_source_name_FortiGuard-FlexiSpy" "objects_1132_external_references_1_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1132_external_references_1_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1132_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1132_modified_2023-04-05T20:44:31.870Z" "objects_1132_description_[FlexiSpy](https://attack.mitre.org/software/S0408) is capable of hiding SuperSU's icon if it is installed and visible.(Citation: FortiGuard-FlexiSpy) [FlexiSpy](https://attack.mitre.org/software/S0408) can also hide its own icon to make detection and the uninstallation process more difficult.(Citation: FlexiSpy-Features)" "objects_1132_relationship_type_uses" "objects_1132_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1132_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1132_x_mitre_deprecated_False" "objects_1132_x_mitre_version_1.0" "objects_1132_x_mitre_attack_spec_version_3.1.0" "objects_1132_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1132_spec_version_2.1" "objects_1132_x_mitre_domains_0_mobile-attack" "objects_1133_type_relationship" "objects_1133_id_relationship--8bc21e5d-b6bb-4c93-9419-19a12061de52" "objects_1133_created_2023-01-19T18:07:52.146Z" "objects_1133_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1133_revoked_False" "objects_1133_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_1133_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_1133_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_1133_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1133_modified_2023-03-29T21:19:25.438Z" "objects_1133_description_[TianySpy](https://attack.mitre.org/software/S1056) can exfiltrate collected user data, including credentials and authorized cookies, via email.(Citation: trendmicro_tianyspy_0122) " "objects_1133_relationship_type_uses" "objects_1133_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_1133_target_ref_attack-pattern--3e091a89-a493-4a6c-8e88-d57be19bb98d" "objects_1133_x_mitre_deprecated_False" "objects_1133_x_mitre_version_0.1" "objects_1133_x_mitre_attack_spec_version_3.1.0" "objects_1133_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1133_spec_version_2.1" "objects_1133_x_mitre_domains_0_mobile-attack" "objects_1134_type_relationship" "objects_1134_id_relationship--8bcc9da8-c390-4151-b72d-30604820673e" "objects_1134_created_2023-08-04T19:05:04.644Z" "objects_1134_revoked_False" "objects_1134_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1134_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1134_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1134_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1134_modified_2023-08-04T19:05:04.644Z" "objects_1134_description_[Hornbill](https://attack.mitre.org/software/S1077) can search for installed applications such as WhatsApp.(Citation: lookout_hornbill_sunbird_0221) " "objects_1134_relationship_type_uses" "objects_1134_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1134_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1134_x_mitre_deprecated_False" "objects_1134_x_mitre_version_0.1" "objects_1134_x_mitre_attack_spec_version_3.1.0" "objects_1134_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1134_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1134_spec_version_2.1" "objects_1134_x_mitre_domains_0_mobile-attack" "objects_1135_type_relationship" "objects_1135_id_relationship--8c034c66-18ad-4b30-9f17-ed574c10918f" "objects_1135_created_2023-03-20T18:56:20.203Z" "objects_1135_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1135_revoked_False" "objects_1135_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1135_modified_2023-08-10T22:08:44.242Z" "objects_1135_description_The user can view permissions granted to an application in device settings. " "objects_1135_relationship_type_detects" "objects_1135_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1135_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_1135_x_mitre_deprecated_False" "objects_1135_x_mitre_version_0.1" "objects_1135_x_mitre_attack_spec_version_3.1.0" "objects_1135_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1135_spec_version_2.1" "objects_1135_x_mitre_domains_0_mobile-attack" "objects_1136_type_relationship" "objects_1136_id_relationship--8c3296f6-3520-4d1b-8b57-bdd48a5aac91" "objects_1136_created_2020-12-18T20:14:47.369Z" "objects_1136_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1136_revoked_False" "objects_1136_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1136_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1136_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1136_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1136_modified_2023-04-05T17:48:00.045Z" "objects_1136_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has registered several broadcast receivers.(Citation: WhiteOps TERRACOTTA)" "objects_1136_relationship_type_uses" "objects_1136_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1136_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1136_x_mitre_deprecated_False" "objects_1136_x_mitre_version_1.0" "objects_1136_x_mitre_attack_spec_version_3.1.0" "objects_1136_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1136_spec_version_2.1" "objects_1136_x_mitre_domains_0_mobile-attack" "objects_1137_type_relationship" "objects_1137_id_relationship--8c50e9e7-e13c-4814-98d0-088d73b10005" "objects_1137_created_2023-03-03T16:21:24.531Z" "objects_1137_revoked_False" "objects_1137_external_references_0_source_name_paloalto_yispecter_1015" "objects_1137_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1137_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1137_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1137_modified_2023-03-03T16:21:24.531Z" "objects_1137_description_[YiSpecter](https://attack.mitre.org/software/S0311) has modified Safari\u2019s default search engine, bookmarked websites, opened pages, and accessed contacts and authorization tokens of the IM program \u201cQQ\u201d on infected devices.(Citation: paloalto_yispecter_1015)" "objects_1137_relationship_type_uses" "objects_1137_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1137_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1137_x_mitre_deprecated_False" "objects_1137_x_mitre_version_0.1" "objects_1137_x_mitre_attack_spec_version_3.1.0" "objects_1137_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1137_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1137_spec_version_2.1" "objects_1137_x_mitre_domains_0_mobile-attack" "objects_1138_type_relationship" "objects_1138_id_relationship--8c656539-aa1e-42db-9016-d38f1daaae16" "objects_1138_created_2023-01-18T19:20:26.156Z" "objects_1138_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1138_revoked_False" "objects_1138_external_references_0_source_name_cyble_drinik_1022" "objects_1138_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1138_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1138_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1138_modified_2023-03-27T18:06:05.822Z" "objects_1138_description_[Drinik](https://attack.mitre.org/software/S1054) can collect user SMS messages.(Citation: cyble_drinik_1022)" "objects_1138_relationship_type_uses" "objects_1138_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1138_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1138_x_mitre_deprecated_False" "objects_1138_x_mitre_version_0.1" "objects_1138_x_mitre_attack_spec_version_3.1.0" "objects_1138_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1138_spec_version_2.1" "objects_1138_x_mitre_domains_0_mobile-attack" "objects_1139_type_relationship" "objects_1139_id_relationship--8c7598a6-6046-491d-99a7-52c31974a9a9" "objects_1139_created_2023-03-20T18:57:40.504Z" "objects_1139_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1139_revoked_False" "objects_1139_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1139_modified_2023-08-08T15:36:24.934Z" "objects_1139_description_Application vetting services could look for misuse of dynamic libraries." "objects_1139_relationship_type_detects" "objects_1139_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1139_target_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_1139_x_mitre_deprecated_False" "objects_1139_x_mitre_version_0.1" "objects_1139_x_mitre_attack_spec_version_3.1.0" "objects_1139_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1139_spec_version_2.1" "objects_1139_x_mitre_domains_0_mobile-attack" "objects_1140_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1140_id_relationship--8c8ce536-d9b5-4dfc-93f1-84c4f222b49e" "objects_1140_type_relationship" "objects_1140_created_2021-01-05T20:16:20.512Z" "objects_1140_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1140_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1140_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1140_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1140_modified_2021-01-05T20:16:20.512Z" "objects_1140_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can check the device\u2019s battery status.(Citation: Zscaler TikTok Spyware)" "objects_1140_relationship_type_uses" "objects_1140_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1140_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1140_x_mitre_version_1.0" "objects_1140_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1140_spec_version_2.1" "objects_1140_x_mitre_attack_spec_version_2.1.0" "objects_1140_x_mitre_domains_0_mobile-attack" "objects_1141_type_relationship" "objects_1141_id_relationship--8c9dbc53-27d2-420c-b698-98c23a7ead2b" "objects_1141_created_2020-09-11T14:54:16.638Z" "objects_1141_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1141_revoked_False" "objects_1141_external_references_0_source_name_Lookout Desert Scorpion" "objects_1141_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1141_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1141_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1141_modified_2023-04-05T20:36:55.810Z" "objects_1141_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can delete copies of itself if additional APKs are downloaded to external storage.(Citation: Lookout Desert Scorpion)" "objects_1141_relationship_type_uses" "objects_1141_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1141_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1141_x_mitre_deprecated_False" "objects_1141_x_mitre_version_1.0" "objects_1141_x_mitre_attack_spec_version_3.1.0" "objects_1141_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1141_spec_version_2.1" "objects_1141_x_mitre_domains_0_mobile-attack" "objects_1142_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1142_type_relationship" "objects_1142_id_relationship--8cb42e3d-69f4-4b0d-98c9-0bb7560947c1" "objects_1142_created_2017-12-14T16:46:06.044Z" "objects_1142_x_mitre_version_1.0" "objects_1142_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1142_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1142_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1142_x_mitre_deprecated_False" "objects_1142_revoked_False" "objects_1142_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can use SMS for command and control.(Citation: TrendMicro-RCSAndroid)" "objects_1142_modified_2022-04-19T14:25:41.669Z" "objects_1142_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1142_relationship_type_uses" "objects_1142_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1142_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1142_x_mitre_attack_spec_version_2.1.0" "objects_1142_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1142_spec_version_2.1" "objects_1142_x_mitre_domains_0_mobile-attack" "objects_1143_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1143_id_relationship--8d027310-93a0-4046-b7ad-d1f461f30838" "objects_1143_type_relationship" "objects_1143_created_2017-12-14T16:46:06.044Z" "objects_1143_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1143_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1143_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1143_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1143_modified_2020-03-31T14:49:39.188Z" "objects_1143_description_[RCSAndroid](https://attack.mitre.org/software/S0295) has the ability to dynamically download and execute new code at runtime.(Citation: TrendMicro-RCSAndroid)" "objects_1143_relationship_type_uses" "objects_1143_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1143_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1143_x_mitre_version_1.0" "objects_1143_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1143_spec_version_2.1" "objects_1143_x_mitre_attack_spec_version_2.1.0" "objects_1143_x_mitre_domains_0_mobile-attack" "objects_1144_type_relationship" "objects_1144_id_relationship--8d3ca04e-867f-4274-bc61-f18c0282a0a9" "objects_1144_created_2023-08-04T18:29:54.503Z" "objects_1144_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1144_revoked_False" "objects_1144_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1144_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1144_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1144_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1144_modified_2023-09-26T12:53:15.952Z" "objects_1144_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate a device's contacts.(Citation: lookout_hornbill_sunbird_0221)" "objects_1144_relationship_type_uses" "objects_1144_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1144_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1144_x_mitre_deprecated_False" "objects_1144_x_mitre_version_0.1" "objects_1144_x_mitre_attack_spec_version_3.1.0" "objects_1144_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1144_spec_version_2.1" "objects_1144_x_mitre_domains_0_mobile-attack" "objects_1145_type_relationship" "objects_1145_id_relationship--8d71e646-74d1-4d62-8989-2ad4ddf7a67b" "objects_1145_created_2023-02-06T19:47:08.535Z" "objects_1145_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1145_revoked_False" "objects_1145_external_references_0_source_name_cleafy_sova_1122" "objects_1145_external_references_0_description_Francesco Lubatti, Federico Valentini. (2022, November 8). SOVA malware is back and is evolving rapidly. Retrieved March 30, 2023." "objects_1145_external_references_0_url_https://www.cleafy.com/cleafy-labs/sova-malware-is-back-and-is-evolving-rapidly" "objects_1145_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1145_modified_2023-03-30T15:13:44.210Z" "objects_1145_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) has code to encrypt device data with AES.(Citation: cleafy_sova_1122)" "objects_1145_relationship_type_uses" "objects_1145_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1145_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_1145_x_mitre_deprecated_False" "objects_1145_x_mitre_version_0.1" "objects_1145_x_mitre_attack_spec_version_3.1.0" "objects_1145_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1145_spec_version_2.1" "objects_1145_x_mitre_domains_0_mobile-attack" "objects_1146_type_relationship" "objects_1146_id_relationship--8d72c224-0cf5-4b9b-a98a-76ee3a406803" "objects_1146_created_2023-02-06T19:05:00.862Z" "objects_1146_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1146_revoked_False" "objects_1146_external_references_0_source_name_lookout_abstractemu_1021" "objects_1146_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1146_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1146_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1146_modified_2023-03-27T17:20:37.796Z" "objects_1146_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can obtain a list of installed applications.(Citation: lookout_abstractemu_1021)" "objects_1146_relationship_type_uses" "objects_1146_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1146_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1146_x_mitre_deprecated_False" "objects_1146_x_mitre_version_0.1" "objects_1146_x_mitre_attack_spec_version_3.1.0" "objects_1146_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1146_spec_version_2.1" "objects_1146_x_mitre_domains_0_mobile-attack" "objects_1147_type_relationship" "objects_1147_id_relationship--8e67f2e0-65da-4d27-9d41-e2f9a174331b" "objects_1147_created_2023-10-10T15:33:58.186Z" "objects_1147_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1147_revoked_False" "objects_1147_external_references_0_source_name_ThreatFabric Ginp" "objects_1147_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1147_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1147_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1147_modified_2023-10-10T15:33:58.186Z" "objects_1147_description_[Ginp](https://attack.mitre.org/software/S0423) has masqueraded as \u201cAdobe Flash Player\u201d and \u201cGoogle Play Verificator\u201d.(Citation: ThreatFabric Ginp)" "objects_1147_relationship_type_uses" "objects_1147_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1147_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1147_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1147_x_mitre_deprecated_False" "objects_1147_x_mitre_version_1.0" "objects_1147_x_mitre_attack_spec_version_2.1.0" "objects_1147_spec_version_2.1" "objects_1147_x_mitre_domains_0_mobile-attack" "objects_1148_type_relationship" "objects_1148_id_relationship--8e6b9c1e-5e28-4519-95c3-6b4a836661de" "objects_1148_created_2023-01-18T19:16:45.773Z" "objects_1148_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1148_revoked_False" "objects_1148_external_references_0_source_name_cyble_drinik_1022" "objects_1148_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1148_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1148_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1148_modified_2023-03-27T18:07:34.581Z" "objects_1148_description_[Drinik](https://attack.mitre.org/software/S1054) has used custom encryption to hide strings, potentially to evade antivirus products.(Citation: cyble_drinik_1022)" "objects_1148_relationship_type_uses" "objects_1148_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1148_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1148_x_mitre_deprecated_False" "objects_1148_x_mitre_version_0.1" "objects_1148_x_mitre_attack_spec_version_3.1.0" "objects_1148_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1148_spec_version_2.1" "objects_1148_x_mitre_domains_0_mobile-attack" "objects_1149_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1149_type_relationship" "objects_1149_id_relationship--8ea39534-6fe9-404c-94b7-0f320af95404" "objects_1149_created_2022-04-01T15:17:21.511Z" "objects_1149_x_mitre_version_0.1" "objects_1149_x_mitre_deprecated_False" "objects_1149_revoked_False" "objects_1149_description_" "objects_1149_modified_2022-04-01T15:17:21.511Z" "objects_1149_relationship_type_revoked-by" "objects_1149_source_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_1149_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_1149_x_mitre_attack_spec_version_2.1.0" "objects_1149_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1149_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1149_spec_version_2.1" "objects_1149_x_mitre_domains_0_mobile-attack" "objects_1150_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1150_id_relationship--8ec03f4c-5ed8-4c25-956c-3ee6c777a5cc" "objects_1150_type_relationship" "objects_1150_created_2019-09-23T13:36:08.441Z" "objects_1150_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1150_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1150_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1150_external_references_0_source_name_securelist rotexy 2018" "objects_1150_modified_2020-03-31T14:49:39.188Z" "objects_1150_description_[Rotexy](https://attack.mitre.org/software/S0411) retrieves a list of installed applications and sends it to the command and control server.(Citation: securelist rotexy 2018)" "objects_1150_relationship_type_uses" "objects_1150_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1150_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1150_x_mitre_version_1.0" "objects_1150_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1150_spec_version_2.1" "objects_1150_x_mitre_attack_spec_version_2.1.0" "objects_1150_x_mitre_domains_0_mobile-attack" "objects_1151_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1151_id_relationship--8ed14c81-0b30-4bfc-8552-439aa0e920c3" "objects_1151_type_relationship" "objects_1151_created_2017-12-14T16:46:06.044Z" "objects_1151_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1151_external_references_0_source_name_NYTimes-BackDoor" "objects_1151_external_references_0_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_1151_external_references_0_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_1151_modified_2020-03-31T14:49:39.188Z" "objects_1151_description_[Adups](https://attack.mitre.org/software/S0309) transmitted location information.(Citation: NYTimes-BackDoor)" "objects_1151_relationship_type_uses" "objects_1151_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_1151_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1151_x_mitre_version_1.0" "objects_1151_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1151_spec_version_2.1" "objects_1151_x_mitre_attack_spec_version_2.1.0" "objects_1151_x_mitre_domains_0_mobile-attack" "objects_1152_type_relationship" "objects_1152_id_relationship--8f142643-0448-4b04-8260-8e4e62ad80bb" "objects_1152_created_2023-08-04T18:34:42.357Z" "objects_1152_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1152_revoked_False" "objects_1152_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1152_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1152_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1152_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1152_modified_2023-09-26T12:54:48.541Z" "objects_1152_description_[Sunbird](https://attack.mitre.org/software/S1082) can download adversary specified content from FTP shares.(Citation: lookout_hornbill_sunbird_0221)" "objects_1152_relationship_type_uses" "objects_1152_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1152_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1152_x_mitre_deprecated_False" "objects_1152_x_mitre_version_0.1" "objects_1152_x_mitre_attack_spec_version_3.1.0" "objects_1152_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1152_spec_version_2.1" "objects_1152_x_mitre_domains_0_mobile-attack" "objects_1153_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1153_type_relationship" "objects_1153_id_relationship--8f22a4ce-f075-4343-acb0-1d45c56e91e8" "objects_1153_created_2022-03-30T18:06:21.355Z" "objects_1153_x_mitre_version_0.1" "objects_1153_external_references_0_source_name_Symantec-iOSProfile2" "objects_1153_external_references_0_url_https://www.symantec.com/connect/blogs/apple-ios-103-finally-battles-malicious-profiles" "objects_1153_external_references_0_description_Brian Duckering. (2017, March 27). Apple iOS 10.3 Finally Battles Malicious Profiles. Retrieved September 24, 2018." "objects_1153_external_references_1_source_name_Android-TrustedCA" "objects_1153_external_references_1_url_https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html" "objects_1153_external_references_1_description_Chad Brubaker. (2016, July 7). Changes to Trusted Certificate Authorities in Android Nougat. Retrieved September 24, 2018." "objects_1153_x_mitre_deprecated_False" "objects_1153_revoked_False" "objects_1153_description_Mobile OSes have implemented measures to make it more difficult to trick users into installing untrusted certificates and configurations. iOS 10.3 and higher add an additional step for users to install new trusted CA certificates and configuration profiles. On Android, apps that target compatibility with Android 7 and higher (API Level 24) default to only trusting CA certificates that are bundled with the operating system, not CA certificates that are added by the user or administrator, hence decreasing their susceptibility to successful adversary-in-the-middle attack.(Citation: Symantec-iOSProfile2)(Citation: Android-TrustedCA)" "objects_1153_modified_2022-03-30T18:06:21.355Z" "objects_1153_relationship_type_mitigates" "objects_1153_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1153_target_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_1153_x_mitre_attack_spec_version_2.1.0" "objects_1153_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1153_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1153_spec_version_2.1" "objects_1153_x_mitre_domains_0_mobile-attack" "objects_1154_type_relationship" "objects_1154_id_relationship--8f2929a9-cd25-4e07-b402-447da68aaa56" "objects_1154_created_2020-04-24T15:06:33.455Z" "objects_1154_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1154_revoked_False" "objects_1154_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1154_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1154_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1154_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1154_modified_2023-04-05T20:10:43.246Z" "objects_1154_description_[Corona Updates](https://attack.mitre.org/software/S0425) communicates with the C2 server using HTTP requests.(Citation: TrendMicro Coronavirus Updates)" "objects_1154_relationship_type_uses" "objects_1154_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1154_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1154_x_mitre_deprecated_False" "objects_1154_x_mitre_version_1.0" "objects_1154_x_mitre_attack_spec_version_3.1.0" "objects_1154_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1154_spec_version_2.1" "objects_1154_x_mitre_domains_0_mobile-attack" "objects_1155_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1155_id_relationship--8f2ff9c5-249d-4a9a-bdc6-0cef887eaefc" "objects_1155_type_relationship" "objects_1155_created_2020-07-15T20:20:59.298Z" "objects_1155_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1155_external_references_0_source_name_Bitdefender Mandrake" "objects_1155_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1155_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1155_modified_2020-07-15T20:20:59.298Z" "objects_1155_description_[Mandrake](https://attack.mitre.org/software/S0485) obfuscates its hardcoded C2 URLs.(Citation: Bitdefender Mandrake)" "objects_1155_relationship_type_uses" "objects_1155_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1155_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1155_x_mitre_version_1.0" "objects_1155_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1155_spec_version_2.1" "objects_1155_x_mitre_attack_spec_version_2.1.0" "objects_1155_x_mitre_domains_0_mobile-attack" "objects_1156_type_relationship" "objects_1156_id_relationship--8f4c7030-f3e2-4c7d-b5b1-dc6815055c68" "objects_1156_created_2023-06-09T19:15:30.280Z" "objects_1156_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1156_revoked_False" "objects_1156_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1156_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1156_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1156_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1156_modified_2023-08-04T19:07:51.438Z" "objects_1156_description_[Hornbill](https://attack.mitre.org/software/S1077) can collect voice notes and messages from WhatsApp, if installed.(Citation: lookout_hornbill_sunbird_0221)" "objects_1156_relationship_type_uses" "objects_1156_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1156_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1156_x_mitre_deprecated_False" "objects_1156_x_mitre_version_0.1" "objects_1156_x_mitre_attack_spec_version_3.1.0" "objects_1156_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1156_spec_version_2.1" "objects_1156_x_mitre_domains_0_mobile-attack" "objects_1157_type_relationship" "objects_1157_id_relationship--8f52e1ab-284e-4d0c-bae1-3a8544a22f57" "objects_1157_created_2020-11-24T17:55:12.826Z" "objects_1157_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1157_revoked_False" "objects_1157_external_references_0_source_name_Talos GPlayed" "objects_1157_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1157_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1157_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1157_modified_2023-04-05T17:22:41.797Z" "objects_1157_description_[GPlayed](https://attack.mitre.org/software/S0536) can wipe the device.(Citation: Talos GPlayed)" "objects_1157_relationship_type_uses" "objects_1157_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1157_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1157_x_mitre_deprecated_False" "objects_1157_x_mitre_version_1.0" "objects_1157_x_mitre_attack_spec_version_3.1.0" "objects_1157_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1157_spec_version_2.1" "objects_1157_x_mitre_domains_0_mobile-attack" "objects_1158_type_relationship" "objects_1158_id_relationship--8f72a070-cfcb-4d75-ace6-b4427f3ba8d3" "objects_1158_created_2020-04-08T15:41:19.404Z" "objects_1158_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1158_revoked_False" "objects_1158_external_references_0_source_name_Cofense Anubis" "objects_1158_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1158_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1158_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1158_modified_2023-04-05T17:18:13.761Z" "objects_1158_description_[Anubis](https://attack.mitre.org/software/S0422) can steal the device\u2019s contact list.(Citation: Cofense Anubis) " "objects_1158_relationship_type_uses" "objects_1158_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1158_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1158_x_mitre_deprecated_False" "objects_1158_x_mitre_version_1.0" "objects_1158_x_mitre_attack_spec_version_3.1.0" "objects_1158_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1158_spec_version_2.1" "objects_1158_x_mitre_domains_0_mobile-attack" "objects_1159_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1159_id_relationship--8f88d438-3150-4317-b1fe-b14f13c15ac5" "objects_1159_type_relationship" "objects_1159_created_2019-09-03T19:45:48.501Z" "objects_1159_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1159_external_references_0_source_name_SWB Exodus March 2019" "objects_1159_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1159_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1159_modified_2020-03-31T14:49:39.188Z" "objects_1159_description_ [Exodus](https://attack.mitre.org/software/S0405) Two can record audio from the compromised device's microphone and can record call audio in 3GP format.(Citation: SWB Exodus March 2019) " "objects_1159_relationship_type_uses" "objects_1159_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1159_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1159_x_mitre_version_1.0" "objects_1159_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1159_spec_version_2.1" "objects_1159_x_mitre_attack_spec_version_2.1.0" "objects_1159_x_mitre_domains_0_mobile-attack" "objects_1160_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1160_type_relationship" "objects_1160_id_relationship--8fd05d96-552d-4ef9-98e3-ea70dc84f6a9" "objects_1160_created_2022-03-30T14:26:02.359Z" "objects_1160_x_mitre_version_0.1" "objects_1160_external_references_0_source_name_Android Changes to System Broadcasts" "objects_1160_external_references_0_url_https://developer.android.com/guide/components/broadcasts#changes-system-broadcasts" "objects_1160_external_references_0_description_Google. (2019, December 27). Broadcasts Overview. Retrieved January 27, 2020." "objects_1160_x_mitre_deprecated_False" "objects_1160_revoked_False" "objects_1160_description_Android 8 introduced additional limitations on the implicit intents that an application can register for.(Citation: Android Changes to System Broadcasts) " "objects_1160_modified_2022-03-30T14:26:02.359Z" "objects_1160_relationship_type_mitigates" "objects_1160_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1160_target_ref_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_1160_x_mitre_attack_spec_version_2.1.0" "objects_1160_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1160_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1160_spec_version_2.1" "objects_1160_x_mitre_domains_0_mobile-attack" "objects_1161_type_relationship" "objects_1161_id_relationship--8ff45341-60d6-40d3-bb38-566814a466f9" "objects_1161_created_2020-07-20T13:27:33.552Z" "objects_1161_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1161_revoked_False" "objects_1161_external_references_0_source_name_Talos-WolfRAT" "objects_1161_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_1161_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_1161_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1161_modified_2023-04-05T20:51:31.121Z" "objects_1161_description_[WolfRAT](https://attack.mitre.org/software/S0489) can perform primitive emulation checks.(Citation: Talos-WolfRAT)" "objects_1161_relationship_type_uses" "objects_1161_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_1161_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_1161_x_mitre_deprecated_False" "objects_1161_x_mitre_version_1.0" "objects_1161_x_mitre_attack_spec_version_3.1.0" "objects_1161_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1161_spec_version_2.1" "objects_1161_x_mitre_domains_0_mobile-attack" "objects_1162_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1162_id_relationship--901492b5-b074-4631-ad6e-4178caa4164a" "objects_1162_type_relationship" "objects_1162_created_2020-12-24T22:04:28.017Z" "objects_1162_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1162_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1162_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1162_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1162_modified_2020-12-24T22:04:28.017Z" "objects_1162_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has recorded calls and environment audio in .amr format.(Citation: Lookout Uyghur Campaign)" "objects_1162_relationship_type_uses" "objects_1162_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1162_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1162_x_mitre_version_1.0" "objects_1162_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1162_spec_version_2.1" "objects_1162_x_mitre_attack_spec_version_2.1.0" "objects_1162_x_mitre_domains_0_mobile-attack" "objects_1163_type_relationship" "objects_1163_id_relationship--907db911-b39c-4230-b6ad-a0ba5ef6926a" "objects_1163_created_2023-09-28T17:39:24.890Z" "objects_1163_revoked_False" "objects_1163_external_references_0_source_name_Trend Micro FlyTrap" "objects_1163_external_references_0_description_Trend Micro. (2021, August 17). FlyTrap Android Malware Is Taking Over Facebook Accounts \u2014 Protect Yourself With a Malware Scanner. Retrieved September 28, 2023." "objects_1163_external_references_0_url_https://news.trendmicro.com/2021/08/17/flytrap-android-malware-is-taking-over-facebook-accounts-protect-yourself-with-a-malware-scanner/" "objects_1163_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1163_modified_2023-09-28T17:39:24.890Z" "objects_1163_description_[FlyTrap](https://attack.mitre.org/software/S1093) can collect device geolocation data.(Citation: Trend Micro FlyTrap)" "objects_1163_relationship_type_uses" "objects_1163_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_1163_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1163_x_mitre_deprecated_False" "objects_1163_x_mitre_version_0.1" "objects_1163_x_mitre_attack_spec_version_3.2.0" "objects_1163_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1163_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1163_spec_version_2.1" "objects_1163_x_mitre_domains_0_mobile-attack" "objects_1164_type_relationship" "objects_1164_id_relationship--90d4d964-efa2-46ac-adc2-759886e07158" "objects_1164_created_2020-10-29T17:48:27.325Z" "objects_1164_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1164_revoked_False" "objects_1164_external_references_0_source_name_Threat Fabric Exobot" "objects_1164_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1164_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1164_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1164_modified_2023-04-05T20:11:02.157Z" "objects_1164_description_[Exobot](https://attack.mitre.org/software/S0522) has used HTTPS for C2 communication.(Citation: Threat Fabric Exobot)" "objects_1164_relationship_type_uses" "objects_1164_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1164_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1164_x_mitre_deprecated_False" "objects_1164_x_mitre_version_1.0" "objects_1164_x_mitre_attack_spec_version_3.1.0" "objects_1164_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1164_spec_version_2.1" "objects_1164_x_mitre_domains_0_mobile-attack" "objects_1165_type_relationship" "objects_1165_id_relationship--90d58c65-acb9-4d7b-89b9-f4b35593c861" "objects_1165_created_2021-02-08T16:36:20.711Z" "objects_1165_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1165_revoked_False" "objects_1165_external_references_0_source_name_BlackBerry Bahamut" "objects_1165_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1165_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1165_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1165_modified_2023-04-05T17:06:46.369Z" "objects_1165_description_[Windshift](https://attack.mitre.org/groups/G0112) has included SMS message exfiltration in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_1165_relationship_type_uses" "objects_1165_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1165_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1165_x_mitre_deprecated_False" "objects_1165_x_mitre_version_1.0" "objects_1165_x_mitre_attack_spec_version_3.1.0" "objects_1165_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1165_spec_version_2.1" "objects_1165_x_mitre_domains_0_mobile-attack" "objects_1166_type_relationship" "objects_1166_id_relationship--910009da-65c0-4e6a-aeb2-386c643d1c0e" "objects_1166_created_2017-12-14T16:46:06.044Z" "objects_1166_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1166_revoked_False" "objects_1166_external_references_0_source_name_Zscaler-SuperMarioRun" "objects_1166_external_references_0_description_Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." "objects_1166_external_references_0_url_https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat" "objects_1166_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1166_modified_2023-04-05T17:24:53.701Z" "objects_1166_description_[DroidJack](https://attack.mitre.org/software/S0320) captures SMS data.(Citation: Zscaler-SuperMarioRun)" "objects_1166_relationship_type_uses" "objects_1166_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_1166_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1166_x_mitre_deprecated_False" "objects_1166_x_mitre_version_1.0" "objects_1166_x_mitre_attack_spec_version_3.1.0" "objects_1166_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1166_spec_version_2.1" "objects_1166_x_mitre_domains_0_mobile-attack" "objects_1167_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1167_id_relationship--91831379-b0da-4019-a7bb-17e53cda9d0b" "objects_1167_type_relationship" "objects_1167_created_2020-12-31T18:25:05.131Z" "objects_1167_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1167_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1167_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1167_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1167_modified_2020-12-31T18:25:05.131Z" "objects_1167_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has utilized native code to decrypt its malicious payload.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1167_relationship_type_uses" "objects_1167_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1167_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_1167_x_mitre_version_1.0" "objects_1167_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1167_spec_version_2.1" "objects_1167_x_mitre_attack_spec_version_2.1.0" "objects_1167_x_mitre_domains_0_mobile-attack" "objects_1168_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1168_id_relationship--919a13bc-74be-4660-af63-454abee92635" "objects_1168_type_relationship" "objects_1168_created_2019-03-11T15:13:40.408Z" "objects_1168_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1168_external_references_0_description_Karl Dominguez. (2011, September 27). ANDROIDOS_ANSERVER.A. Retrieved November 30, 2018." "objects_1168_external_references_0_url_https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ANDROIDOS_ANSERVER.A" "objects_1168_external_references_0_source_name_TrendMicro-Anserver2" "objects_1168_modified_2020-03-31T14:49:39.188Z" "objects_1168_description_\n[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) gathers the device IMEI and IMSI.(Citation: TrendMicro-Anserver2)" "objects_1168_relationship_type_uses" "objects_1168_source_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_1168_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1168_x_mitre_version_1.0" "objects_1168_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1168_spec_version_2.1" "objects_1168_x_mitre_attack_spec_version_2.1.0" "objects_1168_x_mitre_domains_0_mobile-attack" "objects_1169_type_relationship" "objects_1169_id_relationship--91a4924f-2519-4662-91f2-b7ef715a459f" "objects_1169_created_2023-03-20T18:59:55.756Z" "objects_1169_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1169_revoked_False" "objects_1169_external_references_0_source_name_Samsung Knox Mobile Threat Defense" "objects_1169_external_references_0_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_1169_external_references_0_url_https://partner.samsungknox.com/mtd" "objects_1169_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1169_modified_2023-08-08T17:10:20.748Z" "objects_1169_description_Application vetting can detect many techniques associated with impairing device defenses.(Citation: Samsung Knox Mobile Threat Defense)" "objects_1169_relationship_type_detects" "objects_1169_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1169_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1169_x_mitre_deprecated_False" "objects_1169_x_mitre_version_0.1" "objects_1169_x_mitre_attack_spec_version_3.1.0" "objects_1169_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1169_spec_version_2.1" "objects_1169_x_mitre_domains_0_mobile-attack" "objects_1170_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1170_id_relationship--91de92af-fe1d-469e-8c36-1a9f4b621a27" "objects_1170_type_relationship" "objects_1170_created_2020-07-20T13:27:33.488Z" "objects_1170_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1170_external_references_0_source_name_Talos-WolfRAT" "objects_1170_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_1170_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_1170_modified_2020-08-10T21:57:54.704Z" "objects_1170_description_[WolfRAT](https://attack.mitre.org/software/S0489)\u2019s code is obfuscated.(Citation: Talos-WolfRAT)" "objects_1170_relationship_type_uses" "objects_1170_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_1170_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1170_x_mitre_version_1.0" "objects_1170_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1170_spec_version_2.1" "objects_1170_x_mitre_attack_spec_version_2.1.0" "objects_1170_x_mitre_domains_0_mobile-attack" "objects_1171_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1171_id_relationship--92129d5b-7822-4e84-8a69-f96b598fba9e" "objects_1171_type_relationship" "objects_1171_created_2018-10-17T00:14:20.652Z" "objects_1171_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1171_external_references_0_source_name_Lookout-StealthMango" "objects_1171_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1171_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1171_modified_2020-03-31T14:49:39.188Z" "objects_1171_description_[Tangelo](https://attack.mitre.org/software/S0329) accesses databases from WhatsApp, Viber, Skype, and Line.(Citation: Lookout-StealthMango)" "objects_1171_relationship_type_uses" "objects_1171_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_1171_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1171_x_mitre_version_1.0" "objects_1171_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1171_spec_version_2.1" "objects_1171_x_mitre_attack_spec_version_2.1.0" "objects_1171_x_mitre_domains_0_mobile-attack" "objects_1172_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1172_type_relationship" "objects_1172_id_relationship--92879f0e-d1db-4407-9cc6-c1dbcc47caea" "objects_1172_created_2019-10-18T14:52:53.193Z" "objects_1172_x_mitre_version_1.0" "objects_1172_x_mitre_deprecated_False" "objects_1172_revoked_False" "objects_1172_description_Device attestation could detect devices with unauthorized or unsafe modifications. " "objects_1172_modified_2022-03-30T20:07:50.094Z" "objects_1172_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1172_relationship_type_mitigates" "objects_1172_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1172_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_1172_x_mitre_attack_spec_version_2.1.0" "objects_1172_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1172_spec_version_2.1" "objects_1172_x_mitre_domains_0_mobile-attack" "objects_1173_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1173_id_relationship--92c9106d-a71b-4a4f-a9d4-ef692a0294eb" "objects_1173_type_relationship" "objects_1173_created_2020-06-26T14:55:13.261Z" "objects_1173_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1173_external_references_0_source_name_Cybereason EventBot" "objects_1173_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1173_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1173_modified_2020-06-26T14:55:13.261Z" "objects_1173_description_[EventBot](https://attack.mitre.org/software/S0478) can collect system information such as OS version, device vendor, and the type of screen lock that is active on the device.(Citation: Cybereason EventBot)" "objects_1173_relationship_type_uses" "objects_1173_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1173_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1173_x_mitre_version_1.0" "objects_1173_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1173_spec_version_2.1" "objects_1173_x_mitre_attack_spec_version_2.1.0" "objects_1173_x_mitre_domains_0_mobile-attack" "objects_1174_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1174_type_relationship" "objects_1174_id_relationship--93395e61-0d3e-4ea6-9c1b-08d4a04005a0" "objects_1174_created_2019-08-07T15:57:13.453Z" "objects_1174_x_mitre_version_1.0" "objects_1174_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_1174_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_1174_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_1174_x_mitre_deprecated_False" "objects_1174_revoked_False" "objects_1174_description_[Riltok](https://attack.mitre.org/software/S0403) can open a fake Google Play screen requesting bank card credentials and mimic the screen of relevant mobile banking apps to request user/bank card details.(Citation: Kaspersky Riltok June 2019)" "objects_1174_modified_2022-04-12T10:01:44.682Z" "objects_1174_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1174_relationship_type_uses" "objects_1174_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_1174_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1174_x_mitre_attack_spec_version_2.1.0" "objects_1174_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1174_spec_version_2.1" "objects_1174_x_mitre_domains_0_mobile-attack" "objects_1175_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1175_type_relationship" "objects_1175_id_relationship--935fd3e3-dd47-4c43-bdd8-1668af26395f" "objects_1175_created_2018-10-17T00:14:20.652Z" "objects_1175_x_mitre_version_1.0" "objects_1175_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1175_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1175_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1175_x_mitre_deprecated_False" "objects_1175_revoked_False" "objects_1175_description_[SpyDealer](https://attack.mitre.org/software/S0324) enables remote control of the victim through SMS channels.(Citation: PaloAlto-SpyDealer)" "objects_1175_modified_2022-04-19T14:25:41.669Z" "objects_1175_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1175_relationship_type_uses" "objects_1175_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1175_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1175_x_mitre_attack_spec_version_2.1.0" "objects_1175_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1175_spec_version_2.1" "objects_1175_x_mitre_domains_0_mobile-attack" "objects_1176_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1176_id_relationship--9366529d-fba9-4ef6-b4ee-b6b41aa3b18c" "objects_1176_type_relationship" "objects_1176_created_2019-07-10T15:35:43.631Z" "objects_1176_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1176_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1176_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1176_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1176_modified_2020-03-31T14:49:39.188Z" "objects_1176_description_[Pallas](https://attack.mitre.org/software/S0399) queries the device for metadata, such as device ID, OS version, and the number of cameras.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1176_relationship_type_uses" "objects_1176_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1176_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1176_x_mitre_version_1.0" "objects_1176_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1176_spec_version_2.1" "objects_1176_x_mitre_attack_spec_version_2.1.0" "objects_1176_x_mitre_domains_0_mobile-attack" "objects_1177_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1177_id_relationship--9373912a-affa-4a3c-ad97-1b8311e228ee" "objects_1177_type_relationship" "objects_1177_created_2019-09-04T14:28:15.991Z" "objects_1177_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1177_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1177_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1177_external_references_0_source_name_Lookout-Monokle" "objects_1177_modified_2020-03-31T14:49:39.188Z" "objects_1177_description_[Monokle](https://attack.mitre.org/software/S0407) checks if the device is connected via Wi-Fi or mobile data.(Citation: Lookout-Monokle)" "objects_1177_relationship_type_uses" "objects_1177_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1177_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1177_x_mitre_version_1.0" "objects_1177_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1177_spec_version_2.1" "objects_1177_x_mitre_attack_spec_version_2.1.0" "objects_1177_x_mitre_domains_0_mobile-attack" "objects_1178_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1178_type_relationship" "objects_1178_id_relationship--9398bf9d-be77-4ac2-acea-893152cafd16" "objects_1178_created_2022-03-30T14:43:46.034Z" "objects_1178_x_mitre_version_0.1" "objects_1178_x_mitre_deprecated_False" "objects_1178_revoked_False" "objects_1178_description_" "objects_1178_modified_2022-03-30T14:43:46.034Z" "objects_1178_relationship_type_revoked-by" "objects_1178_source_ref_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_1178_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1178_x_mitre_attack_spec_version_2.1.0" "objects_1178_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1178_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1178_spec_version_2.1" "objects_1178_x_mitre_domains_0_mobile-attack" "objects_1179_type_relationship" "objects_1179_id_relationship--93b2474b-0ba6-469e-a4e8-d17a41d0d016" "objects_1179_created_2022-04-15T18:12:53.512Z" "objects_1179_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1179_revoked_False" "objects_1179_external_references_0_source_name_Xiao-KeyRaider" "objects_1179_external_references_0_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_1179_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_1179_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1179_modified_2023-04-05T21:28:29.839Z" "objects_1179_description_[Monokle](https://attack.mitre.org/software/S0407) can install attacker-specified certificates to the device's trusted certificate store, enabling an adversary to perform adversary-in-the-middle attacks.(Citation: Xiao-KeyRaider)" "objects_1179_relationship_type_uses" "objects_1179_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1179_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1179_x_mitre_deprecated_False" "objects_1179_x_mitre_version_0.1" "objects_1179_x_mitre_attack_spec_version_3.1.0" "objects_1179_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1179_spec_version_2.1" "objects_1179_x_mitre_domains_0_mobile-attack" "objects_1180_type_relationship" "objects_1180_id_relationship--93b6bf37-5614-4317-8ed7-42f098152c40" "objects_1180_created_2023-02-28T20:39:18.320Z" "objects_1180_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1180_revoked_False" "objects_1180_external_references_0_source_name_proofpoint_flubot_0421" "objects_1180_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1180_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1180_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1180_modified_2023-03-31T22:10:38.672Z" "objects_1180_description_[FluBot](https://attack.mitre.org/software/S1067) can use a SOCKS proxy to evade C2 IP detection.(Citation: proofpoint_flubot_0421)" "objects_1180_relationship_type_uses" "objects_1180_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1180_target_ref_attack-pattern--5ca3c7ec-55b2-4587-9376-cf6c96f8047a" "objects_1180_x_mitre_deprecated_False" "objects_1180_x_mitre_version_0.1" "objects_1180_x_mitre_attack_spec_version_3.1.0" "objects_1180_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1180_spec_version_2.1" "objects_1180_x_mitre_domains_0_mobile-attack" "objects_1181_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1181_type_relationship" "objects_1181_id_relationship--93c20f43-6684-471c-910f-d9577f289677" "objects_1181_created_2018-10-17T00:14:20.652Z" "objects_1181_x_mitre_version_1.0" "objects_1181_external_references_0_source_name_Lookout-StealthMango" "objects_1181_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1181_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1181_x_mitre_deprecated_False" "objects_1181_revoked_False" "objects_1181_description_In at least one case, [Stealth Mango](https://attack.mitre.org/software/S0328) may have been installed using physical access to the device by a repair shop.(Citation: Lookout-StealthMango)" "objects_1181_modified_2022-04-19T15:47:05.436Z" "objects_1181_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1181_relationship_type_uses" "objects_1181_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1181_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1181_x_mitre_attack_spec_version_2.1.0" "objects_1181_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1181_spec_version_2.1" "objects_1181_x_mitre_domains_0_mobile-attack" "objects_1182_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1182_id_relationship--94040d2e-3f60-423c-8a93-a83b61cafe7d" "objects_1182_type_relationship" "objects_1182_created_2017-12-14T16:46:06.044Z" "objects_1182_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1182_external_references_0_source_name_Lookout-Pegasus" "objects_1182_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1182_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1182_modified_2020-03-31T14:49:39.188Z" "objects_1182_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) update and sends the location of the phone.(Citation: Lookout-Pegasus)" "objects_1182_relationship_type_uses" "objects_1182_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1182_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1182_x_mitre_version_1.0" "objects_1182_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1182_spec_version_2.1" "objects_1182_x_mitre_attack_spec_version_2.1.0" "objects_1182_x_mitre_domains_0_mobile-attack" "objects_1183_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1183_type_relationship" "objects_1183_id_relationship--9432fabf-9487-469c-86c9-b9d26b013c85" "objects_1183_created_2022-04-01T13:13:10.587Z" "objects_1183_x_mitre_version_0.1" "objects_1183_x_mitre_deprecated_False" "objects_1183_revoked_False" "objects_1183_description_Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs. " "objects_1183_modified_2022-04-01T13:13:10.587Z" "objects_1183_relationship_type_mitigates" "objects_1183_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1183_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1183_x_mitre_attack_spec_version_2.1.0" "objects_1183_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1183_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1183_spec_version_2.1" "objects_1183_x_mitre_domains_0_mobile-attack" "objects_1184_type_relationship" "objects_1184_id_relationship--945db15a-b356-4e05-a6a0-9b24ca9aa348" "objects_1184_created_2022-04-20T17:42:11.714Z" "objects_1184_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1184_revoked_False" "objects_1184_external_references_0_source_name_Wandera-RedDrop" "objects_1184_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1184_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1184_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1184_modified_2023-04-05T20:40:15.440Z" "objects_1184_description_[RedDrop](https://attack.mitre.org/software/S0326) uses standard HTTP for exfiltration.(Citation: Wandera-RedDrop)" "objects_1184_relationship_type_uses" "objects_1184_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1184_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1184_x_mitre_deprecated_False" "objects_1184_x_mitre_version_0.1" "objects_1184_x_mitre_attack_spec_version_3.1.0" "objects_1184_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1184_spec_version_2.1" "objects_1184_x_mitre_domains_0_mobile-attack" "objects_1185_type_relationship" "objects_1185_id_relationship--947e2398-4565-4ae0-8cc2-fb0ef5f9c73f" "objects_1185_created_2019-12-10T16:07:41.083Z" "objects_1185_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1185_revoked_False" "objects_1185_external_references_0_source_name_SecureList DVMap June 2017" "objects_1185_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_1185_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_1185_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1185_modified_2023-04-05T21:21:03.081Z" "objects_1185_description_[Dvmap](https://attack.mitre.org/software/S0420) can enable installation of apps from unknown sources.(Citation: SecureList DVMap June 2017)" "objects_1185_relationship_type_uses" "objects_1185_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_1185_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1185_x_mitre_deprecated_False" "objects_1185_x_mitre_version_1.0" "objects_1185_x_mitre_attack_spec_version_3.1.0" "objects_1185_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1185_spec_version_2.1" "objects_1185_x_mitre_domains_0_mobile-attack" "objects_1186_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1186_type_relationship" "objects_1186_id_relationship--94bf07c4-3bf0-4ecc-8043-644e59fb9ec4" "objects_1186_created_2022-03-28T19:30:27.364Z" "objects_1186_x_mitre_version_0.1" "objects_1186_x_mitre_deprecated_False" "objects_1186_revoked_False" "objects_1186_description_Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications." "objects_1186_modified_2022-03-28T19:30:27.364Z" "objects_1186_relationship_type_mitigates" "objects_1186_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1186_target_ref_attack-pattern--c08366bb-8d11-4921-853f-f0a3b6a2a1da" "objects_1186_x_mitre_attack_spec_version_2.1.0" "objects_1186_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1186_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1186_spec_version_2.1" "objects_1186_x_mitre_domains_0_mobile-attack" "objects_1187_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1187_type_relationship" "objects_1187_id_relationship--94e111fa-81d1-4882-ae73-4d6ad6367b9f" "objects_1187_created_2022-03-28T19:25:38.355Z" "objects_1187_x_mitre_version_0.1" "objects_1187_x_mitre_deprecated_False" "objects_1187_revoked_False" "objects_1187_description_Security updates may contain patches that inhibit system software compromises." "objects_1187_modified_2022-03-28T19:25:38.355Z" "objects_1187_relationship_type_mitigates" "objects_1187_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1187_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1187_x_mitre_attack_spec_version_2.1.0" "objects_1187_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1187_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1187_spec_version_2.1" "objects_1187_x_mitre_domains_0_mobile-attack" "objects_1188_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1188_id_relationship--950e1476-83ca-4e81-b542-c91a19b206d7" "objects_1188_type_relationship" "objects_1188_created_2020-04-24T17:46:31.466Z" "objects_1188_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1188_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1188_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1188_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1188_modified_2020-04-24T17:46:31.466Z" "objects_1188_description_[TrickMo](https://attack.mitre.org/software/S0427) can collect device information such as network operator, model, brand, and OS version.(Citation: SecurityIntelligence TrickMo)" "objects_1188_relationship_type_uses" "objects_1188_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1188_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1188_x_mitre_version_1.0" "objects_1188_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1188_spec_version_2.1" "objects_1188_x_mitre_attack_spec_version_2.1.0" "objects_1188_x_mitre_domains_0_mobile-attack" "objects_1189_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1189_id_relationship--95bf4e8b-f388-48a0-b236-c2077252e71e" "objects_1189_type_relationship" "objects_1189_created_2019-09-03T20:08:00.757Z" "objects_1189_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1189_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1189_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1189_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1189_modified_2020-03-31T14:49:39.188Z" "objects_1189_description_[Gustuff](https://attack.mitre.org/software/S0406) gathers the device IMEI to send to the command and control server.(Citation: Talos Gustuff Apr 2019)" "objects_1189_relationship_type_uses" "objects_1189_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1189_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1189_x_mitre_version_1.0" "objects_1189_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1189_spec_version_2.1" "objects_1189_x_mitre_attack_spec_version_2.1.0" "objects_1189_x_mitre_domains_0_mobile-attack" "objects_1190_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1190_type_relationship" "objects_1190_id_relationship--95fec5e4-d48a-471f-8223-711cd32659b8" "objects_1190_created_2022-04-01T18:49:51.050Z" "objects_1190_x_mitre_version_0.1" "objects_1190_x_mitre_deprecated_False" "objects_1190_revoked_False" "objects_1190_description_" "objects_1190_modified_2022-04-01T18:49:51.050Z" "objects_1190_relationship_type_revoked-by" "objects_1190_source_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1190_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_1190_x_mitre_attack_spec_version_2.1.0" "objects_1190_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1190_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1190_spec_version_2.1" "objects_1190_x_mitre_domains_0_mobile-attack" "objects_1191_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1191_type_relationship" "objects_1191_id_relationship--96298aed-9e9f-4836-b29b-04c88e79e53e" "objects_1191_created_2022-04-01T18:42:37.987Z" "objects_1191_x_mitre_version_0.1" "objects_1191_x_mitre_deprecated_False" "objects_1191_revoked_False" "objects_1191_description_Security updates often contain patches for vulnerabilities that could be exploited for root access. Root access is often a requirement to impairing defenses." "objects_1191_modified_2022-04-01T18:42:37.987Z" "objects_1191_relationship_type_mitigates" "objects_1191_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1191_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1191_x_mitre_attack_spec_version_2.1.0" "objects_1191_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1191_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1191_spec_version_2.1" "objects_1191_x_mitre_domains_0_mobile-attack" "objects_1192_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1192_id_relationship--9634001c-575b-47aa-acd2-c3b1e900bd0b" "objects_1192_type_relationship" "objects_1192_created_2020-12-17T20:15:22.397Z" "objects_1192_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1192_external_references_0_source_name_Palo Alto HenBox" "objects_1192_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1192_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1192_modified_2020-12-17T20:15:22.397Z" "objects_1192_description_[HenBox](https://attack.mitre.org/software/S0544) can steal data from various sources, including chat, communication, and social media apps.(Citation: Palo Alto HenBox)" "objects_1192_relationship_type_uses" "objects_1192_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1192_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1192_x_mitre_version_1.0" "objects_1192_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1192_spec_version_2.1" "objects_1192_x_mitre_attack_spec_version_2.1.0" "objects_1192_x_mitre_domains_0_mobile-attack" "objects_1193_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1193_id_relationship--96490f73-d8ef-4c6b-9a3a-3c66fc963306" "objects_1193_type_relationship" "objects_1193_created_2020-05-07T15:33:32.778Z" "objects_1193_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1193_external_references_0_source_name_CheckPoint Agent Smith" "objects_1193_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1193_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1193_modified_2020-05-07T15:33:32.778Z" "objects_1193_description_[Agent Smith](https://attack.mitre.org/software/S0440) exploits known OS vulnerabilities, including Janus, to replace legitimate applications with malicious versions.(Citation: CheckPoint Agent Smith)" "objects_1193_relationship_type_uses" "objects_1193_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1193_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1193_x_mitre_version_1.0" "objects_1193_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1193_spec_version_2.1" "objects_1193_x_mitre_attack_spec_version_2.1.0" "objects_1193_x_mitre_domains_0_mobile-attack" "objects_1194_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1194_type_relationship" "objects_1194_id_relationship--96569099-db95-4f3c-8ded-6d9cf023e55e" "objects_1194_created_2019-09-03T20:08:00.717Z" "objects_1194_x_mitre_version_1.0" "objects_1194_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1194_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1194_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1194_x_mitre_deprecated_False" "objects_1194_revoked_False" "objects_1194_description_ [Gustuff](https://attack.mitre.org/software/S0406) can use SMS for command and control from a defined admin phone number.(Citation: Talos Gustuff Apr 2019) " "objects_1194_modified_2022-04-19T14:25:41.669Z" "objects_1194_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1194_relationship_type_uses" "objects_1194_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1194_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1194_x_mitre_attack_spec_version_2.1.0" "objects_1194_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1194_spec_version_2.1" "objects_1194_x_mitre_domains_0_mobile-attack" "objects_1195_type_relationship" "objects_1195_id_relationship--96ec33c8-78b6-421f-bab3-bd9d0564db31" "objects_1195_created_2022-09-29T20:11:55.474Z" "objects_1195_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1195_revoked_False" "objects_1195_external_references_0_source_name_Cylance Dust Storm" "objects_1195_external_references_0_description_Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021." "objects_1195_external_references_0_url_https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf" "objects_1195_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1195_modified_2022-09-30T18:39:16.003Z" "objects_1195_description_During [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016), the threat actors used Android backdoors capable of enumerating specific files on the infected devices.(Citation: Cylance Dust Storm)" "objects_1195_relationship_type_uses" "objects_1195_source_ref_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_1195_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1195_x_mitre_deprecated_False" "objects_1195_x_mitre_version_0.1" "objects_1195_x_mitre_attack_spec_version_2.1.0" "objects_1195_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1195_spec_version_2.1" "objects_1195_x_mitre_domains_0_mobile-attack" "objects_1196_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1196_id_relationship--97158eda-5092-4939-8b5c-1ef5ab918089" "objects_1196_type_relationship" "objects_1196_created_2020-04-24T15:12:11.189Z" "objects_1196_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1196_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1196_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1196_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1196_modified_2020-04-24T15:12:11.189Z" "objects_1196_description_[Concipit1248](https://attack.mitre.org/software/S0426) can collect device photos.(Citation: TrendMicro Coronavirus Updates)" "objects_1196_relationship_type_uses" "objects_1196_source_ref_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_1196_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1196_x_mitre_version_1.0" "objects_1196_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1196_spec_version_2.1" "objects_1196_x_mitre_attack_spec_version_2.1.0" "objects_1196_x_mitre_domains_0_mobile-attack" "objects_1197_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1197_id_relationship--972f0703-f4d7-42d2-8ca2-bec175dac0bf" "objects_1197_type_relationship" "objects_1197_created_2020-09-11T14:54:16.617Z" "objects_1197_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1197_external_references_0_source_name_Lookout Desert Scorpion" "objects_1197_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1197_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1197_modified_2020-09-11T14:54:16.617Z" "objects_1197_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can collect account information stored on the device.(Citation: Lookout Desert Scorpion)" "objects_1197_relationship_type_uses" "objects_1197_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1197_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1197_x_mitre_version_1.0" "objects_1197_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1197_spec_version_2.1" "objects_1197_x_mitre_attack_spec_version_2.1.0" "objects_1197_x_mitre_domains_0_mobile-attack" "objects_1198_type_relationship" "objects_1198_id_relationship--97408547-bacd-4308-a8be-556e9ff04951" "objects_1198_created_2023-03-20T18:55:23.628Z" "objects_1198_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1198_revoked_False" "objects_1198_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1198_modified_2023-08-09T16:43:16.137Z" "objects_1198_description_Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of `ps` or inspection of the `/proc` directory." "objects_1198_relationship_type_detects" "objects_1198_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1198_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1198_x_mitre_deprecated_False" "objects_1198_x_mitre_version_0.1" "objects_1198_x_mitre_attack_spec_version_3.1.0" "objects_1198_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1198_spec_version_2.1" "objects_1198_x_mitre_domains_0_mobile-attack" "objects_1199_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1199_id_relationship--97417113-1840-4e00-98d3-bb222e1a1f60" "objects_1199_type_relationship" "objects_1199_created_2020-07-27T14:14:56.980Z" "objects_1199_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1199_external_references_0_source_name_Google Security Zen" "objects_1199_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_1199_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_1199_modified_2020-08-10T22:18:20.815Z" "objects_1199_description_[Zen](https://attack.mitre.org/software/S0494) base64 encodes one of the strings it searches for.(Citation: Google Security Zen)" "objects_1199_relationship_type_uses" "objects_1199_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_1199_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1199_x_mitre_version_1.0" "objects_1199_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1199_spec_version_2.1" "objects_1199_x_mitre_attack_spec_version_2.1.0" "objects_1199_x_mitre_domains_0_mobile-attack" "objects_1200_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1200_id_relationship--97738857-d496-4d39-9809-1921e0ad10b7" "objects_1200_type_relationship" "objects_1200_created_2020-12-31T18:25:05.125Z" "objects_1200_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1200_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1200_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1200_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1200_modified_2020-12-31T18:25:05.125Z" "objects_1200_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) can collect files from the filesystem and account information from Google Chrome.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1200_relationship_type_uses" "objects_1200_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1200_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1200_x_mitre_version_1.0" "objects_1200_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1200_spec_version_2.1" "objects_1200_x_mitre_attack_spec_version_2.1.0" "objects_1200_x_mitre_domains_0_mobile-attack" "objects_1201_type_relationship" "objects_1201_id_relationship--980430c1-6173-440e-b75e-c1cdb4c41560" "objects_1201_created_2023-09-28T17:40:16.985Z" "objects_1201_revoked_False" "objects_1201_external_references_0_source_name_Zimperium FlyTrap" "objects_1201_external_references_0_description_A. Yaswant. (2021, August 9). FlyTrap Android Malware Compromises Thousands of Facebook Accounts. Retrieved September 28, 2023." "objects_1201_external_references_0_url_https://www.zimperium.com/blog/flytrap-android-malware-compromises-thousands-of-facebook-accounts/" "objects_1201_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1201_modified_2023-09-28T17:40:16.985Z" "objects_1201_description_[FlyTrap](https://attack.mitre.org/software/S1093) can use HTTP to exfiltrate data to the C2 server.(Citation: Zimperium FlyTrap)" "objects_1201_relationship_type_uses" "objects_1201_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_1201_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1201_x_mitre_deprecated_False" "objects_1201_x_mitre_version_0.1" "objects_1201_x_mitre_attack_spec_version_3.2.0" "objects_1201_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1201_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1201_spec_version_2.1" "objects_1201_x_mitre_domains_0_mobile-attack" "objects_1202_type_relationship" "objects_1202_id_relationship--980c49f8-d991-4e1f-8feb-6173e3dfca1f" "objects_1202_created_2017-12-14T16:46:06.044Z" "objects_1202_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1202_revoked_False" "objects_1202_external_references_0_source_name_Lookout-EnterpriseApps" "objects_1202_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_1202_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_1202_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1202_modified_2023-04-05T20:29:18.098Z" "objects_1202_description_[AndroRAT](https://attack.mitre.org/software/S0292) captures SMS messages.(Citation: Lookout-EnterpriseApps)" "objects_1202_relationship_type_uses" "objects_1202_source_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_1202_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1202_x_mitre_deprecated_False" "objects_1202_x_mitre_version_1.0" "objects_1202_x_mitre_attack_spec_version_3.1.0" "objects_1202_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1202_spec_version_2.1" "objects_1202_x_mitre_domains_0_mobile-attack" "objects_1203_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1203_id_relationship--9814ecd5-911a-4776-9dc0-4a4ae0bf6a39" "objects_1203_type_relationship" "objects_1203_created_2020-04-08T15:41:19.364Z" "objects_1203_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1203_external_references_0_source_name_Cofense Anubis" "objects_1203_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1203_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1203_modified_2020-04-08T15:41:19.364Z" "objects_1203_description_[Anubis](https://attack.mitre.org/software/S0422) can take screenshots.(Citation: Cofense Anubis)" "objects_1203_relationship_type_uses" "objects_1203_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1203_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1203_x_mitre_version_1.0" "objects_1203_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1203_spec_version_2.1" "objects_1203_x_mitre_attack_spec_version_2.1.0" "objects_1203_x_mitre_domains_0_mobile-attack" "objects_1204_type_relationship" "objects_1204_id_relationship--9819974c-f093-482b-8b2b-93a05ab7382e" "objects_1204_created_2023-08-04T18:31:48.507Z" "objects_1204_revoked_False" "objects_1204_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1204_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1204_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1204_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1204_modified_2023-08-04T18:31:48.507Z" "objects_1204_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate browser history, BlackBerry Messenger files, IMO instant messaging content, and WhatsApp voice notes.(Citation: lookout_hornbill_sunbird_0221)" "objects_1204_relationship_type_uses" "objects_1204_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1204_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1204_x_mitre_deprecated_False" "objects_1204_x_mitre_version_0.1" "objects_1204_x_mitre_attack_spec_version_3.1.0" "objects_1204_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1204_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1204_spec_version_2.1" "objects_1204_x_mitre_domains_0_mobile-attack" "objects_1205_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1205_type_relationship" "objects_1205_id_relationship--9858ae0b-140b-4dd2-8ba9-1ef22183dec3" "objects_1205_created_2021-02-08T16:36:20.788Z" "objects_1205_x_mitre_version_1.0" "objects_1205_external_references_0_source_name_BlackBerry Bahamut" "objects_1205_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1205_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1205_x_mitre_deprecated_False" "objects_1205_revoked_False" "objects_1205_description_[Windshift](https://attack.mitre.org/groups/G0112) has included keylogging capabilities as part of Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_1205_modified_2022-04-15T17:35:26.197Z" "objects_1205_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1205_relationship_type_uses" "objects_1205_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1205_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1205_x_mitre_attack_spec_version_2.1.0" "objects_1205_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1205_spec_version_2.1" "objects_1205_x_mitre_domains_0_mobile-attack" "objects_1206_type_relationship" "objects_1206_id_relationship--98a4a746-e7bf-494c-9ee3-584403d76d3e" "objects_1206_created_2023-02-28T20:34:18.504Z" "objects_1206_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1206_revoked_False" "objects_1206_external_references_0_source_name_proofpoint_flubot_0421" "objects_1206_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1206_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1206_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1206_modified_2023-03-31T22:12:45.147Z" "objects_1206_description_[FluBot](https://attack.mitre.org/software/S1067) can use HTTP POST requests on port 80 for communicating with its C2 server.(Citation: proofpoint_flubot_0421)" "objects_1206_relationship_type_uses" "objects_1206_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1206_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1206_x_mitre_deprecated_False" "objects_1206_x_mitre_version_0.1" "objects_1206_x_mitre_attack_spec_version_3.1.0" "objects_1206_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1206_spec_version_2.1" "objects_1206_x_mitre_domains_0_mobile-attack" "objects_1207_type_relationship" "objects_1207_id_relationship--98ae9cb2-1141-48c6-81fd-f16adb430031" "objects_1207_created_2023-01-18T19:17:07.565Z" "objects_1207_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1207_revoked_False" "objects_1207_external_references_0_source_name_cyble_drinik_1022" "objects_1207_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1207_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1207_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1207_modified_2023-03-27T18:07:52.850Z" "objects_1207_description_[Drinik](https://attack.mitre.org/software/S1054) can request the `READ_EXTERNAL_STORAGE` and `WRITE_EXTERNAL_STORAGE` Android permissions.(Citation: cyble_drinik_1022)" "objects_1207_relationship_type_uses" "objects_1207_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1207_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1207_x_mitre_deprecated_False" "objects_1207_x_mitre_version_0.1" "objects_1207_x_mitre_attack_spec_version_3.1.0" "objects_1207_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1207_spec_version_2.1" "objects_1207_x_mitre_domains_0_mobile-attack" "objects_1208_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1208_id_relationship--98b14660-79e1-4244-99c2-3dedd84eb68d" "objects_1208_type_relationship" "objects_1208_created_2020-09-11T14:54:16.582Z" "objects_1208_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1208_external_references_0_source_name_Lookout Desert Scorpion" "objects_1208_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1208_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1208_modified_2020-09-11T14:54:16.582Z" "objects_1208_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can track the device\u2019s location.(Citation: Lookout Desert Scorpion)" "objects_1208_relationship_type_uses" "objects_1208_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1208_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1208_x_mitre_version_1.0" "objects_1208_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1208_spec_version_2.1" "objects_1208_x_mitre_attack_spec_version_2.1.0" "objects_1208_x_mitre_domains_0_mobile-attack" "objects_1209_type_relationship" "objects_1209_id_relationship--98dec4bf-6753-4d7a-8983-d4fd6d1d892a" "objects_1209_created_2020-11-20T16:37:28.475Z" "objects_1209_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1209_revoked_False" "objects_1209_external_references_0_source_name_Symantec GoldenCup" "objects_1209_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1209_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1209_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1209_modified_2023-04-05T19:52:20.309Z" "objects_1209_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect the device\u2019s contact list.(Citation: Symantec GoldenCup)" "objects_1209_relationship_type_uses" "objects_1209_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1209_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1209_x_mitre_deprecated_False" "objects_1209_x_mitre_version_1.0" "objects_1209_x_mitre_attack_spec_version_3.1.0" "objects_1209_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1209_spec_version_2.1" "objects_1209_x_mitre_domains_0_mobile-attack" "objects_1210_type_relationship" "objects_1210_id_relationship--98fb2884-c912-42ff-9c87-4fbabfa70115" "objects_1210_created_2023-08-08T16:14:01.661Z" "objects_1210_revoked_False" "objects_1210_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1210_modified_2023-08-08T16:14:01.661Z" "objects_1210_description_Application vetting services may potentially determine if an application contains suspicious code and/or metadata." "objects_1210_relationship_type_detects" "objects_1210_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1210_target_ref_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_1210_x_mitre_deprecated_False" "objects_1210_x_mitre_version_0.1" "objects_1210_x_mitre_attack_spec_version_3.1.0" "objects_1210_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1210_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1210_spec_version_2.1" "objects_1210_x_mitre_domains_0_mobile-attack" "objects_1211_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1211_id_relationship--991ef2f2-c196-4d5d-bd29-504ea25831f4" "objects_1211_type_relationship" "objects_1211_created_2021-10-01T14:42:48.815Z" "objects_1211_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1211_external_references_0_source_name_SecureList BusyGasper" "objects_1211_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1211_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1211_modified_2021-10-01T14:42:48.815Z" "objects_1211_description_[BusyGasper](https://attack.mitre.org/software/S0655) can record from the device\u2019s camera.(Citation: SecureList BusyGasper)" "objects_1211_relationship_type_uses" "objects_1211_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1211_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1211_x_mitre_version_1.0" "objects_1211_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1211_spec_version_2.1" "objects_1211_x_mitre_attack_spec_version_2.1.0" "objects_1211_x_mitre_domains_0_mobile-attack" "objects_1212_type_relationship" "objects_1212_id_relationship--9951d8c0-d210-4776-808b-421b613f244f" "objects_1212_created_2019-09-23T13:36:08.463Z" "objects_1212_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1212_revoked_False" "objects_1212_external_references_0_source_name_securelist rotexy 2018" "objects_1212_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1212_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1212_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1212_modified_2023-04-05T16:55:41.638Z" "objects_1212_description_[Rotexy](https://attack.mitre.org/software/S0411) hides its icon after first launch.(Citation: securelist rotexy 2018)" "objects_1212_relationship_type_uses" "objects_1212_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1212_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1212_x_mitre_deprecated_False" "objects_1212_x_mitre_version_1.0" "objects_1212_x_mitre_attack_spec_version_3.1.0" "objects_1212_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1212_spec_version_2.1" "objects_1212_x_mitre_domains_0_mobile-attack" "objects_1213_type_relationship" "objects_1213_id_relationship--99b4be95-74f2-48f7-b4e9-8b4d88ecd31f" "objects_1213_created_2020-09-11T14:54:16.642Z" "objects_1213_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1213_revoked_False" "objects_1213_external_references_0_source_name_Lookout Desert Scorpion" "objects_1213_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1213_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1213_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1213_modified_2023-04-05T21:21:19.617Z" "objects_1213_description_If running on a Huawei device, [Desert Scorpion](https://attack.mitre.org/software/S0505) adds itself to the protected apps list, which allows it to run with the screen off.(Citation: Lookout Desert Scorpion)" "objects_1213_relationship_type_uses" "objects_1213_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1213_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1213_x_mitre_deprecated_False" "objects_1213_x_mitre_version_1.0" "objects_1213_x_mitre_attack_spec_version_3.1.0" "objects_1213_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1213_spec_version_2.1" "objects_1213_x_mitre_domains_0_mobile-attack" "objects_1214_type_relationship" "objects_1214_id_relationship--9a575420-cdce-4a9f-9ea9-2ae5c469cad9" "objects_1214_created_2023-09-25T19:44:41.503Z" "objects_1214_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1214_revoked_False" "objects_1214_external_references_0_source_name_MoustachedBouncer ESET August 2023" "objects_1214_external_references_0_description_Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 25, 2023." "objects_1214_external_references_0_url_https://www.welivesecurity.com/en/eset-research/moustachedbouncer-espionage-against-foreign-diplomats-in-belarus/" "objects_1214_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1214_modified_2023-09-30T22:22:13.142Z" "objects_1214_description_[MoustachedBouncer](https://attack.mitre.org/groups/G1019) has used legitimate looking filenames for malicious executables including MicrosoftUpdate845255.exe.(Citation: MoustachedBouncer ESET August 2023)" "objects_1214_relationship_type_uses" "objects_1214_source_ref_intrusion-set--7251b44b-6072-476c-b8d9-a6e32c355b28" "objects_1214_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1214_x_mitre_deprecated_False" "objects_1214_x_mitre_version_0.1" "objects_1214_x_mitre_attack_spec_version_3.2.0" "objects_1214_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1214_spec_version_2.1" "objects_1214_x_mitre_domains_0_mobile-attack" "objects_1215_type_relationship" "objects_1215_id_relationship--9b34ae1e-027f-4b52-9a4f-1e58f6efdc25" "objects_1215_created_2023-06-09T19:16:28.560Z" "objects_1215_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1215_revoked_False" "objects_1215_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1215_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1215_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1215_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1215_modified_2023-09-22T20:48:05.605Z" "objects_1215_description_[Hornbill](https://attack.mitre.org/software/S1077) can take screenshots and can abuse accessibility services to scrape WhatsApp messages, contacts, and notifications.(Citation: lookout_hornbill_sunbird_0221)" "objects_1215_relationship_type_uses" "objects_1215_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1215_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1215_x_mitre_deprecated_False" "objects_1215_x_mitre_version_0.1" "objects_1215_x_mitre_attack_spec_version_3.1.0" "objects_1215_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1215_spec_version_2.1" "objects_1215_x_mitre_domains_0_mobile-attack" "objects_1216_type_relationship" "objects_1216_id_relationship--9b56528f-cf04-4d81-80ee-7bacb862383a" "objects_1216_created_2023-03-20T18:57:33.693Z" "objects_1216_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1216_revoked_False" "objects_1216_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1216_modified_2023-08-14T20:52:56.065Z" "objects_1216_description_Application vetting services can detect when applications request the `SEND_SMS` permission, which should be infrequently used." "objects_1216_relationship_type_detects" "objects_1216_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1216_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1216_x_mitre_deprecated_False" "objects_1216_x_mitre_version_0.1" "objects_1216_x_mitre_attack_spec_version_3.1.0" "objects_1216_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1216_spec_version_2.1" "objects_1216_x_mitre_domains_0_mobile-attack" "objects_1217_type_relationship" "objects_1217_id_relationship--9b8b51fb-c380-4516-b109-821f015506d4" "objects_1217_created_2023-03-20T15:40:26.994Z" "objects_1217_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1217_revoked_False" "objects_1217_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1217_modified_2023-08-10T22:16:28.207Z" "objects_1217_description_Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it." "objects_1217_relationship_type_detects" "objects_1217_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1217_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1217_x_mitre_deprecated_False" "objects_1217_x_mitre_version_0.1" "objects_1217_x_mitre_attack_spec_version_3.1.0" "objects_1217_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1217_spec_version_2.1" "objects_1217_x_mitre_domains_0_mobile-attack" "objects_1218_type_relationship" "objects_1218_id_relationship--9bbfa759-5555-4048-a79d-fed27a1efd93" "objects_1218_created_2023-06-09T19:14:21.299Z" "objects_1218_revoked_False" "objects_1218_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1218_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1218_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1218_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1218_modified_2023-06-09T19:14:21.299Z" "objects_1218_description_[Hornbill](https://attack.mitre.org/software/S1077) can access images stored on external storage.(Citation: lookout_hornbill_sunbird_0221)" "objects_1218_relationship_type_uses" "objects_1218_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1218_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1218_x_mitre_deprecated_False" "objects_1218_x_mitre_version_0.1" "objects_1218_x_mitre_attack_spec_version_3.1.0" "objects_1218_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1218_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1218_spec_version_2.1" "objects_1218_x_mitre_domains_0_mobile-attack" "objects_1219_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1219_type_relationship" "objects_1219_id_relationship--9c284d41-21ef-4009-bb47-3ae09b08f38d" "objects_1219_created_2022-04-01T17:06:06.950Z" "objects_1219_x_mitre_version_0.1" "objects_1219_x_mitre_deprecated_False" "objects_1219_revoked_False" "objects_1219_description_Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to location information. Users should also protect their account credentials and enable multi-factor authentication options when available. " "objects_1219_modified_2022-04-01T17:06:06.950Z" "objects_1219_relationship_type_mitigates" "objects_1219_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1219_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1219_x_mitre_attack_spec_version_2.1.0" "objects_1219_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1219_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1219_spec_version_2.1" "objects_1219_x_mitre_domains_0_mobile-attack" "objects_1220_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1220_type_relationship" "objects_1220_id_relationship--9c302eb1-1810-48a5-b34d-6aae303d2097" "objects_1220_created_2022-04-01T15:16:26.387Z" "objects_1220_x_mitre_version_0.1" "objects_1220_x_mitre_deprecated_False" "objects_1220_revoked_False" "objects_1220_description_Users should be instructed to not open links in applications they don\u2019t recognize." "objects_1220_modified_2022-04-01T15:16:26.387Z" "objects_1220_relationship_type_mitigates" "objects_1220_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1220_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_1220_x_mitre_attack_spec_version_2.1.0" "objects_1220_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1220_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1220_spec_version_2.1" "objects_1220_x_mitre_domains_0_mobile-attack" "objects_1221_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1221_id_relationship--9c7c302a-d5ba-4fc9-a4e5-e865fd7fb708" "objects_1221_type_relationship" "objects_1221_created_2017-12-14T16:46:06.044Z" "objects_1221_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1221_external_references_0_source_name_Kaspersky-WUC" "objects_1221_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_1221_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_1221_modified_2020-03-31T14:49:39.188Z" "objects_1221_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) stole geo-location data.(Citation: Kaspersky-WUC)" "objects_1221_relationship_type_uses" "objects_1221_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_1221_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1221_x_mitre_version_1.0" "objects_1221_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1221_spec_version_2.1" "objects_1221_x_mitre_attack_spec_version_2.1.0" "objects_1221_x_mitre_domains_0_mobile-attack" "objects_1222_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1222_id_relationship--9c853c22-7607-4cbd-b114-08aaa4625c35" "objects_1222_type_relationship" "objects_1222_created_2020-12-17T20:15:22.405Z" "objects_1222_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1222_external_references_0_source_name_Palo Alto HenBox" "objects_1222_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1222_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1222_modified_2020-12-28T18:47:52.600Z" "objects_1222_description_[HenBox](https://attack.mitre.org/software/S0544) can collect device information and can check if the device is running MIUI on a Xiaomi device.(Citation: Palo Alto HenBox)" "objects_1222_relationship_type_uses" "objects_1222_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1222_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1222_x_mitre_version_1.0" "objects_1222_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1222_spec_version_2.1" "objects_1222_x_mitre_attack_spec_version_2.1.0" "objects_1222_x_mitre_domains_0_mobile-attack" "objects_1223_type_relationship" "objects_1223_id_relationship--9caf7cd5-fa15-45f0-8e1e-75917ea33af2" "objects_1223_created_2023-03-20T18:50:32.580Z" "objects_1223_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1223_revoked_False" "objects_1223_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1223_modified_2023-08-09T16:45:40.815Z" "objects_1223_description_Application vetting services could look for usage of the `READ_PRIVILEGED_PHONE_STATE` Android permission. This could indicate that non-system apps are attempting to access information that they do not have access to." "objects_1223_relationship_type_detects" "objects_1223_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1223_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1223_x_mitre_deprecated_False" "objects_1223_x_mitre_version_0.1" "objects_1223_x_mitre_attack_spec_version_3.1.0" "objects_1223_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1223_spec_version_2.1" "objects_1223_x_mitre_domains_0_mobile-attack" "objects_1224_type_relationship" "objects_1224_id_relationship--9cfc30de-3e68-4361-a213-3c37ce27b70e" "objects_1224_created_2023-03-20T18:52:52.011Z" "objects_1224_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1224_revoked_False" "objects_1224_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1224_modified_2023-08-09T14:51:29.206Z" "objects_1224_description_On Android, the user can use the device settings menu to view trusted CA certificates and look for unexpected or unknown certificates. A mobile security product could similarly examine the trusted CA certificate store for anomalies. Users can use the device settings menu to view which applications on the device are allowed to install unknown applications.\n\nOn iOS, the user can use the device settings menu to view installed Configuration Profiles and look for unexpected or unknown profiles. A Mobile Device Management (MDM) system could use the iOS MDM APIs to examine the list of installed Configuration Profiles for anomalies." "objects_1224_relationship_type_detects" "objects_1224_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1224_target_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_1224_x_mitre_deprecated_False" "objects_1224_x_mitre_version_0.1" "objects_1224_x_mitre_attack_spec_version_3.1.0" "objects_1224_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1224_spec_version_2.1" "objects_1224_x_mitre_domains_0_mobile-attack" "objects_1225_type_relationship" "objects_1225_id_relationship--9cfcda7d-bb82-4122-a38b-fec4f5532856" "objects_1225_created_2020-05-04T14:04:56.211Z" "objects_1225_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1225_revoked_False" "objects_1225_external_references_0_source_name_Google Bread" "objects_1225_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_1225_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_1225_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1225_modified_2023-04-05T17:03:51.504Z" "objects_1225_description_[Bread](https://attack.mitre.org/software/S0432) communicates with the C2 server using HTTP requests.(Citation: Google Bread)" "objects_1225_relationship_type_uses" "objects_1225_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1225_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1225_x_mitre_deprecated_False" "objects_1225_x_mitre_version_1.0" "objects_1225_x_mitre_attack_spec_version_3.1.0" "objects_1225_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1225_spec_version_2.1" "objects_1225_x_mitre_domains_0_mobile-attack" "objects_1226_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1226_id_relationship--9d264e84-27b2-4867-82c8-55486a969d7c" "objects_1226_type_relationship" "objects_1226_created_2020-12-17T20:15:22.489Z" "objects_1226_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1226_external_references_0_source_name_Palo Alto HenBox" "objects_1226_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1226_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1226_modified_2020-12-17T20:15:22.489Z" "objects_1226_description_[HenBox](https://attack.mitre.org/software/S0544) can obtain a list of running processes.(Citation: Palo Alto HenBox)" "objects_1226_relationship_type_uses" "objects_1226_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1226_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1226_x_mitre_version_1.0" "objects_1226_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1226_spec_version_2.1" "objects_1226_x_mitre_attack_spec_version_2.1.0" "objects_1226_x_mitre_domains_0_mobile-attack" "objects_1227_type_relationship" "objects_1227_id_relationship--9d2a9348-5d0a-43b0-8776-e9bbddc659c7" "objects_1227_created_2023-03-20T18:48:56.995Z" "objects_1227_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1227_revoked_False" "objects_1227_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1227_modified_2023-08-09T15:53:41.268Z" "objects_1227_description_Application vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, the user can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions." "objects_1227_relationship_type_detects" "objects_1227_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1227_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1227_x_mitre_deprecated_False" "objects_1227_x_mitre_version_0.1" "objects_1227_x_mitre_attack_spec_version_3.1.0" "objects_1227_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1227_spec_version_2.1" "objects_1227_x_mitre_domains_0_mobile-attack" "objects_1228_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1228_id_relationship--9d4c1d68-3cc8-4cf9-b3ee-1525d0ce32de" "objects_1228_type_relationship" "objects_1228_created_2019-10-14T20:49:24.571Z" "objects_1228_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1228_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1228_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1228_external_references_0_source_name_securelist rotexy 2018" "objects_1228_modified_2020-03-31T14:49:39.188Z" "objects_1228_description_[Rotexy](https://attack.mitre.org/software/S0411) collects information about running processes.(Citation: securelist rotexy 2018)" "objects_1228_relationship_type_uses" "objects_1228_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1228_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1228_x_mitre_version_1.0" "objects_1228_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1228_spec_version_2.1" "objects_1228_x_mitre_attack_spec_version_2.1.0" "objects_1228_x_mitre_domains_0_mobile-attack" "objects_1229_type_relationship" "objects_1229_id_relationship--9d621873-6d3c-4660-be9a-57e2e8648236" "objects_1229_created_2018-10-17T00:14:20.652Z" "objects_1229_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1229_revoked_False" "objects_1229_external_references_0_source_name_Proofpoint-Marcher" "objects_1229_external_references_0_description_Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018." "objects_1229_external_references_0_url_https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks" "objects_1229_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1229_modified_2023-04-05T21:24:29.502Z" "objects_1229_description_[Marcher](https://attack.mitre.org/software/S0317) requests Android Device Administrator access.(Citation: Proofpoint-Marcher)" "objects_1229_relationship_type_uses" "objects_1229_source_ref_malware--f9854ba6-989d-43bf-828b-7240b8a65291" "objects_1229_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1229_x_mitre_deprecated_False" "objects_1229_x_mitre_version_1.0" "objects_1229_x_mitre_attack_spec_version_3.1.0" "objects_1229_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1229_spec_version_2.1" "objects_1229_x_mitre_domains_0_mobile-attack" "objects_1230_type_relationship" "objects_1230_id_relationship--9d72c60b-d5d1-4b50-a01f-3882ddb335d9" "objects_1230_created_2019-09-04T14:28:15.316Z" "objects_1230_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1230_revoked_False" "objects_1230_external_references_0_source_name_Lookout-Monokle" "objects_1230_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1230_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1230_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1230_modified_2023-04-05T21:26:48.912Z" "objects_1230_description_[Monokle](https://attack.mitre.org/software/S0407) can remount the system partition as read/write to install attacker-specified certificates.(Citation: Lookout-Monokle) " "objects_1230_relationship_type_uses" "objects_1230_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1230_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1230_x_mitre_deprecated_False" "objects_1230_x_mitre_version_1.0" "objects_1230_x_mitre_attack_spec_version_3.1.0" "objects_1230_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1230_spec_version_2.1" "objects_1230_x_mitre_domains_0_mobile-attack" "objects_1231_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1231_id_relationship--9dec6b2f-790a-4da9-86c9-1f4b7141c32c" "objects_1231_type_relationship" "objects_1231_created_2019-09-04T15:38:56.562Z" "objects_1231_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1231_external_references_0_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1231_external_references_0_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1231_external_references_0_source_name_FortiGuard-FlexiSpy" "objects_1231_modified_2020-03-31T14:49:39.188Z" "objects_1231_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can communicate with the command and control server over ports 12512 and 12514.(Citation: FortiGuard-FlexiSpy)" "objects_1231_relationship_type_uses" "objects_1231_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1231_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1231_x_mitre_version_1.0" "objects_1231_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1231_spec_version_2.1" "objects_1231_x_mitre_attack_spec_version_2.1.0" "objects_1231_x_mitre_domains_0_mobile-attack" "objects_1232_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1232_id_relationship--9e3921a8-a9e1-48c4-9b61-ff190c104f63" "objects_1232_type_relationship" "objects_1232_created_2017-12-14T16:46:06.044Z" "objects_1232_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1232_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1232_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1232_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1232_modified_2020-03-31T14:49:39.188Z" "objects_1232_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can monitor clipboard content.(Citation: TrendMicro-RCSAndroid)" "objects_1232_relationship_type_uses" "objects_1232_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1232_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_1232_x_mitre_version_1.0" "objects_1232_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1232_spec_version_2.1" "objects_1232_x_mitre_attack_spec_version_2.1.0" "objects_1232_x_mitre_domains_0_mobile-attack" "objects_1233_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1233_id_relationship--9e458d77-c856-4b02-82a7-50947b232dc3" "objects_1233_type_relationship" "objects_1233_created_2021-10-01T14:42:49.183Z" "objects_1233_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1233_external_references_0_source_name_SecureList BusyGasper" "objects_1233_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1233_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1233_modified_2021-10-06T15:32:46.533Z" "objects_1233_description_[BusyGasper](https://attack.mitre.org/software/S0655) can download a payload or updates from either its C2 server or email attachments in the adversary\u2019s inbox.(Citation: SecureList BusyGasper)" "objects_1233_relationship_type_uses" "objects_1233_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1233_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1233_x_mitre_version_1.0" "objects_1233_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1233_spec_version_2.1" "objects_1233_x_mitre_attack_spec_version_2.1.0" "objects_1233_x_mitre_domains_0_mobile-attack" "objects_1234_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1234_id_relationship--9e66ec3b-cdd6-461c-bd84-e75316818e15" "objects_1234_type_relationship" "objects_1234_created_2017-12-14T16:46:06.044Z" "objects_1234_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1234_external_references_0_source_name_CrowdStrike-Android" "objects_1234_external_references_0_description_CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017." "objects_1234_external_references_0_url_https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf" "objects_1234_modified_2020-03-31T14:49:39.188Z" "objects_1234_description_[X-Agent for Android](https://attack.mitre.org/software/S0314) was believed to have been used to obtain locational data of Ukrainian artillery forces.(Citation: CrowdStrike-Android)" "objects_1234_relationship_type_uses" "objects_1234_source_ref_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_1234_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1234_x_mitre_version_1.0" "objects_1234_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1234_spec_version_2.1" "objects_1234_x_mitre_attack_spec_version_2.1.0" "objects_1234_x_mitre_domains_0_mobile-attack" "objects_1235_type_relationship" "objects_1235_id_relationship--9e95ef68-0650-49eb-888f-47c211481be9" "objects_1235_created_2023-03-20T18:51:40.217Z" "objects_1235_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1235_revoked_False" "objects_1235_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1235_modified_2023-08-09T17:16:36.672Z" "objects_1235_description_Application vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. " "objects_1235_relationship_type_detects" "objects_1235_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1235_target_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_1235_x_mitre_deprecated_False" "objects_1235_x_mitre_version_0.1" "objects_1235_x_mitre_attack_spec_version_3.1.0" "objects_1235_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1235_spec_version_2.1" "objects_1235_x_mitre_domains_0_mobile-attack" "objects_1236_type_relationship" "objects_1236_id_relationship--9f83d618-a42d-4797-b9fe-030affdbd13f" "objects_1236_created_2023-01-18T19:46:45.399Z" "objects_1236_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1236_revoked_False" "objects_1236_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1236_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1236_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1236_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1236_modified_2023-03-27T18:49:35.020Z" "objects_1236_description_[SharkBot](https://attack.mitre.org/software/S1055) can hide and send SMS messages. [SharkBot](https://attack.mitre.org/software/S1055) can also change which application is the device\u2019s default SMS handler.(Citation: nccgroup_sharkbot_0322)" "objects_1236_relationship_type_uses" "objects_1236_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1236_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1236_x_mitre_deprecated_False" "objects_1236_x_mitre_version_0.1" "objects_1236_x_mitre_attack_spec_version_3.1.0" "objects_1236_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1236_spec_version_2.1" "objects_1236_x_mitre_domains_0_mobile-attack" "objects_1237_type_relationship" "objects_1237_id_relationship--9f9a0349-ca95-4bde-8d8d-af524ce19bc7" "objects_1237_created_2022-04-15T16:00:43.483Z" "objects_1237_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1237_revoked_False" "objects_1237_external_references_0_source_name_SecureList DVMap June 2017" "objects_1237_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_1237_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_1237_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1237_modified_2023-04-05T20:52:33.829Z" "objects_1237_description_[Dvmap](https://attack.mitre.org/software/S0420) can turn off `VerifyApps`, and can grant Device Administrator permissions via commands only, rather than using the UI.(Citation: SecureList DVMap June 2017)" "objects_1237_relationship_type_uses" "objects_1237_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_1237_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1237_x_mitre_deprecated_False" "objects_1237_x_mitre_version_0.1" "objects_1237_x_mitre_attack_spec_version_3.1.0" "objects_1237_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1237_spec_version_2.1" "objects_1237_x_mitre_domains_0_mobile-attack" "objects_1238_type_relationship" "objects_1238_id_relationship--9fa03a70-ad00-4148-ae5e-8315f3e618d2" "objects_1238_created_2020-07-15T20:20:59.375Z" "objects_1238_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1238_revoked_False" "objects_1238_external_references_0_source_name_Bitdefender Mandrake" "objects_1238_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1238_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1238_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1238_modified_2023-04-05T21:29:29.307Z" "objects_1238_description_[Mandrake](https://attack.mitre.org/software/S0485) can abuse device administrator permissions to ensure that it cannot be uninstalled until its permissions are revoked.(Citation: Bitdefender Mandrake)" "objects_1238_relationship_type_uses" "objects_1238_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1238_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1238_x_mitre_deprecated_False" "objects_1238_x_mitre_version_1.0" "objects_1238_x_mitre_attack_spec_version_3.1.0" "objects_1238_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1238_spec_version_2.1" "objects_1238_x_mitre_domains_0_mobile-attack" "objects_1239_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1239_type_relationship" "objects_1239_id_relationship--a011bcc6-b5d8-4923-b533-55abec69ff2f" "objects_1239_created_2022-03-30T20:07:33.291Z" "objects_1239_x_mitre_version_0.1" "objects_1239_x_mitre_deprecated_False" "objects_1239_revoked_False" "objects_1239_description_" "objects_1239_modified_2022-03-30T20:07:33.291Z" "objects_1239_relationship_type_revoked-by" "objects_1239_source_ref_attack-pattern--fd658820-cbba-4c95-8ac9-0fac6b1099e2" "objects_1239_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1239_x_mitre_attack_spec_version_2.1.0" "objects_1239_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1239_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1239_spec_version_2.1" "objects_1239_x_mitre_domains_0_mobile-attack" "objects_1240_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1240_id_relationship--a042d55c-b31e-41c1-9cd0-66070ec9a11d" "objects_1240_type_relationship" "objects_1240_created_2020-10-29T19:21:23.235Z" "objects_1240_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1240_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_1240_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_1240_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_1240_modified_2020-10-29T19:21:23.235Z" "objects_1240_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has hidden the C2 server address using base-64 encoding. (Citation: WeLiveSecurity AdDisplayAshas)" "objects_1240_relationship_type_uses" "objects_1240_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_1240_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1240_x_mitre_version_1.0" "objects_1240_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1240_spec_version_2.1" "objects_1240_x_mitre_attack_spec_version_2.1.0" "objects_1240_x_mitre_domains_0_mobile-attack" "objects_1241_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1241_type_relationship" "objects_1241_id_relationship--a0464679-71b6-4ab4-a72d-0428e4d75d5e" "objects_1241_created_2022-03-30T13:45:39.184Z" "objects_1241_x_mitre_version_0.1" "objects_1241_x_mitre_deprecated_False" "objects_1241_revoked_False" "objects_1241_description_Device attestation can often detect jailbroken or rooted devices." "objects_1241_modified_2022-03-30T13:45:39.184Z" "objects_1241_relationship_type_mitigates" "objects_1241_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1241_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_1241_x_mitre_attack_spec_version_2.1.0" "objects_1241_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1241_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1241_spec_version_2.1" "objects_1241_x_mitre_domains_0_mobile-attack" "objects_1242_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1242_type_relationship" "objects_1242_id_relationship--a04ae7d7-1500-49c9-bada-1a75a8670f5c" "objects_1242_created_2019-11-21T19:16:34.820Z" "objects_1242_x_mitre_version_1.0" "objects_1242_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1242_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1242_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1242_x_mitre_deprecated_False" "objects_1242_revoked_False" "objects_1242_description_[SimBad](https://attack.mitre.org/software/S0419) generates fraudulent advertising revenue by displaying ads in the background and by opening the browser and displaying ads.(Citation: CheckPoint SimBad 2019)" "objects_1242_modified_2022-04-19T14:25:41.669Z" "objects_1242_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1242_relationship_type_uses" "objects_1242_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1242_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1242_x_mitre_attack_spec_version_2.1.0" "objects_1242_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1242_spec_version_2.1" "objects_1242_x_mitre_domains_0_mobile-attack" "objects_1243_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1243_id_relationship--a04dfb58-b7d3-4abe-9f4a-fad4f7158965" "objects_1243_type_relationship" "objects_1243_created_2020-04-08T15:51:25.106Z" "objects_1243_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1243_external_references_0_source_name_ThreatFabric Ginp" "objects_1243_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1243_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1243_modified_2020-04-08T15:51:25.106Z" "objects_1243_description_[Ginp](https://attack.mitre.org/software/S0423) can obtain a list of installed applications.(Citation: ThreatFabric Ginp)" "objects_1243_relationship_type_uses" "objects_1243_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1243_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1243_x_mitre_version_1.0" "objects_1243_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1243_spec_version_2.1" "objects_1243_x_mitre_attack_spec_version_2.1.0" "objects_1243_x_mitre_domains_0_mobile-attack" "objects_1244_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1244_id_relationship--a09f8daa-aa02-45f1-8dac-9bea355c9415" "objects_1244_type_relationship" "objects_1244_created_2020-11-10T17:08:35.819Z" "objects_1244_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1244_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1244_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1244_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1244_modified_2020-11-10T17:08:35.819Z" "objects_1244_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can access the device\u2019s location and track the device over time.(Citation: Lookout Uyghur Campaign)" "objects_1244_relationship_type_uses" "objects_1244_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1244_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1244_x_mitre_version_1.0" "objects_1244_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1244_spec_version_2.1" "objects_1244_x_mitre_attack_spec_version_2.1.0" "objects_1244_x_mitre_domains_0_mobile-attack" "objects_1245_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1245_id_relationship--a1023a75-31cc-420a-9c59-b440f7fb27e6" "objects_1245_type_relationship" "objects_1245_created_2019-11-21T16:42:48.501Z" "objects_1245_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1245_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1245_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1245_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1245_external_references_1_source_name_Bitdefender - Triout 2018" "objects_1245_external_references_1_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_1245_external_references_1_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_1245_modified_2020-01-21T14:20:50.492Z" "objects_1245_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can collect location information, including GPS coordinates.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_1245_relationship_type_uses" "objects_1245_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1245_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1245_x_mitre_version_1.0" "objects_1245_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1245_spec_version_2.1" "objects_1245_x_mitre_attack_spec_version_2.1.0" "objects_1245_x_mitre_domains_0_mobile-attack" "objects_1246_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1246_type_relationship" "objects_1246_id_relationship--a111ab3c-97f2-4b17-b291-f141e9b7613f" "objects_1246_created_2022-04-01T12:50:48.459Z" "objects_1246_x_mitre_version_0.1" "objects_1246_x_mitre_deprecated_False" "objects_1246_revoked_False" "objects_1246_description_" "objects_1246_modified_2022-04-01T12:50:48.459Z" "objects_1246_relationship_type_revoked-by" "objects_1246_source_ref_attack-pattern--62adb627-f647-498e-b4cc-41499361bacb" "objects_1246_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1246_x_mitre_attack_spec_version_2.1.0" "objects_1246_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1246_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1246_spec_version_2.1" "objects_1246_x_mitre_domains_0_mobile-attack" "objects_1247_type_relationship" "objects_1247_id_relationship--a120ac54-32fa-43ad-a826-8325823b656d" "objects_1247_created_2023-09-22T19:14:12.741Z" "objects_1247_revoked_False" "objects_1247_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1247_modified_2023-09-22T19:14:12.741Z" "objects_1247_description_Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups." "objects_1247_relationship_type_mitigates" "objects_1247_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1247_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_1247_x_mitre_deprecated_False" "objects_1247_x_mitre_version_0.1" "objects_1247_x_mitre_attack_spec_version_3.1.0" "objects_1247_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1247_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1247_spec_version_2.1" "objects_1247_x_mitre_domains_0_mobile-attack" "objects_1248_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1248_id_relationship--a1814198-1f91-41d4-a413-d55e1a66c8e9" "objects_1248_type_relationship" "objects_1248_created_2020-07-20T13:27:33.548Z" "objects_1248_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1248_external_references_0_source_name_Talos-WolfRAT" "objects_1248_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_1248_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_1248_modified_2020-08-10T22:00:43.490Z" "objects_1248_description_[WolfRAT](https://attack.mitre.org/software/S0489) uses `dumpsys` to determine if certain applications are running.(Citation: Talos-WolfRAT)" "objects_1248_relationship_type_uses" "objects_1248_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_1248_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1248_x_mitre_version_1.0" "objects_1248_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1248_spec_version_2.1" "objects_1248_x_mitre_attack_spec_version_2.1.0" "objects_1248_x_mitre_domains_0_mobile-attack" "objects_1249_type_relationship" "objects_1249_id_relationship--a186540d-d235-48f1-8757-d0b46f13c6ce" "objects_1249_created_2023-06-09T19:20:23.377Z" "objects_1249_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1249_revoked_False" "objects_1249_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1249_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1249_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1249_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1249_modified_2023-09-22T20:42:33.371Z" "objects_1249_description_(Citation: lookout_hornbill_sunbird_0221)" "objects_1249_relationship_type_uses" "objects_1249_source_ref_intrusion-set--6eded342-33e5-4451-b6b2-e1c62863129f" "objects_1249_target_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1249_x_mitre_deprecated_False" "objects_1249_x_mitre_version_0.1" "objects_1249_x_mitre_attack_spec_version_3.1.0" "objects_1249_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1249_spec_version_2.1" "objects_1249_x_mitre_domains_0_mobile-attack" "objects_1250_type_relationship" "objects_1250_id_relationship--a1a9db79-4a80-4e65-91bf-72e358d2ce41" "objects_1250_created_2023-01-18T21:43:36.398Z" "objects_1250_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1250_revoked_False" "objects_1250_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1250_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1250_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1250_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1250_modified_2023-02-21T18:44:26.569Z" "objects_1250_description_[SharkBot](https://attack.mitre.org/software/S1055) can download attacker-specified files.(Citation: nccgroup_sharkbot_0322)" "objects_1250_relationship_type_uses" "objects_1250_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1250_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1250_x_mitre_deprecated_False" "objects_1250_x_mitre_version_0.1" "objects_1250_x_mitre_attack_spec_version_3.1.0" "objects_1250_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1250_spec_version_2.1" "objects_1250_x_mitre_domains_0_mobile-attack" "objects_1251_type_relationship" "objects_1251_id_relationship--a1c53fcf-a691-4233-a136-0a51d5a3840f" "objects_1251_created_2019-09-03T19:45:48.518Z" "objects_1251_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1251_revoked_False" "objects_1251_external_references_0_source_name_SWB Exodus March 2019" "objects_1251_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1251_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1251_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1251_modified_2023-04-05T17:11:03.802Z" "objects_1251_description_[Exodus](https://attack.mitre.org/software/S0405) Two can capture SMS messages.(Citation: SWB Exodus March 2019)" "objects_1251_relationship_type_uses" "objects_1251_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1251_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1251_x_mitre_deprecated_False" "objects_1251_x_mitre_version_1.0" "objects_1251_x_mitre_attack_spec_version_3.1.0" "objects_1251_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1251_spec_version_2.1" "objects_1251_x_mitre_domains_0_mobile-attack" "objects_1252_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1252_id_relationship--a1fac829-275a-409a-9060-e7bd7c63057e" "objects_1252_type_relationship" "objects_1252_created_2020-12-18T20:14:47.375Z" "objects_1252_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1252_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1252_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1252_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1252_modified_2020-12-18T20:14:47.375Z" "objects_1252_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) can obtain a list of installed apps.(Citation: WhiteOps TERRACOTTA)" "objects_1252_relationship_type_uses" "objects_1252_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1252_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1252_x_mitre_version_1.0" "objects_1252_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1252_spec_version_2.1" "objects_1252_x_mitre_attack_spec_version_2.1.0" "objects_1252_x_mitre_domains_0_mobile-attack" "objects_1253_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1253_type_relationship" "objects_1253_id_relationship--a20493e1-4699-405d-a291-c28aae8ed737" "objects_1253_created_2022-04-18T16:53:24.617Z" "objects_1253_x_mitre_version_0.1" "objects_1253_external_references_0_source_name_Wandera-RedDrop" "objects_1253_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1253_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1253_x_mitre_deprecated_False" "objects_1253_revoked_False" "objects_1253_description_[RedDrop](https://attack.mitre.org/software/S0326) uses ads or other links within websites to encourage users to download the malicious apps using a complex content distribution network (CDN) and series of network redirects. [RedDrop](https://attack.mitre.org/software/S0326) also downloads additional components (APKs, JAR files) from different C2 servers.(Citation: Wandera-RedDrop) " "objects_1253_modified_2022-04-20T16:33:23.507Z" "objects_1253_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1253_relationship_type_uses" "objects_1253_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1253_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1253_x_mitre_attack_spec_version_2.1.0" "objects_1253_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1253_spec_version_2.1" "objects_1253_x_mitre_domains_0_mobile-attack" "objects_1254_type_relationship" "objects_1254_id_relationship--a20581b4-21fa-4ed9-b056-d139998868e8" "objects_1254_created_2019-09-04T14:28:15.970Z" "objects_1254_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1254_revoked_False" "objects_1254_external_references_0_source_name_Lookout-Monokle" "objects_1254_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1254_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1254_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1254_modified_2023-04-05T19:52:44.819Z" "objects_1254_description_[Monokle](https://attack.mitre.org/software/S0407) can retrieve the device's contact list.(Citation: Lookout-Monokle)" "objects_1254_relationship_type_uses" "objects_1254_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1254_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1254_x_mitre_deprecated_False" "objects_1254_x_mitre_version_1.0" "objects_1254_x_mitre_attack_spec_version_3.1.0" "objects_1254_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1254_spec_version_2.1" "objects_1254_x_mitre_domains_0_mobile-attack" "objects_1255_type_relationship" "objects_1255_id_relationship--a2323d47-348c-4e3c-9c25-7feb20e2e457" "objects_1255_created_2018-10-17T00:14:20.652Z" "objects_1255_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1255_revoked_False" "objects_1255_external_references_0_source_name_Lookout-StealthMango" "objects_1255_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1255_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1255_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1255_modified_2023-04-05T19:53:03.638Z" "objects_1255_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uploads contact lists for various third-party applications such as Yahoo, AIM, GoogleTalk, Skype, QQ, and others.(Citation: Lookout-StealthMango)" "objects_1255_relationship_type_uses" "objects_1255_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1255_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1255_x_mitre_deprecated_False" "objects_1255_x_mitre_version_1.0" "objects_1255_x_mitre_attack_spec_version_3.1.0" "objects_1255_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1255_spec_version_2.1" "objects_1255_x_mitre_domains_0_mobile-attack" "objects_1256_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1256_type_relationship" "objects_1256_id_relationship--a2365c91-60f6-4249-af13-6bc2fdb80d52" "objects_1256_created_2019-09-23T13:36:08.459Z" "objects_1256_x_mitre_version_1.0" "objects_1256_external_references_0_source_name_securelist rotexy 2018" "objects_1256_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1256_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1256_x_mitre_deprecated_False" "objects_1256_revoked_False" "objects_1256_description_[Rotexy](https://attack.mitre.org/software/S0411) can use phishing overlays to capture users' credit card information.(Citation: securelist rotexy 2018)" "objects_1256_modified_2022-04-12T10:01:44.682Z" "objects_1256_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1256_relationship_type_uses" "objects_1256_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1256_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1256_x_mitre_attack_spec_version_2.1.0" "objects_1256_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1256_spec_version_2.1" "objects_1256_x_mitre_domains_0_mobile-attack" "objects_1257_type_relationship" "objects_1257_id_relationship--a25a0454-d6da-4448-a3c5-33648ee6675a" "objects_1257_created_2023-07-21T19:36:50.262Z" "objects_1257_revoked_False" "objects_1257_external_references_0_source_name_lookout_bouldspy_0423" "objects_1257_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1257_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1257_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1257_modified_2023-07-21T19:36:50.262Z" "objects_1257_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can collect system information, such as Android version and device identifiers.(Citation: lookout_bouldspy_0423)" "objects_1257_relationship_type_uses" "objects_1257_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1257_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1257_x_mitre_deprecated_False" "objects_1257_x_mitre_version_0.1" "objects_1257_x_mitre_attack_spec_version_3.1.0" "objects_1257_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1257_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1257_spec_version_2.1" "objects_1257_x_mitre_domains_0_mobile-attack" "objects_1258_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1258_id_relationship--a25d58af-dbb3-4025-b91d-898c6adffcb3" "objects_1258_type_relationship" "objects_1258_created_2017-12-14T16:46:06.044Z" "objects_1258_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1258_external_references_0_source_name_Gooligan Citation" "objects_1258_external_references_0_description_Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016." "objects_1258_external_references_0_url_http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/" "objects_1258_modified_2020-03-31T14:49:39.188Z" "objects_1258_description_[Gooligan](https://attack.mitre.org/software/S0290) steals authentication tokens that can be used to access data from multiple Google applications.(Citation: Gooligan Citation)" "objects_1258_relationship_type_uses" "objects_1258_source_ref_malware--20d56cd6-8dff-4871-9889-d32d254816de" "objects_1258_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1258_x_mitre_version_1.0" "objects_1258_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1258_spec_version_2.1" "objects_1258_x_mitre_attack_spec_version_2.1.0" "objects_1258_x_mitre_domains_0_mobile-attack" "objects_1259_type_relationship" "objects_1259_id_relationship--a2803d73-f5bf-4815-bfbf-662c372e1f5a" "objects_1259_created_2023-03-20T18:53:52.174Z" "objects_1259_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1259_revoked_False" "objects_1259_external_references_0_source_name_Android-AppLinks" "objects_1259_external_references_0_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_1259_external_references_0_url_https://developer.android.com/training/app-links/index.html" "objects_1259_external_references_1_source_name_IETF-OAuthNativeApps" "objects_1259_external_references_1_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_1259_external_references_1_url_https://tools.ietf.org/html/rfc8252" "objects_1259_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1259_modified_2023-08-09T16:08:37.797Z" "objects_1259_description_When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)" "objects_1259_relationship_type_detects" "objects_1259_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1259_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_1259_x_mitre_deprecated_False" "objects_1259_x_mitre_version_0.1" "objects_1259_x_mitre_attack_spec_version_3.1.0" "objects_1259_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1259_spec_version_2.1" "objects_1259_x_mitre_domains_0_mobile-attack" "objects_1260_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1260_id_relationship--a285f343-09c3-49af-9c18-1dccf89e9009" "objects_1260_type_relationship" "objects_1260_created_2020-11-20T16:37:28.391Z" "objects_1260_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1260_external_references_0_source_name_Symantec GoldenCup" "objects_1260_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1260_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1260_modified_2020-11-20T16:37:28.391Z" "objects_1260_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect a directory listing of external storage.(Citation: Symantec GoldenCup)" "objects_1260_relationship_type_uses" "objects_1260_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1260_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1260_x_mitre_version_1.0" "objects_1260_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1260_spec_version_2.1" "objects_1260_x_mitre_attack_spec_version_2.1.0" "objects_1260_x_mitre_domains_0_mobile-attack" "objects_1261_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1261_id_relationship--a28a53e9-7a42-4f81-bced-0efbc3128cbd" "objects_1261_type_relationship" "objects_1261_created_2019-09-04T15:38:56.597Z" "objects_1261_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1261_external_references_0_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1261_external_references_0_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1261_external_references_0_source_name_FortiGuard-FlexiSpy" "objects_1261_modified_2020-03-31T14:49:39.188Z" "objects_1261_description_[FlexiSpy](https://attack.mitre.org/software/S0408) encrypts its configuration file using AES.(Citation: FortiGuard-FlexiSpy)" "objects_1261_relationship_type_uses" "objects_1261_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1261_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1261_x_mitre_version_1.0" "objects_1261_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1261_spec_version_2.1" "objects_1261_x_mitre_attack_spec_version_2.1.0" "objects_1261_x_mitre_domains_0_mobile-attack" "objects_1262_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1262_id_relationship--a290a8ca-e650-456c-b33e-03343fe5ea4e" "objects_1262_type_relationship" "objects_1262_created_2017-12-14T16:46:06.044Z" "objects_1262_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1262_external_references_0_source_name_Lookout-Pegasus" "objects_1262_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1262_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1262_modified_2020-03-31T14:49:39.188Z" "objects_1262_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) accesses sensitive data in files, such as saving Skype calls by reading them out of the Skype database files.(Citation: Lookout-Pegasus)" "objects_1262_relationship_type_uses" "objects_1262_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1262_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1262_x_mitre_version_1.0" "objects_1262_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1262_spec_version_2.1" "objects_1262_x_mitre_attack_spec_version_2.1.0" "objects_1262_x_mitre_domains_0_mobile-attack" "objects_1263_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1263_id_relationship--a299e0a6-cada-4629-a6c6-ed73dc4422aa" "objects_1263_type_relationship" "objects_1263_created_2020-11-24T17:55:12.903Z" "objects_1263_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1263_external_references_0_source_name_Talos GPlayed" "objects_1263_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1263_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1263_modified_2020-11-24T17:55:12.903Z" "objects_1263_description_[GPlayed](https://attack.mitre.org/software/S0536) has base64-encoded the exfiltrated data, replacing some of the base64 characters to further obfuscate the data.(Citation: Talos GPlayed)" "objects_1263_relationship_type_uses" "objects_1263_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1263_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1263_x_mitre_version_1.0" "objects_1263_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1263_spec_version_2.1" "objects_1263_x_mitre_attack_spec_version_2.1.0" "objects_1263_x_mitre_domains_0_mobile-attack" "objects_1264_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1264_id_relationship--a32db277-593f-4fd1-bdcb-9f677b1a05e1" "objects_1264_type_relationship" "objects_1264_created_2020-06-26T14:55:13.289Z" "objects_1264_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1264_external_references_0_source_name_Cybereason EventBot" "objects_1264_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1264_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1264_modified_2020-06-26T14:55:13.289Z" "objects_1264_description_[EventBot](https://attack.mitre.org/software/S0478) can abuse Android\u2019s accessibility service to capture data from installed applications.(Citation: Cybereason EventBot)" "objects_1264_relationship_type_uses" "objects_1264_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1264_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1264_x_mitre_version_1.0" "objects_1264_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1264_spec_version_2.1" "objects_1264_x_mitre_attack_spec_version_2.1.0" "objects_1264_x_mitre_domains_0_mobile-attack" "objects_1265_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1265_type_relationship" "objects_1265_id_relationship--a34f3873-3df7-4e93-915c-fc2b4af3444d" "objects_1265_created_2020-07-15T20:20:59.380Z" "objects_1265_x_mitre_version_1.0" "objects_1265_external_references_0_source_name_Bitdefender Mandrake" "objects_1265_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1265_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1265_x_mitre_deprecated_False" "objects_1265_revoked_False" "objects_1265_description_[Mandrake](https://attack.mitre.org/software/S0485) has used Firebase for C2.(Citation: Bitdefender Mandrake)" "objects_1265_modified_2022-04-18T19:18:24.378Z" "objects_1265_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1265_relationship_type_uses" "objects_1265_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1265_target_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_1265_x_mitre_attack_spec_version_2.1.0" "objects_1265_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1265_spec_version_2.1" "objects_1265_x_mitre_domains_0_mobile-attack" "objects_1266_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1266_id_relationship--a3a8b2f2-f1aa-49ba-be55-a674f371f209" "objects_1266_type_relationship" "objects_1266_created_2020-04-24T15:06:33.449Z" "objects_1266_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1266_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1266_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1266_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1266_modified_2020-04-24T15:06:33.450Z" "objects_1266_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect device network configuration information, such as Wi-Fi SSID and IMSI.(Citation: TrendMicro Coronavirus Updates)" "objects_1266_relationship_type_uses" "objects_1266_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1266_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1266_x_mitre_version_1.0" "objects_1266_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1266_spec_version_2.1" "objects_1266_x_mitre_attack_spec_version_2.1.0" "objects_1266_x_mitre_domains_0_mobile-attack" "objects_1267_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1267_type_relationship" "objects_1267_id_relationship--a3c4b392-2879-4f31-9431-3398e034851b" "objects_1267_created_2022-04-06T13:52:37.470Z" "objects_1267_x_mitre_version_0.1" "objects_1267_x_mitre_deprecated_False" "objects_1267_revoked_False" "objects_1267_description_Users should be cautioned against granting administrative access to applications." "objects_1267_modified_2022-04-06T13:52:37.470Z" "objects_1267_relationship_type_mitigates" "objects_1267_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1267_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_1267_x_mitre_attack_spec_version_2.1.0" "objects_1267_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1267_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1267_spec_version_2.1" "objects_1267_x_mitre_domains_0_mobile-attack" "objects_1268_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1268_type_relationship" "objects_1268_id_relationship--a3c9d5d6-acc5-46e9-9e4f-b078aeac553c" "objects_1268_created_2020-12-14T14:52:03.385Z" "objects_1268_x_mitre_version_1.0" "objects_1268_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1268_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1268_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1268_x_mitre_deprecated_False" "objects_1268_revoked_False" "objects_1268_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can fetch a backup C2 domain from Twitter if the primary C2 is unresponsive.(Citation: Sophos Red Alert 2.0)" "objects_1268_modified_2022-04-20T17:56:51.457Z" "objects_1268_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1268_relationship_type_uses" "objects_1268_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1268_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_1268_x_mitre_attack_spec_version_2.1.0" "objects_1268_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1268_spec_version_2.1" "objects_1268_x_mitre_domains_0_mobile-attack" "objects_1269_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1269_id_relationship--a3f36e9e-e2f4-4745-a9a3-0d1231db116d" "objects_1269_type_relationship" "objects_1269_created_2018-10-17T00:14:20.652Z" "objects_1269_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1269_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_1269_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_1269_external_references_0_source_name_Kaspersky-Skygofree" "objects_1269_modified_2020-03-31T14:49:39.188Z" "objects_1269_description_[Skygofree](https://attack.mitre.org/software/S0327) can download executable code from the C2 server after the implant starts or after a specific command.(Citation: Kaspersky-Skygofree)" "objects_1269_relationship_type_uses" "objects_1269_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_1269_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1269_x_mitre_version_1.0" "objects_1269_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1269_spec_version_2.1" "objects_1269_x_mitre_attack_spec_version_2.1.0" "objects_1269_x_mitre_domains_0_mobile-attack" "objects_1270_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1270_type_relationship" "objects_1270_id_relationship--a427ce33-d1e1-4c38-a024-e44fc00033d3" "objects_1270_created_2020-12-14T14:52:03.283Z" "objects_1270_x_mitre_version_1.0" "objects_1270_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1270_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1270_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1270_x_mitre_deprecated_False" "objects_1270_revoked_False" "objects_1270_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has communicated with the C2 using HTTP requests over port 7878.(Citation: Sophos Red Alert 2.0)" "objects_1270_modified_2022-04-20T16:43:23.973Z" "objects_1270_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1270_relationship_type_uses" "objects_1270_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1270_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1270_x_mitre_attack_spec_version_2.1.0" "objects_1270_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1270_spec_version_2.1" "objects_1270_x_mitre_domains_0_mobile-attack" "objects_1271_type_relationship" "objects_1271_id_relationship--a451966b-f826-422b-9505-f564b9988a9c" "objects_1271_created_2020-12-24T21:55:56.693Z" "objects_1271_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1271_revoked_False" "objects_1271_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1271_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1271_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1271_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1271_modified_2023-04-05T21:27:39.012Z" "objects_1271_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has used both FTP and TCP sockets for data exfiltration.(Citation: Lookout Uyghur Campaign)" "objects_1271_relationship_type_uses" "objects_1271_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1271_target_ref_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_1271_x_mitre_deprecated_False" "objects_1271_x_mitre_version_1.0" "objects_1271_x_mitre_attack_spec_version_3.1.0" "objects_1271_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1271_spec_version_2.1" "objects_1271_x_mitre_domains_0_mobile-attack" "objects_1272_type_relationship" "objects_1272_id_relationship--a466f8f0-c9da-46d1-80d0-b8654e727526" "objects_1272_created_2023-08-04T18:33:37.920Z" "objects_1272_revoked_False" "objects_1272_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1272_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1272_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1272_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1272_modified_2023-08-04T18:33:37.920Z" "objects_1272_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate a list of installed applications.(Citation: lookout_hornbill_sunbird_0221)" "objects_1272_relationship_type_uses" "objects_1272_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1272_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1272_x_mitre_deprecated_False" "objects_1272_x_mitre_version_0.1" "objects_1272_x_mitre_attack_spec_version_3.1.0" "objects_1272_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1272_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1272_spec_version_2.1" "objects_1272_x_mitre_domains_0_mobile-attack" "objects_1273_type_relationship" "objects_1273_id_relationship--a46c3b05-07d5-461c-b1b1-4a81912b79f8" "objects_1273_created_2023-02-06T18:59:15.881Z" "objects_1273_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1273_revoked_False" "objects_1273_external_references_0_source_name_lookout_abstractemu_1021" "objects_1273_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1273_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1273_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1273_modified_2023-03-27T17:21:10.915Z" "objects_1273_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can collect device information such as manufacturer, model, version, serial number, and telephone number.(Citation: lookout_abstractemu_1021)" "objects_1273_relationship_type_uses" "objects_1273_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1273_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1273_x_mitre_deprecated_False" "objects_1273_x_mitre_version_0.1" "objects_1273_x_mitre_attack_spec_version_3.1.0" "objects_1273_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1273_spec_version_2.1" "objects_1273_x_mitre_domains_0_mobile-attack" "objects_1274_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1274_id_relationship--a501b700-250f-4e9a-a20f-656ae9bf90f9" "objects_1274_type_relationship" "objects_1274_created_2020-12-24T21:55:56.753Z" "objects_1274_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1274_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1274_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1274_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1274_modified_2020-12-24T21:55:56.753Z" "objects_1274_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has used exploit tools to gain root, such as TowelRoot.(Citation: Lookout Uyghur Campaign)" "objects_1274_relationship_type_uses" "objects_1274_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1274_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1274_x_mitre_version_1.0" "objects_1274_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1274_spec_version_2.1" "objects_1274_x_mitre_attack_spec_version_2.1.0" "objects_1274_x_mitre_domains_0_mobile-attack" "objects_1275_type_relationship" "objects_1275_id_relationship--a503ca06-7f98-4ab4-a8fc-ff55c3da7f0a" "objects_1275_created_2020-10-29T19:21:23.143Z" "objects_1275_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1275_revoked_False" "objects_1275_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_1275_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_1275_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_1275_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1275_modified_2023-04-05T17:48:18.023Z" "objects_1275_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has registered to receive the `BOOT_COMPLETED` broadcast intent to activate on device startup.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_1275_relationship_type_uses" "objects_1275_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_1275_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1275_x_mitre_deprecated_False" "objects_1275_x_mitre_version_1.0" "objects_1275_x_mitre_attack_spec_version_3.1.0" "objects_1275_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1275_spec_version_2.1" "objects_1275_x_mitre_domains_0_mobile-attack" "objects_1276_type_relationship" "objects_1276_id_relationship--a54c8c09-c849-4146-a7cc-158887222a6d" "objects_1276_created_2020-12-24T21:45:56.969Z" "objects_1276_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1276_revoked_False" "objects_1276_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1276_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1276_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1276_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1276_modified_2023-04-05T17:15:05.454Z" "objects_1276_description_[SilkBean](https://attack.mitre.org/software/S0549) can access SMS messages.(Citation: Lookout Uyghur Campaign)" "objects_1276_relationship_type_uses" "objects_1276_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1276_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1276_x_mitre_deprecated_False" "objects_1276_x_mitre_version_1.0" "objects_1276_x_mitre_attack_spec_version_3.1.0" "objects_1276_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1276_spec_version_2.1" "objects_1276_x_mitre_domains_0_mobile-attack" "objects_1277_type_relationship" "objects_1277_id_relationship--a563fc97-a452-4348-a831-f4fb55c71e35" "objects_1277_created_2023-03-03T16:22:45.712Z" "objects_1277_revoked_False" "objects_1277_external_references_0_source_name_paloalto_yispecter_1015" "objects_1277_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1277_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1277_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1277_modified_2023-03-03T16:22:45.712Z" "objects_1277_description_[YiSpecter](https://attack.mitre.org/software/S0311) has used fake Verisign and Symantec certificates to bypass malware detection systems. [YiSpecter](https://attack.mitre.org/software/S0311) has also signed malicious apps with iOS enterprise certificates to work on non-jailbroken iOS devices.(Citation: paloalto_yispecter_1015)" "objects_1277_relationship_type_uses" "objects_1277_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1277_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1277_x_mitre_deprecated_False" "objects_1277_x_mitre_version_0.1" "objects_1277_x_mitre_attack_spec_version_3.1.0" "objects_1277_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1277_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1277_spec_version_2.1" "objects_1277_x_mitre_domains_0_mobile-attack" "objects_1278_type_relationship" "objects_1278_id_relationship--a5b37f26-7629-4195-9536-12e349e5843b" "objects_1278_created_2023-03-20T18:51:04.334Z" "objects_1278_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1278_revoked_False" "objects_1278_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1278_modified_2023-08-09T14:54:47.199Z" "objects_1278_description_Application vetting services could look for applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands. This could indicate some level of sandbox evasion, as Google recommends against using system properties within applications." "objects_1278_relationship_type_detects" "objects_1278_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1278_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_1278_x_mitre_deprecated_False" "objects_1278_x_mitre_version_0.1" "objects_1278_x_mitre_attack_spec_version_3.1.0" "objects_1278_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1278_spec_version_2.1" "objects_1278_x_mitre_domains_0_mobile-attack" "objects_1279_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1279_id_relationship--a5b72279-f99e-4f03-8669-04322b40ee6b" "objects_1279_type_relationship" "objects_1279_created_2018-10-17T00:14:20.652Z" "objects_1279_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1279_external_references_0_source_name_TrendMicro-XLoader" "objects_1279_external_references_0_description_Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018." "objects_1279_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing/" "objects_1279_modified_2020-07-20T13:49:03.710Z" "objects_1279_description_[XLoader for Android](https://attack.mitre.org/software/S0318) loads an encrypted DEX code payload.(Citation: TrendMicro-XLoader)" "objects_1279_relationship_type_uses" "objects_1279_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1279_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1279_x_mitre_version_1.0" "objects_1279_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1279_spec_version_2.1" "objects_1279_x_mitre_attack_spec_version_2.1.0" "objects_1279_x_mitre_domains_0_mobile-attack" "objects_1280_type_relationship" "objects_1280_id_relationship--a5dac41f-4a16-44ea-b279-b84c927ce62d" "objects_1280_created_2019-09-03T20:08:00.760Z" "objects_1280_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1280_revoked_False" "objects_1280_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1280_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1280_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1280_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1280_modified_2023-04-05T20:11:36.853Z" "objects_1280_description_[Gustuff](https://attack.mitre.org/software/S0406) communicates with the command and control server using HTTP requests.(Citation: Talos Gustuff Apr 2019)" "objects_1280_relationship_type_uses" "objects_1280_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1280_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1280_x_mitre_deprecated_False" "objects_1280_x_mitre_version_1.0" "objects_1280_x_mitre_attack_spec_version_3.1.0" "objects_1280_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1280_spec_version_2.1" "objects_1280_x_mitre_domains_0_mobile-attack" "objects_1281_type_relationship" "objects_1281_id_relationship--a5f64f9e-3ed9-442b-a244-9857b926d93b" "objects_1281_created_2023-03-20T18:59:46.622Z" "objects_1281_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1281_revoked_False" "objects_1281_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1281_modified_2023-08-08T15:03:56.766Z" "objects_1281_description_Mobile threat defense agents could detect unauthorized operating system modifications by using attestation." "objects_1281_relationship_type_detects" "objects_1281_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1281_target_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_1281_x_mitre_deprecated_False" "objects_1281_x_mitre_version_0.1" "objects_1281_x_mitre_attack_spec_version_3.1.0" "objects_1281_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1281_spec_version_2.1" "objects_1281_x_mitre_domains_0_mobile-attack" "objects_1282_type_relationship" "objects_1282_id_relationship--a63bafb6-6647-410f-8673-a53ef2dee5e2" "objects_1282_created_2020-07-27T14:14:57.020Z" "objects_1282_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1282_revoked_False" "objects_1282_external_references_0_source_name_Google Security Zen" "objects_1282_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_1282_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_1282_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1282_modified_2023-04-05T20:52:46.975Z" "objects_1282_description_[Zen](https://attack.mitre.org/software/S0494) can modify the SELinux enforcement mode.(Citation: Google Security Zen)" "objects_1282_relationship_type_uses" "objects_1282_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_1282_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1282_x_mitre_deprecated_False" "objects_1282_x_mitre_version_1.0" "objects_1282_x_mitre_attack_spec_version_3.1.0" "objects_1282_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1282_spec_version_2.1" "objects_1282_x_mitre_domains_0_mobile-attack" "objects_1283_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1283_id_relationship--a67c5611-00bc-4e1a-a1be-2512a2bcf072" "objects_1283_type_relationship" "objects_1283_created_2020-09-11T15:14:34.064Z" "objects_1283_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1283_external_references_0_source_name_SMS KitKat" "objects_1283_external_references_0_url_https://android-developers.googleblog.com/2013/10/getting-your-sms-apps-ready-for-kitkat.html" "objects_1283_external_references_0_description_S.Main, D. Braun. (2013, October 14). Getting Your SMS Apps Ready for KitKat. Retrieved September 11, 2020." "objects_1283_modified_2020-10-22T17:04:15.708Z" "objects_1283_description_Users should be encouraged to be very careful with what applications they grant SMS access to. Further, users should not change their default SMS handler to applications they do not recognize.(Citation: SMS KitKat)" "objects_1283_relationship_type_mitigates" "objects_1283_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1283_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1283_x_mitre_version_1.0" "objects_1283_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1283_spec_version_2.1" "objects_1283_x_mitre_attack_spec_version_2.1.0" "objects_1283_x_mitre_domains_0_mobile-attack" "objects_1284_type_relationship" "objects_1284_id_relationship--a6bb6c55-3b33-4cd4-981b-055551edc4c2" "objects_1284_created_2023-01-18T21:24:28.714Z" "objects_1284_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1284_revoked_False" "objects_1284_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1284_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1284_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1284_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1284_modified_2023-03-27T18:55:39.648Z" "objects_1284_description_[SharkBot](https://attack.mitre.org/software/S1055) can use a Domain Generation Algorithm to decode the C2 server location.(Citation: nccgroup_sharkbot_0322) " "objects_1284_relationship_type_uses" "objects_1284_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1284_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1284_x_mitre_deprecated_False" "objects_1284_x_mitre_version_0.1" "objects_1284_x_mitre_attack_spec_version_3.1.0" "objects_1284_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1284_spec_version_2.1" "objects_1284_x_mitre_domains_0_mobile-attack" "objects_1285_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1285_id_relationship--a7336f2c-8f89-4d54-ac2b-77743afb2943" "objects_1285_type_relationship" "objects_1285_created_2018-10-17T00:14:20.652Z" "objects_1285_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1285_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1285_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1285_external_references_0_source_name_Lookout-StealthMango" "objects_1285_modified_2020-03-31T14:49:39.188Z" "objects_1285_description_[Stealth Mango](https://attack.mitre.org/software/S0328) collects and uploads information about changes in SIM card or phone numbers on the device.(Citation: Lookout-StealthMango)" "objects_1285_relationship_type_uses" "objects_1285_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1285_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1285_x_mitre_version_1.0" "objects_1285_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1285_spec_version_2.1" "objects_1285_x_mitre_attack_spec_version_2.1.0" "objects_1285_x_mitre_domains_0_mobile-attack" "objects_1286_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1286_id_relationship--a76d731b-484c-442a-b1a3-255d8398aefd" "objects_1286_type_relationship" "objects_1286_created_2019-10-10T15:22:52.545Z" "objects_1286_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1286_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1286_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1286_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1286_modified_2020-03-31T14:49:39.188Z" "objects_1286_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can collect passwords for Wi-Fi networks and online accounts, including Skype, Facebook, Twitter, Google, WhatsApp, Mail, and LinkedIn.(Citation: TrendMicro-RCSAndroid)" "objects_1286_relationship_type_uses" "objects_1286_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1286_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1286_x_mitre_version_1.0" "objects_1286_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1286_spec_version_2.1" "objects_1286_x_mitre_attack_spec_version_2.1.0" "objects_1286_x_mitre_domains_0_mobile-attack" "objects_1287_type_relationship" "objects_1287_id_relationship--a772d1fc-e2d1-4553-b93f-12412cdc8360" "objects_1287_created_2023-08-08T22:50:32.635Z" "objects_1287_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1287_revoked_False" "objects_1287_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1287_modified_2023-08-14T16:52:18.036Z" "objects_1287_description_The user can view applications that have registered accessibility services in the accessibility menu within the device settings." "objects_1287_relationship_type_detects" "objects_1287_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1287_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1287_x_mitre_deprecated_False" "objects_1287_x_mitre_version_0.1" "objects_1287_x_mitre_attack_spec_version_3.1.0" "objects_1287_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1287_spec_version_2.1" "objects_1287_x_mitre_domains_0_mobile-attack" "objects_1288_type_relationship" "objects_1288_id_relationship--a7b276ac-6f07-4d1f-8d24-dc5682acf62d" "objects_1288_created_2017-12-14T16:46:06.044Z" "objects_1288_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1288_revoked_False" "objects_1288_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1288_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1288_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1288_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1288_modified_2023-04-05T17:13:36.481Z" "objects_1288_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses calendar entries.(Citation: Lookout-PegasusAndroid)" "objects_1288_relationship_type_uses" "objects_1288_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1288_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1288_x_mitre_deprecated_False" "objects_1288_x_mitre_version_1.0" "objects_1288_x_mitre_attack_spec_version_3.1.0" "objects_1288_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1288_spec_version_2.1" "objects_1288_x_mitre_domains_0_mobile-attack" "objects_1289_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1289_id_relationship--a7cc0168-247d-4a6d-b6f4-d5a04f99216c" "objects_1289_type_relationship" "objects_1289_created_2018-10-17T00:14:20.652Z" "objects_1289_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1289_modified_2018-10-17T00:14:20.652Z" "objects_1289_relationship_type_revoked-by" "objects_1289_source_ref_attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc" "objects_1289_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_1289_x_mitre_version_1.0" "objects_1289_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1289_spec_version_2.1" "objects_1289_x_mitre_attack_spec_version_2.1.0" "objects_1289_x_mitre_domains_0_mobile-attack" "objects_1290_type_relationship" "objects_1290_id_relationship--a8079e6a-ef87-4e3b-9f71-cf1ea2360892" "objects_1290_created_2017-12-14T16:46:06.044Z" "objects_1290_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1290_revoked_False" "objects_1290_external_references_0_source_name_NYTimes-BackDoor" "objects_1290_external_references_0_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_1290_external_references_0_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_1290_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1290_modified_2023-04-05T19:53:24.312Z" "objects_1290_description_[Adups](https://attack.mitre.org/software/S0309) transmitted contact lists.(Citation: NYTimes-BackDoor)" "objects_1290_relationship_type_uses" "objects_1290_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_1290_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1290_x_mitre_deprecated_False" "objects_1290_x_mitre_version_1.0" "objects_1290_x_mitre_attack_spec_version_3.1.0" "objects_1290_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1290_spec_version_2.1" "objects_1290_x_mitre_domains_0_mobile-attack" "objects_1291_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1291_id_relationship--a808c887-b2b8-4b05-9cab-47c918e48d48" "objects_1291_type_relationship" "objects_1291_created_2020-12-14T15:02:35.257Z" "objects_1291_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1291_external_references_0_source_name_Securelist Asacub" "objects_1291_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1291_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1291_modified_2020-12-14T15:02:35.257Z" "objects_1291_description_[Asacub](https://attack.mitre.org/software/S0540) can send SMS messages from compromised devices.(Citation: Securelist Asacub) " "objects_1291_relationship_type_uses" "objects_1291_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1291_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1291_x_mitre_version_1.0" "objects_1291_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1291_spec_version_2.1" "objects_1291_x_mitre_attack_spec_version_2.1.0" "objects_1291_x_mitre_domains_0_mobile-attack" "objects_1292_type_relationship" "objects_1292_id_relationship--a81431c4-ac34-4b63-9647-eb7c8e529e03" "objects_1292_created_2020-12-24T21:45:56.962Z" "objects_1292_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1292_revoked_False" "objects_1292_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1292_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1292_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1292_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1292_modified_2023-04-05T17:14:46.472Z" "objects_1292_description_[SilkBean](https://attack.mitre.org/software/S0549) can access call logs.(Citation: Lookout Uyghur Campaign)" "objects_1292_relationship_type_uses" "objects_1292_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1292_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1292_x_mitre_deprecated_False" "objects_1292_x_mitre_version_1.0" "objects_1292_x_mitre_attack_spec_version_3.1.0" "objects_1292_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1292_spec_version_2.1" "objects_1292_x_mitre_domains_0_mobile-attack" "objects_1293_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1293_id_relationship--a82d3cfb-7ef2-4e39-a6e1-3097d7b106f7" "objects_1293_type_relationship" "objects_1293_created_2019-03-11T15:13:40.425Z" "objects_1293_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1293_external_references_0_description_Karl Dominguez. (2011, September 27). ANDROIDOS_ANSERVER.A. Retrieved November 30, 2018." "objects_1293_external_references_0_url_https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ANDROIDOS_ANSERVER.A" "objects_1293_external_references_0_source_name_TrendMicro-Anserver2" "objects_1293_modified_2020-03-31T14:49:39.188Z" "objects_1293_description_[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) gathers the device OS version, device build version, manufacturer, and model.(Citation: TrendMicro-Anserver2)" "objects_1293_relationship_type_uses" "objects_1293_source_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_1293_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1293_x_mitre_version_1.0" "objects_1293_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1293_spec_version_2.1" "objects_1293_x_mitre_attack_spec_version_2.1.0" "objects_1293_x_mitre_domains_0_mobile-attack" "objects_1294_type_relationship" "objects_1294_id_relationship--a8565c17-7054-4d3f-bca5-6e17dc931491" "objects_1294_created_2023-03-03T16:20:08.033Z" "objects_1294_revoked_False" "objects_1294_external_references_0_source_name_paloalto_yispecter_1015" "objects_1294_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1294_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1294_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1294_modified_2023-03-03T16:20:08.033Z" "objects_1294_description_[YiSpecter](https://attack.mitre.org/software/S0311) has used private APIs to download and install other pieces of itself, as well as other malicious apps. (Citation: paloalto_yispecter_1015)" "objects_1294_relationship_type_uses" "objects_1294_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1294_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1294_x_mitre_deprecated_False" "objects_1294_x_mitre_version_0.1" "objects_1294_x_mitre_attack_spec_version_3.1.0" "objects_1294_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1294_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1294_spec_version_2.1" "objects_1294_x_mitre_domains_0_mobile-attack" "objects_1295_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1295_id_relationship--a87fa426-3968-4d3b-8f8d-8e3c3a9c32f5" "objects_1295_type_relationship" "objects_1295_created_2019-09-03T20:08:00.764Z" "objects_1295_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1295_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1295_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1295_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1295_modified_2020-03-31T14:49:39.188Z" "objects_1295_description_[Gustuff](https://attack.mitre.org/software/S0406) gathers information about the device, including the default SMS application, if SafetyNet is enabled, the battery level, the operating system version, and if the malware has elevated permissions.(Citation: Talos Gustuff Apr 2019)" "objects_1295_relationship_type_uses" "objects_1295_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1295_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1295_x_mitre_version_1.0" "objects_1295_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1295_spec_version_2.1" "objects_1295_x_mitre_attack_spec_version_2.1.0" "objects_1295_x_mitre_domains_0_mobile-attack" "objects_1296_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1296_id_relationship--a8ac5084-5631-4670-8ac6-6fbe7bdb0a84" "objects_1296_type_relationship" "objects_1296_created_2019-07-10T15:35:43.708Z" "objects_1296_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1296_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1296_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1296_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1296_modified_2020-03-31T14:49:39.188Z" "objects_1296_description_[Pallas](https://attack.mitre.org/software/S0399) tracks the latitude and longitude coordinates of the infected device.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1296_relationship_type_uses" "objects_1296_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1296_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1296_x_mitre_version_1.0" "objects_1296_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1296_spec_version_2.1" "objects_1296_x_mitre_attack_spec_version_2.1.0" "objects_1296_x_mitre_domains_0_mobile-attack" "objects_1297_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1297_type_relationship" "objects_1297_id_relationship--a8bf6bbd-88f0-4725-ba4f-3b9317dca388" "objects_1297_created_2022-03-30T20:36:18.656Z" "objects_1297_x_mitre_version_0.1" "objects_1297_x_mitre_deprecated_False" "objects_1297_revoked_False" "objects_1297_description_Attestation can typically detect rooted devices. For MDM-enrolled devices, action can be taken if a device fails an attestation check. " "objects_1297_modified_2022-03-30T20:36:18.656Z" "objects_1297_relationship_type_mitigates" "objects_1297_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1297_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1297_x_mitre_attack_spec_version_2.1.0" "objects_1297_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1297_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1297_spec_version_2.1" "objects_1297_x_mitre_domains_0_mobile-attack" "objects_1298_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1298_type_relationship" "objects_1298_id_relationship--a8c21a71-f3e9-43e9-9212-faf9181e70ce" "objects_1298_created_2022-04-01T18:42:50.381Z" "objects_1298_x_mitre_version_0.1" "objects_1298_x_mitre_deprecated_False" "objects_1298_revoked_False" "objects_1298_description_Providing user guidance around commonly abused features, such as the modal that requests for administrator permissions, should aid in preventing impairing defenses." "objects_1298_modified_2022-04-01T18:42:50.381Z" "objects_1298_relationship_type_mitigates" "objects_1298_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1298_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1298_x_mitre_attack_spec_version_2.1.0" "objects_1298_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1298_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1298_spec_version_2.1" "objects_1298_x_mitre_domains_0_mobile-attack" "objects_1299_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1299_id_relationship--a8dd6ed7-910d-4bae-a2a8-19f3f32c915c" "objects_1299_type_relationship" "objects_1299_created_2019-09-23T13:36:08.390Z" "objects_1299_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1299_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1299_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1299_external_references_0_source_name_securelist rotexy 2018" "objects_1299_modified_2020-03-31T14:49:39.188Z" "objects_1299_description_Starting in 2017, the [Rotexy](https://attack.mitre.org/software/S0411) DEX file was packed with garbage strings and/or operations.(Citation: securelist rotexy 2018)" "objects_1299_relationship_type_uses" "objects_1299_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1299_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1299_x_mitre_version_1.0" "objects_1299_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1299_spec_version_2.1" "objects_1299_x_mitre_attack_spec_version_2.1.0" "objects_1299_x_mitre_domains_0_mobile-attack" "objects_1300_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1300_type_relationship" "objects_1300_id_relationship--a92a805e-d5f5-4e94-8592-c253e03e4476" "objects_1300_created_2022-03-31T19:51:15.415Z" "objects_1300_x_mitre_version_0.1" "objects_1300_external_references_0_source_name_Android Package Visibility" "objects_1300_external_references_0_url_https://developer.android.com/training/package-visibility" "objects_1300_external_references_0_description_Google. (n.d.). Package visibility filtering on Android. Retrieved April 11, 2022." "objects_1300_x_mitre_deprecated_False" "objects_1300_revoked_False" "objects_1300_description_Android 11 introduced privacy enhancements to package visibility, filtering results that are returned from the package manager. iOS 12 removed the private API that could previously be used to list installed applications on non-app store applications.(Citation: Android Package Visibility)" "objects_1300_modified_2022-04-11T19:19:34.658Z" "objects_1300_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1300_relationship_type_mitigates" "objects_1300_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1300_target_ref_attack-pattern--1d44f529-6fe6-489f-8a01-6261ac43f05e" "objects_1300_x_mitre_attack_spec_version_2.1.0" "objects_1300_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1300_spec_version_2.1" "objects_1300_x_mitre_domains_0_mobile-attack" "objects_1301_type_relationship" "objects_1301_id_relationship--a93ee044-bd5d-48f3-972e-0abab780c35c" "objects_1301_created_2023-02-08T20:05:06.786Z" "objects_1301_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1301_revoked_False" "objects_1301_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_1301_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_1301_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_1301_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1301_modified_2023-03-29T21:21:22.070Z" "objects_1301_description_[TianySpy](https://attack.mitre.org/software/S1056) can steal information via malicious JavaScript.(Citation: trendmicro_tianyspy_0122)" "objects_1301_relationship_type_uses" "objects_1301_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_1301_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_1301_x_mitre_deprecated_False" "objects_1301_x_mitre_version_0.1" "objects_1301_x_mitre_attack_spec_version_3.1.0" "objects_1301_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1301_spec_version_2.1" "objects_1301_x_mitre_domains_0_mobile-attack" "objects_1302_type_relationship" "objects_1302_id_relationship--a95fe853-d1d1-47dc-a776-b905daacfe32" "objects_1302_created_2020-06-26T20:16:32.181Z" "objects_1302_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1302_revoked_False" "objects_1302_external_references_0_source_name_ESET DEFENSOR ID" "objects_1302_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_1302_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_1302_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1302_modified_2023-04-05T20:11:53.609Z" "objects_1302_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) has used Firebase Cloud Messaging for C2.(Citation: ESET DEFENSOR ID) " "objects_1302_relationship_type_uses" "objects_1302_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_1302_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1302_x_mitre_deprecated_False" "objects_1302_x_mitre_version_1.0" "objects_1302_x_mitre_attack_spec_version_3.1.0" "objects_1302_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1302_spec_version_2.1" "objects_1302_x_mitre_domains_0_mobile-attack" "objects_1303_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1303_id_relationship--a9689f2c-ad8f-4861-8cad-d78e07fd1530" "objects_1303_type_relationship" "objects_1303_created_2020-01-27T17:05:58.213Z" "objects_1303_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1303_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1303_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1303_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1303_modified_2020-01-27T17:05:58.213Z" "objects_1303_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain a list of installed applications.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1303_relationship_type_uses" "objects_1303_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1303_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1303_x_mitre_version_1.0" "objects_1303_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1303_spec_version_2.1" "objects_1303_x_mitre_attack_spec_version_2.1.0" "objects_1303_x_mitre_domains_0_mobile-attack" "objects_1304_type_relationship" "objects_1304_id_relationship--a98c127b-8da9-4ea5-980e-d154ea541ec9" "objects_1304_created_2022-04-01T17:08:15.158Z" "objects_1304_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1304_revoked_False" "objects_1304_external_references_0_source_name_CSRIC5-WG10-FinalReport" "objects_1304_external_references_0_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_1304_external_references_0_url_https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_1304_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1304_modified_2023-08-15T15:06:03.429Z" "objects_1304_description_Filtering requests by checking request origin information may provide some defense against spurious operators.(Citation: CSRIC5-WG10-FinalReport) " "objects_1304_relationship_type_mitigates" "objects_1304_source_ref_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_1304_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1304_x_mitre_deprecated_False" "objects_1304_x_mitre_version_0.1" "objects_1304_x_mitre_attack_spec_version_3.1.0" "objects_1304_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1304_spec_version_2.1" "objects_1304_x_mitre_domains_0_mobile-attack" "objects_1305_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1305_id_relationship--a9e97a14-ea3c-47b1-a865-0a1edea9c81c" "objects_1305_type_relationship" "objects_1305_created_2021-02-17T20:43:52.410Z" "objects_1305_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1305_external_references_0_source_name_Lookout FrozenCell" "objects_1305_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1305_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1305_modified_2021-02-17T20:43:52.410Z" "objects_1305_description_[FrozenCell](https://attack.mitre.org/software/S0577) has searched for pdf, doc, docx, ppt, pptx, xls, and xlsx file types for exfiltration.(Citation: Lookout FrozenCell)" "objects_1305_relationship_type_uses" "objects_1305_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1305_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1305_x_mitre_version_1.0" "objects_1305_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1305_spec_version_2.1" "objects_1305_x_mitre_attack_spec_version_2.1.0" "objects_1305_x_mitre_domains_0_mobile-attack" "objects_1306_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1306_type_relationship" "objects_1306_id_relationship--aa1deed1-800c-470b-ac88-eb8013c11ec0" "objects_1306_created_2019-09-03T20:08:00.711Z" "objects_1306_x_mitre_version_1.0" "objects_1306_external_references_0_source_name_Group IB Gustuff Mar 2019" "objects_1306_external_references_0_url_https://www.group-ib.com/blog/gustuff" "objects_1306_external_references_0_description_Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named \u00abGustuff\u00bb capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019." "objects_1306_external_references_1_source_name_Talos Gustuff Apr 2019" "objects_1306_external_references_1_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1306_external_references_1_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1306_x_mitre_deprecated_False" "objects_1306_revoked_False" "objects_1306_description_[Gustuff](https://attack.mitre.org/software/S0406) uses WebView overlays to prompt the user for their device unlock code, as well as banking and cryptocurrency application credentials. [Gustuff](https://attack.mitre.org/software/S0406) can also send push notifications pretending to be from a bank, triggering a phishing overlay.(Citation: Talos Gustuff Apr 2019)(Citation: Group IB Gustuff Mar 2019)" "objects_1306_modified_2022-04-19T19:42:17.904Z" "objects_1306_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1306_relationship_type_uses" "objects_1306_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1306_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1306_x_mitre_attack_spec_version_2.1.0" "objects_1306_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1306_spec_version_2.1" "objects_1306_x_mitre_domains_0_mobile-attack" "objects_1307_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1307_type_relationship" "objects_1307_id_relationship--aa40d01f-0741-4bf2-bacd-75e1f3a77af0" "objects_1307_created_2022-04-01T16:52:03.322Z" "objects_1307_x_mitre_version_0.1" "objects_1307_x_mitre_deprecated_False" "objects_1307_revoked_False" "objects_1307_description_" "objects_1307_modified_2022-04-01T16:52:03.322Z" "objects_1307_relationship_type_subtechnique-of" "objects_1307_source_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1307_target_ref_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_1307_x_mitre_attack_spec_version_2.1.0" "objects_1307_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1307_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1307_spec_version_2.1" "objects_1307_x_mitre_domains_0_mobile-attack" "objects_1308_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1308_type_relationship" "objects_1308_id_relationship--aa5877fd-ef7d-435e-86af-c427f086b3c5" "objects_1308_created_2019-08-08T18:47:57.655Z" "objects_1308_x_mitre_version_1.0" "objects_1308_external_references_0_source_name_Android 10 Privacy Changes" "objects_1308_external_references_0_url_https://developer.android.com/about/versions/10/privacy/changes#clipboard-data" "objects_1308_external_references_0_description_Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019." "objects_1308_x_mitre_deprecated_False" "objects_1308_revoked_False" "objects_1308_description_Android 10 introduced changes to prevent applications from accessing clipboard data if they are not in the foreground or set as the device\u2019s default IME.(Citation: Android 10 Privacy Changes) " "objects_1308_modified_2022-04-01T16:35:38.189Z" "objects_1308_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1308_relationship_type_mitigates" "objects_1308_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1308_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_1308_x_mitre_attack_spec_version_2.1.0" "objects_1308_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1308_spec_version_2.1" "objects_1308_x_mitre_domains_0_mobile-attack" "objects_1309_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1309_type_relationship" "objects_1309_id_relationship--aa628e44-ff05-4ac9-bb0b-11c22384a443" "objects_1309_created_2020-07-20T13:49:03.676Z" "objects_1309_x_mitre_version_1.0" "objects_1309_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1309_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1309_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1309_x_mitre_deprecated_False" "objects_1309_revoked_False" "objects_1309_description_[XLoader for Android](https://attack.mitre.org/software/S0318) has fetched its C2 address from encoded Twitter names, as well as Instagram and Tumblr.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1309_modified_2022-04-20T17:58:16.567Z" "objects_1309_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1309_relationship_type_uses" "objects_1309_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1309_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_1309_x_mitre_attack_spec_version_2.1.0" "objects_1309_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1309_spec_version_2.1" "objects_1309_x_mitre_domains_0_mobile-attack" "objects_1310_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1310_id_relationship--aa8e45c2-4276-451b-b1eb-59c396bf720a" "objects_1310_type_relationship" "objects_1310_created_2017-12-14T16:46:06.044Z" "objects_1310_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1310_external_references_0_source_name_Gooligan Citation" "objects_1310_external_references_0_description_Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016." "objects_1310_external_references_0_url_http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/" "objects_1310_modified_2020-03-31T14:49:39.188Z" "objects_1310_description_[Gooligan](https://attack.mitre.org/software/S0290) executes Android root exploits.(Citation: Gooligan Citation)" "objects_1310_relationship_type_uses" "objects_1310_source_ref_malware--20d56cd6-8dff-4871-9889-d32d254816de" "objects_1310_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1310_x_mitre_version_1.0" "objects_1310_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1310_spec_version_2.1" "objects_1310_x_mitre_attack_spec_version_2.1.0" "objects_1310_x_mitre_domains_0_mobile-attack" "objects_1311_type_relationship" "objects_1311_id_relationship--aaf55dd1-33df-4f02-8025-eaae01f30b33" "objects_1311_created_2017-12-14T16:46:06.044Z" "objects_1311_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1311_revoked_False" "objects_1311_external_references_0_source_name_Lookout-EnterpriseApps" "objects_1311_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_1311_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_1311_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1311_modified_2023-04-05T19:53:38.161Z" "objects_1311_description_[AndroRAT](https://attack.mitre.org/software/S0292) collects contact list information.(Citation: Lookout-EnterpriseApps)" "objects_1311_relationship_type_uses" "objects_1311_source_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_1311_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1311_x_mitre_deprecated_False" "objects_1311_x_mitre_version_1.0" "objects_1311_x_mitre_attack_spec_version_3.1.0" "objects_1311_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1311_spec_version_2.1" "objects_1311_x_mitre_domains_0_mobile-attack" "objects_1312_type_relationship" "objects_1312_id_relationship--ab18ee61-f94a-411c-9893-941714ce713e" "objects_1312_created_2023-03-20T18:44:26.642Z" "objects_1312_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1312_revoked_False" "objects_1312_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1312_modified_2023-08-14T16:47:05.294Z" "objects_1312_description_Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them." "objects_1312_relationship_type_detects" "objects_1312_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1312_target_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_1312_x_mitre_deprecated_False" "objects_1312_x_mitre_version_0.1" "objects_1312_x_mitre_attack_spec_version_3.1.0" "objects_1312_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1312_spec_version_2.1" "objects_1312_x_mitre_domains_0_mobile-attack" "objects_1313_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1313_type_relationship" "objects_1313_id_relationship--ab67b233-2c3d-4ac2-a3f0-13b6484ea920" "objects_1313_created_2022-04-05T19:46:22.326Z" "objects_1313_x_mitre_version_0.1" "objects_1313_x_mitre_deprecated_False" "objects_1313_revoked_False" "objects_1313_description_Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as keyboard registration or accessibility service access." "objects_1313_modified_2022-04-05T19:46:22.326Z" "objects_1313_relationship_type_mitigates" "objects_1313_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1313_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1313_x_mitre_attack_spec_version_2.1.0" "objects_1313_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1313_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1313_spec_version_2.1" "objects_1313_x_mitre_domains_0_mobile-attack" "objects_1314_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1314_type_relationship" "objects_1314_id_relationship--ab7cd212-7faa-46a8-9666-92a67ae7a6b0" "objects_1314_created_2018-10-17T00:14:20.652Z" "objects_1314_x_mitre_version_1.0" "objects_1314_x_mitre_deprecated_False" "objects_1314_revoked_False" "objects_1314_description_" "objects_1314_modified_2022-07-07T14:00:00.188Z" "objects_1314_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1314_relationship_type_revoked-by" "objects_1314_source_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_1314_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1314_x_mitre_attack_spec_version_2.1.0" "objects_1314_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1314_spec_version_2.1" "objects_1314_x_mitre_domains_0_mobile-attack" "objects_1315_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1315_type_relationship" "objects_1315_id_relationship--abd2e863-4bd3-4686-b2aa-f8a097a41c99" "objects_1315_created_2017-10-25T14:48:53.742Z" "objects_1315_x_mitre_version_1.0" "objects_1315_external_references_0_source_name_Elcomsoft-iOSRestricted" "objects_1315_external_references_0_url_https://blog.elcomsoft.com/2018/09/ios-12-enhances-usb-restricted-mode/" "objects_1315_external_references_0_description_Oleg Afonin. (2018, September 20). iOS 12 Enhances USB Restricted Mode. Retrieved September 21, 2018." "objects_1315_x_mitre_deprecated_False" "objects_1315_revoked_False" "objects_1315_description_iOS 11.4.1 and higher introduce USB Restricted Mode, which disables data access through the device's charging port under certain conditions (making the port only usable for power), likely preventing this technique from working.(Citation: Elcomsoft-iOSRestricted)" "objects_1315_modified_2022-04-01T15:35:28.360Z" "objects_1315_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1315_relationship_type_mitigates" "objects_1315_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1315_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1315_x_mitre_attack_spec_version_2.1.0" "objects_1315_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1315_spec_version_2.1" "objects_1315_x_mitre_domains_0_mobile-attack" "objects_1316_type_relationship" "objects_1316_id_relationship--abf03652-acd0-4361-8a66-f7e70e8e4376" "objects_1316_created_2020-06-02T14:32:31.913Z" "objects_1316_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1316_revoked_False" "objects_1316_external_references_0_source_name_Volexity Insomnia" "objects_1316_external_references_0_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_1316_external_references_0_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_1316_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1316_modified_2023-04-05T20:12:12.766Z" "objects_1316_description_[INSOMNIA](https://attack.mitre.org/software/S0463) communicates with the C2 server using HTTPS requests.(Citation: Volexity Insomnia)" "objects_1316_relationship_type_uses" "objects_1316_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1316_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1316_x_mitre_deprecated_False" "objects_1316_x_mitre_version_1.0" "objects_1316_x_mitre_attack_spec_version_3.1.0" "objects_1316_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1316_spec_version_2.1" "objects_1316_x_mitre_domains_0_mobile-attack" "objects_1317_type_relationship" "objects_1317_id_relationship--abf3b5c8-9ee5-42ff-ba94-2b3a15317783" "objects_1317_created_2023-03-20T18:55:51.580Z" "objects_1317_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1317_revoked_False" "objects_1317_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1317_modified_2023-08-09T15:57:46.908Z" "objects_1317_description_An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). " "objects_1317_relationship_type_detects" "objects_1317_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1317_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1317_x_mitre_deprecated_False" "objects_1317_x_mitre_version_0.1" "objects_1317_x_mitre_attack_spec_version_3.1.0" "objects_1317_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1317_spec_version_2.1" "objects_1317_x_mitre_domains_0_mobile-attack" "objects_1318_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1318_type_relationship" "objects_1318_id_relationship--ac31f650-4bd2-4bb6-b450-71e66db4888f" "objects_1318_created_2022-03-30T19:28:55.980Z" "objects_1318_x_mitre_version_0.1" "objects_1318_x_mitre_deprecated_False" "objects_1318_revoked_False" "objects_1318_description_Security updates typically provide patches for vulnerabilities that could be abused by malicious applications." "objects_1318_modified_2022-03-30T19:28:55.980Z" "objects_1318_relationship_type_mitigates" "objects_1318_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1318_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1318_x_mitre_attack_spec_version_2.1.0" "objects_1318_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1318_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1318_spec_version_2.1" "objects_1318_x_mitre_domains_0_mobile-attack" "objects_1319_type_relationship" "objects_1319_id_relationship--ac415e32-e204-4382-b500-2370cec7a608" "objects_1319_created_2023-08-16T16:45:58.547Z" "objects_1319_revoked_False" "objects_1319_external_references_0_source_name_cyble_chameleon_0423" "objects_1319_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_1319_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_1319_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1319_modified_2023-08-16T16:45:58.547Z" "objects_1319_description_[Chameleon](https://attack.mitre.org/software/S1083) can download new code at runtime.(Citation: cyble_chameleon_0423)" "objects_1319_relationship_type_uses" "objects_1319_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_1319_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1319_x_mitre_deprecated_False" "objects_1319_x_mitre_version_0.1" "objects_1319_x_mitre_attack_spec_version_3.1.0" "objects_1319_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1319_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1319_spec_version_2.1" "objects_1319_x_mitre_domains_0_mobile-attack" "objects_1320_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1320_id_relationship--ac53e382-a140-4bbf-a59d-db3fe21acfaa" "objects_1320_type_relationship" "objects_1320_created_2018-10-17T00:14:20.652Z" "objects_1320_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1320_modified_2018-10-17T00:14:20.652Z" "objects_1320_relationship_type_revoked-by" "objects_1320_source_ref_attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431" "objects_1320_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1320_x_mitre_version_1.0" "objects_1320_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1320_spec_version_2.1" "objects_1320_x_mitre_attack_spec_version_2.1.0" "objects_1320_x_mitre_domains_0_mobile-attack" "objects_1321_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1321_id_relationship--ad0c873b-9e45-44e0-adaf-529921ee7a77" "objects_1321_type_relationship" "objects_1321_created_2020-06-26T15:32:25.035Z" "objects_1321_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1321_external_references_0_source_name_Threat Fabric Cerberus" "objects_1321_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1321_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1321_external_references_1_source_name_CheckPoint Cerberus" "objects_1321_external_references_1_url_https://research.checkpoint.com/2020/mobile-as-attack-vector-using-mdm/" "objects_1321_external_references_1_description_A. Hazum, B. Melnykov, C. Efrati, D. Golubenko, I. Wernik, L. Kuperman, O. Mana. (2020, April 29). First seen in the wild \u2013 Malware uses Corporate MDM as attack vector. Retrieved June 26, 2020." "objects_1321_modified_2020-06-26T15:32:25.035Z" "objects_1321_description_[Cerberus](https://attack.mitre.org/software/S0480) can collect device information, such as the default SMS app and device locale.(Citation: Threat Fabric Cerberus)(Citation: CheckPoint Cerberus)" "objects_1321_relationship_type_uses" "objects_1321_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1321_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1321_x_mitre_version_1.0" "objects_1321_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1321_spec_version_2.1" "objects_1321_x_mitre_attack_spec_version_2.1.0" "objects_1321_x_mitre_domains_0_mobile-attack" "objects_1322_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1322_id_relationship--ad2c8b49-bbfb-47dd-84bb-cd4dbc49a64c" "objects_1322_type_relationship" "objects_1322_created_2019-09-03T19:45:48.512Z" "objects_1322_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1322_external_references_0_source_name_SWB Exodus March 2019" "objects_1322_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1322_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1322_modified_2020-03-31T14:49:39.188Z" "objects_1322_description_[Exodus](https://attack.mitre.org/software/S0405) Two attempts to connect to port 22011 to provide a remote reverse shell.(Citation: SWB Exodus March 2019)" "objects_1322_relationship_type_uses" "objects_1322_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1322_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1322_x_mitre_version_1.0" "objects_1322_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1322_spec_version_2.1" "objects_1322_x_mitre_attack_spec_version_2.1.0" "objects_1322_x_mitre_domains_0_mobile-attack" "objects_1323_type_relationship" "objects_1323_id_relationship--ad723fb0-7439-407e-9bf5-1cb3fd7df8aa" "objects_1323_created_2023-02-06T19:05:28.288Z" "objects_1323_revoked_False" "objects_1323_external_references_0_source_name_lookout_abstractemu_1021" "objects_1323_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1323_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1323_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1323_modified_2023-02-06T19:05:28.288Z" "objects_1323_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can collect files from or inspect the device\u2019s filesystem.(Citation: lookout_abstractemu_1021)" "objects_1323_relationship_type_uses" "objects_1323_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1323_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1323_x_mitre_deprecated_False" "objects_1323_x_mitre_version_0.1" "objects_1323_x_mitre_attack_spec_version_3.1.0" "objects_1323_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1323_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1323_spec_version_2.1" "objects_1323_x_mitre_domains_0_mobile-attack" "objects_1324_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1324_type_relationship" "objects_1324_id_relationship--ad76b0ad-fa76-4d56-8a6e-8818bbc6509e" "objects_1324_created_2022-03-30T18:07:07.306Z" "objects_1324_x_mitre_version_0.1" "objects_1324_x_mitre_deprecated_False" "objects_1324_revoked_False" "objects_1324_description_On iOS, the `allowEnterpriseAppTrust` and `allowEnterpriseAppTrustModification` configuration profile restrictions can be used to prevent users from installing apps signed using enterprise distribution keys. " "objects_1324_modified_2022-03-30T18:07:07.306Z" "objects_1324_relationship_type_mitigates" "objects_1324_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1324_target_ref_attack-pattern--79cb02f4-ac4e-4335-8b51-425c9573cce1" "objects_1324_x_mitre_attack_spec_version_2.1.0" "objects_1324_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1324_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1324_spec_version_2.1" "objects_1324_x_mitre_domains_0_mobile-attack" "objects_1325_type_relationship" "objects_1325_id_relationship--ada67532-039d-4b4f-93ab-82ceba13ec56" "objects_1325_created_2023-07-21T19:53:12.605Z" "objects_1325_revoked_False" "objects_1325_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_1325_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_1325_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_1325_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1325_modified_2023-07-21T19:53:12.605Z" "objects_1325_description_[Fakecalls](https://attack.mitre.org/software/S1080) can access text message history.(Citation: kaspersky_fakecalls_0422)" "objects_1325_relationship_type_uses" "objects_1325_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_1325_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1325_x_mitre_deprecated_False" "objects_1325_x_mitre_version_0.1" "objects_1325_x_mitre_attack_spec_version_3.1.0" "objects_1325_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1325_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1325_spec_version_2.1" "objects_1325_x_mitre_domains_0_mobile-attack" "objects_1326_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1326_id_relationship--adc9957c-fa57-4e81-9231-b60f01b69859" "objects_1326_type_relationship" "objects_1326_created_2020-12-24T22:04:28.010Z" "objects_1326_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1326_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1326_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1326_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1326_modified_2020-12-24T22:04:28.010Z" "objects_1326_description_[GoldenEagle](https://attack.mitre.org/software/S0551) can download new code to update itself.(Citation: Lookout Uyghur Campaign)" "objects_1326_relationship_type_uses" "objects_1326_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1326_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1326_x_mitre_version_1.0" "objects_1326_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1326_spec_version_2.1" "objects_1326_x_mitre_attack_spec_version_2.1.0" "objects_1326_x_mitre_domains_0_mobile-attack" "objects_1327_type_relationship" "objects_1327_id_relationship--ade5c0c5-8b53-4bc5-9d81-0284be2e5fee" "objects_1327_created_2023-07-21T19:51:55.111Z" "objects_1327_revoked_False" "objects_1327_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_1327_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_1327_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_1327_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1327_modified_2023-07-21T19:51:55.111Z" "objects_1327_description_[Fakecalls](https://attack.mitre.org/software/S1080) can intercept and imitate phone conversations by breaking the connection and displaying a fake call screen. It can also make outgoing calls and spoof incoming calls.(Citation: kaspersky_fakecalls_0422)" "objects_1327_relationship_type_uses" "objects_1327_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_1327_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_1327_x_mitre_deprecated_False" "objects_1327_x_mitre_version_0.1" "objects_1327_x_mitre_attack_spec_version_3.1.0" "objects_1327_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1327_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1327_spec_version_2.1" "objects_1327_x_mitre_domains_0_mobile-attack" "objects_1328_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1328_type_relationship" "objects_1328_id_relationship--aeeadd6b-30d3-4b4f-ac61-fd0bc367b415" "objects_1328_created_2022-03-30T14:50:07.291Z" "objects_1328_x_mitre_version_0.1" "objects_1328_x_mitre_deprecated_False" "objects_1328_revoked_False" "objects_1328_description_Device attestation could detect unauthorized operating system modifications." "objects_1328_modified_2022-03-30T14:50:07.291Z" "objects_1328_relationship_type_mitigates" "objects_1328_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1328_target_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_1328_x_mitre_attack_spec_version_2.1.0" "objects_1328_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1328_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1328_spec_version_2.1" "objects_1328_x_mitre_domains_0_mobile-attack" "objects_1329_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1329_id_relationship--af55d12a-5f58-4135-90d0-f465a66f7a3f" "objects_1329_type_relationship" "objects_1329_created_2020-07-15T20:20:59.305Z" "objects_1329_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1329_external_references_0_source_name_Bitdefender Mandrake" "objects_1329_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1329_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1329_modified_2020-07-15T20:20:59.305Z" "objects_1329_description_[Mandrake](https://attack.mitre.org/software/S0485) abuses the accessibility service to prevent removing administrator permissions, accessibility permissions, and to set itself as the default SMS handler.(Citation: Bitdefender Mandrake)" "objects_1329_relationship_type_uses" "objects_1329_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1329_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1329_x_mitre_version_1.0" "objects_1329_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1329_spec_version_2.1" "objects_1329_x_mitre_attack_spec_version_2.1.0" "objects_1329_x_mitre_domains_0_mobile-attack" "objects_1330_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1330_id_relationship--afba6b19-7486-4e5a-8fda-e91852b0b354" "objects_1330_type_relationship" "objects_1330_created_2021-09-20T13:42:21.104Z" "objects_1330_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1330_modified_2021-09-27T18:05:43.107Z" "objects_1330_description_Users should be encouraged to be very careful with what applications they grant phone call-based permissions to. Further, users should not change their default call handler to applications they do not recognize." "objects_1330_relationship_type_mitigates" "objects_1330_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1330_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_1330_x_mitre_version_1.0" "objects_1330_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1330_spec_version_2.1" "objects_1330_x_mitre_attack_spec_version_2.1.0" "objects_1330_x_mitre_domains_0_mobile-attack" "objects_1331_type_relationship" "objects_1331_id_relationship--afc0e8b2-2e85-4640-8517-fb2e16831082" "objects_1331_created_2023-01-18T19:45:27.807Z" "objects_1331_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1331_revoked_False" "objects_1331_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1331_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1331_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1331_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1331_modified_2023-03-27T18:56:03.190Z" "objects_1331_description_[SharkBot](https://attack.mitre.org/software/S1055) can use a WebView with a fake log in site to capture banking credentials.(Citation: nccgroup_sharkbot_0322)" "objects_1331_relationship_type_uses" "objects_1331_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1331_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1331_x_mitre_deprecated_False" "objects_1331_x_mitre_version_0.1" "objects_1331_x_mitre_attack_spec_version_3.1.0" "objects_1331_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1331_spec_version_2.1" "objects_1331_x_mitre_domains_0_mobile-attack" "objects_1332_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1332_id_relationship--afc0f502-39bb-41e3-b4fc-5b5bb1a1175b" "objects_1332_type_relationship" "objects_1332_created_2018-10-17T00:14:20.652Z" "objects_1332_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1332_external_references_0_source_name_Lookout-StealthMango" "objects_1332_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1332_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1332_modified_2020-03-31T14:49:39.188Z" "objects_1332_description_[Tangelo](https://attack.mitre.org/software/S0329) contains functionality to record calls as well as the victim device's environment.(Citation: Lookout-StealthMango)" "objects_1332_relationship_type_uses" "objects_1332_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_1332_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1332_x_mitre_version_1.0" "objects_1332_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1332_spec_version_2.1" "objects_1332_x_mitre_attack_spec_version_2.1.0" "objects_1332_x_mitre_domains_0_mobile-attack" "objects_1333_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1333_id_relationship--afe9e326-01f7-4296-a11b-09cfffd80120" "objects_1333_type_relationship" "objects_1333_created_2020-07-27T14:14:56.962Z" "objects_1333_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1333_external_references_0_source_name_Google Security Zen" "objects_1333_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_1333_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_1333_modified_2020-08-10T22:18:20.747Z" "objects_1333_description_[Zen](https://attack.mitre.org/software/S0494) can simulate user clicks on ads and system prompts to create new Google accounts.(Citation: Google Security Zen)" "objects_1333_relationship_type_uses" "objects_1333_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_1333_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1333_x_mitre_version_1.0" "objects_1333_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1333_spec_version_2.1" "objects_1333_x_mitre_attack_spec_version_2.1.0" "objects_1333_x_mitre_domains_0_mobile-attack" "objects_1334_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1334_id_relationship--b018fe06-740b-4864-b30a-f047598506b3" "objects_1334_type_relationship" "objects_1334_created_2020-04-24T15:06:33.510Z" "objects_1334_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1334_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1334_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1334_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1334_modified_2020-04-24T15:06:33.510Z" "objects_1334_description_[Corona Updates](https://attack.mitre.org/software/S0425) can collect various pieces of device information, including OS version, phone model, and manufacturer.(Citation: TrendMicro Coronavirus Updates) " "objects_1334_relationship_type_uses" "objects_1334_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1334_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1334_x_mitre_version_1.0" "objects_1334_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1334_spec_version_2.1" "objects_1334_x_mitre_attack_spec_version_2.1.0" "objects_1334_x_mitre_domains_0_mobile-attack" "objects_1335_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1335_id_relationship--b05668b9-aa06-4191-a4fa-f7e5a7804694" "objects_1335_type_relationship" "objects_1335_created_2021-01-05T20:16:20.514Z" "objects_1335_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1335_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1335_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1335_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1335_modified_2021-01-05T20:16:20.514Z" "objects_1335_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can list all hidden files in the `/DCIM/.dat/` directory.(Citation: Zscaler TikTok Spyware)" "objects_1335_relationship_type_uses" "objects_1335_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1335_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1335_x_mitre_version_1.0" "objects_1335_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1335_spec_version_2.1" "objects_1335_x_mitre_attack_spec_version_2.1.0" "objects_1335_x_mitre_domains_0_mobile-attack" "objects_1336_type_relationship" "objects_1336_id_relationship--b0625604-e4c4-402b-b191-f43137d38d99" "objects_1336_created_2020-11-20T15:44:57.481Z" "objects_1336_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1336_revoked_False" "objects_1336_external_references_0_source_name_Symantec GoldenCup" "objects_1336_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1336_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1336_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1336_modified_2023-04-05T20:29:50.160Z" "objects_1336_description_[Golden Cup](https://attack.mitre.org/software/S0535) can collect sent and received SMS messages.(Citation: Symantec GoldenCup)" "objects_1336_relationship_type_uses" "objects_1336_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1336_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1336_x_mitre_deprecated_False" "objects_1336_x_mitre_version_1.0" "objects_1336_x_mitre_attack_spec_version_3.1.0" "objects_1336_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1336_spec_version_2.1" "objects_1336_x_mitre_domains_0_mobile-attack" "objects_1337_type_relationship" "objects_1337_id_relationship--b0bade50-bcca-4924-9746-c4ed0c3be76c" "objects_1337_created_2023-07-21T19:41:31.114Z" "objects_1337_revoked_False" "objects_1337_external_references_0_source_name_lookout_bouldspy_0423" "objects_1337_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1337_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1337_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1337_modified_2023-07-21T19:41:31.114Z" "objects_1337_description_[BOULDSPY](https://attack.mitre.org/software/S1079) has been installed using the package name `com.android.callservice`, pretending to be an Android system service.(Citation: lookout_bouldspy_0423)" "objects_1337_relationship_type_uses" "objects_1337_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1337_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1337_x_mitre_deprecated_False" "objects_1337_x_mitre_version_0.1" "objects_1337_x_mitre_attack_spec_version_3.1.0" "objects_1337_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1337_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1337_spec_version_2.1" "objects_1337_x_mitre_domains_0_mobile-attack" "objects_1338_type_relationship" "objects_1338_id_relationship--b0d0541d-caeb-43c0-906c-2e1e2ec25f69" "objects_1338_created_2019-10-14T19:14:18.673Z" "objects_1338_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1338_revoked_False" "objects_1338_external_references_0_source_name_Group IB Gustuff Mar 2019" "objects_1338_external_references_0_description_Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named \u00abGustuff\u00bb capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019." "objects_1338_external_references_0_url_https://www.group-ib.com/blog/gustuff" "objects_1338_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1338_modified_2023-04-05T17:32:47.359Z" "objects_1338_description_[Gustuff](https://attack.mitre.org/software/S0406) hides its icon after installation.(Citation: Group IB Gustuff Mar 2019) " "objects_1338_relationship_type_uses" "objects_1338_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1338_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1338_x_mitre_deprecated_False" "objects_1338_x_mitre_version_1.0" "objects_1338_x_mitre_attack_spec_version_3.1.0" "objects_1338_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1338_spec_version_2.1" "objects_1338_x_mitre_domains_0_mobile-attack" "objects_1339_type_relationship" "objects_1339_id_relationship--b0fe69e0-d08f-488d-b1cf-3f0dbb28accc" "objects_1339_created_2023-02-28T20:37:01.639Z" "objects_1339_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1339_revoked_False" "objects_1339_external_references_0_source_name_proofpoint_flubot_0421" "objects_1339_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1339_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1339_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1339_modified_2023-03-31T22:13:55.642Z" "objects_1339_description_[FluBot](https://attack.mitre.org/software/S1067) can use `locale.getLanguage()` to choose the language for notifications and avoid user detection.(Citation: proofpoint_flubot_0421)" "objects_1339_relationship_type_uses" "objects_1339_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1339_target_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_1339_x_mitre_deprecated_False" "objects_1339_x_mitre_version_0.1" "objects_1339_x_mitre_attack_spec_version_3.1.0" "objects_1339_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1339_spec_version_2.1" "objects_1339_x_mitre_domains_0_mobile-attack" "objects_1340_type_relationship" "objects_1340_id_relationship--b110d919-acd4-4fe0-a46a-ac4819508667" "objects_1340_created_2020-07-20T13:58:53.589Z" "objects_1340_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1340_revoked_False" "objects_1340_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1340_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1340_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1340_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1340_modified_2023-04-05T21:21:35.992Z" "objects_1340_description_[XLoader for iOS](https://attack.mitre.org/software/S0490) has been installed via a malicious configuration profile.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1340_relationship_type_uses" "objects_1340_source_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_1340_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1340_x_mitre_deprecated_False" "objects_1340_x_mitre_version_1.0" "objects_1340_x_mitre_attack_spec_version_3.1.0" "objects_1340_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1340_spec_version_2.1" "objects_1340_x_mitre_domains_0_mobile-attack" "objects_1341_type_relationship" "objects_1341_id_relationship--b19082d2-c151-45dd-8844-82335fbe3ed9" "objects_1341_created_2023-02-28T21:43:54.880Z" "objects_1341_revoked_False" "objects_1341_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_1341_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_1341_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_1341_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1341_modified_2023-02-28T21:43:54.880Z" "objects_1341_description_[TangleBot](https://attack.mitre.org/software/S1069) can send text messages.(Citation: cloudmark_tanglebot_0921)" "objects_1341_relationship_type_uses" "objects_1341_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_1341_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1341_x_mitre_deprecated_False" "objects_1341_x_mitre_version_0.1" "objects_1341_x_mitre_attack_spec_version_3.1.0" "objects_1341_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1341_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1341_spec_version_2.1" "objects_1341_x_mitre_domains_0_mobile-attack" "objects_1342_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1342_id_relationship--b1e5bd2f-01e4-402d-a9b6-255110510a83" "objects_1342_type_relationship" "objects_1342_created_2020-12-24T21:45:56.986Z" "objects_1342_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1342_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1342_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1342_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1342_modified_2020-12-24T21:45:56.986Z" "objects_1342_description_[SilkBean](https://attack.mitre.org/software/S0549) can install new applications which are obtained from the C2 server.(Citation: Lookout Uyghur Campaign)" "objects_1342_relationship_type_uses" "objects_1342_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1342_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1342_x_mitre_version_1.0" "objects_1342_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1342_spec_version_2.1" "objects_1342_x_mitre_attack_spec_version_2.1.0" "objects_1342_x_mitre_domains_0_mobile-attack" "objects_1343_type_relationship" "objects_1343_id_relationship--b2277deb-0ddb-45a7-9690-4a2168e1026b" "objects_1343_created_2023-10-10T15:33:59.058Z" "objects_1343_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1343_revoked_False" "objects_1343_external_references_0_source_name_Lookout FrozenCell" "objects_1343_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1343_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1343_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1343_modified_2023-10-10T15:33:59.058Z" "objects_1343_description_[FrozenCell](https://attack.mitre.org/software/S0577) has masqueraded as fake updates to chat applications such as Facebook, WhatsApp, Messenger, LINE, and LoveChat, as well as apps targeting Middle Eastern demographics.(Citation: Lookout FrozenCell) " "objects_1343_relationship_type_uses" "objects_1343_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1343_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1343_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1343_x_mitre_deprecated_False" "objects_1343_x_mitre_version_1.0" "objects_1343_x_mitre_attack_spec_version_2.1.0" "objects_1343_spec_version_2.1" "objects_1343_x_mitre_domains_0_mobile-attack" "objects_1344_type_relationship" "objects_1344_id_relationship--b22addc1-6a23-4657-8164-3705e12bb95b" "objects_1344_created_2023-07-21T19:40:41.725Z" "objects_1344_revoked_False" "objects_1344_external_references_0_source_name_lookout_bouldspy_0423" "objects_1344_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1344_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1344_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1344_modified_2023-07-21T19:40:41.725Z" "objects_1344_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can use SMS to send C2 commands.(Citation: lookout_bouldspy_0423)" "objects_1344_relationship_type_uses" "objects_1344_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1344_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1344_x_mitre_deprecated_False" "objects_1344_x_mitre_version_0.1" "objects_1344_x_mitre_attack_spec_version_3.1.0" "objects_1344_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1344_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1344_spec_version_2.1" "objects_1344_x_mitre_domains_0_mobile-attack" "objects_1345_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1345_id_relationship--b24553a7-01c7-49b2-b1e0-fb961e788de2" "objects_1345_type_relationship" "objects_1345_created_2020-06-26T15:32:25.062Z" "objects_1345_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1345_external_references_0_source_name_Threat Fabric Cerberus" "objects_1345_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1345_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1345_modified_2020-06-26T15:32:25.062Z" "objects_1345_description_[Cerberus](https://attack.mitre.org/software/S0480) can obtain a list of installed applications.(Citation: Threat Fabric Cerberus)" "objects_1345_relationship_type_uses" "objects_1345_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1345_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1345_x_mitre_version_1.0" "objects_1345_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1345_spec_version_2.1" "objects_1345_x_mitre_attack_spec_version_2.1.0" "objects_1345_x_mitre_domains_0_mobile-attack" "objects_1346_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1346_type_relationship" "objects_1346_id_relationship--b247a4f6-3629-4123-84b0-c7c5b3e7e37e" "objects_1346_created_2022-03-30T20:45:34.433Z" "objects_1346_x_mitre_version_0.1" "objects_1346_external_references_0_source_name_Android Package Visibility" "objects_1346_external_references_0_url_https://developer.android.com/training/package-visibility" "objects_1346_external_references_0_description_Google. (n.d.). Package visibility filtering on Android. Retrieved April 11, 2022." "objects_1346_x_mitre_deprecated_False" "objects_1346_revoked_False" "objects_1346_description_Android 11 introduced privacy enhancements to package visibility, filtering results that are returned from the package manager. iOS 12 removed the private API that could previously be used to list installed applications on non-app store applications.(Citation: Android Package Visibility)" "objects_1346_modified_2022-04-11T19:19:52.562Z" "objects_1346_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1346_relationship_type_mitigates" "objects_1346_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1346_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1346_x_mitre_attack_spec_version_2.1.0" "objects_1346_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1346_spec_version_2.1" "objects_1346_x_mitre_domains_0_mobile-attack" "objects_1347_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1347_type_relationship" "objects_1347_id_relationship--b263e4e9-972d-4ba7-8be8-e55eb6a483c0" "objects_1347_created_2017-12-14T16:46:06.044Z" "objects_1347_x_mitre_version_1.0" "objects_1347_external_references_0_source_name_ArsTechnica-HummingWhale" "objects_1347_external_references_0_url_http://arstechnica.com/security/2017/01/virulent-android-malware-returns-gets-2-million-downloads-on-google-play/" "objects_1347_external_references_0_description_Dan Goodin. (2017, January 23). Virulent Android malware returns, gets >2 million downloads on Google Play. Retrieved January 24, 2017." "objects_1347_x_mitre_deprecated_False" "objects_1347_revoked_False" "objects_1347_description_[HummingWhale](https://attack.mitre.org/software/S0321) generates revenue by displaying fraudulent ads and automatically installing apps. When victims try to close the ads, [HummingWhale](https://attack.mitre.org/software/S0321) runs in a virtual machine, creating a fake ID that allows the perpetrators to generate revenue.(Citation: ArsTechnica-HummingWhale)" "objects_1347_modified_2022-04-19T14:25:41.669Z" "objects_1347_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1347_relationship_type_uses" "objects_1347_source_ref_malware--6447e3a1-ef4d-44b1-99d5-6b1c4888674f" "objects_1347_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1347_x_mitre_attack_spec_version_2.1.0" "objects_1347_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1347_spec_version_2.1" "objects_1347_x_mitre_domains_0_mobile-attack" "objects_1348_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1348_id_relationship--b2896068-4d54-41e1-b0f2-db9385615112" "objects_1348_type_relationship" "objects_1348_created_2021-01-05T20:16:20.426Z" "objects_1348_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1348_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1348_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1348_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1348_modified_2021-01-05T20:16:20.426Z" "objects_1348_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has shown a persistent notification to maintain access to device sensors.(Citation: Zscaler TikTok Spyware)" "objects_1348_relationship_type_uses" "objects_1348_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1348_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_1348_x_mitre_version_1.0" "objects_1348_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1348_spec_version_2.1" "objects_1348_x_mitre_attack_spec_version_2.1.0" "objects_1348_x_mitre_domains_0_mobile-attack" "objects_1349_type_relationship" "objects_1349_id_relationship--b309c25a-6baf-4874-829d-63712a38652c" "objects_1349_created_2023-02-06T19:02:16.194Z" "objects_1349_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1349_revoked_False" "objects_1349_external_references_0_source_name_lookout_abstractemu_1021" "objects_1349_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1349_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1349_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1349_modified_2023-03-27T17:21:41.461Z" "objects_1349_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can grant itself camera permissions.(Citation: lookout_abstractemu_1021)" "objects_1349_relationship_type_uses" "objects_1349_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1349_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1349_x_mitre_deprecated_False" "objects_1349_x_mitre_version_0.1" "objects_1349_x_mitre_attack_spec_version_3.1.0" "objects_1349_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1349_spec_version_2.1" "objects_1349_x_mitre_domains_0_mobile-attack" "objects_1350_type_relationship" "objects_1350_id_relationship--b30fa851-75cf-46ac-aa1b-cfa8b7f36545" "objects_1350_created_2019-09-23T13:36:08.429Z" "objects_1350_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1350_revoked_False" "objects_1350_external_references_0_source_name_securelist rotexy 2018" "objects_1350_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1350_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1350_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1350_modified_2023-04-05T16:56:23.365Z" "objects_1350_description_[Rotexy](https://attack.mitre.org/software/S0411) processes incoming SMS messages by filtering based on phone numbers, keywords, and regular expressions, focusing primarily on banks, payment systems, and mobile network operators. [Rotexy](https://attack.mitre.org/software/S0411) can also send a list of all SMS messages on the device to the command and control server.(Citation: securelist rotexy 2018)" "objects_1350_relationship_type_uses" "objects_1350_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1350_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1350_x_mitre_deprecated_False" "objects_1350_x_mitre_version_1.0" "objects_1350_x_mitre_attack_spec_version_3.1.0" "objects_1350_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1350_spec_version_2.1" "objects_1350_x_mitre_domains_0_mobile-attack" "objects_1351_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1351_id_relationship--b356d405-f6b1-485b-bd35-236b9da766d2" "objects_1351_type_relationship" "objects_1351_created_2020-04-24T17:46:31.586Z" "objects_1351_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1351_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1351_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1351_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1351_modified_2020-04-27T15:27:26.539Z" "objects_1351_description_[TrickMo](https://attack.mitre.org/software/S0427) can use the `MediaRecorder` class to record the screen when the targeted application is presented to the user, and can abuse accessibility features to record targeted applications to intercept transaction authorization numbers (TANs) and to scrape on-screen text.(Citation: SecurityIntelligence TrickMo)" "objects_1351_relationship_type_uses" "objects_1351_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1351_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1351_x_mitre_version_1.0" "objects_1351_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1351_spec_version_2.1" "objects_1351_x_mitre_attack_spec_version_2.1.0" "objects_1351_x_mitre_domains_0_mobile-attack" "objects_1352_type_relationship" "objects_1352_id_relationship--b360a1c8-8939-428e-bc6e-3f4755bd9ee0" "objects_1352_created_2020-10-29T17:48:27.394Z" "objects_1352_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1352_revoked_False" "objects_1352_external_references_0_source_name_Threat Fabric Exobot" "objects_1352_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1352_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1352_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1352_modified_2023-04-05T20:30:18.307Z" "objects_1352_description_[Exobot](https://attack.mitre.org/software/S0522) can intercept SMS messages.(Citation: Threat Fabric Exobot)" "objects_1352_relationship_type_uses" "objects_1352_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1352_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1352_x_mitre_deprecated_False" "objects_1352_x_mitre_version_1.0" "objects_1352_x_mitre_attack_spec_version_3.1.0" "objects_1352_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1352_spec_version_2.1" "objects_1352_x_mitre_domains_0_mobile-attack" "objects_1353_type_relationship" "objects_1353_id_relationship--b37ebb4e-0536-4de0-8e00-7b3d942a02b7" "objects_1353_created_2023-03-20T15:33:34.181Z" "objects_1353_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1353_revoked_False" "objects_1353_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1353_modified_2023-08-07T17:19:28.650Z" "objects_1353_description_System partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition." "objects_1353_relationship_type_detects" "objects_1353_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1353_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1353_x_mitre_deprecated_False" "objects_1353_x_mitre_version_0.1" "objects_1353_x_mitre_attack_spec_version_3.1.0" "objects_1353_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1353_spec_version_2.1" "objects_1353_x_mitre_domains_0_mobile-attack" "objects_1354_type_relationship" "objects_1354_id_relationship--b3866c07-e143-4d0d-9176-c2845f85c5ab" "objects_1354_created_2023-01-18T19:58:21.223Z" "objects_1354_revoked_False" "objects_1354_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1354_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1354_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1354_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1354_modified_2023-01-18T19:58:21.223Z" "objects_1354_description_[SharkBot](https://attack.mitre.org/software/S1055) has used RSA to encrypt the symmetric encryption key used for C2 messages.(Citation: nccgroup_sharkbot_0322)" "objects_1354_relationship_type_uses" "objects_1354_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1354_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_1354_x_mitre_deprecated_False" "objects_1354_x_mitre_version_0.1" "objects_1354_x_mitre_attack_spec_version_3.1.0" "objects_1354_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1354_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1354_spec_version_2.1" "objects_1354_x_mitre_domains_0_mobile-attack" "objects_1355_type_relationship" "objects_1355_id_relationship--b3a14001-e0c0-4f13-ac03-04e56dc0e312" "objects_1355_created_2023-10-10T15:33:59.311Z" "objects_1355_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1355_revoked_False" "objects_1355_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1355_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1355_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1355_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1355_modified_2023-10-10T15:33:59.311Z" "objects_1355_description_[SilkBean](https://attack.mitre.org/software/S0549) has been incorporated into trojanized applications, including Uyghur/Arabic focused keyboards, alphabets, and plugins, as well as official-looking Google applications.(Citation: Lookout Uyghur Campaign)" "objects_1355_relationship_type_uses" "objects_1355_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1355_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1355_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1355_x_mitre_deprecated_False" "objects_1355_x_mitre_version_1.0" "objects_1355_x_mitre_attack_spec_version_2.1.0" "objects_1355_spec_version_2.1" "objects_1355_x_mitre_domains_0_mobile-attack" "objects_1356_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1356_id_relationship--b3bb33bf-9034-4d5c-8ea0-31d3bbd12b6b" "objects_1356_type_relationship" "objects_1356_created_2017-12-14T16:46:06.044Z" "objects_1356_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1356_external_references_0_source_name_PaloAlto-WireLurker" "objects_1356_external_references_0_description_Claud Xiao. (2014, November 5). WireLurker: A New Era in OS X and iOS Malware. Retrieved January 24, 2017." "objects_1356_external_references_0_url_https://researchcenter.paloaltonetworks.com/2014/11/wirelurker-new-era-os-x-ios-malware/" "objects_1356_modified_2020-03-31T14:49:39.188Z" "objects_1356_description_[WireLurker](https://attack.mitre.org/software/S0312) obfuscates its payload through complex code structure, multiple component versions, file hiding, code obfuscation and customized encryption to thwart anti-reversing.(Citation: PaloAlto-WireLurker)" "objects_1356_relationship_type_uses" "objects_1356_source_ref_malware--326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb" "objects_1356_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1356_x_mitre_version_1.0" "objects_1356_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1356_spec_version_2.1" "objects_1356_x_mitre_attack_spec_version_2.1.0" "objects_1356_x_mitre_domains_0_mobile-attack" "objects_1357_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1357_type_relationship" "objects_1357_id_relationship--b402664b-a5b4-45e4-832f-02638e6c67a7" "objects_1357_created_2022-04-01T14:59:17.991Z" "objects_1357_x_mitre_version_0.1" "objects_1357_x_mitre_deprecated_False" "objects_1357_revoked_False" "objects_1357_description_Mobile security products can take appropriate action when jailbroken devices are detected, potentially limiting the adversary\u2019s access to password stores. " "objects_1357_modified_2022-04-01T14:59:17.991Z" "objects_1357_relationship_type_mitigates" "objects_1357_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1357_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_1357_x_mitre_attack_spec_version_2.1.0" "objects_1357_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1357_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1357_spec_version_2.1" "objects_1357_x_mitre_domains_0_mobile-attack" "objects_1358_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1358_type_relationship" "objects_1358_id_relationship--b40e34ad-b699-4196-aa07-5bd71fe8f213" "objects_1358_created_2022-04-20T17:31:58.697Z" "objects_1358_x_mitre_version_0.1" "objects_1358_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1358_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1358_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1358_x_mitre_deprecated_False" "objects_1358_revoked_False" "objects_1358_description_[Corona Updates](https://attack.mitre.org/software/S0425) has exfiltrated data using FTP.(Citation: TrendMicro Coronavirus Updates)" "objects_1358_modified_2022-04-20T17:31:58.697Z" "objects_1358_relationship_type_uses" "objects_1358_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1358_target_ref_attack-pattern--37047267-3e56-453c-833e-d92b68118120" "objects_1358_x_mitre_attack_spec_version_2.1.0" "objects_1358_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1358_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1358_spec_version_2.1" "objects_1358_x_mitre_domains_0_mobile-attack" "objects_1359_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1359_id_relationship--b4180067-52b6-4109-91df-52fd9a7ed2e8" "objects_1359_type_relationship" "objects_1359_created_2017-12-14T16:46:06.044Z" "objects_1359_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1359_external_references_0_source_name_Lookout-EnterpriseApps" "objects_1359_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_1359_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_1359_modified_2020-03-31T14:49:39.188Z" "objects_1359_description_[AndroRAT](https://attack.mitre.org/software/S0292) gathers audio from the microphone.(Citation: Lookout-EnterpriseApps)" "objects_1359_relationship_type_uses" "objects_1359_source_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_1359_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1359_x_mitre_version_1.0" "objects_1359_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1359_spec_version_2.1" "objects_1359_x_mitre_attack_spec_version_2.1.0" "objects_1359_x_mitre_domains_0_mobile-attack" "objects_1360_type_relationship" "objects_1360_id_relationship--b43c87a7-de40-4673-9808-57c7ffca7b98" "objects_1360_created_2023-07-21T19:54:21.877Z" "objects_1360_revoked_False" "objects_1360_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_1360_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_1360_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_1360_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1360_modified_2023-07-21T19:54:21.877Z" "objects_1360_description_[Fakecalls](https://attack.mitre.org/software/S1080) has masqueraded as popular Korean banking apps.(Citation: kaspersky_fakecalls_0422)" "objects_1360_relationship_type_uses" "objects_1360_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_1360_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1360_x_mitre_deprecated_False" "objects_1360_x_mitre_version_0.1" "objects_1360_x_mitre_attack_spec_version_3.1.0" "objects_1360_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1360_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1360_spec_version_2.1" "objects_1360_x_mitre_domains_0_mobile-attack" "objects_1361_type_relationship" "objects_1361_id_relationship--b43f4cef-138e-4b5d-8e68-e8eeae3591be" "objects_1361_created_2021-02-17T20:43:52.337Z" "objects_1361_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1361_revoked_False" "objects_1361_external_references_0_source_name_Lookout FrozenCell" "objects_1361_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1361_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1361_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1361_modified_2023-04-05T20:30:32.294Z" "objects_1361_description_[FrozenCell](https://attack.mitre.org/software/S0577) has read SMS messages for exfiltration.(Citation: Lookout FrozenCell)" "objects_1361_relationship_type_uses" "objects_1361_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1361_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1361_x_mitre_deprecated_False" "objects_1361_x_mitre_version_1.0" "objects_1361_x_mitre_attack_spec_version_3.1.0" "objects_1361_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1361_spec_version_2.1" "objects_1361_x_mitre_domains_0_mobile-attack" "objects_1362_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1362_id_relationship--b45cf5e0-7427-4d5c-be2c-22f5231493d1" "objects_1362_type_relationship" "objects_1362_created_2021-10-01T14:42:49.184Z" "objects_1362_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1362_external_references_0_source_name_SecureList BusyGasper" "objects_1362_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1362_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1362_modified_2021-10-01T14:42:49.184Z" "objects_1362_description_[BusyGasper](https://attack.mitre.org/software/S0655) can collect the device\u2019s location information based on cellular network or GPS coordinates.(Citation: SecureList BusyGasper)" "objects_1362_relationship_type_uses" "objects_1362_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1362_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1362_x_mitre_version_1.0" "objects_1362_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1362_spec_version_2.1" "objects_1362_x_mitre_attack_spec_version_2.1.0" "objects_1362_x_mitre_domains_0_mobile-attack" "objects_1363_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1363_id_relationship--b4735277-516a-4cd2-9607-a3e415945d93" "objects_1363_type_relationship" "objects_1363_created_2020-11-10T17:08:35.800Z" "objects_1363_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1363_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1363_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1363_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1363_modified_2021-09-20T13:54:20.494Z" "objects_1363_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can remotely capture device audio.(Citation: Lookout Uyghur Campaign)" "objects_1363_relationship_type_uses" "objects_1363_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1363_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1363_x_mitre_version_1.0" "objects_1363_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1363_spec_version_2.1" "objects_1363_x_mitre_attack_spec_version_2.1.0" "objects_1363_x_mitre_domains_0_mobile-attack" "objects_1364_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1364_id_relationship--b477afcb-7449-4fae-b4aa-c512c22d7500" "objects_1364_type_relationship" "objects_1364_created_2020-09-15T15:18:12.394Z" "objects_1364_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1364_external_references_0_source_name_Cybereason FakeSpy" "objects_1364_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1364_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1364_modified_2020-09-15T15:18:12.394Z" "objects_1364_description_[FakeSpy](https://attack.mitre.org/software/S0509) can send SMS messages.(Citation: Cybereason FakeSpy)" "objects_1364_relationship_type_uses" "objects_1364_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1364_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1364_x_mitre_version_1.0" "objects_1364_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1364_spec_version_2.1" "objects_1364_x_mitre_attack_spec_version_2.1.0" "objects_1364_x_mitre_domains_0_mobile-attack" "objects_1365_type_relationship" "objects_1365_id_relationship--b49ecb71-92b3-4813-be4d-9f8c2aa67ccd" "objects_1365_created_2021-02-08T16:36:20.707Z" "objects_1365_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1365_revoked_False" "objects_1365_external_references_0_source_name_BlackBerry Bahamut" "objects_1365_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1365_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1365_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1365_modified_2023-04-05T17:05:01.189Z" "objects_1365_description_[Windshift](https://attack.mitre.org/groups/G0112) has installed malicious MDM profiles on iOS devices as part of Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_1365_relationship_type_uses" "objects_1365_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1365_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1365_x_mitre_deprecated_False" "objects_1365_x_mitre_version_1.0" "objects_1365_x_mitre_attack_spec_version_3.1.0" "objects_1365_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1365_spec_version_2.1" "objects_1365_x_mitre_domains_0_mobile-attack" "objects_1366_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1366_id_relationship--b4ef35e9-3dba-49c7-8842-a7dff403241f" "objects_1366_type_relationship" "objects_1366_created_2020-12-17T20:15:22.445Z" "objects_1366_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1366_external_references_0_source_name_Palo Alto HenBox" "objects_1366_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1366_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1366_modified_2020-12-17T20:15:22.445Z" "objects_1366_description_[HenBox](https://attack.mitre.org/software/S0544) can access the device\u2019s camera.(Citation: Palo Alto HenBox)" "objects_1366_relationship_type_uses" "objects_1366_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1366_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1366_x_mitre_version_1.0" "objects_1366_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1366_spec_version_2.1" "objects_1366_x_mitre_attack_spec_version_2.1.0" "objects_1366_x_mitre_domains_0_mobile-attack" "objects_1367_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1367_type_relationship" "objects_1367_id_relationship--b536f233-8c43-4671-b8e8-d72a4806946d" "objects_1367_created_2022-04-05T17:14:23.789Z" "objects_1367_x_mitre_version_0.1" "objects_1367_x_mitre_deprecated_False" "objects_1367_revoked_False" "objects_1367_description_" "objects_1367_modified_2022-04-05T17:14:23.789Z" "objects_1367_relationship_type_subtechnique-of" "objects_1367_source_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1367_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_1367_x_mitre_attack_spec_version_2.1.0" "objects_1367_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1367_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1367_spec_version_2.1" "objects_1367_x_mitre_domains_0_mobile-attack" "objects_1368_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1368_id_relationship--b53d1c92-b71f-434e-aa4f-08b8db765248" "objects_1368_type_relationship" "objects_1368_created_2019-07-10T15:25:57.604Z" "objects_1368_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1368_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1368_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1368_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1368_modified_2020-03-31T14:49:39.188Z" "objects_1368_description_[FinFisher](https://attack.mitre.org/software/S0182) tracks the latitude and longitude coordinates of the infected device.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1368_relationship_type_uses" "objects_1368_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_1368_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1368_x_mitre_version_1.0" "objects_1368_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1368_spec_version_2.1" "objects_1368_x_mitre_attack_spec_version_2.1.0" "objects_1368_x_mitre_domains_0_mobile-attack" "objects_1369_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1369_id_relationship--b5590b50-0aaa-4f43-9b29-f17ee717b551" "objects_1369_type_relationship" "objects_1369_created_2021-02-08T16:36:20.698Z" "objects_1369_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1369_external_references_0_source_name_BlackBerry Bahamut" "objects_1369_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1369_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1369_modified_2021-05-24T13:16:56.412Z" "objects_1369_description_[Windshift](https://attack.mitre.org/groups/G0112) has included location tracking capabilities in the malicious apps deployed as part of Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_1369_relationship_type_uses" "objects_1369_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1369_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1369_x_mitre_version_1.0" "objects_1369_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1369_spec_version_2.1" "objects_1369_x_mitre_attack_spec_version_2.1.0" "objects_1369_x_mitre_domains_0_mobile-attack" "objects_1370_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1370_type_relationship" "objects_1370_id_relationship--b5e8cef4-e8a1-484f-baae-cf12b26e6070" "objects_1370_created_2020-12-18T20:14:47.302Z" "objects_1370_x_mitre_version_1.0" "objects_1370_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1370_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1370_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1370_x_mitre_deprecated_False" "objects_1370_revoked_False" "objects_1370_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has used Firebase for C2 communication.(Citation: WhiteOps TERRACOTTA)" "objects_1370_modified_2022-04-18T19:18:56.475Z" "objects_1370_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1370_relationship_type_uses" "objects_1370_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1370_target_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_1370_x_mitre_attack_spec_version_2.1.0" "objects_1370_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1370_spec_version_2.1" "objects_1370_x_mitre_domains_0_mobile-attack" "objects_1371_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1371_id_relationship--b5f3b110-fc66-4369-89f3-621c945d655f" "objects_1371_type_relationship" "objects_1371_created_2020-04-27T16:52:49.444Z" "objects_1371_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1371_external_references_0_source_name_Google Triada June 2019" "objects_1371_external_references_0_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_1371_external_references_0_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_1371_modified_2020-04-27T16:52:49.444Z" "objects_1371_description_[Triada](https://attack.mitre.org/software/S0424) encrypts data prior to exfiltration.(Citation: Google Triada June 2019) " "objects_1371_relationship_type_uses" "objects_1371_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_1371_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1371_x_mitre_version_1.0" "objects_1371_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1371_spec_version_2.1" "objects_1371_x_mitre_attack_spec_version_2.1.0" "objects_1371_x_mitre_domains_0_mobile-attack" "objects_1372_type_relationship" "objects_1372_id_relationship--b610c587-576a-40cc-9f76-6362455c8ff4" "objects_1372_created_2023-03-20T18:43:01.334Z" "objects_1372_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1372_revoked_False" "objects_1372_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1372_modified_2023-08-14T16:49:09.975Z" "objects_1372_description_Application vetting services can detect and closely scrutinize applications that utilize Device Administrator access." "objects_1372_relationship_type_detects" "objects_1372_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1372_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_1372_x_mitre_deprecated_False" "objects_1372_x_mitre_version_0.1" "objects_1372_x_mitre_attack_spec_version_3.1.0" "objects_1372_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1372_spec_version_2.1" "objects_1372_x_mitre_domains_0_mobile-attack" "objects_1373_type_relationship" "objects_1373_id_relationship--b6323cf4-8141-4910-8743-e42cd15b49e9" "objects_1373_created_2023-07-21T19:53:59.148Z" "objects_1373_revoked_False" "objects_1373_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_1373_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_1373_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_1373_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1373_modified_2023-07-21T19:53:59.148Z" "objects_1373_description_[Fakecalls](https://attack.mitre.org/software/S1080) can send exfiltrated data back to the C2 server.(Citation: kaspersky_fakecalls_0422)" "objects_1373_relationship_type_uses" "objects_1373_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_1373_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1373_x_mitre_deprecated_False" "objects_1373_x_mitre_version_0.1" "objects_1373_x_mitre_attack_spec_version_3.1.0" "objects_1373_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1373_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1373_spec_version_2.1" "objects_1373_x_mitre_domains_0_mobile-attack" "objects_1374_type_relationship" "objects_1374_id_relationship--b641e5b8-5981-452a-99f0-3598c783e5ee" "objects_1374_created_2019-08-07T15:57:13.443Z" "objects_1374_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1374_revoked_False" "objects_1374_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_1374_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_1374_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_1374_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1374_modified_2023-04-05T20:30:47.506Z" "objects_1374_description_[Riltok](https://attack.mitre.org/software/S0403) can intercept incoming SMS messages.(Citation: Kaspersky Riltok June 2019)" "objects_1374_relationship_type_uses" "objects_1374_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_1374_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1374_x_mitre_deprecated_False" "objects_1374_x_mitre_version_1.0" "objects_1374_x_mitre_attack_spec_version_3.1.0" "objects_1374_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1374_spec_version_2.1" "objects_1374_x_mitre_domains_0_mobile-attack" "objects_1375_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1375_id_relationship--b6726136-3c20-4921-a0cb-75a66f59107c" "objects_1375_type_relationship" "objects_1375_created_2020-09-11T16:22:03.296Z" "objects_1375_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1375_external_references_0_source_name_Lookout ViperRAT" "objects_1375_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1375_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1375_modified_2020-09-11T16:22:03.296Z" "objects_1375_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect network configuration data from the device, including phone number, SIM operator, and network operator.(Citation: Lookout ViperRAT)" "objects_1375_relationship_type_uses" "objects_1375_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1375_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1375_x_mitre_version_1.0" "objects_1375_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1375_spec_version_2.1" "objects_1375_x_mitre_attack_spec_version_2.1.0" "objects_1375_x_mitre_domains_0_mobile-attack" "objects_1376_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1376_id_relationship--b67f04d9-1cbd-49b4-9ec3-a33a41ac42ab" "objects_1376_type_relationship" "objects_1376_created_2017-12-14T16:46:06.044Z" "objects_1376_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1376_external_references_0_source_name_TrendMicro-Obad" "objects_1376_external_references_0_description_Veo Zhang. (2013, June 13). Cybercriminals Improve Android Malware Stealth Routines with OBAD. Retrieved December 9, 2016." "objects_1376_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-improve-android-malware-stealth-routines-with-obad/" "objects_1376_modified_2020-03-31T14:49:39.188Z" "objects_1376_description_[OBAD](https://attack.mitre.org/software/S0286) contains encrypted code along with an obfuscated decryption routine to make it difficult to analyze.(Citation: TrendMicro-Obad)" "objects_1376_relationship_type_uses" "objects_1376_source_ref_malware--ca4f63b9-a358-4214-bb26-8c912318cfde" "objects_1376_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1376_x_mitre_version_1.0" "objects_1376_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1376_spec_version_2.1" "objects_1376_x_mitre_attack_spec_version_2.1.0" "objects_1376_x_mitre_domains_0_mobile-attack" "objects_1377_type_relationship" "objects_1377_id_relationship--b697a198-8949-43e0-b2b8-23498373c920" "objects_1377_created_2023-03-20T18:37:13.628Z" "objects_1377_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1377_revoked_False" "objects_1377_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1377_modified_2023-08-14T16:28:09.643Z" "objects_1377_description_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application." "objects_1377_relationship_type_detects" "objects_1377_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1377_target_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_1377_x_mitre_deprecated_False" "objects_1377_x_mitre_version_0.1" "objects_1377_x_mitre_attack_spec_version_3.1.0" "objects_1377_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1377_spec_version_2.1" "objects_1377_x_mitre_domains_0_mobile-attack" "objects_1378_type_relationship" "objects_1378_id_relationship--b6feb018-65e3-46ff-b872-e4385b6f3b34" "objects_1378_created_2023-08-23T22:48:11.931Z" "objects_1378_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1378_revoked_False" "objects_1378_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1378_modified_2023-08-23T22:50:11.248Z" "objects_1378_description_[Gustuff](https://attack.mitre.org/software/S0406) may prevent application removal by abusing Android\u2019s ` performGlobalAction(int)` API call. " "objects_1378_relationship_type_uses" "objects_1378_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1378_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1378_x_mitre_deprecated_False" "objects_1378_x_mitre_version_0.1" "objects_1378_x_mitre_attack_spec_version_3.1.0" "objects_1378_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1378_spec_version_2.1" "objects_1378_x_mitre_domains_0_mobile-attack" "objects_1379_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1379_id_relationship--b7282bf9-63f8-49ad-8ee0-f2ad523a367e" "objects_1379_type_relationship" "objects_1379_created_2017-12-14T16:46:06.044Z" "objects_1379_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1379_external_references_0_source_name_PaloAlto-DualToy" "objects_1379_external_references_0_description_Claud Xiao. (2016, September 13). DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices. Retrieved January 24, 2017." "objects_1379_external_references_0_url_https://researchcenter.paloaltonetworks.com/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/" "objects_1379_modified_2020-03-31T14:49:39.188Z" "objects_1379_description_[DualToy](https://attack.mitre.org/software/S0315) side loads malicious or risky apps to both Android and iOS devices via a USB connection.(Citation: PaloAlto-DualToy)" "objects_1379_relationship_type_uses" "objects_1379_source_ref_malware--507fe748-5e4a-4b45-9e9f-8b1115f4e878" "objects_1379_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1379_x_mitre_version_1.0" "objects_1379_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1379_spec_version_2.1" "objects_1379_x_mitre_attack_spec_version_2.1.0" "objects_1379_x_mitre_domains_0_mobile-attack" "objects_1380_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1380_id_relationship--b7652f27-1cf6-4310-bf6b-5fb99c4fd725" "objects_1380_type_relationship" "objects_1380_created_2017-12-14T16:46:06.044Z" "objects_1380_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1380_external_references_0_source_name_Lookout-Pegasus" "objects_1380_external_references_0_description_Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016." "objects_1380_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf" "objects_1380_modified_2020-03-31T14:49:39.188Z" "objects_1380_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) has the ability to record audio.(Citation: Lookout-Pegasus)" "objects_1380_relationship_type_uses" "objects_1380_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1380_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1380_x_mitre_version_1.0" "objects_1380_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1380_spec_version_2.1" "objects_1380_x_mitre_attack_spec_version_2.1.0" "objects_1380_x_mitre_domains_0_mobile-attack" "objects_1381_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1381_type_relationship" "objects_1381_id_relationship--b7a31a11-6c84-4c28-a548-4751e4d71134" "objects_1381_created_2020-05-04T14:04:56.158Z" "objects_1381_x_mitre_version_1.0" "objects_1381_external_references_0_source_name_Google Bread" "objects_1381_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_1381_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_1381_x_mitre_deprecated_False" "objects_1381_revoked_False" "objects_1381_description_[Bread](https://attack.mitre.org/software/S0432) can perform SMS fraud on older versions of the malware, and toll fraud on newer versions.(Citation: Google Bread)" "objects_1381_modified_2022-04-19T14:25:41.669Z" "objects_1381_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1381_relationship_type_uses" "objects_1381_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1381_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1381_x_mitre_attack_spec_version_2.1.0" "objects_1381_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1381_spec_version_2.1" "objects_1381_x_mitre_domains_0_mobile-attack" "objects_1382_type_relationship" "objects_1382_id_relationship--b7c8abf7-d4e4-40a4-aa2a-ee995a6f4f10" "objects_1382_created_2023-03-03T15:36:15.840Z" "objects_1382_revoked_False" "objects_1382_external_references_0_source_name_lookout_abstractemu_1021" "objects_1382_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1382_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1382_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1382_modified_2023-03-03T15:36:15.840Z" "objects_1382_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can access device call logs.(Citation: lookout_abstractemu_1021)" "objects_1382_relationship_type_uses" "objects_1382_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1382_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1382_x_mitre_deprecated_False" "objects_1382_x_mitre_version_0.1" "objects_1382_x_mitre_attack_spec_version_3.1.0" "objects_1382_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1382_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1382_spec_version_2.1" "objects_1382_x_mitre_domains_0_mobile-attack" "objects_1383_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1383_id_relationship--b7cf1c31-8722-4eeb-ae59-66936c15fa87" "objects_1383_type_relationship" "objects_1383_created_2021-01-05T20:16:20.495Z" "objects_1383_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1383_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1383_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1383_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1383_modified_2021-01-05T20:16:20.495Z" "objects_1383_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can collect device photos and credentials from other applications.(Citation: Zscaler TikTok Spyware)" "objects_1383_relationship_type_uses" "objects_1383_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1383_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1383_x_mitre_version_1.0" "objects_1383_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1383_spec_version_2.1" "objects_1383_x_mitre_attack_spec_version_2.1.0" "objects_1383_x_mitre_domains_0_mobile-attack" "objects_1384_type_relationship" "objects_1384_id_relationship--b81a284d-34ec-4e61-a073-bf6cd85e4c3f" "objects_1384_created_2020-10-29T19:01:13.839Z" "objects_1384_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1384_revoked_False" "objects_1384_external_references_0_source_name_Microsoft MalLockerB" "objects_1384_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_1384_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_1384_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1384_modified_2023-04-05T20:54:05.374Z" "objects_1384_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) can prevent the user from interacting with the UI by using a carefully crafted \"call\" notification screen. This is coupled with overriding the `onUserLeaveHint()` callback method to spawn a new notification instance when the current one is dismissed. (Citation: Microsoft MalLockerB)" "objects_1384_relationship_type_uses" "objects_1384_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_1384_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_1384_x_mitre_deprecated_False" "objects_1384_x_mitre_version_1.0" "objects_1384_x_mitre_attack_spec_version_3.1.0" "objects_1384_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1384_spec_version_2.1" "objects_1384_x_mitre_domains_0_mobile-attack" "objects_1385_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1385_type_relationship" "objects_1385_id_relationship--b81ba10a-73c2-4616-a8bc-eeb422e1c5ea" "objects_1385_created_2018-10-17T00:14:20.652Z" "objects_1385_x_mitre_version_1.0" "objects_1385_external_references_0_source_name_HackerNews-Allwinner" "objects_1385_external_references_0_url_https://thehackernews.com/2016/05/android-kernal-exploit.html" "objects_1385_external_references_0_description_Mohit Kumar. (2016, May 11). Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker. Retrieved September 18, 2018." "objects_1385_x_mitre_deprecated_False" "objects_1385_revoked_False" "objects_1385_description_A Linux kernel distributed by [Allwinner](https://attack.mitre.org/software/S0319) reportedly contained an simple backdoor that could be used to obtain root access. It was believed to have been left in the kernel by mistake by the authors.(Citation: HackerNews-Allwinner)" "objects_1385_modified_2022-04-15T15:16:35.892Z" "objects_1385_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1385_relationship_type_uses" "objects_1385_source_ref_malware--08784a9d-09e9-4dce-a839-9612398214e8" "objects_1385_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1385_x_mitre_attack_spec_version_2.1.0" "objects_1385_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1385_spec_version_2.1" "objects_1385_x_mitre_domains_0_mobile-attack" "objects_1386_type_relationship" "objects_1386_id_relationship--b81f9698-b9d1-4a6a-b836-f7e29232693a" "objects_1386_created_2023-09-28T17:26:10.893Z" "objects_1386_revoked_False" "objects_1386_external_references_0_source_name_kaspersky_fakecalls_0422" "objects_1386_external_references_0_description_Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023." "objects_1386_external_references_0_url_https://www.kaspersky.com/blog/fakecalls-banking-trojan/44072/" "objects_1386_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1386_modified_2023-09-28T17:26:10.893Z" "objects_1386_description_[Fakecalls](https://attack.mitre.org/software/S1080) can manipulate a device\u2019s call log, including deleting incoming calls.(Citation: kaspersky_fakecalls_0422)" "objects_1386_relationship_type_uses" "objects_1386_source_ref_malware--429e1526-6293-495b-8808-af7f9a66c4be" "objects_1386_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1386_x_mitre_deprecated_False" "objects_1386_x_mitre_version_0.1" "objects_1386_x_mitre_attack_spec_version_3.2.0" "objects_1386_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1386_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1386_spec_version_2.1" "objects_1386_x_mitre_domains_0_mobile-attack" "objects_1387_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1387_type_relationship" "objects_1387_id_relationship--b8606318-8c12-4381-ba33-5b2321772ea0" "objects_1387_created_2022-03-30T20:31:57.183Z" "objects_1387_x_mitre_version_0.1" "objects_1387_x_mitre_deprecated_False" "objects_1387_revoked_False" "objects_1387_description_Users should be advised to be extra scrutinous of applications that request location or sensitive phone information permissions, and to deny any permissions requests for applications they do not recognize." "objects_1387_modified_2022-03-30T20:31:57.183Z" "objects_1387_relationship_type_mitigates" "objects_1387_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1387_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_1387_x_mitre_attack_spec_version_2.1.0" "objects_1387_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1387_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1387_spec_version_2.1" "objects_1387_x_mitre_domains_0_mobile-attack" "objects_1388_type_relationship" "objects_1388_id_relationship--b96e8699-4bd2-4793-8f9c-88d6e4c50e98" "objects_1388_created_2023-09-28T17:39:35.622Z" "objects_1388_revoked_False" "objects_1388_external_references_0_source_name_Trend Micro FlyTrap" "objects_1388_external_references_0_description_Trend Micro. (2021, August 17). FlyTrap Android Malware Is Taking Over Facebook Accounts \u2014 Protect Yourself With a Malware Scanner. Retrieved September 28, 2023." "objects_1388_external_references_0_url_https://news.trendmicro.com/2021/08/17/flytrap-android-malware-is-taking-over-facebook-accounts-protect-yourself-with-a-malware-scanner/" "objects_1388_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1388_modified_2023-09-28T17:39:35.622Z" "objects_1388_description_[FlyTrap](https://attack.mitre.org/software/S1093) has used infected applications with Facebook login prompts to steal credentials.(Citation: Trend Micro FlyTrap)" "objects_1388_relationship_type_uses" "objects_1388_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_1388_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1388_x_mitre_deprecated_False" "objects_1388_x_mitre_version_0.1" "objects_1388_x_mitre_attack_spec_version_3.2.0" "objects_1388_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1388_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1388_spec_version_2.1" "objects_1388_x_mitre_domains_0_mobile-attack" "objects_1389_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1389_type_relationship" "objects_1389_id_relationship--b98fa6ef-a5f2-4867-8108-8daf8534cc3c" "objects_1389_created_2022-04-01T16:51:20.688Z" "objects_1389_x_mitre_version_0.1" "objects_1389_x_mitre_deprecated_False" "objects_1389_revoked_False" "objects_1389_description_Users should scrutinize every device administration permission request. If the request is not expected or the user does not recognize the application, the application should be uninstalled immediately." "objects_1389_modified_2022-04-01T16:51:20.688Z" "objects_1389_relationship_type_mitigates" "objects_1389_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1389_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1389_x_mitre_attack_spec_version_2.1.0" "objects_1389_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1389_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1389_spec_version_2.1" "objects_1389_x_mitre_domains_0_mobile-attack" "objects_1390_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1390_id_relationship--b9af8369-a6b2-4081-9f07-2ee15d56bffc" "objects_1390_type_relationship" "objects_1390_created_2020-06-02T14:32:31.871Z" "objects_1390_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1390_external_references_0_source_name_Google Project Zero Insomnia" "objects_1390_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_1390_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_1390_modified_2020-06-24T18:24:35.795Z" "objects_1390_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can collect application database files, including Gmail, Hangouts, device photos, and container directories of third-party apps.(Citation: Google Project Zero Insomnia)" "objects_1390_relationship_type_uses" "objects_1390_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1390_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1390_x_mitre_version_1.0" "objects_1390_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1390_spec_version_2.1" "objects_1390_x_mitre_attack_spec_version_2.1.0" "objects_1390_x_mitre_domains_0_mobile-attack" "objects_1391_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1391_id_relationship--b9b9ce86-89f6-41ea-8ba1-9520985acb49" "objects_1391_type_relationship" "objects_1391_created_2020-12-24T22:04:28.004Z" "objects_1391_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1391_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1391_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1391_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1391_modified_2020-12-24T22:04:28.004Z" "objects_1391_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has checked for system root.(Citation: Lookout Uyghur Campaign)" "objects_1391_relationship_type_uses" "objects_1391_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1391_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1391_x_mitre_version_1.0" "objects_1391_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1391_spec_version_2.1" "objects_1391_x_mitre_attack_spec_version_2.1.0" "objects_1391_x_mitre_domains_0_mobile-attack" "objects_1392_type_relationship" "objects_1392_id_relationship--ba02a1dc-d5b9-41cb-9adf-883119e1aa51" "objects_1392_created_2020-12-14T14:52:03.359Z" "objects_1392_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1392_revoked_False" "objects_1392_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1392_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1392_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1392_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1392_modified_2023-04-05T20:12:27.624Z" "objects_1392_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has communicated with the C2 using HTTP.(Citation: Sophos Red Alert 2.0)" "objects_1392_relationship_type_uses" "objects_1392_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1392_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1392_x_mitre_deprecated_False" "objects_1392_x_mitre_version_1.0" "objects_1392_x_mitre_attack_spec_version_3.1.0" "objects_1392_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1392_spec_version_2.1" "objects_1392_x_mitre_domains_0_mobile-attack" "objects_1393_type_relationship" "objects_1393_id_relationship--ba116807-ef1c-4621-84c8-9921fa7b735e" "objects_1393_created_2023-09-28T17:19:21.499Z" "objects_1393_revoked_False" "objects_1393_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1393_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1393_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1393_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1393_modified_2023-09-28T17:19:21.499Z" "objects_1393_description_[Escobar](https://attack.mitre.org/software/S1092) can request the `GET_ACCOUNTS` permission to get the list of accounts on the device, and can collect media files.(Citation: Bleeipng Computer Escobar)" "objects_1393_relationship_type_uses" "objects_1393_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1393_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1393_x_mitre_deprecated_False" "objects_1393_x_mitre_version_0.1" "objects_1393_x_mitre_attack_spec_version_3.2.0" "objects_1393_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1393_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1393_spec_version_2.1" "objects_1393_x_mitre_domains_0_mobile-attack" "objects_1394_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1394_id_relationship--ba5fc090-d420-4006-9dc0-57b75260b5f6" "objects_1394_type_relationship" "objects_1394_created_2020-07-15T20:20:59.296Z" "objects_1394_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1394_external_references_0_source_name_Bitdefender Mandrake" "objects_1394_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1394_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1394_modified_2020-07-15T20:20:59.296Z" "objects_1394_description_[Mandrake](https://attack.mitre.org/software/S0485) can collect the device\u2019s location.(Citation: Bitdefender Mandrake)" "objects_1394_relationship_type_uses" "objects_1394_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1394_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1394_x_mitre_version_1.0" "objects_1394_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1394_spec_version_2.1" "objects_1394_x_mitre_attack_spec_version_2.1.0" "objects_1394_x_mitre_domains_0_mobile-attack" "objects_1395_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1395_id_relationship--ba8735ad-b9c6-4b35-9fac-d4747ab0b2ae" "objects_1395_type_relationship" "objects_1395_created_2020-11-10T17:08:35.746Z" "objects_1395_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1395_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1395_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1395_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1395_modified_2020-12-01T19:48:44.878Z" "objects_1395_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has searched device storage for various files, including .amr files (audio recordings) and superuser binaries.(Citation: Lookout Uyghur Campaign)" "objects_1395_relationship_type_uses" "objects_1395_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1395_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1395_x_mitre_version_1.0" "objects_1395_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1395_spec_version_2.1" "objects_1395_x_mitre_attack_spec_version_2.1.0" "objects_1395_x_mitre_domains_0_mobile-attack" "objects_1396_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1396_id_relationship--baa82c0a-b51c-4d4a-ae1d-6d6fd637f78d" "objects_1396_type_relationship" "objects_1396_created_2020-07-15T20:20:59.294Z" "objects_1396_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1396_external_references_0_source_name_Bitdefender Mandrake" "objects_1396_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1396_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1396_modified_2020-07-15T20:20:59.294Z" "objects_1396_description_[Mandrake](https://attack.mitre.org/software/S0485) can obtain a list of installed applications.(Citation: Bitdefender Mandrake)" "objects_1396_relationship_type_uses" "objects_1396_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1396_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1396_x_mitre_version_1.0" "objects_1396_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1396_spec_version_2.1" "objects_1396_x_mitre_attack_spec_version_2.1.0" "objects_1396_x_mitre_domains_0_mobile-attack" "objects_1397_type_relationship" "objects_1397_id_relationship--baad8ab8-f05f-4e31-9671-44c009ae3ecf" "objects_1397_created_2023-08-09T14:38:34.721Z" "objects_1397_revoked_False" "objects_1397_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1397_modified_2023-08-09T14:38:34.721Z" "objects_1397_description_Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code." "objects_1397_relationship_type_detects" "objects_1397_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1397_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1397_x_mitre_deprecated_False" "objects_1397_x_mitre_version_0.1" "objects_1397_x_mitre_attack_spec_version_3.1.0" "objects_1397_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1397_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1397_spec_version_2.1" "objects_1397_x_mitre_domains_0_mobile-attack" "objects_1398_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1398_id_relationship--bb006be2-7d2c-4bb3-ab48-7c95e0ab8106" "objects_1398_type_relationship" "objects_1398_created_2020-12-14T14:52:03.255Z" "objects_1398_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1398_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1398_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1398_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1398_modified_2020-12-14T14:52:03.255Z" "objects_1398_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has stored data embedded in the strings.xml resource file.(Citation: Sophos Red Alert 2.0)" "objects_1398_relationship_type_uses" "objects_1398_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1398_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1398_x_mitre_version_1.0" "objects_1398_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1398_spec_version_2.1" "objects_1398_x_mitre_attack_spec_version_2.1.0" "objects_1398_x_mitre_domains_0_mobile-attack" "objects_1399_type_relationship" "objects_1399_id_relationship--bb11b7d1-e661-49af-9746-9fa4c56324bf" "objects_1399_created_2023-03-20T18:59:14.759Z" "objects_1399_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1399_revoked_False" "objects_1399_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1399_modified_2023-08-08T16:31:10.270Z" "objects_1399_description_Application vetting services can detect unnecessary and potentially abused API calls." "objects_1399_relationship_type_detects" "objects_1399_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1399_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1399_x_mitre_deprecated_False" "objects_1399_x_mitre_version_0.1" "objects_1399_x_mitre_attack_spec_version_3.1.0" "objects_1399_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1399_spec_version_2.1" "objects_1399_x_mitre_domains_0_mobile-attack" "objects_1400_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1400_type_relationship" "objects_1400_id_relationship--bb34aff0-9af9-463b-a1aa-7f5ec7b84630" "objects_1400_created_2020-07-15T20:20:59.300Z" "objects_1400_x_mitre_version_1.0" "objects_1400_external_references_0_source_name_Bitdefender Mandrake" "objects_1400_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1400_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1400_x_mitre_deprecated_False" "objects_1400_revoked_False" "objects_1400_description_[Mandrake](https://attack.mitre.org/software/S0485) can manipulate visual components to trick the user into granting dangerous permissions, and can use phishing overlays and JavaScript injection to capture credentials.(Citation: Bitdefender Mandrake)" "objects_1400_modified_2022-04-12T10:01:44.682Z" "objects_1400_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1400_relationship_type_uses" "objects_1400_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1400_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1400_x_mitre_attack_spec_version_2.1.0" "objects_1400_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1400_spec_version_2.1" "objects_1400_x_mitre_domains_0_mobile-attack" "objects_1401_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1401_id_relationship--bb3be217-08e2-4bb0-9f1a-d8e538010451" "objects_1401_type_relationship" "objects_1401_created_2017-12-14T16:46:06.044Z" "objects_1401_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1401_external_references_0_source_name_FireEye-RuMMS" "objects_1401_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_1401_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_1401_modified_2020-03-31T14:49:39.188Z" "objects_1401_description_[RuMMS](https://attack.mitre.org/software/S0313) gathers device model and operating system version information and transmits it to a command and control server.(Citation: FireEye-RuMMS)" "objects_1401_relationship_type_uses" "objects_1401_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_1401_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1401_x_mitre_version_1.0" "objects_1401_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1401_spec_version_2.1" "objects_1401_x_mitre_attack_spec_version_2.1.0" "objects_1401_x_mitre_domains_0_mobile-attack" "objects_1402_type_relationship" "objects_1402_id_relationship--bb77cfbe-ac95-4cc2-acbc-8cefa15b9387" "objects_1402_created_2023-06-09T19:09:30.333Z" "objects_1402_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1402_revoked_False" "objects_1402_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1402_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1402_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1402_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1402_modified_2023-08-04T19:15:08.695Z" "objects_1402_description_[Hornbill](https://attack.mitre.org/software/S1077) can gather device call logs.(Citation: lookout_hornbill_sunbird_0221)" "objects_1402_relationship_type_uses" "objects_1402_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1402_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1402_x_mitre_deprecated_False" "objects_1402_x_mitre_version_0.1" "objects_1402_x_mitre_attack_spec_version_3.1.0" "objects_1402_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1402_spec_version_2.1" "objects_1402_x_mitre_domains_0_mobile-attack" "objects_1403_type_relationship" "objects_1403_id_relationship--bb83ee25-8875-4806-9f69-ac39bf7cb402" "objects_1403_created_2021-10-01T14:42:49.178Z" "objects_1403_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1403_revoked_False" "objects_1403_external_references_0_source_name_SecureList BusyGasper" "objects_1403_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1403_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1403_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1403_modified_2023-04-05T17:25:39.509Z" "objects_1403_description_[BusyGasper](https://attack.mitre.org/software/S0655) can collect SMS messages.(Citation: SecureList BusyGasper)" "objects_1403_relationship_type_uses" "objects_1403_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1403_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1403_x_mitre_deprecated_False" "objects_1403_x_mitre_version_1.0" "objects_1403_x_mitre_attack_spec_version_3.1.0" "objects_1403_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1403_spec_version_2.1" "objects_1403_x_mitre_domains_0_mobile-attack" "objects_1404_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1404_type_relationship" "objects_1404_id_relationship--bba8b056-acbe-4fed-b890-965a446d7a3c" "objects_1404_created_2022-04-01T18:45:00.923Z" "objects_1404_x_mitre_version_0.1" "objects_1404_x_mitre_deprecated_False" "objects_1404_revoked_False" "objects_1404_description_Users should be warned against granting access to accessibility features and device administration services, and to carefully scrutinize applications that request these dangerous permissions. Users should be taught how to boot into safe mode to uninstall malicious applications that may be interfering with the uninstallation process." "objects_1404_modified_2022-04-01T18:45:00.923Z" "objects_1404_relationship_type_mitigates" "objects_1404_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1404_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1404_x_mitre_attack_spec_version_2.1.0" "objects_1404_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1404_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1404_spec_version_2.1" "objects_1404_x_mitre_domains_0_mobile-attack" "objects_1405_type_relationship" "objects_1405_id_relationship--bbc6308e-f7f6-40c7-80cb-f760d623c8af" "objects_1405_created_2023-01-18T21:20:01.333Z" "objects_1405_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1405_revoked_False" "objects_1405_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1405_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1405_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1405_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1405_modified_2023-03-27T18:56:41.614Z" "objects_1405_description_[SharkBot](https://attack.mitre.org/software/S1055) can use HTTP to send C2 messages to infected devices.(Citation: nccgroup_sharkbot_0322)" "objects_1405_relationship_type_uses" "objects_1405_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1405_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1405_x_mitre_deprecated_False" "objects_1405_x_mitre_version_0.1" "objects_1405_x_mitre_attack_spec_version_3.1.0" "objects_1405_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1405_spec_version_2.1" "objects_1405_x_mitre_domains_0_mobile-attack" "objects_1406_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1406_id_relationship--bbe1af69-7303-4205-82d8-5b03c43e39c1" "objects_1406_type_relationship" "objects_1406_created_2020-11-24T17:55:12.887Z" "objects_1406_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1406_external_references_0_source_name_Talos GPlayed" "objects_1406_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1406_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1406_modified_2020-11-24T17:55:12.887Z" "objects_1406_description_[GPlayed](https://attack.mitre.org/software/S0536) can collect the device\u2019s model, country, and Android version.(Citation: Talos GPlayed)" "objects_1406_relationship_type_uses" "objects_1406_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1406_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1406_x_mitre_version_1.0" "objects_1406_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1406_spec_version_2.1" "objects_1406_x_mitre_attack_spec_version_2.1.0" "objects_1406_x_mitre_domains_0_mobile-attack" "objects_1407_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1407_type_relationship" "objects_1407_id_relationship--bc0d2cbb-30fa-40e6-a250-bf6e5d8f9005" "objects_1407_created_2018-10-17T00:14:20.652Z" "objects_1407_x_mitre_version_1.0" "objects_1407_external_references_0_source_name_Kaspersky-Skygofree" "objects_1407_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_1407_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_1407_x_mitre_deprecated_False" "objects_1407_revoked_False" "objects_1407_description_[Skygofree](https://attack.mitre.org/software/S0327) can be controlled via binary SMS.(Citation: Kaspersky-Skygofree)" "objects_1407_modified_2022-04-19T14:25:41.669Z" "objects_1407_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1407_relationship_type_uses" "objects_1407_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_1407_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1407_x_mitre_attack_spec_version_2.1.0" "objects_1407_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1407_spec_version_2.1" "objects_1407_x_mitre_domains_0_mobile-attack" "objects_1408_type_relationship" "objects_1408_id_relationship--bc0d86de-0642-4cbf-a785-7ff70507a9a2" "objects_1408_created_2023-03-20T18:51:44.864Z" "objects_1408_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1408_revoked_False" "objects_1408_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1408_modified_2023-08-08T17:08:11.867Z" "objects_1408_description_The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application\u2019s icon, they should inspect the application to ensure it is genuine." "objects_1408_relationship_type_detects" "objects_1408_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1408_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1408_x_mitre_deprecated_False" "objects_1408_x_mitre_version_0.1" "objects_1408_x_mitre_attack_spec_version_3.1.0" "objects_1408_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1408_spec_version_2.1" "objects_1408_x_mitre_domains_0_mobile-attack" "objects_1409_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1409_id_relationship--bc4e848a-adb7-40a2-94a1-d5ab9854ff0f" "objects_1409_type_relationship" "objects_1409_created_2017-12-14T16:46:06.044Z" "objects_1409_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1409_external_references_0_source_name_Zscaler-SpyNote" "objects_1409_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_1409_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_1409_modified_2020-03-31T14:49:39.188Z" "objects_1409_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) can copy files from the device to the C2 server.(Citation: Zscaler-SpyNote)" "objects_1409_relationship_type_uses" "objects_1409_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_1409_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1409_x_mitre_version_1.0" "objects_1409_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1409_spec_version_2.1" "objects_1409_x_mitre_attack_spec_version_2.1.0" "objects_1409_x_mitre_domains_0_mobile-attack" "objects_1410_type_relationship" "objects_1410_id_relationship--bc59883f-672e-4dc8-a7de-f713a26f88e1" "objects_1410_created_2023-08-14T16:31:37.179Z" "objects_1410_revoked_False" "objects_1410_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1410_modified_2023-08-14T16:31:37.179Z" "objects_1410_description_Many properly configured firewalls may naturally block command and control traffic." "objects_1410_relationship_type_detects" "objects_1410_source_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_1410_target_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_1410_x_mitre_deprecated_False" "objects_1410_x_mitre_version_0.1" "objects_1410_x_mitre_attack_spec_version_3.1.0" "objects_1410_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1410_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1410_spec_version_2.1" "objects_1410_x_mitre_domains_0_mobile-attack" "objects_1411_type_relationship" "objects_1411_id_relationship--bc79a212-139f-4dce-be72-e90585f38f03" "objects_1411_created_2023-03-16T18:31:37.091Z" "objects_1411_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1411_revoked_False" "objects_1411_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1411_modified_2023-08-10T21:11:17.731Z" "objects_1411_description_The user can view their default phone app in device settings." "objects_1411_relationship_type_detects" "objects_1411_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1411_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_1411_x_mitre_deprecated_False" "objects_1411_x_mitre_version_0.1" "objects_1411_x_mitre_attack_spec_version_3.1.0" "objects_1411_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1411_spec_version_2.1" "objects_1411_x_mitre_domains_0_mobile-attack" "objects_1412_type_relationship" "objects_1412_id_relationship--bc79d59b-1828-4133-9f8f-df8cad9543a8" "objects_1412_created_2019-11-21T16:42:48.459Z" "objects_1412_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1412_revoked_False" "objects_1412_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1412_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1412_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1412_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1412_modified_2023-04-05T20:37:19.124Z" "objects_1412_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can delete arbitrary files from the device.(Citation: SecureList - ViceLeaker 2019)" "objects_1412_relationship_type_uses" "objects_1412_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1412_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1412_x_mitre_deprecated_False" "objects_1412_x_mitre_version_1.0" "objects_1412_x_mitre_attack_spec_version_3.1.0" "objects_1412_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1412_spec_version_2.1" "objects_1412_x_mitre_domains_0_mobile-attack" "objects_1413_type_relationship" "objects_1413_id_relationship--bc870a55-5499-4146-91ef-ea74647c3e10" "objects_1413_created_2023-07-12T20:50:03.159Z" "objects_1413_revoked_False" "objects_1413_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1413_modified_2023-07-12T20:50:03.159Z" "objects_1413_description_Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps." "objects_1413_relationship_type_mitigates" "objects_1413_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1413_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1413_x_mitre_deprecated_False" "objects_1413_x_mitre_version_0.1" "objects_1413_x_mitre_attack_spec_version_3.1.0" "objects_1413_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1413_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1413_spec_version_2.1" "objects_1413_x_mitre_domains_0_mobile-attack" "objects_1414_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1414_type_relationship" "objects_1414_id_relationship--bcc8eb7a-d2a8-41d2-832e-f435e51c685a" "objects_1414_created_2022-03-30T19:54:43.835Z" "objects_1414_x_mitre_version_0.1" "objects_1414_x_mitre_deprecated_False" "objects_1414_revoked_False" "objects_1414_description_Security updates frequently contain fixes for vulnerabilities that could be leveraged to modify protected operating system files. " "objects_1414_modified_2022-03-30T19:54:43.835Z" "objects_1414_relationship_type_mitigates" "objects_1414_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1414_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1414_x_mitre_attack_spec_version_2.1.0" "objects_1414_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1414_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1414_spec_version_2.1" "objects_1414_x_mitre_domains_0_mobile-attack" "objects_1415_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1415_id_relationship--bce64ec2-43d5-4501-a0aa-0abe65551a19" "objects_1415_type_relationship" "objects_1415_created_2021-02-17T20:43:52.381Z" "objects_1415_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1415_external_references_0_source_name_Lookout FrozenCell" "objects_1415_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1415_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1415_modified_2021-02-17T20:43:52.381Z" "objects_1415_description_[FrozenCell](https://attack.mitre.org/software/S0577) has retrieved account information for other applications.(Citation: Lookout FrozenCell)" "objects_1415_relationship_type_uses" "objects_1415_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1415_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1415_x_mitre_version_1.0" "objects_1415_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1415_spec_version_2.1" "objects_1415_x_mitre_attack_spec_version_2.1.0" "objects_1415_x_mitre_domains_0_mobile-attack" "objects_1416_type_relationship" "objects_1416_id_relationship--bd1e016a-1ebb-4f30-9342-998f656dd8b8" "objects_1416_created_2022-04-15T15:57:32.958Z" "objects_1416_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1416_revoked_False" "objects_1416_external_references_0_source_name_Bitdefender Mandrake" "objects_1416_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1416_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1416_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1416_modified_2023-04-05T21:21:49.009Z" "objects_1416_description_[Mandrake](https://attack.mitre.org/software/S0485) can enable app installation from unknown sources.(Citation: Bitdefender Mandrake)" "objects_1416_relationship_type_uses" "objects_1416_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1416_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1416_x_mitre_deprecated_False" "objects_1416_x_mitre_version_0.1" "objects_1416_x_mitre_attack_spec_version_3.1.0" "objects_1416_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1416_spec_version_2.1" "objects_1416_x_mitre_domains_0_mobile-attack" "objects_1417_type_relationship" "objects_1417_id_relationship--bd29ce15-1771-470c-a74b-5ea90832ce23" "objects_1417_created_2020-12-24T22:04:27.911Z" "objects_1417_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1417_revoked_False" "objects_1417_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1417_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1417_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1417_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1417_modified_2023-04-05T20:31:11.269Z" "objects_1417_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has collected SMS messages.(Citation: Lookout Uyghur Campaign)" "objects_1417_relationship_type_uses" "objects_1417_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1417_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1417_x_mitre_deprecated_False" "objects_1417_x_mitre_version_1.0" "objects_1417_x_mitre_attack_spec_version_3.1.0" "objects_1417_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1417_spec_version_2.1" "objects_1417_x_mitre_domains_0_mobile-attack" "objects_1418_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1418_id_relationship--bd351b17-e995-4528-bbea-e1138c51476a" "objects_1418_type_relationship" "objects_1418_created_2018-10-17T00:14:20.652Z" "objects_1418_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1418_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1418_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1418_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1418_modified_2020-03-31T14:49:39.188Z" "objects_1418_description_[SpyDealer](https://attack.mitre.org/software/S0324) exfiltrates data from over 40 apps such as WeChat, Facebook, WhatsApp, Skype, and others.(Citation: PaloAlto-SpyDealer)" "objects_1418_relationship_type_uses" "objects_1418_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1418_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1418_x_mitre_version_1.0" "objects_1418_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1418_spec_version_2.1" "objects_1418_x_mitre_attack_spec_version_2.1.0" "objects_1418_x_mitre_domains_0_mobile-attack" "objects_1419_type_relationship" "objects_1419_id_relationship--bd6829ee-dc51-477b-9739-1cd1cd304b6c" "objects_1419_created_2020-09-11T14:54:16.646Z" "objects_1419_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1419_revoked_False" "objects_1419_external_references_0_source_name_Lookout Desert Scorpion" "objects_1419_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1419_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1419_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1419_modified_2023-04-05T20:45:14.199Z" "objects_1419_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can hide its icon.(Citation: Lookout Desert Scorpion)" "objects_1419_relationship_type_uses" "objects_1419_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1419_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1419_x_mitre_deprecated_False" "objects_1419_x_mitre_version_1.0" "objects_1419_x_mitre_attack_spec_version_3.1.0" "objects_1419_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1419_spec_version_2.1" "objects_1419_x_mitre_domains_0_mobile-attack" "objects_1420_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1420_type_relationship" "objects_1420_id_relationship--bd889077-d4bd-4475-8e1f-6f507a7bedb9" "objects_1420_created_2022-04-01T13:19:41.207Z" "objects_1420_x_mitre_version_0.1" "objects_1420_x_mitre_deprecated_False" "objects_1420_revoked_False" "objects_1420_description_" "objects_1420_modified_2022-04-01T13:19:41.207Z" "objects_1420_relationship_type_revoked-by" "objects_1420_source_ref_attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce" "objects_1420_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1420_x_mitre_attack_spec_version_2.1.0" "objects_1420_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1420_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1420_spec_version_2.1" "objects_1420_x_mitre_domains_0_mobile-attack" "objects_1421_type_relationship" "objects_1421_id_relationship--bd952153-4902-4fc4-8e2e-b7c7b8bad7f1" "objects_1421_created_2023-01-18T19:13:15.991Z" "objects_1421_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1421_revoked_False" "objects_1421_external_references_0_source_name_cyble_drinik_1022" "objects_1421_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1421_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1421_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1421_modified_2023-03-27T18:11:24.686Z" "objects_1421_description_[Drinik](https://attack.mitre.org/software/S1054) has code to use Firebase Cloud Messaging for receiving C2 instructions.(Citation: cyble_drinik_1022)" "objects_1421_relationship_type_uses" "objects_1421_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1421_target_ref_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_1421_x_mitre_deprecated_False" "objects_1421_x_mitre_version_0.1" "objects_1421_x_mitre_attack_spec_version_3.1.0" "objects_1421_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1421_spec_version_2.1" "objects_1421_x_mitre_domains_0_mobile-attack" "objects_1422_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1422_id_relationship--bd99b570-5966-4337-8ab4-2d6f4afd0f7f" "objects_1422_type_relationship" "objects_1422_created_2019-09-04T15:38:56.799Z" "objects_1422_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1422_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_1422_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1422_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1422_modified_2020-03-31T14:49:39.188Z" "objects_1422_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can record video.(Citation: CyberMerchants-FlexiSpy)" "objects_1422_relationship_type_uses" "objects_1422_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1422_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1422_x_mitre_version_1.0" "objects_1422_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1422_spec_version_2.1" "objects_1422_x_mitre_attack_spec_version_2.1.0" "objects_1422_x_mitre_domains_0_mobile-attack" "objects_1423_type_relationship" "objects_1423_id_relationship--bdb29822-63c5-4dd0-961b-cdf3f2482adf" "objects_1423_created_2023-03-16T18:28:28.144Z" "objects_1423_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1423_revoked_False" "objects_1423_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1423_modified_2023-08-10T22:11:45.377Z" "objects_1423_description_On both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. " "objects_1423_relationship_type_detects" "objects_1423_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1423_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1423_x_mitre_deprecated_False" "objects_1423_x_mitre_version_0.1" "objects_1423_x_mitre_attack_spec_version_3.1.0" "objects_1423_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1423_spec_version_2.1" "objects_1423_x_mitre_domains_0_mobile-attack" "objects_1424_type_relationship" "objects_1424_id_relationship--bdc59dcf-0e0a-4d47-b289-0c298115215f" "objects_1424_created_2023-08-23T22:17:13.986Z" "objects_1424_revoked_False" "objects_1424_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1424_modified_2023-08-23T22:17:13.986Z" "objects_1424_description_Security updates frequently contain patches to vulnerabilities. " "objects_1424_relationship_type_mitigates" "objects_1424_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1424_target_ref_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_1424_x_mitre_deprecated_False" "objects_1424_x_mitre_version_0.1" "objects_1424_x_mitre_attack_spec_version_3.1.0" "objects_1424_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1424_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1424_spec_version_2.1" "objects_1424_x_mitre_domains_0_mobile-attack" "objects_1425_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1425_id_relationship--be136fd1-6949-4de6-be37-6d76f8def41a" "objects_1425_type_relationship" "objects_1425_created_2018-10-17T00:14:20.652Z" "objects_1425_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1425_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1425_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1425_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1425_modified_2020-03-31T14:49:39.188Z" "objects_1425_description_[SpyDealer](https://attack.mitre.org/software/S0324) harvests location data from victims.(Citation: PaloAlto-SpyDealer)" "objects_1425_relationship_type_uses" "objects_1425_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1425_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1425_x_mitre_version_1.0" "objects_1425_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1425_spec_version_2.1" "objects_1425_x_mitre_attack_spec_version_2.1.0" "objects_1425_x_mitre_domains_0_mobile-attack" "objects_1426_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1426_id_relationship--be17dc63-5b0a-491a-be5f-132058444c3a" "objects_1426_type_relationship" "objects_1426_created_2019-08-09T17:52:13.352Z" "objects_1426_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1426_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1426_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1426_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1426_modified_2020-03-31T14:49:39.188Z" "objects_1426_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) has the ability to take pictures using the device camera.(Citation: Lookout-PegasusAndroid)" "objects_1426_relationship_type_uses" "objects_1426_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1426_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1426_x_mitre_version_1.0" "objects_1426_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1426_spec_version_2.1" "objects_1426_x_mitre_attack_spec_version_2.1.0" "objects_1426_x_mitre_domains_0_mobile-attack" "objects_1427_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1427_id_relationship--be256f8a-8bae-4a00-8682-22797ba7e0ce" "objects_1427_type_relationship" "objects_1427_created_2019-09-04T14:28:15.975Z" "objects_1427_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1427_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1427_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1427_external_references_0_source_name_Lookout-Monokle" "objects_1427_modified_2020-03-31T14:49:39.188Z" "objects_1427_description_[Monokle](https://attack.mitre.org/software/S0407) queries the device for metadata such as make, model, and power levels.(Citation: Lookout-Monokle)" "objects_1427_relationship_type_uses" "objects_1427_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1427_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1427_x_mitre_version_1.0" "objects_1427_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1427_spec_version_2.1" "objects_1427_x_mitre_attack_spec_version_2.1.0" "objects_1427_x_mitre_domains_0_mobile-attack" "objects_1428_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1428_id_relationship--be27a303-5748-4b72-ba69-a328e2f6cc08" "objects_1428_type_relationship" "objects_1428_created_2020-12-31T18:25:05.177Z" "objects_1428_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1428_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1428_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1428_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1428_modified_2020-12-31T18:25:05.177Z" "objects_1428_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) can download new modules while running.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1428_relationship_type_uses" "objects_1428_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1428_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1428_x_mitre_version_1.0" "objects_1428_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1428_spec_version_2.1" "objects_1428_x_mitre_attack_spec_version_2.1.0" "objects_1428_x_mitre_domains_0_mobile-attack" "objects_1429_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1429_id_relationship--be39c012-7201-4757-8cd6-c855bc945a9e" "objects_1429_type_relationship" "objects_1429_created_2019-07-10T15:25:57.623Z" "objects_1429_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1429_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1429_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1429_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1429_modified_2020-03-31T14:49:39.188Z" "objects_1429_description_[FinFisher](https://attack.mitre.org/software/S0182) comes packaged with ExynosAbuse, an Android exploit that can gain root privileges.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1429_relationship_type_uses" "objects_1429_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_1429_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1429_x_mitre_version_1.0" "objects_1429_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1429_spec_version_2.1" "objects_1429_x_mitre_attack_spec_version_2.1.0" "objects_1429_x_mitre_domains_0_mobile-attack" "objects_1430_type_relationship" "objects_1430_id_relationship--be7c3f83-b164-4d53-bfac-65f7437dabec" "objects_1430_created_2023-03-20T18:54:36.266Z" "objects_1430_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1430_revoked_False" "objects_1430_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1430_modified_2023-08-08T17:13:28.972Z" "objects_1430_description_The user can view a list of device administrators and applications that have registered accessibility services in device settings. The user can typically visually see when an action happens that they did not initiate and can subsequently review installed applications for any out of place or unknown ones. Applications that register an accessibility service or request device administrator permissions should be scrutinized further for malicious behavior." "objects_1430_relationship_type_detects" "objects_1430_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1430_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1430_x_mitre_deprecated_False" "objects_1430_x_mitre_version_0.1" "objects_1430_x_mitre_attack_spec_version_3.1.0" "objects_1430_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1430_spec_version_2.1" "objects_1430_x_mitre_domains_0_mobile-attack" "objects_1431_type_relationship" "objects_1431_id_relationship--be8d0cd6-be77-456e-bcfb-6325cb8ba137" "objects_1431_created_2023-09-28T17:20:15.010Z" "objects_1431_revoked_False" "objects_1431_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1431_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1431_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1431_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1431_modified_2023-09-28T17:20:15.010Z" "objects_1431_description_[Escobar](https://attack.mitre.org/software/S1092) can access external storage.(Citation: Bleeipng Computer Escobar)" "objects_1431_relationship_type_uses" "objects_1431_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1431_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1431_x_mitre_deprecated_False" "objects_1431_x_mitre_version_0.1" "objects_1431_x_mitre_attack_spec_version_3.2.0" "objects_1431_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1431_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1431_spec_version_2.1" "objects_1431_x_mitre_domains_0_mobile-attack" "objects_1432_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1432_id_relationship--bed52256-e5d2-4f15-8c4c-27f709e10c6c" "objects_1432_type_relationship" "objects_1432_created_2020-06-26T14:55:13.380Z" "objects_1432_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1432_external_references_0_source_name_Cybereason EventBot" "objects_1432_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1432_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1432_modified_2020-06-26T14:55:13.380Z" "objects_1432_description_[EventBot](https://attack.mitre.org/software/S0478) dynamically loads its malicious functionality at runtime from an RC4-encrypted TTF file. [EventBot](https://attack.mitre.org/software/S0478) also utilizes ProGuard to obfuscate the generated APK file.(Citation: Cybereason EventBot)" "objects_1432_relationship_type_uses" "objects_1432_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1432_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1432_x_mitre_version_1.0" "objects_1432_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1432_spec_version_2.1" "objects_1432_x_mitre_attack_spec_version_2.1.0" "objects_1432_x_mitre_domains_0_mobile-attack" "objects_1433_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1433_id_relationship--bee6407a-1f05-4f91-b6e7-a8f8b58fa421" "objects_1433_type_relationship" "objects_1433_created_2017-12-14T16:46:06.044Z" "objects_1433_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1433_external_references_0_source_name_CheckPoint-Charger" "objects_1433_external_references_0_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_1433_external_references_0_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_1433_modified_2020-03-31T14:49:39.188Z" "objects_1433_description_[Charger](https://attack.mitre.org/software/S0323) encodes strings into binary arrays to make it difficult to inspect them. It also loads code from encrypted resources dynamically and includes meaningless commands that mask the actual commands passing through.(Citation: CheckPoint-Charger)" "objects_1433_relationship_type_uses" "objects_1433_source_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_1433_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1433_x_mitre_version_1.0" "objects_1433_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1433_spec_version_2.1" "objects_1433_x_mitre_attack_spec_version_2.1.0" "objects_1433_x_mitre_domains_0_mobile-attack" "objects_1434_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1434_id_relationship--bee919a6-c488-49a0-9848-fff19aa2c276" "objects_1434_type_relationship" "objects_1434_created_2021-09-24T14:47:34.449Z" "objects_1434_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1434_modified_2021-10-04T20:08:48.556Z" "objects_1434_description_Mobile security products can often detect rooted devices." "objects_1434_relationship_type_mitigates" "objects_1434_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1434_target_ref_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_1434_x_mitre_version_1.0" "objects_1434_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1434_spec_version_2.1" "objects_1434_x_mitre_attack_spec_version_2.1.0" "objects_1434_x_mitre_domains_0_mobile-attack" "objects_1435_type_relationship" "objects_1435_id_relationship--bef936d5-736e-491a-9c30-37b8362a5d96" "objects_1435_created_2023-07-21T19:33:48.439Z" "objects_1435_revoked_False" "objects_1435_external_references_0_source_name_lookout_bouldspy_0423" "objects_1435_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1435_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1435_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1435_modified_2023-07-21T19:33:48.439Z" "objects_1435_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can access device call logs.(Citation: lookout_bouldspy_0423)" "objects_1435_relationship_type_uses" "objects_1435_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1435_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1435_x_mitre_deprecated_False" "objects_1435_x_mitre_version_0.1" "objects_1435_x_mitre_attack_spec_version_3.1.0" "objects_1435_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1435_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1435_spec_version_2.1" "objects_1435_x_mitre_domains_0_mobile-attack" "objects_1436_type_relationship" "objects_1436_id_relationship--befa3b5a-e4f4-4ed3-ada1-860a034284d2" "objects_1436_created_2023-09-28T17:19:51.110Z" "objects_1436_revoked_False" "objects_1436_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1436_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1436_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1436_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1436_modified_2023-09-28T17:19:51.110Z" "objects_1436_description_[Escobar](https://attack.mitre.org/software/S1092) can access the device\u2019s call log.(Citation: Bleeipng Computer Escobar)" "objects_1436_relationship_type_uses" "objects_1436_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1436_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1436_x_mitre_deprecated_False" "objects_1436_x_mitre_version_0.1" "objects_1436_x_mitre_attack_spec_version_3.2.0" "objects_1436_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1436_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1436_spec_version_2.1" "objects_1436_x_mitre_domains_0_mobile-attack" "objects_1437_type_relationship" "objects_1437_id_relationship--bf19207a-ac71-436d-8ef4-4ab059b533c8" "objects_1437_created_2019-09-04T15:38:56.721Z" "objects_1437_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1437_revoked_False" "objects_1437_external_references_0_source_name_FortiGuard-FlexiSpy" "objects_1437_external_references_0_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1437_external_references_0_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1437_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1437_modified_2023-04-05T17:48:43.225Z" "objects_1437_description_[FlexiSpy](https://attack.mitre.org/software/S0408) uses root access to establish reboot hooks to re-install the application from `/data/misc/adn`.(Citation: FortiGuard-FlexiSpy) At boot, [FlexiSpy](https://attack.mitre.org/software/S0408) spawns daemons for process monitoring, call monitoring, call managing, and system.(Citation: FortiGuard-FlexiSpy)" "objects_1437_relationship_type_uses" "objects_1437_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1437_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1437_x_mitre_deprecated_False" "objects_1437_x_mitre_version_1.0" "objects_1437_x_mitre_attack_spec_version_3.1.0" "objects_1437_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1437_spec_version_2.1" "objects_1437_x_mitre_domains_0_mobile-attack" "objects_1438_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1438_id_relationship--bf2ea132-c8f3-4ea0-8c4c-bdc95923c3b1" "objects_1438_type_relationship" "objects_1438_created_2017-12-14T16:46:06.044Z" "objects_1438_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1438_external_references_0_source_name_Zscaler-SpyNote" "objects_1438_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_1438_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_1438_modified_2020-03-31T14:49:39.188Z" "objects_1438_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) can activate the victim's microphone.(Citation: Zscaler-SpyNote)" "objects_1438_relationship_type_uses" "objects_1438_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_1438_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1438_x_mitre_version_1.0" "objects_1438_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1438_spec_version_2.1" "objects_1438_x_mitre_attack_spec_version_2.1.0" "objects_1438_x_mitre_domains_0_mobile-attack" "objects_1439_type_relationship" "objects_1439_id_relationship--bf33711d-a4d2-4957-9b1f-49c5b83958db" "objects_1439_created_2023-09-21T22:51:40.666Z" "objects_1439_revoked_False" "objects_1439_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1439_modified_2023-09-21T22:51:40.666Z" "objects_1439_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) can compromise iPhones running iOS 16.6 without any user interaction." "objects_1439_relationship_type_uses" "objects_1439_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1439_target_ref_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_1439_x_mitre_deprecated_False" "objects_1439_x_mitre_version_0.1" "objects_1439_x_mitre_attack_spec_version_3.1.0" "objects_1439_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1439_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1439_spec_version_2.1" "objects_1439_x_mitre_domains_0_mobile-attack" "objects_1440_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1440_id_relationship--bf901bab-3caa-4d05-a859-d9fb4d838304" "objects_1440_type_relationship" "objects_1440_created_2019-10-10T15:27:22.091Z" "objects_1440_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1440_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1440_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1440_external_references_0_source_name_Lookout-StealthMango" "objects_1440_modified_2020-03-31T14:49:39.188Z" "objects_1440_description_[Tangelo](https://attack.mitre.org/software/S0329) accesses browser history, pictures, and videos.(Citation: Lookout-StealthMango)" "objects_1440_relationship_type_uses" "objects_1440_source_ref_malware--35aae10a-97c5-471a-9c67-02c231a7a31a" "objects_1440_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1440_x_mitre_version_1.0" "objects_1440_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1440_spec_version_2.1" "objects_1440_x_mitre_attack_spec_version_2.1.0" "objects_1440_x_mitre_domains_0_mobile-attack" "objects_1441_type_relationship" "objects_1441_id_relationship--bfad064a-0a49-44e3-b283-94653edc12af" "objects_1441_created_2023-08-07T17:13:04.270Z" "objects_1441_revoked_False" "objects_1441_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1441_modified_2023-08-07T17:13:04.270Z" "objects_1441_description_Mobile security products can often alert the user if their device is vulnerable to known exploits." "objects_1441_relationship_type_detects" "objects_1441_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1441_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1441_x_mitre_deprecated_False" "objects_1441_x_mitre_version_0.1" "objects_1441_x_mitre_attack_spec_version_3.1.0" "objects_1441_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1441_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1441_spec_version_2.1" "objects_1441_x_mitre_domains_0_mobile-attack" "objects_1442_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1442_type_relationship" "objects_1442_id_relationship--bfd0d9cb-27e2-42a2-9207-764bb1491962" "objects_1442_created_2022-03-30T19:54:07.548Z" "objects_1442_x_mitre_version_0.1" "objects_1442_x_mitre_deprecated_False" "objects_1442_revoked_False" "objects_1442_description_Device attestation could detect devices with unauthorized or unsafe modifications. " "objects_1442_modified_2022-03-30T19:54:07.548Z" "objects_1442_relationship_type_mitigates" "objects_1442_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1442_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1442_x_mitre_attack_spec_version_2.1.0" "objects_1442_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1442_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1442_spec_version_2.1" "objects_1442_x_mitre_domains_0_mobile-attack" "objects_1443_type_relationship" "objects_1443_id_relationship--bff3f22c-660d-4ceb-b1bb-dbd064d363c0" "objects_1443_created_2023-03-15T16:39:32.117Z" "objects_1443_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1443_revoked_False" "objects_1443_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1443_modified_2023-08-10T21:00:59.182Z" "objects_1443_description_Application vetting services should look for applications that request VPN access. These applications should be heavily scrutinized since VPN functionality is not very common. " "objects_1443_relationship_type_detects" "objects_1443_source_ref_x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2" "objects_1443_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1443_x_mitre_deprecated_False" "objects_1443_x_mitre_version_0.1" "objects_1443_x_mitre_attack_spec_version_3.1.0" "objects_1443_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1443_spec_version_2.1" "objects_1443_x_mitre_domains_0_mobile-attack" "objects_1444_type_relationship" "objects_1444_id_relationship--c00031dd-0466-4fd2-9724-ab1c04232bad" "objects_1444_created_2023-03-20T18:44:40.722Z" "objects_1444_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1444_revoked_False" "objects_1444_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1444_modified_2023-08-08T16:28:27.010Z" "objects_1444_description_Application vetting services can detect unnecessary and potentially abused API calls." "objects_1444_relationship_type_detects" "objects_1444_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1444_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_1444_x_mitre_deprecated_False" "objects_1444_x_mitre_version_0.1" "objects_1444_x_mitre_attack_spec_version_3.1.0" "objects_1444_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1444_spec_version_2.1" "objects_1444_x_mitre_domains_0_mobile-attack" "objects_1445_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1445_id_relationship--c021d9b9-3850-425d-b3d2-6b7bd7e62b95" "objects_1445_type_relationship" "objects_1445_created_2019-10-18T15:51:48.525Z" "objects_1445_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1445_modified_2019-10-18T15:51:48.525Z" "objects_1445_description_Users should be advised not to use public charging stations or computers to charge their devices. Instead, users should be issued a charger acquired from a trustworthy source. Users should be advised not to click on device prompts to trust attached computers unless absolutely necessary." "objects_1445_relationship_type_mitigates" "objects_1445_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1445_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1445_x_mitre_version_1.0" "objects_1445_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1445_spec_version_2.1" "objects_1445_x_mitre_attack_spec_version_2.1.0" "objects_1445_x_mitre_domains_0_mobile-attack" "objects_1446_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1446_type_relationship" "objects_1446_id_relationship--c1453cd9-44bb-4dd2-bdbd-eb06a239d38c" "objects_1446_created_2022-04-06T15:52:07.805Z" "objects_1446_x_mitre_version_0.1" "objects_1446_x_mitre_deprecated_False" "objects_1446_revoked_False" "objects_1446_description_" "objects_1446_modified_2022-04-06T15:52:07.805Z" "objects_1446_relationship_type_subtechnique-of" "objects_1446_source_ref_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_1446_target_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_1446_x_mitre_attack_spec_version_2.1.0" "objects_1446_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1446_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1446_spec_version_2.1" "objects_1446_x_mitre_domains_0_mobile-attack" "objects_1447_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1447_type_relationship" "objects_1447_id_relationship--c14efc74-8a5c-4a2d-b9ba-a231738c90dd" "objects_1447_created_2020-12-24T21:41:37.047Z" "objects_1447_x_mitre_version_1.0" "objects_1447_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1447_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1447_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1447_x_mitre_deprecated_False" "objects_1447_revoked_False" "objects_1447_description_[SilkBean](https://attack.mitre.org/software/S0549) has used HTTPS for C2 communication.(Citation: Lookout Uyghur Campaign)" "objects_1447_modified_2022-04-18T16:04:02.127Z" "objects_1447_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1447_relationship_type_uses" "objects_1447_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1447_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_1447_x_mitre_attack_spec_version_2.1.0" "objects_1447_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1447_spec_version_2.1" "objects_1447_x_mitre_domains_0_mobile-attack" "objects_1448_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1448_type_relationship" "objects_1448_id_relationship--c1512591-7440-4a69-93b9-fe439a4c197e" "objects_1448_created_2022-03-28T19:40:40.860Z" "objects_1448_x_mitre_version_0.1" "objects_1448_x_mitre_deprecated_False" "objects_1448_revoked_False" "objects_1448_description_" "objects_1448_modified_2022-03-28T19:40:40.860Z" "objects_1448_relationship_type_subtechnique-of" "objects_1448_source_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1448_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_1448_x_mitre_attack_spec_version_2.1.0" "objects_1448_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1448_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1448_spec_version_2.1" "objects_1448_x_mitre_domains_0_mobile-attack" "objects_1449_type_relationship" "objects_1449_id_relationship--c16c7904-3c85-49de-a0f4-872f4227d775" "objects_1449_created_2023-10-10T15:33:59.143Z" "objects_1449_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1449_revoked_False" "objects_1449_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1449_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1449_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1449_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1449_modified_2023-10-10T15:33:59.143Z" "objects_1449_description_[ViceLeaker](https://attack.mitre.org/software/S0418) was embedded into legitimate applications using Smali injection.(Citation: SecureList - ViceLeaker 2019)" "objects_1449_relationship_type_uses" "objects_1449_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1449_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1449_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1449_x_mitre_deprecated_False" "objects_1449_x_mitre_version_1.0" "objects_1449_x_mitre_attack_spec_version_2.1.0" "objects_1449_spec_version_2.1" "objects_1449_x_mitre_domains_0_mobile-attack" "objects_1450_type_relationship" "objects_1450_id_relationship--c186864b-0af9-42eb-92ba-b8a6952e89b6" "objects_1450_created_2023-07-21T19:36:09.214Z" "objects_1450_revoked_False" "objects_1450_external_references_0_source_name_lookout_bouldspy_0423" "objects_1450_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1450_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1450_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1450_modified_2023-07-21T19:36:09.214Z" "objects_1450_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can take photos using the device cameras.(Citation: lookout_bouldspy_0423)" "objects_1450_relationship_type_uses" "objects_1450_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1450_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1450_x_mitre_deprecated_False" "objects_1450_x_mitre_version_0.1" "objects_1450_x_mitre_attack_spec_version_3.1.0" "objects_1450_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1450_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1450_spec_version_2.1" "objects_1450_x_mitre_domains_0_mobile-attack" "objects_1451_type_relationship" "objects_1451_id_relationship--c1d78c3d-9ed6-4e3f-9cad-b98b5dfb8ebd" "objects_1451_created_2023-03-20T15:40:11.819Z" "objects_1451_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1451_revoked_False" "objects_1451_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1451_modified_2023-08-10T22:13:31.468Z" "objects_1451_description_On both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. " "objects_1451_relationship_type_detects" "objects_1451_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1451_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1451_x_mitre_deprecated_False" "objects_1451_x_mitre_version_0.1" "objects_1451_x_mitre_attack_spec_version_3.1.0" "objects_1451_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1451_spec_version_2.1" "objects_1451_x_mitre_domains_0_mobile-attack" "objects_1452_type_relationship" "objects_1452_id_relationship--c23d9eff-1d4e-479f-a114-acc535540a23" "objects_1452_created_2023-03-20T18:46:51.895Z" "objects_1452_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1452_revoked_False" "objects_1452_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1452_modified_2023-08-08T16:29:07.329Z" "objects_1452_description_Application vetting services can detect unnecessary and potentially abused permissions." "objects_1452_relationship_type_detects" "objects_1452_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1452_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_1452_x_mitre_deprecated_False" "objects_1452_x_mitre_version_0.1" "objects_1452_x_mitre_attack_spec_version_3.1.0" "objects_1452_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1452_spec_version_2.1" "objects_1452_x_mitre_domains_0_mobile-attack" "objects_1453_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1453_type_relationship" "objects_1453_id_relationship--c2536a3c-bb84-42b7-8ac6-05f26205a4ad" "objects_1453_created_2021-10-01T14:42:49.159Z" "objects_1453_x_mitre_version_1.0" "objects_1453_external_references_0_source_name_SecureList BusyGasper" "objects_1453_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1453_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1453_x_mitre_deprecated_False" "objects_1453_revoked_False" "objects_1453_description_[BusyGasper](https://attack.mitre.org/software/S0655) can utilize the device\u2019s sensors to determine when the device is in use and subsequently hide malicious activity. When active, it attempts to hide its malicious activity by turning the screen\u2019s brightness as low as possible and muting the device.(Citation: SecureList BusyGasper)" "objects_1453_modified_2022-04-12T10:01:44.682Z" "objects_1453_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1453_relationship_type_uses" "objects_1453_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1453_target_ref_attack-pattern--24a77e53-0751-46fc-b207-99378fb35c08" "objects_1453_x_mitre_attack_spec_version_2.1.0" "objects_1453_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1453_spec_version_2.1" "objects_1453_x_mitre_domains_0_mobile-attack" "objects_1454_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1454_id_relationship--c264d954-8b5f-4be1-acf0-6387b7f04fae" "objects_1454_type_relationship" "objects_1454_created_2021-02-17T20:43:52.407Z" "objects_1454_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1454_external_references_0_source_name_Lookout FrozenCell" "objects_1454_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1454_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1454_modified_2021-02-17T20:43:52.407Z" "objects_1454_description_[FrozenCell](https://attack.mitre.org/software/S0577) has gathered the device manufacturer, model, and serial number.(Citation: Lookout FrozenCell)" "objects_1454_relationship_type_uses" "objects_1454_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1454_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1454_x_mitre_version_1.0" "objects_1454_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1454_spec_version_2.1" "objects_1454_x_mitre_attack_spec_version_2.1.0" "objects_1454_x_mitre_domains_0_mobile-attack" "objects_1455_type_relationship" "objects_1455_id_relationship--c33b7dfb-82ad-4a7c-a84c-6e7e9849253b" "objects_1455_created_2023-08-14T16:35:55.610Z" "objects_1455_revoked_False" "objects_1455_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1455_modified_2023-08-14T16:35:55.610Z" "objects_1455_description_Many properly configured firewalls may naturally block one-way command and control traffic." "objects_1455_relationship_type_detects" "objects_1455_source_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_1455_target_ref_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_1455_x_mitre_deprecated_False" "objects_1455_x_mitre_version_0.1" "objects_1455_x_mitre_attack_spec_version_3.1.0" "objects_1455_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1455_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1455_spec_version_2.1" "objects_1455_x_mitre_domains_0_mobile-attack" "objects_1456_type_relationship" "objects_1456_id_relationship--c340b30d-0ad5-4e90-94ce-b6a6b229a7c4" "objects_1456_created_2020-09-15T15:18:12.362Z" "objects_1456_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1456_revoked_False" "objects_1456_external_references_0_source_name_Cybereason FakeSpy" "objects_1456_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1456_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1456_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1456_modified_2023-04-05T20:31:30.741Z" "objects_1456_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect SMS messages.(Citation: Cybereason FakeSpy)" "objects_1456_relationship_type_uses" "objects_1456_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1456_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1456_x_mitre_deprecated_False" "objects_1456_x_mitre_version_1.0" "objects_1456_x_mitre_attack_spec_version_3.1.0" "objects_1456_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1456_spec_version_2.1" "objects_1456_x_mitre_domains_0_mobile-attack" "objects_1457_type_relationship" "objects_1457_id_relationship--c3439bdd-a0db-401b-97fd-5e2ec135a396" "objects_1457_created_2023-03-20T18:40:12.814Z" "objects_1457_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1457_revoked_False" "objects_1457_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1457_modified_2023-08-08T17:15:46.818Z" "objects_1457_description_The user can view a list of active device administrators in the device settings." "objects_1457_relationship_type_detects" "objects_1457_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1457_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1457_x_mitre_deprecated_False" "objects_1457_x_mitre_version_0.1" "objects_1457_x_mitre_attack_spec_version_3.1.0" "objects_1457_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1457_spec_version_2.1" "objects_1457_x_mitre_domains_0_mobile-attack" "objects_1458_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1458_id_relationship--c368c932-7d5a-40e3-a18b-f30e82b9e4e6" "objects_1458_type_relationship" "objects_1458_created_2020-10-29T17:48:27.332Z" "objects_1458_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1458_external_references_0_source_name_Threat Fabric Exobot" "objects_1458_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1458_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1458_modified_2020-10-29T17:48:27.332Z" "objects_1458_description_[Exobot](https://attack.mitre.org/software/S0522) can obtain the device\u2019s IMEI, phone number, and IP address.(Citation: Threat Fabric Exobot) " "objects_1458_relationship_type_uses" "objects_1458_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1458_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1458_x_mitre_version_1.0" "objects_1458_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1458_spec_version_2.1" "objects_1458_x_mitre_attack_spec_version_2.1.0" "objects_1458_x_mitre_domains_0_mobile-attack" "objects_1459_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1459_id_relationship--c374c9ce-ff30-4daa-bdec-8015a507746a" "objects_1459_type_relationship" "objects_1459_created_2018-10-17T00:14:20.652Z" "objects_1459_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1459_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_1459_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_1459_external_references_0_source_name_Kaspersky-Skygofree" "objects_1459_modified_2020-03-31T14:49:39.188Z" "objects_1459_description_[Skygofree](https://attack.mitre.org/software/S0327) has a capability to obtain files from other installed applications.(Citation: Kaspersky-Skygofree)" "objects_1459_relationship_type_uses" "objects_1459_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_1459_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1459_x_mitre_version_1.0" "objects_1459_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1459_spec_version_2.1" "objects_1459_x_mitre_attack_spec_version_2.1.0" "objects_1459_x_mitre_domains_0_mobile-attack" "objects_1460_type_relationship" "objects_1460_id_relationship--c393fe8f-5708-40eb-ada9-6ca0d9b16c7d" "objects_1460_created_2023-03-15T16:34:51.794Z" "objects_1460_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1460_revoked_False" "objects_1460_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1460_modified_2023-08-14T16:43:05.577Z" "objects_1460_description_Application vetting services could closely scrutinize applications that request Device Administrator permissions." "objects_1460_relationship_type_detects" "objects_1460_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1460_target_ref_attack-pattern--e2c2249a-eb82-4614-8dd4-9c514dde65e2" "objects_1460_x_mitre_deprecated_False" "objects_1460_x_mitre_version_0.1" "objects_1460_x_mitre_attack_spec_version_3.1.0" "objects_1460_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1460_spec_version_2.1" "objects_1460_x_mitre_domains_0_mobile-attack" "objects_1461_type_relationship" "objects_1461_id_relationship--c3c0ff44-71bb-4774-a850-7b7c9dccb619" "objects_1461_created_2023-03-20T18:44:04.803Z" "objects_1461_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1461_revoked_False" "objects_1461_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1461_modified_2023-08-09T15:59:29.793Z" "objects_1461_description_On Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it." "objects_1461_relationship_type_detects" "objects_1461_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1461_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_1461_x_mitre_deprecated_False" "objects_1461_x_mitre_version_0.1" "objects_1461_x_mitre_attack_spec_version_3.1.0" "objects_1461_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1461_spec_version_2.1" "objects_1461_x_mitre_domains_0_mobile-attack" "objects_1462_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1462_type_relationship" "objects_1462_id_relationship--c3c2bf20-fa33-4af4-92ec-d60679e1d4ee" "objects_1462_created_2018-10-17T00:14:20.652Z" "objects_1462_x_mitre_version_1.0" "objects_1462_x_mitre_deprecated_False" "objects_1462_revoked_False" "objects_1462_description_" "objects_1462_modified_2022-07-07T14:00:00.188Z" "objects_1462_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1462_relationship_type_revoked-by" "objects_1462_source_ref_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_1462_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1462_x_mitre_attack_spec_version_2.1.0" "objects_1462_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1462_spec_version_2.1" "objects_1462_x_mitre_domains_0_mobile-attack" "objects_1463_type_relationship" "objects_1463_id_relationship--c41d817e-913e-4574-b8d4-370de9f0034b" "objects_1463_created_2019-11-18T14:47:25.327Z" "objects_1463_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1463_revoked_False" "objects_1463_external_references_0_source_name_Google Triada June 2019" "objects_1463_external_references_0_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_1463_external_references_0_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_1463_external_references_1_source_name_Kaspersky Triada March 2016" "objects_1463_external_references_1_description_Snow, J. (2016, March 3). Triada: organized crime on Android. Retrieved July 16, 2019." "objects_1463_external_references_1_url_https://www.kaspersky.com/blog/triada-trojan/11481/" "objects_1463_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1463_modified_2023-04-05T21:19:16.331Z" "objects_1463_description_[Triada](https://attack.mitre.org/software/S0424) injects code into the Zygote process to effectively include itself in all forked processes. Additionally, code is injected into the Android Play Store App, web browser applications, and the system UI application.(Citation: Google Triada June 2019)(Citation: Kaspersky Triada March 2016)" "objects_1463_relationship_type_uses" "objects_1463_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_1463_target_ref_attack-pattern--1ff89c1b-7615-4fe8-b9cb-63aaf52e6dee" "objects_1463_x_mitre_deprecated_False" "objects_1463_x_mitre_version_1.0" "objects_1463_x_mitre_attack_spec_version_3.1.0" "objects_1463_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1463_spec_version_2.1" "objects_1463_x_mitre_domains_0_mobile-attack" "objects_1464_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1464_type_relationship" "objects_1464_id_relationship--c43341e3-6fb9-46f1-8ea3-8daede1a4c77" "objects_1464_created_2022-04-06T15:52:41.579Z" "objects_1464_x_mitre_version_0.1" "objects_1464_x_mitre_deprecated_False" "objects_1464_revoked_False" "objects_1464_description_" "objects_1464_modified_2022-04-06T15:52:41.579Z" "objects_1464_relationship_type_revoked-by" "objects_1464_source_ref_attack-pattern--a5de0540-73e7-4c67-96da-4143afedc7ed" "objects_1464_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1464_x_mitre_attack_spec_version_2.1.0" "objects_1464_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1464_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1464_spec_version_2.1" "objects_1464_x_mitre_domains_0_mobile-attack" "objects_1465_type_relationship" "objects_1465_id_relationship--c438b973-c2f3-43fc-8312-2a5bbde4facb" "objects_1465_created_2023-03-20T18:43:03.537Z" "objects_1465_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1465_revoked_False" "objects_1465_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1465_modified_2023-08-08T21:11:29.381Z" "objects_1465_description_Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity." "objects_1465_relationship_type_detects" "objects_1465_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1465_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1465_x_mitre_deprecated_False" "objects_1465_x_mitre_version_0.1" "objects_1465_x_mitre_attack_spec_version_3.1.0" "objects_1465_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1465_spec_version_2.1" "objects_1465_x_mitre_domains_0_mobile-attack" "objects_1466_type_relationship" "objects_1466_id_relationship--c49bae52-63b4-4e5e-adfd-65a0e852ed76" "objects_1466_created_2023-03-20T18:42:18.058Z" "objects_1466_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1466_revoked_False" "objects_1466_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1466_modified_2023-08-08T21:12:52.481Z" "objects_1466_description_The user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. The user can see a list of applications that can use accessibility services in the device settings. " "objects_1466_relationship_type_detects" "objects_1466_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1466_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1466_x_mitre_deprecated_False" "objects_1466_x_mitre_version_0.1" "objects_1466_x_mitre_attack_spec_version_3.1.0" "objects_1466_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1466_spec_version_2.1" "objects_1466_x_mitre_domains_0_mobile-attack" "objects_1467_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1467_id_relationship--c49cdcb7-3cb8-40ed-a745-0cebad20b1fd" "objects_1467_type_relationship" "objects_1467_created_2020-05-04T14:04:56.214Z" "objects_1467_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1467_external_references_0_source_name_Google Bread" "objects_1467_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_1467_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_1467_modified_2020-05-04T15:40:21.076Z" "objects_1467_description_[Bread](https://attack.mitre.org/software/S0432) has used native code in an attempt to disguise malicious functionality.(Citation: Google Bread)" "objects_1467_relationship_type_uses" "objects_1467_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1467_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_1467_x_mitre_version_1.0" "objects_1467_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1467_spec_version_2.1" "objects_1467_x_mitre_attack_spec_version_2.1.0" "objects_1467_x_mitre_domains_0_mobile-attack" "objects_1468_type_relationship" "objects_1468_id_relationship--c4d71eb8-2099-44b9-be45-758f9e6a771a" "objects_1468_created_2023-10-10T15:33:57.823Z" "objects_1468_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1468_revoked_False" "objects_1468_external_references_0_source_name_Securelist Asacub" "objects_1468_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1468_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1468_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1468_modified_2023-10-10T15:33:57.823Z" "objects_1468_description_[Asacub](https://attack.mitre.org/software/S0540) has masqueraded as a client of popular free ads services.(Citation: Securelist Asacub)" "objects_1468_relationship_type_uses" "objects_1468_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1468_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1468_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1468_x_mitre_deprecated_False" "objects_1468_x_mitre_version_1.0" "objects_1468_x_mitre_attack_spec_version_2.1.0" "objects_1468_spec_version_2.1" "objects_1468_x_mitre_domains_0_mobile-attack" "objects_1469_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1469_id_relationship--c4e73a6c-d523-4f3c-bcb6-200f63867fb4" "objects_1469_type_relationship" "objects_1469_created_2020-09-11T15:57:37.770Z" "objects_1469_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1469_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1469_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1469_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1469_modified_2020-09-11T15:57:37.770Z" "objects_1469_description_[TrickMo](https://attack.mitre.org/software/S0427) can delete SMS messages.(Citation: SecurityIntelligence TrickMo)" "objects_1469_relationship_type_uses" "objects_1469_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1469_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1469_x_mitre_version_1.0" "objects_1469_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1469_spec_version_2.1" "objects_1469_x_mitre_attack_spec_version_2.1.0" "objects_1469_x_mitre_domains_0_mobile-attack" "objects_1470_type_relationship" "objects_1470_id_relationship--c50b4da7-f0e1-4f6d-969c-dbc739d49d7c" "objects_1470_created_2021-01-05T20:16:20.508Z" "objects_1470_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1470_revoked_False" "objects_1470_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1470_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1470_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1470_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1470_modified_2023-04-05T17:40:43.898Z" "objects_1470_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can collect the device\u2019s call logs.(Citation: Zscaler TikTok Spyware)" "objects_1470_relationship_type_uses" "objects_1470_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1470_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1470_x_mitre_deprecated_False" "objects_1470_x_mitre_version_1.0" "objects_1470_x_mitre_attack_spec_version_3.1.0" "objects_1470_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1470_spec_version_2.1" "objects_1470_x_mitre_domains_0_mobile-attack" "objects_1471_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1471_type_relationship" "objects_1471_id_relationship--c53170a0-ca7f-4827-9c3c-1803ecd131f9" "objects_1471_created_2018-10-17T00:14:20.652Z" "objects_1471_x_mitre_version_1.0" "objects_1471_x_mitre_deprecated_False" "objects_1471_revoked_False" "objects_1471_description_" "objects_1471_modified_2022-07-07T14:00:00.188Z" "objects_1471_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1471_relationship_type_revoked-by" "objects_1471_source_ref_attack-pattern--831e3269-da49-48ac-94dc-948008e8fd16" "objects_1471_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1471_x_mitre_attack_spec_version_2.1.0" "objects_1471_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1471_spec_version_2.1" "objects_1471_x_mitre_domains_0_mobile-attack" "objects_1472_type_relationship" "objects_1472_id_relationship--c546dd04-2060-44bf-ba1e-d1c1edc54687" "objects_1472_created_2023-10-10T15:33:58.973Z" "objects_1472_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1472_revoked_False" "objects_1472_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1472_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1472_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1472_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1472_modified_2023-10-10T15:33:58.973Z" "objects_1472_description_[SimBad](https://attack.mitre.org/software/S0419) was embedded into legitimate applications.(Citation: CheckPoint SimBad 2019)" "objects_1472_relationship_type_uses" "objects_1472_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1472_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1472_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1472_x_mitre_deprecated_False" "objects_1472_x_mitre_version_1.0" "objects_1472_x_mitre_attack_spec_version_2.1.0" "objects_1472_spec_version_2.1" "objects_1472_x_mitre_domains_0_mobile-attack" "objects_1473_type_relationship" "objects_1473_id_relationship--c574251b-93ad-4f55-8b84-2700dfab4622" "objects_1473_created_2020-07-15T20:20:59.280Z" "objects_1473_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1473_revoked_False" "objects_1473_external_references_0_source_name_Bitdefender Mandrake" "objects_1473_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1473_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1473_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1473_modified_2023-04-05T20:45:27.443Z" "objects_1473_description_[Mandrake](https://attack.mitre.org/software/S0485) can hide its icon on older Android versions.(Citation: Bitdefender Mandrake)" "objects_1473_relationship_type_uses" "objects_1473_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1473_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1473_x_mitre_deprecated_False" "objects_1473_x_mitre_version_1.0" "objects_1473_x_mitre_attack_spec_version_3.1.0" "objects_1473_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1473_spec_version_2.1" "objects_1473_x_mitre_domains_0_mobile-attack" "objects_1474_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1474_id_relationship--c58a26af-cc4c-41a2-b884-9a4fa8a2ad5c" "objects_1474_type_relationship" "objects_1474_created_2019-09-04T15:38:56.946Z" "objects_1474_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1474_external_references_0_source_name_FlexiSpy-Features" "objects_1474_external_references_0_url_https://www.flexispy.com/en/features-overview.htm" "objects_1474_external_references_0_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_1474_modified_2020-03-31T14:49:39.188Z" "objects_1474_description_ [FlexiSpy](https://attack.mitre.org/software/S0408) can retrieve a list of installed applications.(Citation: FlexiSpy-Features) " "objects_1474_relationship_type_uses" "objects_1474_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1474_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1474_x_mitre_version_1.0" "objects_1474_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1474_spec_version_2.1" "objects_1474_x_mitre_attack_spec_version_2.1.0" "objects_1474_x_mitre_domains_0_mobile-attack" "objects_1475_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1475_type_relationship" "objects_1475_id_relationship--c5cb9fb4-2593-412f-82f8-a04a125bd429" "objects_1475_created_2022-04-01T18:51:28.859Z" "objects_1475_x_mitre_version_0.1" "objects_1475_x_mitre_deprecated_False" "objects_1475_revoked_False" "objects_1475_description_Security updates frequently contain patches to vulnerabilities that can be exploited for root access." "objects_1475_modified_2022-04-01T18:51:28.859Z" "objects_1475_relationship_type_mitigates" "objects_1475_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1475_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1475_x_mitre_attack_spec_version_2.1.0" "objects_1475_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1475_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1475_spec_version_2.1" "objects_1475_x_mitre_domains_0_mobile-attack" "objects_1476_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1476_id_relationship--c5db5bb5-9877-43cd-8851-5aa62405dcb2" "objects_1476_type_relationship" "objects_1476_created_2019-11-21T16:42:48.497Z" "objects_1476_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1476_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1476_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1476_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1476_modified_2019-11-21T16:42:48.497Z" "objects_1476_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can take photos from both the front and back cameras.(Citation: SecureList - ViceLeaker 2019)" "objects_1476_relationship_type_uses" "objects_1476_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1476_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1476_x_mitre_version_1.0" "objects_1476_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1476_spec_version_2.1" "objects_1476_x_mitre_attack_spec_version_2.1.0" "objects_1476_x_mitre_domains_0_mobile-attack" "objects_1477_type_relationship" "objects_1477_id_relationship--c61c16a9-8d1a-4329-b784-ba71f8421b33" "objects_1477_created_2023-03-20T19:00:09.608Z" "objects_1477_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1477_revoked_False" "objects_1477_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1477_modified_2023-08-08T17:11:30.820Z" "objects_1477_description_Mobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running." "objects_1477_relationship_type_detects" "objects_1477_source_ref_x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f" "objects_1477_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1477_x_mitre_deprecated_False" "objects_1477_x_mitre_version_0.1" "objects_1477_x_mitre_attack_spec_version_3.1.0" "objects_1477_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1477_spec_version_2.1" "objects_1477_x_mitre_domains_0_mobile-attack" "objects_1478_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1478_id_relationship--c6241ba3-e0f9-48a7-9ed7-a5544a090081" "objects_1478_type_relationship" "objects_1478_created_2019-09-04T14:28:16.000Z" "objects_1478_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1478_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1478_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1478_external_references_0_source_name_Lookout-Monokle" "objects_1478_modified_2020-03-31T14:49:39.188Z" "objects_1478_description_[Monokle](https://attack.mitre.org/software/S0407) can track the device's location.(Citation: Lookout-Monokle)" "objects_1478_relationship_type_uses" "objects_1478_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1478_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1478_x_mitre_version_1.0" "objects_1478_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1478_spec_version_2.1" "objects_1478_x_mitre_attack_spec_version_2.1.0" "objects_1478_x_mitre_domains_0_mobile-attack" "objects_1479_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1479_type_relationship" "objects_1479_id_relationship--c6464a84-e23b-412f-b435-5b23853d3643" "objects_1479_created_2020-09-14T13:35:45.909Z" "objects_1479_x_mitre_version_1.0" "objects_1479_external_references_0_source_name_ESET-Twitoor" "objects_1479_external_references_0_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_1479_external_references_0_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_1479_x_mitre_deprecated_False" "objects_1479_revoked_False" "objects_1479_description_[Twitoor](https://attack.mitre.org/software/S0302) encrypts its C2 communication.(Citation: ESET-Twitoor)" "objects_1479_modified_2022-04-20T12:58:23.550Z" "objects_1479_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1479_relationship_type_uses" "objects_1479_source_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_1479_target_ref_attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84" "objects_1479_x_mitre_attack_spec_version_2.1.0" "objects_1479_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1479_spec_version_2.1" "objects_1479_x_mitre_domains_0_mobile-attack" "objects_1480_type_relationship" "objects_1480_id_relationship--c65661a6-6047-4901-ac2c-3ca4b1bbbb28" "objects_1480_created_2017-12-14T16:46:06.044Z" "objects_1480_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1480_revoked_False" "objects_1480_external_references_0_source_name_Zscaler-SuperMarioRun" "objects_1480_external_references_0_description_Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." "objects_1480_external_references_0_url_https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat" "objects_1480_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1480_modified_2023-04-05T17:24:32.173Z" "objects_1480_description_[DroidJack](https://attack.mitre.org/software/S0320) captures call data.(Citation: Zscaler-SuperMarioRun)" "objects_1480_relationship_type_uses" "objects_1480_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_1480_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1480_x_mitre_deprecated_False" "objects_1480_x_mitre_version_1.0" "objects_1480_x_mitre_attack_spec_version_3.1.0" "objects_1480_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1480_spec_version_2.1" "objects_1480_x_mitre_domains_0_mobile-attack" "objects_1481_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1481_id_relationship--c659256c-82e3-4f4c-ac70-3d2400cf6695" "objects_1481_type_relationship" "objects_1481_created_2020-09-11T16:23:16.363Z" "objects_1481_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1481_external_references_0_source_name_Lookout Desert Scorpion" "objects_1481_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1481_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1481_modified_2020-09-11T16:23:16.363Z" "objects_1481_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can send SMS messages.(Citation: Lookout Desert Scorpion)" "objects_1481_relationship_type_uses" "objects_1481_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1481_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1481_x_mitre_version_1.0" "objects_1481_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1481_spec_version_2.1" "objects_1481_x_mitre_attack_spec_version_2.1.0" "objects_1481_x_mitre_domains_0_mobile-attack" "objects_1482_type_relationship" "objects_1482_id_relationship--c6a32f64-3105-4a94-8172-28ac0e10dd93" "objects_1482_created_2023-03-20T18:21:59.396Z" "objects_1482_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1482_revoked_False" "objects_1482_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1482_modified_2023-08-08T16:24:44.982Z" "objects_1482_description_Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious." "objects_1482_relationship_type_detects" "objects_1482_source_ref_x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c" "objects_1482_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1482_x_mitre_deprecated_False" "objects_1482_x_mitre_version_0.1" "objects_1482_x_mitre_attack_spec_version_3.1.0" "objects_1482_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1482_spec_version_2.1" "objects_1482_x_mitre_domains_0_mobile-attack" "objects_1483_type_relationship" "objects_1483_id_relationship--c720fd30-5694-42b7-bf77-d948f7ba2b6f" "objects_1483_created_2020-06-24T18:24:35.707Z" "objects_1483_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1483_revoked_False" "objects_1483_external_references_0_source_name_Google Project Zero Insomnia" "objects_1483_external_references_0_description_I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020." "objects_1483_external_references_0_url_https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" "objects_1483_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1483_modified_2023-04-05T21:30:27.616Z" "objects_1483_description_[INSOMNIA](https://attack.mitre.org/software/S0463) can extract the device\u2019s keychain.(Citation: Google Project Zero Insomnia)" "objects_1483_relationship_type_uses" "objects_1483_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1483_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1483_x_mitre_deprecated_False" "objects_1483_x_mitre_version_1.0" "objects_1483_x_mitre_attack_spec_version_3.1.0" "objects_1483_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1483_spec_version_2.1" "objects_1483_x_mitre_domains_0_mobile-attack" "objects_1484_type_relationship" "objects_1484_id_relationship--c778593c-1583-48cc-a99d-0ac1b5b537e2" "objects_1484_created_2023-03-20T18:48:39.857Z" "objects_1484_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1484_revoked_False" "objects_1484_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1484_modified_2023-08-09T15:56:56.738Z" "objects_1484_description_On Android, the user can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, the user can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. " "objects_1484_relationship_type_detects" "objects_1484_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1484_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1484_x_mitre_deprecated_False" "objects_1484_x_mitre_version_0.1" "objects_1484_x_mitre_attack_spec_version_3.1.0" "objects_1484_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1484_spec_version_2.1" "objects_1484_x_mitre_domains_0_mobile-attack" "objects_1485_type_relationship" "objects_1485_id_relationship--c78a3e66-b7aa-4feb-bc18-b8af77f27a47" "objects_1485_created_2023-03-20T15:20:11.652Z" "objects_1485_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1485_revoked_False" "objects_1485_external_references_0_source_name_Android-VerifiedBoot" "objects_1485_external_references_0_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_1485_external_references_0_url_https://source.android.com/security/verifiedboot/" "objects_1485_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1485_modified_2023-08-08T14:54:04.526Z" "objects_1485_description_Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android\u2019s SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromised devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices." "objects_1485_relationship_type_detects" "objects_1485_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1485_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1485_x_mitre_deprecated_False" "objects_1485_x_mitre_version_0.1" "objects_1485_x_mitre_attack_spec_version_3.1.0" "objects_1485_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1485_spec_version_2.1" "objects_1485_x_mitre_domains_0_mobile-attack" "objects_1486_type_relationship" "objects_1486_id_relationship--c7f876d4-99f2-41ac-993c-57a3f2b4e0eb" "objects_1486_created_2023-02-06T19:00:42.449Z" "objects_1486_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1486_revoked_False" "objects_1486_external_references_0_source_name_lookout_abstractemu_1021" "objects_1486_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1486_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1486_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1486_modified_2023-03-27T17:22:43.518Z" "objects_1486_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can access a device's location.(Citation: lookout_abstractemu_1021)" "objects_1486_relationship_type_uses" "objects_1486_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1486_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1486_x_mitre_deprecated_False" "objects_1486_x_mitre_version_0.1" "objects_1486_x_mitre_attack_spec_version_3.1.0" "objects_1486_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1486_spec_version_2.1" "objects_1486_x_mitre_domains_0_mobile-attack" "objects_1487_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1487_type_relationship" "objects_1487_id_relationship--c81757a7-16b1-4b48-ae52-3d375f533dfd" "objects_1487_created_2022-04-01T15:03:02.553Z" "objects_1487_x_mitre_version_0.1" "objects_1487_x_mitre_deprecated_False" "objects_1487_revoked_False" "objects_1487_description_" "objects_1487_modified_2022-04-01T15:03:02.553Z" "objects_1487_relationship_type_subtechnique-of" "objects_1487_source_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1487_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_1487_x_mitre_attack_spec_version_2.1.0" "objects_1487_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1487_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1487_spec_version_2.1" "objects_1487_x_mitre_domains_0_mobile-attack" "objects_1488_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1488_type_relationship" "objects_1488_id_relationship--c83c84e8-a556-4efe-ae24-75970ee8ad4b" "objects_1488_created_2017-12-14T16:46:06.044Z" "objects_1488_x_mitre_version_1.0" "objects_1488_external_references_0_source_name_Kaspersky-WUC" "objects_1488_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_1488_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_1488_x_mitre_deprecated_False" "objects_1488_revoked_False" "objects_1488_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) used SMS to receive command and control messages.(Citation: Kaspersky-WUC)" "objects_1488_modified_2022-04-19T14:25:41.669Z" "objects_1488_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1488_relationship_type_uses" "objects_1488_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_1488_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1488_x_mitre_attack_spec_version_2.1.0" "objects_1488_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1488_spec_version_2.1" "objects_1488_x_mitre_domains_0_mobile-attack" "objects_1489_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1489_id_relationship--c8559423-10b0-4d5e-9057-65cbfd7ee1c0" "objects_1489_type_relationship" "objects_1489_created_2021-10-01T14:42:48.728Z" "objects_1489_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1489_external_references_0_source_name_SecureList BusyGasper" "objects_1489_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1489_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1489_modified_2021-10-01T14:42:48.728Z" "objects_1489_description_[BusyGasper](https://attack.mitre.org/software/S0655) can send an SMS message after the device boots, messages containing logs, messages to adversary-specified numbers with custom content, and can delete all SMS messages on the device.(Citation: SecureList BusyGasper)" "objects_1489_relationship_type_uses" "objects_1489_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1489_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1489_x_mitre_version_1.0" "objects_1489_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1489_spec_version_2.1" "objects_1489_x_mitre_attack_spec_version_2.1.0" "objects_1489_x_mitre_domains_0_mobile-attack" "objects_1490_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1490_id_relationship--c86918a3-6e41-4dfb-8b18-650fff596801" "objects_1490_type_relationship" "objects_1490_created_2020-09-11T16:22:03.207Z" "objects_1490_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1490_external_references_0_source_name_Lookout ViperRAT" "objects_1490_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1490_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1490_modified_2020-09-11T16:22:03.207Z" "objects_1490_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect device photos, PDF documents, Office documents, browser history, and browser bookmarks.(Citation: Lookout ViperRAT)" "objects_1490_relationship_type_uses" "objects_1490_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1490_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1490_x_mitre_version_1.0" "objects_1490_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1490_spec_version_2.1" "objects_1490_x_mitre_attack_spec_version_2.1.0" "objects_1490_x_mitre_domains_0_mobile-attack" "objects_1491_type_relationship" "objects_1491_id_relationship--c89d6493-3f33-4568-ac77-ba13b206ae69" "objects_1491_created_2023-03-20T18:52:24.667Z" "objects_1491_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1491_revoked_False" "objects_1491_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1491_modified_2023-08-08T22:24:12.960Z" "objects_1491_description_The user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. " "objects_1491_relationship_type_detects" "objects_1491_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1491_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1491_x_mitre_deprecated_False" "objects_1491_x_mitre_version_0.1" "objects_1491_x_mitre_attack_spec_version_3.1.0" "objects_1491_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1491_spec_version_2.1" "objects_1491_x_mitre_domains_0_mobile-attack" "objects_1492_type_relationship" "objects_1492_id_relationship--c89f8f8d-222b-4b83-9fa4-47fd716a271f" "objects_1492_created_2020-06-26T15:12:40.100Z" "objects_1492_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1492_revoked_False" "objects_1492_external_references_0_source_name_ESET DEFENSOR ID" "objects_1492_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_1492_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_1492_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1492_modified_2023-04-05T17:49:00.042Z" "objects_1492_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) abuses the accessibility service to auto-start the malware on device boot. This is accomplished by receiving the `android.accessibilityservice.AccessibilityService` intent.(Citation: ESET DEFENSOR ID)" "objects_1492_relationship_type_uses" "objects_1492_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_1492_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1492_x_mitre_deprecated_False" "objects_1492_x_mitre_version_1.0" "objects_1492_x_mitre_attack_spec_version_3.1.0" "objects_1492_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1492_spec_version_2.1" "objects_1492_x_mitre_domains_0_mobile-attack" "objects_1493_type_relationship" "objects_1493_id_relationship--c8d0d360-eb9e-4fb4-97a2-efaf6d4f1059" "objects_1493_created_2023-03-20T18:51:23.032Z" "objects_1493_revoked_False" "objects_1493_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1493_modified_2023-03-20T18:51:23.032Z" "objects_1493_description_" "objects_1493_relationship_type_detects" "objects_1493_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1493_target_ref_attack-pattern--d2e112dc-f6d4-488d-b8df-ecbfb57a0a2d" "objects_1493_x_mitre_deprecated_False" "objects_1493_x_mitre_version_0.1" "objects_1493_x_mitre_attack_spec_version_3.1.0" "objects_1493_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1493_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1493_spec_version_2.1" "objects_1493_x_mitre_domains_0_mobile-attack" "objects_1494_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1494_type_relationship" "objects_1494_id_relationship--c90bfd4c-3c7e-4528-b5f6-574ef29ecdc9" "objects_1494_created_2022-03-28T19:32:05.234Z" "objects_1494_x_mitre_version_0.1" "objects_1494_x_mitre_deprecated_False" "objects_1494_revoked_False" "objects_1494_description_Application developers should be cautious when selecting third-party libraries to integrate into their application." "objects_1494_modified_2022-03-28T19:32:05.234Z" "objects_1494_relationship_type_mitigates" "objects_1494_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_1494_target_ref_attack-pattern--7827ced0-95e7-4d05-bdcf-0d8f2d37a3d3" "objects_1494_x_mitre_attack_spec_version_2.1.0" "objects_1494_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1494_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1494_spec_version_2.1" "objects_1494_x_mitre_domains_0_mobile-attack" "objects_1495_type_relationship" "objects_1495_id_relationship--c943d462-fea7-4c01-88b2-de134153095b" "objects_1495_created_2023-03-20T18:56:37.473Z" "objects_1495_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1495_revoked_False" "objects_1495_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1495_modified_2023-08-10T22:09:50.728Z" "objects_1495_description_Application vetting services typically flag permissions requested by an application, which can be reviewed by an administrator. Certain dangerous permissions, such as `RECEIVE_SMS`, could receive additional scrutiny." "objects_1495_relationship_type_detects" "objects_1495_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1495_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_1495_x_mitre_deprecated_False" "objects_1495_x_mitre_version_0.1" "objects_1495_x_mitre_attack_spec_version_3.1.0" "objects_1495_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1495_spec_version_2.1" "objects_1495_x_mitre_domains_0_mobile-attack" "objects_1496_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1496_type_relationship" "objects_1496_id_relationship--c96c3405-1d9b-46e4-8f57-a6c49eb68a31" "objects_1496_created_2022-04-06T13:41:17.517Z" "objects_1496_x_mitre_version_0.1" "objects_1496_x_mitre_deprecated_False" "objects_1496_revoked_False" "objects_1496_description_" "objects_1496_modified_2022-04-06T13:41:17.517Z" "objects_1496_relationship_type_revoked-by" "objects_1496_source_ref_attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb" "objects_1496_target_ref_attack-pattern--74e6003f-c7f4-4047-983b-708cc19b96b6" "objects_1496_x_mitre_attack_spec_version_2.1.0" "objects_1496_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1496_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1496_spec_version_2.1" "objects_1496_x_mitre_domains_0_mobile-attack" "objects_1497_type_relationship" "objects_1497_id_relationship--c9769c36-d89b-40eb-92cb-8faa7d37a140" "objects_1497_created_2023-09-25T19:54:37.211Z" "objects_1497_revoked_False" "objects_1497_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1497_modified_2023-09-25T19:54:37.211Z" "objects_1497_description_When devices are enrolled in an EMM/MDM using device owner (iOS) or fully managed (Android) mode, the EMM/MDM can collect a list of installed applications on the device. An administrator can then act on, for example blocking, specific remote access applications from being installed on managed devices. " "objects_1497_relationship_type_mitigates" "objects_1497_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1497_target_ref_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_1497_x_mitre_deprecated_False" "objects_1497_x_mitre_version_0.1" "objects_1497_x_mitre_attack_spec_version_3.1.0" "objects_1497_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1497_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1497_spec_version_2.1" "objects_1497_x_mitre_domains_0_mobile-attack" "objects_1498_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1498_id_relationship--c9b3d86a-9c5e-4fe3-9c1c-dbd0bb89a74b" "objects_1498_type_relationship" "objects_1498_created_2018-10-17T00:14:20.652Z" "objects_1498_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1498_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1498_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1498_external_references_0_source_name_Wandera-RedDrop" "objects_1498_modified_2020-03-31T14:49:39.188Z" "objects_1498_description_[RedDrop](https://attack.mitre.org/software/S0326) collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.(Citation: Wandera-RedDrop)" "objects_1498_relationship_type_uses" "objects_1498_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1498_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1498_x_mitre_version_1.0" "objects_1498_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1498_spec_version_2.1" "objects_1498_x_mitre_attack_spec_version_2.1.0" "objects_1498_x_mitre_domains_0_mobile-attack" "objects_1499_type_relationship" "objects_1499_id_relationship--c9c22e0d-c427-42ef-ae76-beb8ae9f6bf2" "objects_1499_created_2020-09-15T15:18:12.460Z" "objects_1499_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1499_revoked_False" "objects_1499_external_references_0_source_name_Cybereason FakeSpy" "objects_1499_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1499_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1499_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1499_modified_2023-04-05T19:58:31.945Z" "objects_1499_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect the device\u2019s network information.(Citation: Cybereason FakeSpy)" "objects_1499_relationship_type_uses" "objects_1499_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1499_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_1499_x_mitre_deprecated_False" "objects_1499_x_mitre_version_1.0" "objects_1499_x_mitre_attack_spec_version_3.1.0" "objects_1499_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1499_spec_version_2.1" "objects_1499_x_mitre_domains_0_mobile-attack" "objects_1500_type_relationship" "objects_1500_id_relationship--ca0d9894-0c37-4a34-9b24-1887b7cd1106" "objects_1500_created_2023-03-15T16:26:38.465Z" "objects_1500_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1500_revoked_False" "objects_1500_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1500_modified_2023-08-09T15:29:35.623Z" "objects_1500_description_Application vetting services can look for applications requesting the `BIND_NOTIFICATION_LISTENER_SERVICE` permission in a service declaration. " "objects_1500_relationship_type_detects" "objects_1500_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1500_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1500_x_mitre_deprecated_False" "objects_1500_x_mitre_version_0.1" "objects_1500_x_mitre_attack_spec_version_3.1.0" "objects_1500_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1500_spec_version_2.1" "objects_1500_x_mitre_domains_0_mobile-attack" "objects_1501_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1501_id_relationship--ca486783-9413-4f39-8d2f-3adcb3e79127" "objects_1501_type_relationship" "objects_1501_created_2020-12-24T21:55:56.657Z" "objects_1501_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1501_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1501_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1501_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1501_modified_2020-12-24T21:55:56.657Z" "objects_1501_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has used an AES encrypted file in the assets folder with an unsuspecting name (e.g. \u2018GoogleMusic.png\u2019) for holding configuration and C2 information.(Citation: Lookout Uyghur Campaign)" "objects_1501_relationship_type_uses" "objects_1501_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1501_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1501_x_mitre_version_1.0" "objects_1501_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1501_spec_version_2.1" "objects_1501_x_mitre_attack_spec_version_2.1.0" "objects_1501_x_mitre_domains_0_mobile-attack" "objects_1502_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1502_id_relationship--ca4eb452-4a2f-41d7-a015-81f43e96737e" "objects_1502_type_relationship" "objects_1502_created_2019-09-23T13:36:08.386Z" "objects_1502_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1502_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1502_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1502_external_references_0_source_name_securelist rotexy 2018" "objects_1502_modified_2020-03-31T14:49:39.188Z" "objects_1502_description_[Rotexy](https://attack.mitre.org/software/S0411) collects the device's IMEI and sends it to the command and control server.(Citation: securelist rotexy 2018)" "objects_1502_relationship_type_uses" "objects_1502_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1502_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1502_x_mitre_version_1.0" "objects_1502_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1502_spec_version_2.1" "objects_1502_x_mitre_attack_spec_version_2.1.0" "objects_1502_x_mitre_domains_0_mobile-attack" "objects_1503_type_relationship" "objects_1503_id_relationship--ca568149-9971-4d15-b3db-ff7dabd49695" "objects_1503_created_2023-07-21T19:37:16.030Z" "objects_1503_revoked_False" "objects_1503_external_references_0_source_name_lookout_bouldspy_0423" "objects_1503_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1503_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1503_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1503_modified_2023-07-21T19:37:16.030Z" "objects_1503_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can capture keystrokes.(Citation: lookout_bouldspy_0423)" "objects_1503_relationship_type_uses" "objects_1503_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1503_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1503_x_mitre_deprecated_False" "objects_1503_x_mitre_version_0.1" "objects_1503_x_mitre_attack_spec_version_3.1.0" "objects_1503_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1503_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1503_spec_version_2.1" "objects_1503_x_mitre_domains_0_mobile-attack" "objects_1504_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1504_type_relationship" "objects_1504_id_relationship--ca8c38e6-8343-4f5e-929d-2759a0d49d59" "objects_1504_created_2020-11-24T18:18:33.743Z" "objects_1504_x_mitre_version_1.0" "objects_1504_external_references_0_source_name_Threat Fabric Exobot" "objects_1504_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1504_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1504_x_mitre_deprecated_False" "objects_1504_revoked_False" "objects_1504_description_[Exobot](https://attack.mitre.org/software/S0522) has used web injects to capture users\u2019 credentials.(Citation: Threat Fabric Exobot)" "objects_1504_modified_2022-04-15T17:39:22.154Z" "objects_1504_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1504_relationship_type_uses" "objects_1504_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1504_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1504_x_mitre_attack_spec_version_2.1.0" "objects_1504_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1504_spec_version_2.1" "objects_1504_x_mitre_domains_0_mobile-attack" "objects_1505_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1505_id_relationship--ca9e5e50-49e9-44cc-a0a4-4ec8633a9506" "objects_1505_type_relationship" "objects_1505_created_2020-11-20T16:37:28.567Z" "objects_1505_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1505_external_references_0_source_name_Symantec GoldenCup" "objects_1505_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1505_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1505_modified_2020-11-20T16:37:28.567Z" "objects_1505_description_[Golden Cup](https://attack.mitre.org/software/S0535) has encrypted exfiltrated data using AES in ECB mode.(Citation: Symantec GoldenCup)" "objects_1505_relationship_type_uses" "objects_1505_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1505_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1505_x_mitre_version_1.0" "objects_1505_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1505_spec_version_2.1" "objects_1505_x_mitre_attack_spec_version_2.1.0" "objects_1505_x_mitre_domains_0_mobile-attack" "objects_1506_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1506_id_relationship--cacc0b72-9d73-4381-90e9-545ba908722c" "objects_1506_type_relationship" "objects_1506_created_2019-09-15T15:35:33.215Z" "objects_1506_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1506_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_1506_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_1506_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_1506_modified_2020-03-31T14:49:39.188Z" "objects_1506_description_[Gustuff](https://attack.mitre.org/software/S0406) injects the global action `GLOBAL_ACTION_BACK` to mimic pressing the back button to close the application if a call to an open antivirus application is detected.(Citation: Talos Gustuff Apr 2019)" "objects_1506_relationship_type_uses" "objects_1506_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_1506_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1506_x_mitre_version_1.0" "objects_1506_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1506_spec_version_2.1" "objects_1506_x_mitre_attack_spec_version_2.1.0" "objects_1506_x_mitre_domains_0_mobile-attack" "objects_1507_type_relationship" "objects_1507_id_relationship--cb5465c0-a577-45b1-becf-305e0bd47497" "objects_1507_created_2023-08-23T22:49:18.075Z" "objects_1507_revoked_False" "objects_1507_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1507_modified_2023-08-23T22:49:18.075Z" "objects_1507_description_[Anubis](https://attack.mitre.org/software/S0422) may prevent malware's uninstallation by abusing Android\u2019s ` performGlobalAction(int)` API call." "objects_1507_relationship_type_uses" "objects_1507_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1507_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1507_x_mitre_deprecated_False" "objects_1507_x_mitre_version_0.1" "objects_1507_x_mitre_attack_spec_version_3.1.0" "objects_1507_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1507_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1507_spec_version_2.1" "objects_1507_x_mitre_domains_0_mobile-attack" "objects_1508_type_relationship" "objects_1508_id_relationship--cb5a81bb-a3c6-4d7c-836c-c0bd6227b48f" "objects_1508_created_2023-07-21T19:42:12.649Z" "objects_1508_revoked_False" "objects_1508_external_references_0_source_name_lookout_bouldspy_0423" "objects_1508_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1508_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1508_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1508_modified_2023-07-21T19:42:12.649Z" "objects_1508_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can inject malicious packages into applications already existing on an infected device.(Citation: lookout_bouldspy_0423)" "objects_1508_relationship_type_uses" "objects_1508_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1508_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_1508_x_mitre_deprecated_False" "objects_1508_x_mitre_version_0.1" "objects_1508_x_mitre_attack_spec_version_3.1.0" "objects_1508_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1508_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1508_spec_version_2.1" "objects_1508_x_mitre_domains_0_mobile-attack" "objects_1509_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1509_type_relationship" "objects_1509_id_relationship--cb80178a-5f9c-41bd-95a2-a7c5fe23c12c" "objects_1509_created_2022-04-01T18:48:03.156Z" "objects_1509_x_mitre_version_0.1" "objects_1509_x_mitre_deprecated_False" "objects_1509_revoked_False" "objects_1509_description_" "objects_1509_modified_2022-04-01T18:48:03.156Z" "objects_1509_relationship_type_subtechnique-of" "objects_1509_source_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1509_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1509_x_mitre_attack_spec_version_2.1.0" "objects_1509_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1509_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1509_spec_version_2.1" "objects_1509_x_mitre_domains_0_mobile-attack" "objects_1510_type_relationship" "objects_1510_id_relationship--cbb07bef-f1da-41f6-b786-4a255e8bf985" "objects_1510_created_2023-08-04T18:34:07.176Z" "objects_1510_revoked_False" "objects_1510_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1510_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1510_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1510_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1510_modified_2023-08-04T18:34:07.176Z" "objects_1510_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate compressed ZIP files containing gathered info to C2 infrastructure.(Citation: lookout_hornbill_sunbird_0221)" "objects_1510_relationship_type_uses" "objects_1510_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1510_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1510_x_mitre_deprecated_False" "objects_1510_x_mitre_version_0.1" "objects_1510_x_mitre_attack_spec_version_3.1.0" "objects_1510_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1510_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1510_spec_version_2.1" "objects_1510_x_mitre_domains_0_mobile-attack" "objects_1511_type_relationship" "objects_1511_id_relationship--cbb48fa1-0677-4a07-bdbf-eda1827e52f1" "objects_1511_created_2020-10-29T17:48:27.175Z" "objects_1511_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1511_revoked_False" "objects_1511_external_references_0_source_name_Threat Fabric Exobot" "objects_1511_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1511_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1511_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1511_modified_2023-04-05T21:18:05.613Z" "objects_1511_description_[Exobot](https://attack.mitre.org/software/S0522) can lock the device with a password and permanently disable the screen.(Citation: Threat Fabric Exobot)" "objects_1511_relationship_type_uses" "objects_1511_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1511_target_ref_attack-pattern--eb6cf439-1bcb-4d10-bc68-1eed844ed7b3" "objects_1511_x_mitre_deprecated_False" "objects_1511_x_mitre_version_1.0" "objects_1511_x_mitre_attack_spec_version_3.1.0" "objects_1511_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1511_spec_version_2.1" "objects_1511_x_mitre_domains_0_mobile-attack" "objects_1512_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1512_id_relationship--cbf17fea-141e-44b8-831c-b3cc41066420" "objects_1512_type_relationship" "objects_1512_created_2021-01-20T16:01:19.409Z" "objects_1512_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1512_external_references_0_source_name_Trend Micro Anubis" "objects_1512_external_references_0_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_1512_external_references_0_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_1512_modified_2021-01-20T16:01:19.409Z" "objects_1512_description_[Anubis](https://attack.mitre.org/software/S0422) can download attacker-specified APK files.(Citation: Trend Micro Anubis)" "objects_1512_relationship_type_uses" "objects_1512_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1512_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1512_x_mitre_version_1.0" "objects_1512_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1512_spec_version_2.1" "objects_1512_x_mitre_attack_spec_version_2.1.0" "objects_1512_x_mitre_domains_0_mobile-attack" "objects_1513_type_relationship" "objects_1513_id_relationship--cc0b8984-f561-4453-a2be-9be8bd62561e" "objects_1513_created_2023-09-28T17:21:45.855Z" "objects_1513_revoked_False" "objects_1513_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1513_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1513_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1513_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1513_modified_2023-09-28T17:21:45.855Z" "objects_1513_description_[Escobar](https://attack.mitre.org/software/S1092) can monitor a device\u2019s notifications.(Citation: Bleeipng Computer Escobar)" "objects_1513_relationship_type_uses" "objects_1513_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1513_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1513_x_mitre_deprecated_False" "objects_1513_x_mitre_version_0.1" "objects_1513_x_mitre_attack_spec_version_3.2.0" "objects_1513_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1513_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1513_spec_version_2.1" "objects_1513_x_mitre_domains_0_mobile-attack" "objects_1514_type_relationship" "objects_1514_id_relationship--cc345ae4-0d60-4f21-98b3-596c15118745" "objects_1514_created_2023-02-06T19:42:46.814Z" "objects_1514_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1514_revoked_False" "objects_1514_external_references_0_source_name_threatfabric_sova_0921" "objects_1514_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1514_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1514_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1514_modified_2023-03-29T21:38:03.367Z" "objects_1514_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can send SMS messages.(Citation: threatfabric_sova_0921)" "objects_1514_relationship_type_uses" "objects_1514_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1514_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1514_x_mitre_deprecated_False" "objects_1514_x_mitre_version_0.1" "objects_1514_x_mitre_attack_spec_version_3.1.0" "objects_1514_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1514_spec_version_2.1" "objects_1514_x_mitre_domains_0_mobile-attack" "objects_1515_type_relationship" "objects_1515_id_relationship--cc3cf438-7206-46df-a4a4-999472ea6a9a" "objects_1515_created_2019-11-21T19:16:34.796Z" "objects_1515_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1515_revoked_False" "objects_1515_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1515_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1515_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1515_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1515_modified_2023-04-05T20:45:42.081Z" "objects_1515_description_[SimBad](https://attack.mitre.org/software/S0419) hides its icon from the application launcher.(Citation: CheckPoint SimBad 2019)" "objects_1515_relationship_type_uses" "objects_1515_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1515_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1515_x_mitre_deprecated_False" "objects_1515_x_mitre_version_1.0" "objects_1515_x_mitre_attack_spec_version_3.1.0" "objects_1515_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1515_spec_version_2.1" "objects_1515_x_mitre_domains_0_mobile-attack" "objects_1516_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1516_id_relationship--cc49561f-8364-4908-9111-ad3a6dcd922c" "objects_1516_type_relationship" "objects_1516_created_2018-10-17T00:14:20.652Z" "objects_1516_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1516_modified_2018-10-17T00:14:20.652Z" "objects_1516_relationship_type_revoked-by" "objects_1516_source_ref_attack-pattern--11bd699b-f2c2-4e48-bf46-fb3f8acd9799" "objects_1516_target_ref_attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad" "objects_1516_x_mitre_version_1.0" "objects_1516_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1516_spec_version_2.1" "objects_1516_x_mitre_attack_spec_version_2.1.0" "objects_1516_x_mitre_domains_0_mobile-attack" "objects_1517_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1517_id_relationship--cc4ae06f-0258-4fe9-b63a-334d283e766d" "objects_1517_type_relationship" "objects_1517_created_2021-02-08T16:36:20.774Z" "objects_1517_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1517_external_references_0_source_name_BlackBerry Bahamut" "objects_1517_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1517_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1517_modified_2021-05-24T13:16:56.495Z" "objects_1517_description_[Windshift](https://attack.mitre.org/groups/G0112) has encrypted application strings using AES in ECB mode and Blowfish, and stored strings encoded in hex during Operation BULL. Further, in Operation BULL, encryption keys were stored within the application\u2019s launcher icon file.(Citation: BlackBerry Bahamut)" "objects_1517_relationship_type_uses" "objects_1517_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1517_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1517_x_mitre_version_1.0" "objects_1517_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1517_spec_version_2.1" "objects_1517_x_mitre_attack_spec_version_2.1.0" "objects_1517_x_mitre_domains_0_mobile-attack" "objects_1518_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1518_type_relationship" "objects_1518_id_relationship--cc81b56c-cf73-4307-b950-e80246985195" "objects_1518_created_2019-10-18T14:50:57.473Z" "objects_1518_x_mitre_version_1.0" "objects_1518_x_mitre_deprecated_False" "objects_1518_revoked_False" "objects_1518_description_OS security updates typically contain exploit patches when disclosed." "objects_1518_modified_2022-03-28T19:20:44.337Z" "objects_1518_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1518_relationship_type_mitigates" "objects_1518_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1518_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_1518_x_mitre_attack_spec_version_2.1.0" "objects_1518_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1518_spec_version_2.1" "objects_1518_x_mitre_domains_0_mobile-attack" "objects_1519_type_relationship" "objects_1519_id_relationship--ccb6f906-a785-4695-91a5-f1bc210892dc" "objects_1519_created_2023-08-04T18:35:55.269Z" "objects_1519_revoked_False" "objects_1519_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1519_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1519_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1519_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1519_modified_2023-08-04T18:35:55.269Z" "objects_1519_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate collected data as a ZIP file.(Citation: lookout_hornbill_sunbird_0221)" "objects_1519_relationship_type_uses" "objects_1519_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1519_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1519_x_mitre_deprecated_False" "objects_1519_x_mitre_version_0.1" "objects_1519_x_mitre_attack_spec_version_3.1.0" "objects_1519_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1519_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1519_spec_version_2.1" "objects_1519_x_mitre_domains_0_mobile-attack" "objects_1520_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1520_id_relationship--cce5d90f-edff-454d-bafa-caf33b71ed6c" "objects_1520_type_relationship" "objects_1520_created_2019-12-10T16:07:41.078Z" "objects_1520_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1520_external_references_0_source_name_SecureList DVMap June 2017" "objects_1520_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_1520_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_1520_modified_2019-12-10T16:07:41.078Z" "objects_1520_description_[Dvmap](https://attack.mitre.org/software/S0420) attempts to gain root access by using local exploits.(Citation: SecureList DVMap June 2017)" "objects_1520_relationship_type_uses" "objects_1520_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_1520_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1520_x_mitre_version_1.0" "objects_1520_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1520_spec_version_2.1" "objects_1520_x_mitre_attack_spec_version_2.1.0" "objects_1520_x_mitre_domains_0_mobile-attack" "objects_1521_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1521_id_relationship--cce82a76-5390-473d-9e7c-9450d1509d1d" "objects_1521_type_relationship" "objects_1521_created_2020-07-15T20:20:59.314Z" "objects_1521_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1521_external_references_0_source_name_Bitdefender Mandrake" "objects_1521_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1521_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1521_modified_2020-07-15T20:20:59.314Z" "objects_1521_description_[Mandrake](https://attack.mitre.org/software/S0485) can download its second (Loader) and third (Core) stages after the dropper is installed.(Citation: Bitdefender Mandrake)" "objects_1521_relationship_type_uses" "objects_1521_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1521_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1521_x_mitre_version_1.0" "objects_1521_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1521_spec_version_2.1" "objects_1521_x_mitre_attack_spec_version_2.1.0" "objects_1521_x_mitre_domains_0_mobile-attack" "objects_1522_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1522_id_relationship--ccfffa97-17fd-4826-9a16-c9d8174fb8ac" "objects_1522_type_relationship" "objects_1522_created_2020-01-27T17:05:58.237Z" "objects_1522_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1522_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1522_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1522_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1522_modified_2020-01-27T17:05:58.237Z" "objects_1522_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain the device\u2019s battery level, network operator, connection information, sensor information, and information about the device\u2019s storage and memory.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1522_relationship_type_uses" "objects_1522_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1522_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1522_x_mitre_version_1.0" "objects_1522_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1522_spec_version_2.1" "objects_1522_x_mitre_attack_spec_version_2.1.0" "objects_1522_x_mitre_domains_0_mobile-attack" "objects_1523_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1523_type_relationship" "objects_1523_id_relationship--cd0f76da-ea06-4710-ab1d-53a7e29a6328" "objects_1523_created_2022-03-30T19:34:09.377Z" "objects_1523_x_mitre_version_0.1" "objects_1523_x_mitre_deprecated_False" "objects_1523_revoked_False" "objects_1523_description_" "objects_1523_modified_2022-03-30T19:34:09.377Z" "objects_1523_relationship_type_revoked-by" "objects_1523_source_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_1523_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_1523_x_mitre_attack_spec_version_2.1.0" "objects_1523_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1523_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1523_spec_version_2.1" "objects_1523_x_mitre_domains_0_mobile-attack" "objects_1524_type_relationship" "objects_1524_id_relationship--cd503879-ccb4-4d47-af5a-90fe7e37c438" "objects_1524_created_2018-10-17T00:14:20.652Z" "objects_1524_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1524_revoked_False" "objects_1524_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1524_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1524_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1524_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1524_modified_2023-04-05T19:53:53.384Z" "objects_1524_description_[SpyDealer](https://attack.mitre.org/software/S0324) harvests contact lists from victims.(Citation: PaloAlto-SpyDealer)" "objects_1524_relationship_type_uses" "objects_1524_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1524_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1524_x_mitre_deprecated_False" "objects_1524_x_mitre_version_1.0" "objects_1524_x_mitre_attack_spec_version_3.1.0" "objects_1524_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1524_spec_version_2.1" "objects_1524_x_mitre_domains_0_mobile-attack" "objects_1525_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1525_id_relationship--cd6a9777-a8fd-43ca-91dc-cafc7d4b7df3" "objects_1525_type_relationship" "objects_1525_created_2020-01-27T17:05:58.215Z" "objects_1525_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1525_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1525_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1525_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1525_modified_2020-01-27T17:05:58.215Z" "objects_1525_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain a list of running processes.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1525_relationship_type_uses" "objects_1525_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1525_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1525_x_mitre_version_1.0" "objects_1525_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1525_spec_version_2.1" "objects_1525_x_mitre_attack_spec_version_2.1.0" "objects_1525_x_mitre_domains_0_mobile-attack" "objects_1526_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1526_type_relationship" "objects_1526_id_relationship--cd7a2294-1e14-42e8-b870-d99d73443b88" "objects_1526_created_2022-04-01T12:37:42.068Z" "objects_1526_x_mitre_version_0.1" "objects_1526_x_mitre_deprecated_False" "objects_1526_revoked_False" "objects_1526_description_Users should be taught the danger behind granting unnecessary permissions to an application and should be advised to use extra scrutiny when an application requests them. " "objects_1526_modified_2022-04-01T12:37:42.068Z" "objects_1526_relationship_type_mitigates" "objects_1526_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1526_target_ref_attack-pattern--11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e" "objects_1526_x_mitre_attack_spec_version_2.1.0" "objects_1526_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1526_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1526_spec_version_2.1" "objects_1526_x_mitre_domains_0_mobile-attack" "objects_1527_type_relationship" "objects_1527_id_relationship--cd8c383a-2a62-45e5-917f-a26efe5ba03c" "objects_1527_created_2023-03-20T18:51:29.814Z" "objects_1527_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1527_revoked_False" "objects_1527_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1527_modified_2023-08-08T17:08:59.640Z" "objects_1527_description_Application vetting services could potentially detect the usage of APIs intended for suppressing the application\u2019s icon." "objects_1527_relationship_type_detects" "objects_1527_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1527_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1527_x_mitre_deprecated_False" "objects_1527_x_mitre_version_0.1" "objects_1527_x_mitre_attack_spec_version_3.1.0" "objects_1527_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1527_spec_version_2.1" "objects_1527_x_mitre_domains_0_mobile-attack" "objects_1528_type_relationship" "objects_1528_id_relationship--cd9e8334-2ff6-4f64-993f-4e11a68ef7ca" "objects_1528_created_2023-03-20T18:58:19.895Z" "objects_1528_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1528_revoked_False" "objects_1528_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1528_modified_2023-08-09T16:34:37.498Z" "objects_1528_description_Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. " "objects_1528_relationship_type_detects" "objects_1528_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1528_target_ref_attack-pattern--9ef05e3d-52db-4c12-be4f-519214bbe91f" "objects_1528_x_mitre_deprecated_False" "objects_1528_x_mitre_version_0.1" "objects_1528_x_mitre_attack_spec_version_3.1.0" "objects_1528_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1528_spec_version_2.1" "objects_1528_x_mitre_domains_0_mobile-attack" "objects_1529_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1529_id_relationship--cda58372-ae70-4716-8baf-cc06cb884ad6" "objects_1529_type_relationship" "objects_1529_created_2020-12-24T22:04:28.015Z" "objects_1529_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1529_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1529_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1529_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1529_modified_2020-12-24T22:04:28.015Z" "objects_1529_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has collected a list of installed application names.(Citation: Lookout Uyghur Campaign)" "objects_1529_relationship_type_uses" "objects_1529_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1529_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1529_x_mitre_version_1.0" "objects_1529_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1529_spec_version_2.1" "objects_1529_x_mitre_attack_spec_version_2.1.0" "objects_1529_x_mitre_domains_0_mobile-attack" "objects_1530_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1530_id_relationship--cdb9788e-7d16-482e-92b6-cbde0b3de357" "objects_1530_type_relationship" "objects_1530_created_2020-12-17T20:15:22.408Z" "objects_1530_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1530_external_references_0_source_name_Palo Alto HenBox" "objects_1530_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1530_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1530_modified_2020-12-17T20:15:22.408Z" "objects_1530_description_[HenBox](https://attack.mitre.org/software/S0544) can track the device\u2019s location.(Citation: Palo Alto HenBox)" "objects_1530_relationship_type_uses" "objects_1530_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1530_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1530_x_mitre_version_1.0" "objects_1530_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1530_spec_version_2.1" "objects_1530_x_mitre_attack_spec_version_2.1.0" "objects_1530_x_mitre_domains_0_mobile-attack" "objects_1531_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1531_id_relationship--cde60121-3d7c-47c8-abeb-582854425599" "objects_1531_type_relationship" "objects_1531_created_2020-07-20T13:27:33.512Z" "objects_1531_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1531_external_references_0_source_name_Talos-WolfRAT" "objects_1531_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_1531_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_1531_modified_2020-08-10T21:57:54.531Z" "objects_1531_description_[WolfRAT](https://attack.mitre.org/software/S0489) can update the running malware.(Citation: Talos-WolfRAT)" "objects_1531_relationship_type_uses" "objects_1531_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_1531_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1531_x_mitre_version_1.0" "objects_1531_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1531_spec_version_2.1" "objects_1531_x_mitre_attack_spec_version_2.1.0" "objects_1531_x_mitre_domains_0_mobile-attack" "objects_1532_type_relationship" "objects_1532_id_relationship--cdf06664-903e-499b-86b4-b7bcce3c0740" "objects_1532_created_2023-09-28T17:20:27.451Z" "objects_1532_revoked_False" "objects_1532_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1532_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1532_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1532_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1532_modified_2023-09-28T17:20:27.451Z" "objects_1532_description_[Escobar](https://attack.mitre.org/software/S1092) can modify, send, and delete SMS messages.(Citation: Bleeipng Computer Escobar)" "objects_1532_relationship_type_uses" "objects_1532_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1532_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1532_x_mitre_deprecated_False" "objects_1532_x_mitre_version_0.1" "objects_1532_x_mitre_attack_spec_version_3.2.0" "objects_1532_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1532_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1532_spec_version_2.1" "objects_1532_x_mitre_domains_0_mobile-attack" "objects_1533_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1533_type_relationship" "objects_1533_id_relationship--ce26f077-c47a-4185-8ed7-ec0d9ae2b625" "objects_1533_created_2022-03-31T16:33:55.074Z" "objects_1533_x_mitre_version_0.1" "objects_1533_x_mitre_deprecated_False" "objects_1533_revoked_False" "objects_1533_description_" "objects_1533_modified_2022-03-31T16:33:55.074Z" "objects_1533_relationship_type_revoked-by" "objects_1533_source_ref_attack-pattern--e4c347e9-fb91-4bc5-83b8-391e389131e2" "objects_1533_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_1533_x_mitre_attack_spec_version_2.1.0" "objects_1533_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1533_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1533_spec_version_2.1" "objects_1533_x_mitre_domains_0_mobile-attack" "objects_1534_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1534_type_relationship" "objects_1534_id_relationship--ce51f1b3-7813-4517-bbcf-7ae8abf6d2ef" "objects_1534_created_2020-07-27T14:14:56.993Z" "objects_1534_x_mitre_version_1.0" "objects_1534_external_references_0_source_name_Google Security Zen" "objects_1534_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_1534_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_1534_x_mitre_deprecated_False" "objects_1534_revoked_False" "objects_1534_description_[Zen](https://attack.mitre.org/software/S0494) can simulate user clicks on ads.(Citation: Google Security Zen)" "objects_1534_modified_2022-04-19T14:25:41.669Z" "objects_1534_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1534_relationship_type_uses" "objects_1534_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_1534_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1534_x_mitre_attack_spec_version_2.1.0" "objects_1534_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1534_spec_version_2.1" "objects_1534_x_mitre_domains_0_mobile-attack" "objects_1535_type_relationship" "objects_1535_id_relationship--ce5f506a-8fc9-40a2-a78e-96796c896f1b" "objects_1535_created_2023-03-20T15:56:47.307Z" "objects_1535_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1535_revoked_False" "objects_1535_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1535_modified_2023-08-08T15:31:45.237Z" "objects_1535_description_The user can see which applications are registered as device administrators in the device settings." "objects_1535_relationship_type_detects" "objects_1535_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1535_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1535_x_mitre_deprecated_False" "objects_1535_x_mitre_version_0.1" "objects_1535_x_mitre_attack_spec_version_3.1.0" "objects_1535_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1535_spec_version_2.1" "objects_1535_x_mitre_domains_0_mobile-attack" "objects_1536_type_relationship" "objects_1536_id_relationship--ce645a25-160f-443d-b288-fdd108b78a06" "objects_1536_created_2020-09-11T16:22:03.269Z" "objects_1536_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1536_revoked_False" "objects_1536_external_references_0_source_name_Lookout ViperRAT" "objects_1536_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1536_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1536_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1536_modified_2023-04-05T17:41:00.652Z" "objects_1536_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect the device\u2019s call log.(Citation: Lookout ViperRAT)" "objects_1536_relationship_type_uses" "objects_1536_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1536_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1536_x_mitre_deprecated_False" "objects_1536_x_mitre_version_1.0" "objects_1536_x_mitre_attack_spec_version_3.1.0" "objects_1536_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1536_spec_version_2.1" "objects_1536_x_mitre_domains_0_mobile-attack" "objects_1537_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1537_type_relationship" "objects_1537_id_relationship--ce6c7f21-91a5-4d63-bd03-a6b57e025afe" "objects_1537_created_2017-10-25T14:48:53.746Z" "objects_1537_x_mitre_version_1.0" "objects_1537_x_mitre_deprecated_False" "objects_1537_revoked_False" "objects_1537_description_A locked bootloader could prevent unauthorized modifications to protected operating system files. " "objects_1537_modified_2022-03-30T20:07:33.678Z" "objects_1537_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1537_relationship_type_mitigates" "objects_1537_source_ref_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_1537_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_1537_x_mitre_attack_spec_version_2.1.0" "objects_1537_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1537_spec_version_2.1" "objects_1537_x_mitre_domains_0_mobile-attack" "objects_1538_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1538_id_relationship--ce8cc50a-f3c9-4a6a-b6be-f3e8bdd293bd" "objects_1538_type_relationship" "objects_1538_created_2019-07-10T15:35:43.699Z" "objects_1538_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1538_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1538_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1538_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1538_modified_2020-03-31T14:49:39.188Z" "objects_1538_description_[Pallas](https://attack.mitre.org/software/S0399) captures audio from the device microphone.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1538_relationship_type_uses" "objects_1538_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1538_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1538_x_mitre_version_1.0" "objects_1538_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1538_spec_version_2.1" "objects_1538_x_mitre_attack_spec_version_2.1.0" "objects_1538_x_mitre_domains_0_mobile-attack" "objects_1539_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1539_type_relationship" "objects_1539_id_relationship--cea30219-a255-43ae-b731-9512c5044523" "objects_1539_created_2022-04-18T19:46:02.547Z" "objects_1539_x_mitre_version_0.1" "objects_1539_x_mitre_deprecated_False" "objects_1539_revoked_False" "objects_1539_description_" "objects_1539_modified_2022-04-18T19:46:02.547Z" "objects_1539_relationship_type_revoked-by" "objects_1539_source_ref_attack-pattern--b3c2e5de-0941-4b57-ba61-af029eb5517a" "objects_1539_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1539_x_mitre_attack_spec_version_2.1.0" "objects_1539_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1539_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1539_spec_version_2.1" "objects_1539_x_mitre_domains_0_mobile-attack" "objects_1540_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1540_id_relationship--ced70cea-b2ac-45b8-9f7d-779eedbdf06c" "objects_1540_type_relationship" "objects_1540_created_2020-01-27T17:05:58.273Z" "objects_1540_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1540_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1540_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1540_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1540_modified_2020-01-27T17:05:58.273Z" "objects_1540_description_[GolfSpy](https://attack.mitre.org/software/S0421) can record audio and phone calls.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1540_relationship_type_uses" "objects_1540_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1540_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1540_x_mitre_version_1.0" "objects_1540_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1540_spec_version_2.1" "objects_1540_x_mitre_attack_spec_version_2.1.0" "objects_1540_x_mitre_domains_0_mobile-attack" "objects_1541_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1541_id_relationship--cf26d49c-1d1b-4861-9d6e-959f4f15b73a" "objects_1541_type_relationship" "objects_1541_created_2019-08-09T17:53:48.716Z" "objects_1541_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1541_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1541_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1541_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1541_modified_2020-03-31T14:49:39.188Z" "objects_1541_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can capture photos using the front and back cameras.(Citation: TrendMicro-RCSAndroid)" "objects_1541_relationship_type_uses" "objects_1541_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1541_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1541_x_mitre_version_1.0" "objects_1541_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1541_spec_version_2.1" "objects_1541_x_mitre_attack_spec_version_2.1.0" "objects_1541_x_mitre_domains_0_mobile-attack" "objects_1542_type_relationship" "objects_1542_id_relationship--cf2cfc6e-896a-4c99-b286-41f8dbd6fa4c" "objects_1542_created_2023-09-28T17:21:26.448Z" "objects_1542_revoked_False" "objects_1542_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1542_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1542_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1542_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1542_modified_2023-09-28T17:21:26.448Z" "objects_1542_description_[Escobar](https://attack.mitre.org/software/S1092) can use VNC to remotely control an infected device.(Citation: Bleeipng Computer Escobar)" "objects_1542_relationship_type_uses" "objects_1542_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1542_target_ref_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_1542_x_mitre_deprecated_False" "objects_1542_x_mitre_version_0.1" "objects_1542_x_mitre_attack_spec_version_3.2.0" "objects_1542_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1542_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1542_spec_version_2.1" "objects_1542_x_mitre_domains_0_mobile-attack" "objects_1543_type_relationship" "objects_1543_id_relationship--cf4243f5-562a-457f-bb15-d45a2047f7ca" "objects_1543_created_2019-09-03T19:45:48.510Z" "objects_1543_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1543_revoked_False" "objects_1543_external_references_0_source_name_SWB Exodus March 2019" "objects_1543_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1543_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1543_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1543_modified_2023-04-05T17:10:15.827Z" "objects_1543_description_[Exodus](https://attack.mitre.org/software/S0405) Two collects a list of nearby base stations.(Citation: SWB Exodus March 2019) " "objects_1543_relationship_type_uses" "objects_1543_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1543_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_1543_x_mitre_deprecated_False" "objects_1543_x_mitre_version_1.0" "objects_1543_x_mitre_attack_spec_version_3.1.0" "objects_1543_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1543_spec_version_2.1" "objects_1543_x_mitre_domains_0_mobile-attack" "objects_1544_type_relationship" "objects_1544_id_relationship--cf4fe189-58cf-42aa-89c7-75bd0a83a263" "objects_1544_created_2023-03-15T16:23:59.107Z" "objects_1544_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1544_revoked_False" "objects_1544_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1544_modified_2023-08-08T15:29:32.423Z" "objects_1544_description_When an application requests administrator permission, the user is presented with a popup and the option to grant or deny the request. " "objects_1544_relationship_type_detects" "objects_1544_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_1544_target_ref_attack-pattern--08ea902d-ecb5-47ed-a453-2798057bb2d3" "objects_1544_x_mitre_deprecated_False" "objects_1544_x_mitre_version_0.1" "objects_1544_x_mitre_attack_spec_version_3.1.0" "objects_1544_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1544_spec_version_2.1" "objects_1544_x_mitre_domains_0_mobile-attack" "objects_1545_type_relationship" "objects_1545_id_relationship--cf696296-751a-41e5-a9b0-907c7b991b2a" "objects_1545_created_2023-09-22T19:14:54.719Z" "objects_1545_revoked_False" "objects_1545_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1545_modified_2023-09-22T19:14:54.719Z" "objects_1545_description_Application vetting services may detect API calls for deleting files. " "objects_1545_relationship_type_detects" "objects_1545_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1545_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_1545_x_mitre_deprecated_False" "objects_1545_x_mitre_version_0.1" "objects_1545_x_mitre_attack_spec_version_3.1.0" "objects_1545_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1545_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1545_spec_version_2.1" "objects_1545_x_mitre_domains_0_mobile-attack" "objects_1546_type_relationship" "objects_1546_id_relationship--cf879fe8-9c31-48de-9e49-668d6cda67c5" "objects_1546_created_2023-07-12T20:35:36.527Z" "objects_1546_revoked_False" "objects_1546_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1546_modified_2023-07-12T20:35:36.527Z" "objects_1546_description_Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps." "objects_1546_relationship_type_mitigates" "objects_1546_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1546_target_ref_attack-pattern--f856eaab-e84a-4265-a8a2-7bf37e5dc2fc" "objects_1546_x_mitre_deprecated_False" "objects_1546_x_mitre_version_0.1" "objects_1546_x_mitre_attack_spec_version_3.1.0" "objects_1546_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1546_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1546_spec_version_2.1" "objects_1546_x_mitre_domains_0_mobile-attack" "objects_1547_type_relationship" "objects_1547_id_relationship--cfa1d194-7401-46ba-bfed-5f311aeb22d3" "objects_1547_created_2017-12-14T16:46:06.044Z" "objects_1547_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1547_revoked_False" "objects_1547_external_references_0_source_name_Kaspersky-WUC" "objects_1547_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_1547_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_1547_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1547_modified_2023-04-05T19:54:13.685Z" "objects_1547_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) stole contact list data stored both on the the phone and the SIM card.(Citation: Kaspersky-WUC)" "objects_1547_relationship_type_uses" "objects_1547_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_1547_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1547_x_mitre_deprecated_False" "objects_1547_x_mitre_version_1.0" "objects_1547_x_mitre_attack_spec_version_3.1.0" "objects_1547_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1547_spec_version_2.1" "objects_1547_x_mitre_domains_0_mobile-attack" "objects_1548_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1548_type_relationship" "objects_1548_id_relationship--d01b311d-8741-4b58-b127-88fecb2b0544" "objects_1548_created_2020-04-08T15:41:19.448Z" "objects_1548_x_mitre_version_1.0" "objects_1548_external_references_0_source_name_Cofense Anubis" "objects_1548_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1548_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1548_x_mitre_deprecated_False" "objects_1548_revoked_False" "objects_1548_description_[Anubis](https://attack.mitre.org/software/S0422) has a keylogger that works in every application installed on the device.(Citation: Cofense Anubis)" "objects_1548_modified_2022-04-15T17:33:02.327Z" "objects_1548_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1548_relationship_type_uses" "objects_1548_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1548_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1548_x_mitre_attack_spec_version_2.1.0" "objects_1548_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1548_spec_version_2.1" "objects_1548_x_mitre_domains_0_mobile-attack" "objects_1549_type_relationship" "objects_1549_id_relationship--d0669f8d-0aa2-416f-9ec4-a991a2000d3e" "objects_1549_created_2023-09-21T19:37:30.610Z" "objects_1549_revoked_False" "objects_1549_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1549_modified_2023-09-21T19:37:30.610Z" "objects_1549_description_Some mobile security products offer a loopback VPN used for inspecting traffic. This could proactively block traffic to websites that are known for phishing or appear to be conducting a phishing attack." "objects_1549_relationship_type_mitigates" "objects_1549_source_ref_course-of-action--78671282-26aa-486c-a7a5-5921e1616b58" "objects_1549_target_ref_attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df" "objects_1549_x_mitre_deprecated_False" "objects_1549_x_mitre_version_0.1" "objects_1549_x_mitre_attack_spec_version_3.1.0" "objects_1549_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1549_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1549_spec_version_2.1" "objects_1549_x_mitre_domains_0_mobile-attack" "objects_1550_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1550_type_relationship" "objects_1550_id_relationship--d09a4d42-45bd-4b2a-aef4-3aa3982115ad" "objects_1550_created_2022-04-05T19:45:03.117Z" "objects_1550_x_mitre_version_0.1" "objects_1550_x_mitre_deprecated_False" "objects_1550_revoked_False" "objects_1550_description_" "objects_1550_modified_2022-04-05T19:45:03.117Z" "objects_1550_relationship_type_subtechnique-of" "objects_1550_source_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1550_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_1550_x_mitre_attack_spec_version_2.1.0" "objects_1550_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1550_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1550_spec_version_2.1" "objects_1550_x_mitre_domains_0_mobile-attack" "objects_1551_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1551_id_relationship--d09abcd8-49bf-4d0f-8b17-0db7ada10ec2" "objects_1551_type_relationship" "objects_1551_created_2020-09-11T15:53:38.453Z" "objects_1551_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1551_external_references_0_source_name_securelist rotexy 2018" "objects_1551_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1551_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1551_modified_2020-09-11T15:53:38.453Z" "objects_1551_description_[Rotexy](https://attack.mitre.org/software/S0411) can automatically reply to SMS messages, and optionally delete them.(Citation: securelist rotexy 2018)" "objects_1551_relationship_type_uses" "objects_1551_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1551_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1551_x_mitre_version_1.0" "objects_1551_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1551_spec_version_2.1" "objects_1551_x_mitre_attack_spec_version_2.1.0" "objects_1551_x_mitre_domains_0_mobile-attack" "objects_1552_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1552_id_relationship--d0c039cb-c815-4d9c-a100-a45f923bc65b" "objects_1552_type_relationship" "objects_1552_created_2020-12-24T21:45:56.981Z" "objects_1552_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1552_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1552_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1552_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1552_modified_2020-12-24T21:45:56.981Z" "objects_1552_description_[SilkBean](https://attack.mitre.org/software/S0549) has access to the device\u2019s location.(Citation: Lookout Uyghur Campaign)" "objects_1552_relationship_type_uses" "objects_1552_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1552_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1552_x_mitre_version_1.0" "objects_1552_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1552_spec_version_2.1" "objects_1552_x_mitre_attack_spec_version_2.1.0" "objects_1552_x_mitre_domains_0_mobile-attack" "objects_1553_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1553_id_relationship--d0c21324-62e3-46e5-823b-ea0c03a4885d" "objects_1553_type_relationship" "objects_1553_created_2020-01-21T15:30:39.335Z" "objects_1553_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1553_external_references_0_source_name_Lookout-Monokle" "objects_1553_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1553_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1553_modified_2020-01-21T15:30:39.335Z" "objects_1553_description_[Monokle](https://attack.mitre.org/software/S0407) can download attacker-specified files.(Citation: Lookout-Monokle) " "objects_1553_relationship_type_uses" "objects_1553_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1553_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1553_x_mitre_version_1.0" "objects_1553_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1553_spec_version_2.1" "objects_1553_x_mitre_attack_spec_version_2.1.0" "objects_1553_x_mitre_domains_0_mobile-attack" "objects_1554_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1554_type_relationship" "objects_1554_id_relationship--d1318f71-7f70-4820-a3fc-0d05af038733" "objects_1554_created_2021-10-01T14:42:49.154Z" "objects_1554_x_mitre_version_1.0" "objects_1554_external_references_0_source_name_SecureList BusyGasper" "objects_1554_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1554_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1554_x_mitre_deprecated_False" "objects_1554_revoked_False" "objects_1554_description_[BusyGasper](https://attack.mitre.org/software/S0655) can perform actions when one of two hardcoded magic SMS strings is received.(Citation: SecureList BusyGasper)" "objects_1554_modified_2022-04-19T14:25:41.669Z" "objects_1554_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1554_relationship_type_uses" "objects_1554_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1554_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1554_x_mitre_attack_spec_version_2.1.0" "objects_1554_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1554_spec_version_2.1" "objects_1554_x_mitre_domains_0_mobile-attack" "objects_1555_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1555_type_relationship" "objects_1555_id_relationship--d13724d0-a5e2-433b-86bf-ead04359edec" "objects_1555_created_2022-04-01T15:13:10.022Z" "objects_1555_x_mitre_version_0.1" "objects_1555_external_references_0_source_name_iOS Universal Links" "objects_1555_external_references_0_url_https://developer.apple.com/ios/universal-links/" "objects_1555_external_references_0_description_Apple. (n.d.). Universal Links for Developers. Retrieved September 11, 2020." "objects_1555_external_references_1_source_name_Android App Links" "objects_1555_external_references_1_url_https://developer.android.com/training/app-links/verify-site-associations" "objects_1555_external_references_1_description_Google. (n.d.). Verify Android App Links. Retrieved September 11, 2020." "objects_1555_external_references_2_source_name_IETF-PKCE" "objects_1555_external_references_2_url_https://tools.ietf.org/html/rfc7636" "objects_1555_external_references_2_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_1555_x_mitre_deprecated_False" "objects_1555_revoked_False" "objects_1555_description_Developers should use Android App Links(Citation: Android App Links) and iOS Universal Links(Citation: iOS Universal Links) to provide a secure binding between URIs and applications, preventing malicious applications from intercepting redirections. Additionally, for OAuth use cases, PKCE(Citation: IETF-PKCE) should be used to prevent use of stolen authorization codes. " "objects_1555_modified_2022-04-01T15:13:10.022Z" "objects_1555_relationship_type_mitigates" "objects_1555_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_1555_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_1555_x_mitre_attack_spec_version_2.1.0" "objects_1555_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1555_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1555_spec_version_2.1" "objects_1555_x_mitre_domains_0_mobile-attack" "objects_1556_type_relationship" "objects_1556_id_relationship--d170a088-b115-4a86-b093-8aa32666a470" "objects_1556_created_2023-03-15T16:39:55.148Z" "objects_1556_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1556_revoked_False" "objects_1556_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1556_modified_2023-08-10T21:04:21.890Z" "objects_1556_description_On both Android and iOS, the user must grant consent to an application to act as a VPN. Both platforms also provide visual context to the user in the top status bar when a VPN connection is active. The user can see registered VPN services in the device settings. " "objects_1556_relationship_type_detects" "objects_1556_source_ref_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_1556_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1556_x_mitre_deprecated_False" "objects_1556_x_mitre_version_0.1" "objects_1556_x_mitre_attack_spec_version_3.1.0" "objects_1556_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1556_spec_version_2.1" "objects_1556_x_mitre_domains_0_mobile-attack" "objects_1557_type_relationship" "objects_1557_id_relationship--d1e11627-23e4-40f3-bcbc-2b832b0bbaa3" "objects_1557_created_2023-02-28T20:31:31.983Z" "objects_1557_revoked_False" "objects_1557_external_references_0_source_name_proofpoint_flubot_0421" "objects_1557_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1557_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1557_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1557_modified_2023-02-28T20:31:31.983Z" "objects_1557_description_[FluBot](https://attack.mitre.org/software/S1067) can intercept SMS messages and USSD messages from Telcom operators.(Citation: proofpoint_flubot_0421)" "objects_1557_relationship_type_uses" "objects_1557_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1557_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1557_x_mitre_deprecated_False" "objects_1557_x_mitre_version_0.1" "objects_1557_x_mitre_attack_spec_version_3.1.0" "objects_1557_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1557_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1557_spec_version_2.1" "objects_1557_x_mitre_domains_0_mobile-attack" "objects_1558_type_relationship" "objects_1558_id_relationship--d22be48b-90fa-4dba-ab6f-f3ad5e08c03e" "objects_1558_created_2023-09-22T19:15:22.670Z" "objects_1558_revoked_False" "objects_1558_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1558_modified_2023-09-22T19:15:22.670Z" "objects_1558_description_Mobile security products can detect which applications can request device administrator permissions. Application vetting services could be extra scrutinous of applications that request device administrator permissions." "objects_1558_relationship_type_detects" "objects_1558_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1558_target_ref_attack-pattern--9ef14445-6f35-4ed0-a042-5024f13a9242" "objects_1558_x_mitre_deprecated_False" "objects_1558_x_mitre_version_0.1" "objects_1558_x_mitre_attack_spec_version_3.1.0" "objects_1558_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1558_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1558_spec_version_2.1" "objects_1558_x_mitre_domains_0_mobile-attack" "objects_1559_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1559_id_relationship--d22d309b-ab00-4f17-b6bf-7706f499cc5e" "objects_1559_type_relationship" "objects_1559_created_2019-09-03T19:45:48.489Z" "objects_1559_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1559_external_references_0_source_name_SWB Exodus March 2019" "objects_1559_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1559_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1559_modified_2020-03-31T14:49:39.188Z" "objects_1559_description_[Exodus](https://attack.mitre.org/software/S0405) Two can extract the GPS coordinates of the device.(Citation: SWB Exodus March 2019)" "objects_1559_relationship_type_uses" "objects_1559_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1559_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1559_x_mitre_version_1.0" "objects_1559_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1559_spec_version_2.1" "objects_1559_x_mitre_attack_spec_version_2.1.0" "objects_1559_x_mitre_domains_0_mobile-attack" "objects_1560_type_relationship" "objects_1560_id_relationship--d22f2c45-d6fa-419a-8f25-65ea37529ccc" "objects_1560_created_2019-09-04T14:28:15.412Z" "objects_1560_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1560_revoked_False" "objects_1560_external_references_0_source_name_Lookout-Monokle" "objects_1560_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1560_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1560_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1560_modified_2023-04-05T20:19:04.639Z" "objects_1560_description_[Monokle](https://attack.mitre.org/software/S0407) can retrieve calendar event information including the event name, when and where it is taking place, and the description.(Citation: Lookout-Monokle) " "objects_1560_relationship_type_uses" "objects_1560_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1560_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1560_x_mitre_deprecated_False" "objects_1560_x_mitre_version_1.0" "objects_1560_x_mitre_attack_spec_version_3.1.0" "objects_1560_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1560_spec_version_2.1" "objects_1560_x_mitre_domains_0_mobile-attack" "objects_1561_type_relationship" "objects_1561_id_relationship--d2749285-47d9-44a4-962f-9215e6fb580e" "objects_1561_created_2020-10-29T17:48:27.380Z" "objects_1561_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1561_revoked_False" "objects_1561_external_references_0_source_name_Threat Fabric Exobot" "objects_1561_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1561_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1561_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1561_modified_2023-04-05T19:54:30.569Z" "objects_1561_description_[Exobot](https://attack.mitre.org/software/S0522) can access the device\u2019s contact list.(Citation: Threat Fabric Exobot)" "objects_1561_relationship_type_uses" "objects_1561_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1561_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1561_x_mitre_deprecated_False" "objects_1561_x_mitre_version_1.0" "objects_1561_x_mitre_attack_spec_version_3.1.0" "objects_1561_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1561_spec_version_2.1" "objects_1561_x_mitre_domains_0_mobile-attack" "objects_1562_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1562_type_relationship" "objects_1562_id_relationship--d2d7476e-66a4-4d46-877c-6e80678bbb38" "objects_1562_created_2022-04-01T18:43:25.764Z" "objects_1562_x_mitre_version_0.1" "objects_1562_x_mitre_deprecated_False" "objects_1562_revoked_False" "objects_1562_description_System partition integrity mechanisms, such as Verified Boot, can detect the unauthorized modification of system files." "objects_1562_modified_2022-04-01T18:43:25.764Z" "objects_1562_relationship_type_mitigates" "objects_1562_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_1562_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1562_x_mitre_attack_spec_version_2.1.0" "objects_1562_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1562_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1562_spec_version_2.1" "objects_1562_x_mitre_domains_0_mobile-attack" "objects_1563_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1563_type_relationship" "objects_1563_id_relationship--d300eb82-5ca0-48aa-a45f-d34242545e27" "objects_1563_created_2022-03-30T15:08:28.814Z" "objects_1563_x_mitre_version_0.1" "objects_1563_x_mitre_deprecated_False" "objects_1563_revoked_False" "objects_1563_description_Device attestation could detect unauthorized operating system modifications. " "objects_1563_modified_2022-03-30T15:08:28.814Z" "objects_1563_relationship_type_mitigates" "objects_1563_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1563_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_1563_x_mitre_attack_spec_version_2.1.0" "objects_1563_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1563_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1563_spec_version_2.1" "objects_1563_x_mitre_domains_0_mobile-attack" "objects_1564_type_relationship" "objects_1564_id_relationship--d32003ba-959b-4377-aa04-f75275c32abf" "objects_1564_created_2019-07-16T14:33:12.144Z" "objects_1564_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1564_revoked_False" "objects_1564_external_references_0_source_name_Google Triada June 2019" "objects_1564_external_references_0_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_1564_external_references_0_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_1564_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1564_modified_2023-04-05T20:40:27.131Z" "objects_1564_description_[Triada](https://attack.mitre.org/software/S0424) utilized HTTP to exfiltrate data through POST requests to the command and control server.(Citation: Google Triada June 2019) " "objects_1564_relationship_type_uses" "objects_1564_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_1564_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1564_x_mitre_deprecated_False" "objects_1564_x_mitre_version_1.0" "objects_1564_x_mitre_attack_spec_version_3.1.0" "objects_1564_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1564_spec_version_2.1" "objects_1564_x_mitre_domains_0_mobile-attack" "objects_1565_type_relationship" "objects_1565_id_relationship--d358ac0b-4c67-44e3-939b-24cd36d3c3fb" "objects_1565_created_2020-09-11T16:22:03.294Z" "objects_1565_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1565_revoked_False" "objects_1565_external_references_0_source_name_Lookout ViperRAT" "objects_1565_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1565_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1565_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1565_modified_2023-04-05T19:58:57.686Z" "objects_1565_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect the device\u2019s cell tower information.(Citation: Lookout ViperRAT)" "objects_1565_relationship_type_uses" "objects_1565_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1565_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_1565_x_mitre_deprecated_False" "objects_1565_x_mitre_version_1.0" "objects_1565_x_mitre_attack_spec_version_3.1.0" "objects_1565_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1565_spec_version_2.1" "objects_1565_x_mitre_domains_0_mobile-attack" "objects_1566_type_relationship" "objects_1566_id_relationship--d39ceb9c-ef0c-4820-b363-dc8ce0f0d00c" "objects_1566_created_2023-10-10T15:33:58.621Z" "objects_1566_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1566_revoked_False" "objects_1566_external_references_0_source_name_Cybereason FakeSpy" "objects_1566_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1566_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1566_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1566_modified_2023-10-10T15:33:58.621Z" "objects_1566_description_[FakeSpy](https://attack.mitre.org/software/S0509) masquerades as local postal service applications.(Citation: Cybereason FakeSpy)" "objects_1566_relationship_type_uses" "objects_1566_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1566_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1566_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1566_x_mitre_deprecated_False" "objects_1566_x_mitre_version_1.0" "objects_1566_x_mitre_attack_spec_version_2.1.0" "objects_1566_spec_version_2.1" "objects_1566_x_mitre_domains_0_mobile-attack" "objects_1567_type_relationship" "objects_1567_id_relationship--d3e06522-2a30-4d56-801e-9461178b80ce" "objects_1567_created_2021-01-05T20:16:20.412Z" "objects_1567_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1567_revoked_False" "objects_1567_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1567_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1567_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1567_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1567_modified_2023-04-05T20:45:54.913Z" "objects_1567_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can hide its icon after launch.(Citation: Zscaler TikTok Spyware)" "objects_1567_relationship_type_uses" "objects_1567_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1567_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1567_x_mitre_deprecated_False" "objects_1567_x_mitre_version_1.0" "objects_1567_x_mitre_attack_spec_version_3.1.0" "objects_1567_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1567_spec_version_2.1" "objects_1567_x_mitre_domains_0_mobile-attack" "objects_1568_type_relationship" "objects_1568_id_relationship--d3e52467-d090-4ebd-b9b1-3022cc6d5df0" "objects_1568_created_2023-02-06T19:42:34.537Z" "objects_1568_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1568_revoked_False" "objects_1568_external_references_0_source_name_threatfabric_sova_0921" "objects_1568_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1568_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1568_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1568_modified_2023-04-11T22:08:03.095Z" "objects_1568_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can resist removal by going to the home screen during uninstall.(Citation: threatfabric_sova_0921)" "objects_1568_relationship_type_uses" "objects_1568_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1568_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1568_x_mitre_deprecated_False" "objects_1568_x_mitre_version_0.1" "objects_1568_x_mitre_attack_spec_version_3.1.0" "objects_1568_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1568_spec_version_2.1" "objects_1568_x_mitre_domains_0_mobile-attack" "objects_1569_type_relationship" "objects_1569_id_relationship--d3e6bc20-1f9c-41b6-89f0-ef95689add86" "objects_1569_created_2023-03-20T15:16:43.275Z" "objects_1569_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1569_revoked_False" "objects_1569_external_references_0_source_name_Samsung Knox Mobile Threat Defense" "objects_1569_external_references_0_description_Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022." "objects_1569_external_references_0_url_https://partner.samsungknox.com/mtd" "objects_1569_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1569_modified_2023-08-07T22:12:07.772Z" "objects_1569_description_Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)" "objects_1569_relationship_type_detects" "objects_1569_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1569_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_1569_x_mitre_deprecated_False" "objects_1569_x_mitre_version_0.1" "objects_1569_x_mitre_attack_spec_version_3.1.0" "objects_1569_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1569_spec_version_2.1" "objects_1569_x_mitre_domains_0_mobile-attack" "objects_1570_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1570_id_relationship--d4154247-90ce-43b9-8c17-5c28f67617f5" "objects_1570_type_relationship" "objects_1570_created_2020-12-24T21:55:56.747Z" "objects_1570_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1570_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1570_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1570_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1570_modified_2020-12-24T21:55:56.747Z" "objects_1570_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed browser history, as well as the files for 15 other apps.(Citation: Lookout Uyghur Campaign)" "objects_1570_relationship_type_uses" "objects_1570_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1570_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1570_x_mitre_version_1.0" "objects_1570_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1570_spec_version_2.1" "objects_1570_x_mitre_attack_spec_version_2.1.0" "objects_1570_x_mitre_domains_0_mobile-attack" "objects_1571_type_relationship" "objects_1571_id_relationship--d44b097a-1bba-40bd-8ec8-d717a3f3df0c" "objects_1571_created_2023-03-03T16:24:30.564Z" "objects_1571_revoked_False" "objects_1571_external_references_0_source_name_paloalto_yispecter_1015" "objects_1571_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1571_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1571_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1571_modified_2023-03-03T16:24:30.564Z" "objects_1571_description_[YiSpecter](https://attack.mitre.org/software/S0311) has hijacked normal application\u2019s launch routines to display ads.(Citation: paloalto_yispecter_1015)" "objects_1571_relationship_type_uses" "objects_1571_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1571_target_ref_attack-pattern--670a4d75-103b-4b14-8a9e-4652fa795edd" "objects_1571_x_mitre_deprecated_False" "objects_1571_x_mitre_version_0.1" "objects_1571_x_mitre_attack_spec_version_3.1.0" "objects_1571_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1571_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1571_spec_version_2.1" "objects_1571_x_mitre_domains_0_mobile-attack" "objects_1572_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1572_id_relationship--d4a5a902-231e-4878-ad5b-39620498b018" "objects_1572_type_relationship" "objects_1572_created_2019-09-04T14:28:15.941Z" "objects_1572_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1572_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1572_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1572_external_references_0_source_name_Lookout-Monokle" "objects_1572_modified_2020-03-31T14:49:39.188Z" "objects_1572_description_[Monokle](https://attack.mitre.org/software/S0407) can record audio from the device's microphone and can record phone calls, specifying the output audio quality.(Citation: Lookout-Monokle)" "objects_1572_relationship_type_uses" "objects_1572_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1572_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1572_x_mitre_version_1.0" "objects_1572_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1572_spec_version_2.1" "objects_1572_x_mitre_attack_spec_version_2.1.0" "objects_1572_x_mitre_domains_0_mobile-attack" "objects_1573_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1573_id_relationship--d53a8ff0-7252-477e-8767-fd485dd62e7c" "objects_1573_type_relationship" "objects_1573_created_2020-12-18T20:14:47.381Z" "objects_1573_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1573_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1573_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1573_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1573_modified_2020-12-28T18:59:33.140Z" "objects_1573_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) has collected the device\u2019s phone number and can check if the active network connection is metered.(Citation: WhiteOps TERRACOTTA)" "objects_1573_relationship_type_uses" "objects_1573_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1573_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1573_x_mitre_version_1.0" "objects_1573_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1573_spec_version_2.1" "objects_1573_x_mitre_attack_spec_version_2.1.0" "objects_1573_x_mitre_domains_0_mobile-attack" "objects_1574_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1574_id_relationship--d54bdaff-8eb8-4a02-9f64-bc33c892e9d1" "objects_1574_type_relationship" "objects_1574_created_2017-12-14T16:46:06.044Z" "objects_1574_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1574_external_references_0_source_name_Xiao-ZergHelper" "objects_1574_external_references_0_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_1574_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_1574_modified_2020-03-31T14:49:39.188Z" "objects_1574_description_[ZergHelper](https://attack.mitre.org/software/S0287) attempts to extend its capabilities via dynamic updating of its code.(Citation: Xiao-ZergHelper)" "objects_1574_relationship_type_uses" "objects_1574_source_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_1574_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1574_x_mitre_version_1.0" "objects_1574_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1574_spec_version_2.1" "objects_1574_x_mitre_attack_spec_version_2.1.0" "objects_1574_x_mitre_domains_0_mobile-attack" "objects_1575_type_relationship" "objects_1575_id_relationship--d54d3475-19ee-4ac5-98b0-ec1ae9336dfb" "objects_1575_created_2023-03-20T18:58:14.140Z" "objects_1575_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1575_revoked_False" "objects_1575_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1575_modified_2023-08-08T17:06:44.919Z" "objects_1575_description_The user can review which applications have location permissions in the operating system\u2019s settings menu." "objects_1575_relationship_type_detects" "objects_1575_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1575_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1575_x_mitre_deprecated_False" "objects_1575_x_mitre_version_0.1" "objects_1575_x_mitre_attack_spec_version_3.1.0" "objects_1575_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1575_spec_version_2.1" "objects_1575_x_mitre_domains_0_mobile-attack" "objects_1576_type_relationship" "objects_1576_id_relationship--d5533ca1-d57e-4bbf-bf0c-d114e4b79078" "objects_1576_created_2023-08-04T18:32:39.763Z" "objects_1576_revoked_False" "objects_1576_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1576_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1576_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1576_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1576_modified_2023-08-04T18:32:39.763Z" "objects_1576_description_[Sunbird](https://attack.mitre.org/software/S1082) can access a device\u2019s camera and take photos.(Citation: lookout_hornbill_sunbird_0221)" "objects_1576_relationship_type_uses" "objects_1576_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1576_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1576_x_mitre_deprecated_False" "objects_1576_x_mitre_version_0.1" "objects_1576_x_mitre_attack_spec_version_3.1.0" "objects_1576_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1576_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1576_spec_version_2.1" "objects_1576_x_mitre_domains_0_mobile-attack" "objects_1577_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1577_id_relationship--d562ed4d-ac4d-476b-872e-9e228c580889" "objects_1577_type_relationship" "objects_1577_created_2020-11-20T16:37:28.506Z" "objects_1577_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1577_external_references_0_source_name_Symantec GoldenCup" "objects_1577_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1577_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1577_modified_2020-11-20T16:37:28.506Z" "objects_1577_description_[Golden Cup](https://attack.mitre.org/software/S0535) can obtain a list of installed applications.(Citation: Symantec GoldenCup)" "objects_1577_relationship_type_uses" "objects_1577_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1577_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1577_x_mitre_version_1.0" "objects_1577_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1577_spec_version_2.1" "objects_1577_x_mitre_attack_spec_version_2.1.0" "objects_1577_x_mitre_domains_0_mobile-attack" "objects_1578_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1578_id_relationship--d5928f73-c4ba-4eb1-bf8a-e75ff6806a4a" "objects_1578_type_relationship" "objects_1578_created_2020-11-10T17:08:35.713Z" "objects_1578_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1578_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1578_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1578_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1578_modified_2020-11-10T17:08:35.713Z" "objects_1578_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can collect notes and data from the MiCode app.(Citation: Lookout Uyghur Campaign)" "objects_1578_relationship_type_uses" "objects_1578_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1578_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1578_x_mitre_version_1.0" "objects_1578_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1578_spec_version_2.1" "objects_1578_x_mitre_attack_spec_version_2.1.0" "objects_1578_x_mitre_domains_0_mobile-attack" "objects_1579_type_relationship" "objects_1579_id_relationship--d59da983-c521-47b6-83ab-435f7d58611d" "objects_1579_created_2019-11-21T16:42:48.493Z" "objects_1579_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1579_revoked_False" "objects_1579_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1579_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1579_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1579_external_references_1_source_name_Bitdefender - Triout 2018" "objects_1579_external_references_1_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_1579_external_references_1_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_1579_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1579_modified_2023-04-05T20:12:57.861Z" "objects_1579_description_[ViceLeaker](https://attack.mitre.org/software/S0418) uses HTTP requests for C2 communication.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_1579_relationship_type_uses" "objects_1579_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1579_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1579_x_mitre_deprecated_False" "objects_1579_x_mitre_version_1.0" "objects_1579_x_mitre_attack_spec_version_3.1.0" "objects_1579_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1579_spec_version_2.1" "objects_1579_x_mitre_domains_0_mobile-attack" "objects_1580_type_relationship" "objects_1580_id_relationship--d621eba9-676f-47a4-8358-d68eeff2fb9a" "objects_1580_created_2023-03-03T16:25:09.978Z" "objects_1580_revoked_False" "objects_1580_external_references_0_source_name_paloalto_yispecter_1015" "objects_1580_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1580_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1580_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1580_modified_2023-03-03T16:25:09.978Z" "objects_1580_description_[YiSpecter](https://attack.mitre.org/software/S0311) is believed to have initially infected devices using internet traffic hijacking to generate abnormal popups.(Citation: paloalto_yispecter_1015) " "objects_1580_relationship_type_uses" "objects_1580_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1580_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1580_x_mitre_deprecated_False" "objects_1580_x_mitre_version_0.1" "objects_1580_x_mitre_attack_spec_version_3.1.0" "objects_1580_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1580_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1580_spec_version_2.1" "objects_1580_x_mitre_domains_0_mobile-attack" "objects_1581_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1581_id_relationship--d638565b-ca8e-459f-9c3b-1bd8828606f5" "objects_1581_type_relationship" "objects_1581_created_2020-11-24T17:55:12.897Z" "objects_1581_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1581_external_references_0_source_name_Talos GPlayed" "objects_1581_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1581_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1581_modified_2020-11-24T17:55:12.897Z" "objects_1581_description_[GPlayed](https://attack.mitre.org/software/S0536) can collect the user\u2019s browser cookies.(Citation: Talos GPlayed)" "objects_1581_relationship_type_uses" "objects_1581_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1581_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1581_x_mitre_version_1.0" "objects_1581_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1581_spec_version_2.1" "objects_1581_x_mitre_attack_spec_version_2.1.0" "objects_1581_x_mitre_domains_0_mobile-attack" "objects_1582_type_relationship" "objects_1582_id_relationship--d63de13b-0253-42f4-b13d-34bccf76ad94" "objects_1582_created_2023-03-20T18:54:50.323Z" "objects_1582_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1582_revoked_False" "objects_1582_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1582_modified_2023-08-08T15:01:30.483Z" "objects_1582_description_Applications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found." "objects_1582_relationship_type_detects" "objects_1582_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1582_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_1582_x_mitre_deprecated_False" "objects_1582_x_mitre_version_0.1" "objects_1582_x_mitre_attack_spec_version_3.1.0" "objects_1582_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1582_spec_version_2.1" "objects_1582_x_mitre_domains_0_mobile-attack" "objects_1583_type_relationship" "objects_1583_id_relationship--d63f27cf-95a3-42bb-86dd-dc18e22cb898" "objects_1583_created_2019-09-04T14:28:16.414Z" "objects_1583_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1583_revoked_False" "objects_1583_external_references_0_source_name_Lookout-Monokle" "objects_1583_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1583_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1583_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1583_modified_2023-04-05T17:41:16.423Z" "objects_1583_description_[Monokle](https://attack.mitre.org/software/S0407) can retrieve call history.(Citation: Lookout-Monokle)" "objects_1583_relationship_type_uses" "objects_1583_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1583_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1583_x_mitre_deprecated_False" "objects_1583_x_mitre_version_1.0" "objects_1583_x_mitre_attack_spec_version_3.1.0" "objects_1583_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1583_spec_version_2.1" "objects_1583_x_mitre_domains_0_mobile-attack" "objects_1584_type_relationship" "objects_1584_id_relationship--d64c4924-76f0-4b2e-858d-b0df733334d0" "objects_1584_created_2023-02-06T19:03:11.265Z" "objects_1584_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1584_revoked_False" "objects_1584_external_references_0_source_name_lookout_abstractemu_1021" "objects_1584_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1584_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1584_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1584_modified_2023-03-27T17:23:09.430Z" "objects_1584_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can modify system settings to give itself device administrator privileges.(Citation: lookout_abstractemu_1021)" "objects_1584_relationship_type_uses" "objects_1584_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1584_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1584_x_mitre_deprecated_False" "objects_1584_x_mitre_version_0.1" "objects_1584_x_mitre_attack_spec_version_3.1.0" "objects_1584_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1584_spec_version_2.1" "objects_1584_x_mitre_domains_0_mobile-attack" "objects_1585_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1585_type_relationship" "objects_1585_id_relationship--d663cb6f-9fc8-48a0-827f-29757b12ae71" "objects_1585_created_2022-03-30T20:53:54.296Z" "objects_1585_x_mitre_version_0.1" "objects_1585_x_mitre_deprecated_False" "objects_1585_revoked_False" "objects_1585_description_" "objects_1585_modified_2022-03-30T20:53:54.296Z" "objects_1585_relationship_type_subtechnique-of" "objects_1585_source_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1585_target_ref_attack-pattern--498e7b81-238d-404c-aa5e-332904d63286" "objects_1585_x_mitre_attack_spec_version_2.1.0" "objects_1585_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1585_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1585_spec_version_2.1" "objects_1585_x_mitre_domains_0_mobile-attack" "objects_1586_type_relationship" "objects_1586_id_relationship--d66a3e5f-700e-40d0-b16a-bbb3306256c7" "objects_1586_created_2023-03-20T15:16:28.177Z" "objects_1586_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1586_revoked_False" "objects_1586_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1586_modified_2023-08-07T22:17:39.302Z" "objects_1586_description_Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells." "objects_1586_relationship_type_detects" "objects_1586_source_ref_x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1" "objects_1586_target_ref_attack-pattern--29f1f56c-7b7a-4c14-9e39-59577ea2743c" "objects_1586_x_mitre_deprecated_False" "objects_1586_x_mitre_version_0.1" "objects_1586_x_mitre_attack_spec_version_3.1.0" "objects_1586_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1586_spec_version_2.1" "objects_1586_x_mitre_domains_0_mobile-attack" "objects_1587_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1587_type_relationship" "objects_1587_id_relationship--d6be8665-afbb-4be5-a56a-493af01b120a" "objects_1587_created_2022-03-30T15:52:29.935Z" "objects_1587_x_mitre_version_0.1" "objects_1587_x_mitre_deprecated_False" "objects_1587_revoked_False" "objects_1587_description_Mobile security products can potentially detect jailbroken or rooted devices." "objects_1587_modified_2022-03-30T15:52:29.935Z" "objects_1587_relationship_type_mitigates" "objects_1587_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1587_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1587_x_mitre_attack_spec_version_2.1.0" "objects_1587_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1587_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1587_spec_version_2.1" "objects_1587_x_mitre_domains_0_mobile-attack" "objects_1588_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1588_id_relationship--d6e4fdc6-c936-4bb9-861f-fafd3b72fcb4" "objects_1588_type_relationship" "objects_1588_created_2021-02-17T20:43:52.413Z" "objects_1588_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1588_external_references_0_source_name_Lookout FrozenCell" "objects_1588_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1588_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1588_modified_2021-02-17T20:43:52.413Z" "objects_1588_description_[FrozenCell](https://attack.mitre.org/software/S0577) has compressed and encrypted data before exfiltration using password protected .7z archives.(Citation: Lookout FrozenCell)" "objects_1588_relationship_type_uses" "objects_1588_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1588_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1588_x_mitre_version_1.0" "objects_1588_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1588_spec_version_2.1" "objects_1588_x_mitre_attack_spec_version_2.1.0" "objects_1588_x_mitre_domains_0_mobile-attack" "objects_1589_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1589_id_relationship--d6f78e9b-94d1-4d59-b00e-89fad2261c55" "objects_1589_type_relationship" "objects_1589_created_2020-04-24T17:46:31.603Z" "objects_1589_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1589_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1589_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1589_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1589_modified_2020-04-24T17:46:31.603Z" "objects_1589_description_[TrickMo](https://attack.mitre.org/software/S0427) can steal pictures from the device.(Citation: SecurityIntelligence TrickMo)" "objects_1589_relationship_type_uses" "objects_1589_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1589_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1589_x_mitre_version_1.0" "objects_1589_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1589_spec_version_2.1" "objects_1589_x_mitre_attack_spec_version_2.1.0" "objects_1589_x_mitre_domains_0_mobile-attack" "objects_1590_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1590_type_relationship" "objects_1590_id_relationship--d7007bf2-fcd6-4327-9ffb-bdee5bdeb383" "objects_1590_created_2022-04-05T20:17:46.149Z" "objects_1590_x_mitre_version_0.1" "objects_1590_x_mitre_deprecated_False" "objects_1590_revoked_False" "objects_1590_description_" "objects_1590_modified_2022-04-05T20:17:46.149Z" "objects_1590_relationship_type_revoked-by" "objects_1590_source_ref_attack-pattern--393e8c12-a416-4575-ba90-19cc85656796" "objects_1590_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1590_x_mitre_attack_spec_version_2.1.0" "objects_1590_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1590_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1590_spec_version_2.1" "objects_1590_x_mitre_domains_0_mobile-attack" "objects_1591_type_relationship" "objects_1591_id_relationship--d700c625-d0b6-4570-a538-0ba57bd7bda5" "objects_1591_created_2023-03-20T18:50:21.296Z" "objects_1591_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1591_revoked_False" "objects_1591_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1591_modified_2023-08-09T16:32:32.957Z" "objects_1591_description_Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. " "objects_1591_relationship_type_detects" "objects_1591_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1591_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1591_x_mitre_deprecated_False" "objects_1591_x_mitre_version_0.1" "objects_1591_x_mitre_attack_spec_version_3.1.0" "objects_1591_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1591_spec_version_2.1" "objects_1591_x_mitre_domains_0_mobile-attack" "objects_1592_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1592_id_relationship--d70aaf50-29b7-4687-98ea-ffaa3fa858c0" "objects_1592_type_relationship" "objects_1592_created_2020-12-24T21:55:56.692Z" "objects_1592_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1592_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1592_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1592_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1592_modified_2020-12-24T21:55:56.692Z" "objects_1592_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has searched for specific existing data directories, including the Gmail app, Dropbox app, Pictures, and thumbnails.(Citation: Lookout Uyghur Campaign)" "objects_1592_relationship_type_uses" "objects_1592_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1592_target_ref_attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848" "objects_1592_x_mitre_version_1.0" "objects_1592_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1592_spec_version_2.1" "objects_1592_x_mitre_attack_spec_version_2.1.0" "objects_1592_x_mitre_domains_0_mobile-attack" "objects_1593_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1593_type_relationship" "objects_1593_id_relationship--d716163d-2492-4088-9235-b2310312ba27" "objects_1593_created_2022-04-06T15:44:48.422Z" "objects_1593_x_mitre_version_0.1" "objects_1593_x_mitre_deprecated_False" "objects_1593_revoked_False" "objects_1593_description_" "objects_1593_modified_2022-04-06T15:44:48.422Z" "objects_1593_relationship_type_revoked-by" "objects_1593_source_ref_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_1593_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1593_x_mitre_attack_spec_version_2.1.0" "objects_1593_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1593_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1593_spec_version_2.1" "objects_1593_x_mitre_domains_0_mobile-attack" "objects_1594_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1594_type_relationship" "objects_1594_id_relationship--d71fab20-a56c-4404-a65d-aaa37056f16e" "objects_1594_created_2022-04-01T15:16:16.027Z" "objects_1594_x_mitre_version_0.1" "objects_1594_external_references_0_source_name_Trend Micro iOS URL Hijacking" "objects_1594_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/ios-url-scheme-susceptible-to-hijacking/" "objects_1594_external_references_0_description_L. Wu, Y. Zhou, M. Li. (2019, July 12). iOS URL Scheme Susceptible to Hijacking. Retrieved September 11, 2020." "objects_1594_x_mitre_deprecated_False" "objects_1594_revoked_False" "objects_1594_description_iOS 11 introduced a first-come-first-served principle for URIs, allowing only the prior installed app to be launched via the URI.(Citation: Trend Micro iOS URL Hijacking) Android 6 introduced App Links." "objects_1594_modified_2022-04-01T15:16:16.027Z" "objects_1594_relationship_type_mitigates" "objects_1594_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1594_target_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_1594_x_mitre_attack_spec_version_2.1.0" "objects_1594_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1594_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1594_spec_version_2.1" "objects_1594_x_mitre_domains_0_mobile-attack" "objects_1595_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1595_type_relationship" "objects_1595_id_relationship--d724bcf3-25d2-406a-b612-333fea5e2385" "objects_1595_created_2020-10-29T17:48:27.440Z" "objects_1595_x_mitre_version_1.0" "objects_1595_external_references_0_source_name_Threat Fabric Exobot" "objects_1595_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1595_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1595_x_mitre_deprecated_False" "objects_1595_revoked_False" "objects_1595_description_[Exobot](https://attack.mitre.org/software/S0522) can show phishing popups when a targeted application is running.(Citation: Threat Fabric Exobot)" "objects_1595_modified_2022-04-12T10:01:44.682Z" "objects_1595_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1595_relationship_type_uses" "objects_1595_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1595_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1595_x_mitre_attack_spec_version_2.1.0" "objects_1595_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1595_spec_version_2.1" "objects_1595_x_mitre_domains_0_mobile-attack" "objects_1596_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1596_type_relationship" "objects_1596_id_relationship--d76d838b-bbc7-459a-884a-2da8c36a2ba2" "objects_1596_created_2022-04-08T16:29:55.322Z" "objects_1596_x_mitre_version_0.1" "objects_1596_x_mitre_deprecated_False" "objects_1596_revoked_False" "objects_1596_description_" "objects_1596_modified_2022-04-08T16:29:55.322Z" "objects_1596_relationship_type_revoked-by" "objects_1596_source_ref_attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6" "objects_1596_target_ref_attack-pattern--a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9" "objects_1596_x_mitre_attack_spec_version_2.1.0" "objects_1596_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1596_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1596_spec_version_2.1" "objects_1596_x_mitre_domains_0_mobile-attack" "objects_1597_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1597_id_relationship--d7aa436a-e66d-4217-be66-4414703dec07" "objects_1597_type_relationship" "objects_1597_created_2020-11-10T17:08:35.634Z" "objects_1597_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1597_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1597_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1597_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1597_modified_2020-11-10T17:08:35.634Z" "objects_1597_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has used incorrect file extensions and encryption to hide most of its assets, including secondary APKs, configuration files, and JAR or DEX files.(Citation: Lookout Uyghur Campaign)" "objects_1597_relationship_type_uses" "objects_1597_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1597_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1597_x_mitre_version_1.0" "objects_1597_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1597_spec_version_2.1" "objects_1597_x_mitre_attack_spec_version_2.1.0" "objects_1597_x_mitre_domains_0_mobile-attack" "objects_1598_type_relationship" "objects_1598_id_relationship--d7ae7fb1-c363-4969-a4af-e2dd44a3c064" "objects_1598_created_2017-12-14T16:46:06.044Z" "objects_1598_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1598_revoked_False" "objects_1598_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1598_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1598_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1598_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1598_modified_2023-04-05T21:27:01.081Z" "objects_1598_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) attempts to modify the device's system partition.(Citation: Lookout-PegasusAndroid)" "objects_1598_relationship_type_uses" "objects_1598_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1598_target_ref_attack-pattern--4f14e30b-8b57-4a7b-9093-2c0778ea99cf" "objects_1598_x_mitre_deprecated_False" "objects_1598_x_mitre_version_1.0" "objects_1598_x_mitre_attack_spec_version_3.1.0" "objects_1598_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1598_spec_version_2.1" "objects_1598_x_mitre_domains_0_mobile-attack" "objects_1599_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1599_type_relationship" "objects_1599_id_relationship--d7ca70d4-2006-4252-b243-e52be760e24d" "objects_1599_created_2022-04-01T13:26:39.773Z" "objects_1599_x_mitre_version_0.1" "objects_1599_x_mitre_deprecated_False" "objects_1599_revoked_False" "objects_1599_description_Access to SMS messages is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their SMS messages. " "objects_1599_modified_2022-04-01T13:26:39.773Z" "objects_1599_relationship_type_mitigates" "objects_1599_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1599_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1599_x_mitre_attack_spec_version_2.1.0" "objects_1599_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1599_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1599_spec_version_2.1" "objects_1599_x_mitre_domains_0_mobile-attack" "objects_1600_type_relationship" "objects_1600_id_relationship--d7d78682-c9ad-4880-ae6e-3fc79f3737f1" "objects_1600_created_2019-09-04T15:38:56.809Z" "objects_1600_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1600_revoked_False" "objects_1600_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_1600_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1600_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1600_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1600_modified_2023-04-05T20:37:35.704Z" "objects_1600_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can delete data from a compromised device.(Citation: CyberMerchants-FlexiSpy)" "objects_1600_relationship_type_uses" "objects_1600_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1600_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1600_x_mitre_deprecated_False" "objects_1600_x_mitre_version_1.0" "objects_1600_x_mitre_attack_spec_version_3.1.0" "objects_1600_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1600_spec_version_2.1" "objects_1600_x_mitre_domains_0_mobile-attack" "objects_1601_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1601_id_relationship--d84604bc-2314-4340-b9c1-b1265c0f6c37" "objects_1601_type_relationship" "objects_1601_created_2020-05-07T15:24:49.583Z" "objects_1601_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1601_modified_2020-05-27T13:23:34.544Z" "objects_1601_description_Many vulnerabilities related to injecting code into existing applications have been patched in previous Android releases." "objects_1601_relationship_type_mitigates" "objects_1601_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1601_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_1601_x_mitre_version_1.0" "objects_1601_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1601_spec_version_2.1" "objects_1601_x_mitre_attack_spec_version_2.1.0" "objects_1601_x_mitre_domains_0_mobile-attack" "objects_1602_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1602_id_relationship--d87b468e-f610-4e95-8dfb-8cf029f0e891" "objects_1602_type_relationship" "objects_1602_created_2017-12-14T16:46:06.044Z" "objects_1602_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1602_external_references_0_source_name_ArsTechnica-HummingBad" "objects_1602_external_references_0_description_Dan Goodin. (2016, July 7). 10 million Android phones infected by all-powerful auto-rooting apps. Retrieved January 24, 2017." "objects_1602_external_references_0_url_http://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/" "objects_1602_modified_2020-03-31T14:49:39.188Z" "objects_1602_description_[HummingBad](https://attack.mitre.org/software/S0322) can exploit unfixed vulnerabilities in older Android versions to root victim phones.(Citation: ArsTechnica-HummingBad)" "objects_1602_relationship_type_uses" "objects_1602_source_ref_malware--c8770c81-c29f-40d2-a140-38544206b2b4" "objects_1602_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1602_x_mitre_version_1.0" "objects_1602_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1602_spec_version_2.1" "objects_1602_x_mitre_attack_spec_version_2.1.0" "objects_1602_x_mitre_domains_0_mobile-attack" "objects_1603_type_relationship" "objects_1603_id_relationship--d87b9e3a-9e6b-404d-8fc1-22262ff31157" "objects_1603_created_2023-08-23T22:18:21.774Z" "objects_1603_revoked_False" "objects_1603_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1603_modified_2023-08-23T22:18:21.774Z" "objects_1603_description_Network traffic analysis may reveal processes communicating with malicious domains. " "objects_1603_relationship_type_detects" "objects_1603_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1603_target_ref_attack-pattern--5abfc5e6-3c56-49e7-ad72-502d01acf28b" "objects_1603_x_mitre_deprecated_False" "objects_1603_x_mitre_version_0.1" "objects_1603_x_mitre_attack_spec_version_3.1.0" "objects_1603_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1603_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1603_spec_version_2.1" "objects_1603_x_mitre_domains_0_mobile-attack" "objects_1604_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1604_id_relationship--d886f368-a38b-4cb3-906f-9b284f58b369" "objects_1604_type_relationship" "objects_1604_created_2019-12-10T16:07:41.066Z" "objects_1604_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1604_external_references_0_source_name_SecureList DVMap June 2017" "objects_1604_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_1604_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_1604_modified_2019-12-10T16:07:41.066Z" "objects_1604_description_[Dvmap](https://attack.mitre.org/software/S0420) decrypts executables from archive files stored in the `assets` directory of the installation binary.(Citation: SecureList DVMap June 2017)" "objects_1604_relationship_type_uses" "objects_1604_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_1604_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1604_x_mitre_version_1.0" "objects_1604_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1604_spec_version_2.1" "objects_1604_x_mitre_attack_spec_version_2.1.0" "objects_1604_x_mitre_domains_0_mobile-attack" "objects_1605_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1605_id_relationship--d8ca4ea5-5242-4f0f-b3b7-008673f561ab" "objects_1605_type_relationship" "objects_1605_created_2020-09-11T16:22:03.229Z" "objects_1605_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1605_external_references_0_source_name_Lookout ViperRAT" "objects_1605_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1605_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1605_modified_2020-09-11T16:22:03.229Z" "objects_1605_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect and record audio content.(Citation: Lookout ViperRAT)" "objects_1605_relationship_type_uses" "objects_1605_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1605_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1605_x_mitre_version_1.0" "objects_1605_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1605_spec_version_2.1" "objects_1605_x_mitre_attack_spec_version_2.1.0" "objects_1605_x_mitre_domains_0_mobile-attack" "objects_1606_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1606_id_relationship--d8d773ab-b0e3-484b-bdb8-c1a1ab48d218" "objects_1606_type_relationship" "objects_1606_created_2018-10-17T00:14:20.652Z" "objects_1606_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1606_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1606_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1606_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1606_modified_2020-03-31T14:49:39.188Z" "objects_1606_description_[SpyDealer](https://attack.mitre.org/software/S0324) uses the commercial rooting app Baidu Easy Root to gain root privilege and maintain persistence on the victim.(Citation: PaloAlto-SpyDealer)" "objects_1606_relationship_type_uses" "objects_1606_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1606_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1606_x_mitre_version_1.0" "objects_1606_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1606_spec_version_2.1" "objects_1606_x_mitre_attack_spec_version_2.1.0" "objects_1606_x_mitre_domains_0_mobile-attack" "objects_1607_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1607_id_relationship--d933bba1-61ab-4fea-b7db-7e2a4f4146e7" "objects_1607_type_relationship" "objects_1607_created_2020-12-14T15:02:35.230Z" "objects_1607_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1607_external_references_0_source_name_Securelist Asacub" "objects_1607_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1607_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1607_modified_2020-12-14T15:02:35.230Z" "objects_1607_description_[Asacub](https://attack.mitre.org/software/S0540) has encrypted C2 communications using Base64-encoded RC4.(Citation: Securelist Asacub)" "objects_1607_relationship_type_uses" "objects_1607_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1607_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1607_x_mitre_version_1.0" "objects_1607_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1607_spec_version_2.1" "objects_1607_x_mitre_attack_spec_version_2.1.0" "objects_1607_x_mitre_domains_0_mobile-attack" "objects_1608_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1608_type_relationship" "objects_1608_id_relationship--d995dfff-e4b2-4e07-8e76-b064354f591a" "objects_1608_created_2022-04-01T12:49:32.365Z" "objects_1608_x_mitre_version_0.1" "objects_1608_x_mitre_deprecated_False" "objects_1608_revoked_False" "objects_1608_description_Calendar access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their device calendar. " "objects_1608_modified_2022-04-01T12:49:32.365Z" "objects_1608_relationship_type_mitigates" "objects_1608_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1608_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1608_x_mitre_attack_spec_version_2.1.0" "objects_1608_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1608_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1608_spec_version_2.1" "objects_1608_x_mitre_domains_0_mobile-attack" "objects_1609_type_relationship" "objects_1609_id_relationship--d9aab2e1-31e0-45b2-a40b-0cbe60677b4b" "objects_1609_created_2020-11-24T18:18:33.772Z" "objects_1609_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1609_revoked_False" "objects_1609_external_references_0_source_name_Threat Fabric Exobot" "objects_1609_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1609_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1609_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1609_modified_2023-04-05T21:24:43.120Z" "objects_1609_description_[Exobot](https://attack.mitre.org/software/S0522) can request device administrator permissions.(Citation: Threat Fabric Exobot)" "objects_1609_relationship_type_uses" "objects_1609_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1609_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1609_x_mitre_deprecated_False" "objects_1609_x_mitre_version_1.0" "objects_1609_x_mitre_attack_spec_version_3.1.0" "objects_1609_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1609_spec_version_2.1" "objects_1609_x_mitre_domains_0_mobile-attack" "objects_1610_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1610_id_relationship--da424f3f-8a93-4a66-858c-b33f587108e6" "objects_1610_type_relationship" "objects_1610_created_2020-10-29T17:48:27.225Z" "objects_1610_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1610_external_references_0_source_name_Threat Fabric Exobot" "objects_1610_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1610_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1610_modified_2020-10-29T17:48:27.225Z" "objects_1610_description_[Exobot](https://attack.mitre.org/software/S0522) can obtain the device\u2019s country and carrier name.(Citation: Threat Fabric Exobot)" "objects_1610_relationship_type_uses" "objects_1610_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1610_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1610_x_mitre_version_1.0" "objects_1610_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1610_spec_version_2.1" "objects_1610_x_mitre_attack_spec_version_2.1.0" "objects_1610_x_mitre_domains_0_mobile-attack" "objects_1611_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1611_id_relationship--da4296d7-5fdb-45b6-9791-b023d634c08d" "objects_1611_type_relationship" "objects_1611_created_2017-12-14T16:46:06.044Z" "objects_1611_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1611_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/" "objects_1611_external_references_0_description_Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016." "objects_1611_external_references_0_source_name_TrendMicro-RCSAndroid" "objects_1611_modified_2020-03-31T14:49:39.188Z" "objects_1611_description_[RCSAndroid](https://attack.mitre.org/software/S0295) can record location.(Citation: TrendMicro-RCSAndroid)" "objects_1611_relationship_type_uses" "objects_1611_source_ref_malware--363bc05d-13cb-4e98-a5b7-e250f2bbdc2b" "objects_1611_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1611_x_mitre_version_1.0" "objects_1611_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1611_spec_version_2.1" "objects_1611_x_mitre_attack_spec_version_2.1.0" "objects_1611_x_mitre_domains_0_mobile-attack" "objects_1612_type_relationship" "objects_1612_id_relationship--da55ec01-daf2-4fac-ba0b-243f759b73aa" "objects_1612_created_2023-08-14T16:19:34.080Z" "objects_1612_revoked_False" "objects_1612_external_references_0_source_name_unit42_strat_aged_domain_det" "objects_1612_external_references_0_description_Chen, Z. et al. (2021, December 29). Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends. Retrieved July 31, 2023." "objects_1612_external_references_0_url_https://unit42.paloaltonetworks.com/strategically-aged-domain-detection/" "objects_1612_external_references_1_source_name_Data Driven Security DGA" "objects_1612_external_references_1_description_Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019." "objects_1612_external_references_1_url_https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/" "objects_1612_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1612_modified_2023-08-14T16:19:34.080Z" "objects_1612_description_Monitor for pseudo-randomly generated domain names based on frequency analysis, Markov chains, entropy, proportion of dictionary words, ratio of vowels to other characters, and more.(Citation: Data Driven Security DGA) Additionally, check if the suspicious domain has been recently registered, if it has been rarely visited, or if the domain had a spike in activity after being dormant.(Citation: unit42_strat_aged_domain_det) Content delivery network (CDN) domains may trigger these detections due to the format of their domain names." "objects_1612_relationship_type_detects" "objects_1612_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1612_target_ref_attack-pattern--2ccc3d39-9598-4d32-9657-42e1c7095d26" "objects_1612_x_mitre_deprecated_False" "objects_1612_x_mitre_version_0.1" "objects_1612_x_mitre_attack_spec_version_3.1.0" "objects_1612_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1612_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1612_spec_version_2.1" "objects_1612_x_mitre_domains_0_mobile-attack" "objects_1613_type_relationship" "objects_1613_id_relationship--dae02ffb-1db5-4b7d-80a9-2a8cbf1bc852" "objects_1613_created_2023-09-28T17:22:13.691Z" "objects_1613_revoked_False" "objects_1613_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1613_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1613_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1613_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1613_modified_2023-09-28T17:22:13.691Z" "objects_1613_description_[Escobar](https://attack.mitre.org/software/S1092) can collect sensitive information, such as Google Authenticator codes.(Citation: Bleeipng Computer Escobar)" "objects_1613_relationship_type_uses" "objects_1613_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1613_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1613_x_mitre_deprecated_False" "objects_1613_x_mitre_version_0.1" "objects_1613_x_mitre_attack_spec_version_3.2.0" "objects_1613_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1613_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1613_spec_version_2.1" "objects_1613_x_mitre_domains_0_mobile-attack" "objects_1614_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1614_id_relationship--db1201f0-f925-4c3c-8673-7524a8c20886" "objects_1614_type_relationship" "objects_1614_created_2021-02-17T20:43:52.274Z" "objects_1614_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1614_external_references_0_source_name_Lookout FrozenCell" "objects_1614_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1614_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1614_modified_2021-02-17T20:43:52.274Z" "objects_1614_description_[FrozenCell](https://attack.mitre.org/software/S0577) has recorded calls.(Citation: Lookout FrozenCell)" "objects_1614_relationship_type_uses" "objects_1614_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1614_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1614_x_mitre_version_1.0" "objects_1614_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1614_spec_version_2.1" "objects_1614_x_mitre_attack_spec_version_2.1.0" "objects_1614_x_mitre_domains_0_mobile-attack" "objects_1615_type_relationship" "objects_1615_id_relationship--db34a2c8-01e0-4cd3-a497-0f4bca36812a" "objects_1615_created_2020-01-27T17:05:58.265Z" "objects_1615_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1615_revoked_False" "objects_1615_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1615_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1615_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1615_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1615_modified_2023-04-05T17:27:51.998Z" "objects_1615_description_[GolfSpy](https://attack.mitre.org/software/S0421) can obtain the device\u2019s call log.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1615_relationship_type_uses" "objects_1615_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1615_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1615_x_mitre_deprecated_False" "objects_1615_x_mitre_version_1.0" "objects_1615_x_mitre_attack_spec_version_3.1.0" "objects_1615_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1615_spec_version_2.1" "objects_1615_x_mitre_domains_0_mobile-attack" "objects_1616_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1616_id_relationship--db3fc82d-d353-438d-aa5e-9b5e7e60f0ac" "objects_1616_type_relationship" "objects_1616_created_2017-12-14T16:46:06.044Z" "objects_1616_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1616_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1616_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1616_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1616_modified_2020-03-31T14:49:39.188Z" "objects_1616_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) checks if the device is on Wi-Fi, a cellular network, and is roaming.(Citation: Lookout-PegasusAndroid)" "objects_1616_relationship_type_uses" "objects_1616_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1616_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1616_x_mitre_version_1.0" "objects_1616_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1616_spec_version_2.1" "objects_1616_x_mitre_attack_spec_version_2.1.0" "objects_1616_x_mitre_domains_0_mobile-attack" "objects_1617_type_relationship" "objects_1617_id_relationship--dba7bd66-5f8e-41a8-ad67-ae04cfd1c8ff" "objects_1617_created_2023-09-21T22:31:55.337Z" "objects_1617_revoked_False" "objects_1617_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1617_modified_2023-09-21T22:31:55.337Z" "objects_1617_description_Application vetting services may be able to list domains and/or IP addresses that applications communicate with." "objects_1617_relationship_type_detects" "objects_1617_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1617_target_ref_attack-pattern--28fdd23d-aee3-4afe-bc3f-5f1f52929258" "objects_1617_x_mitre_deprecated_False" "objects_1617_x_mitre_version_0.1" "objects_1617_x_mitre_attack_spec_version_3.1.0" "objects_1617_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1617_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1617_spec_version_2.1" "objects_1617_x_mitre_domains_0_mobile-attack" "objects_1618_type_relationship" "objects_1618_id_relationship--dbef53a9-f9c4-4582-8e93-349ad488de12" "objects_1618_created_2023-02-28T21:42:06.525Z" "objects_1618_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1618_revoked_False" "objects_1618_external_references_0_source_name_cloudmark_tanglebot_0921" "objects_1618_external_references_0_description_Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023." "objects_1618_external_references_0_url_https://www.cloudmark.com/en/blog/malware/tanglebot-new-advanced-sms-malware-targets-mobile-users-across-us-and-canada-covid-19" "objects_1618_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1618_modified_2023-03-29T21:27:42.197Z" "objects_1618_description_[TangleBot](https://attack.mitre.org/software/S1069) can request permission to view call logs.(Citation: cloudmark_tanglebot_0921)" "objects_1618_relationship_type_uses" "objects_1618_source_ref_malware--68156e5a-4c3a-46dd-9c5e-c0bfdec6651f" "objects_1618_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1618_x_mitre_deprecated_False" "objects_1618_x_mitre_version_0.1" "objects_1618_x_mitre_attack_spec_version_3.1.0" "objects_1618_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1618_spec_version_2.1" "objects_1618_x_mitre_domains_0_mobile-attack" "objects_1619_type_relationship" "objects_1619_id_relationship--dbeff88d-441f-47f9-8afc-60400ee3ab97" "objects_1619_created_2023-02-06T19:06:37.359Z" "objects_1619_revoked_False" "objects_1619_external_references_0_source_name_lookout_abstractemu_1021" "objects_1619_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1619_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1619_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1619_modified_2023-02-06T19:06:37.359Z" "objects_1619_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can receive files from the C2 at runtime.(Citation: lookout_abstractemu_1021)" "objects_1619_relationship_type_uses" "objects_1619_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1619_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1619_x_mitre_deprecated_False" "objects_1619_x_mitre_version_0.1" "objects_1619_x_mitre_attack_spec_version_3.1.0" "objects_1619_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1619_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1619_spec_version_2.1" "objects_1619_x_mitre_domains_0_mobile-attack" "objects_1620_type_relationship" "objects_1620_id_relationship--dc354395-cccf-471a-9335-8538ce20f1ec" "objects_1620_created_2023-07-21T19:33:28.471Z" "objects_1620_revoked_False" "objects_1620_external_references_0_source_name_lookout_bouldspy_0423" "objects_1620_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1620_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1620_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1620_modified_2023-07-21T19:33:28.471Z" "objects_1620_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can exfiltrate SMS logs.(Citation: lookout_bouldspy_0423)" "objects_1620_relationship_type_uses" "objects_1620_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1620_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1620_x_mitre_deprecated_False" "objects_1620_x_mitre_version_0.1" "objects_1620_x_mitre_attack_spec_version_3.1.0" "objects_1620_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1620_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1620_spec_version_2.1" "objects_1620_x_mitre_domains_0_mobile-attack" "objects_1621_type_relationship" "objects_1621_id_relationship--dc6514a0-2e9c-4f29-8c15-99e6d382e357" "objects_1621_created_2019-07-10T15:25:57.572Z" "objects_1621_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1621_revoked_False" "objects_1621_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1621_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1621_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1621_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1621_modified_2023-04-05T20:31:46.913Z" "objects_1621_description_[FinFisher](https://attack.mitre.org/software/S0182) captures and exfiltrates SMS messages.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1621_relationship_type_uses" "objects_1621_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_1621_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1621_x_mitre_deprecated_False" "objects_1621_x_mitre_version_1.0" "objects_1621_x_mitre_attack_spec_version_3.1.0" "objects_1621_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1621_spec_version_2.1" "objects_1621_x_mitre_domains_0_mobile-attack" "objects_1622_type_relationship" "objects_1622_id_relationship--dc7ef843-a073-4e23-b717-c505d4863b02" "objects_1622_created_2023-03-20T18:53:58.856Z" "objects_1622_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1622_revoked_False" "objects_1622_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1622_modified_2023-08-14T16:27:15.979Z" "objects_1622_description_If the user sees a notification with text they do not recognize, they should review their list of installed applications." "objects_1622_relationship_type_detects" "objects_1622_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1622_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1622_x_mitre_deprecated_False" "objects_1622_x_mitre_version_0.1" "objects_1622_x_mitre_attack_spec_version_3.1.0" "objects_1622_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1622_spec_version_2.1" "objects_1622_x_mitre_domains_0_mobile-attack" "objects_1623_type_relationship" "objects_1623_id_relationship--dcae3b7c-27d2-4377-9dc6-59dae15ac962" "objects_1623_created_2019-09-23T13:36:08.456Z" "objects_1623_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1623_revoked_False" "objects_1623_external_references_0_source_name_securelist rotexy 2018" "objects_1623_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1623_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1623_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1623_modified_2023-04-05T16:58:03.072Z" "objects_1623_description_[Rotexy](https://attack.mitre.org/software/S0411) can lock an HTML page in the foreground, requiring the user enter credit card information that matches information previously intercepted in SMS messages, such as the last 4 digits of a credit card number. If attempts to revoke administrator permissions are detected, [Rotexy](https://attack.mitre.org/software/S0411) periodically switches off the phone screen to inhibit permission removal.(Citation: securelist rotexy 2018)" "objects_1623_relationship_type_uses" "objects_1623_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1623_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_1623_x_mitre_deprecated_False" "objects_1623_x_mitre_version_1.0" "objects_1623_x_mitre_attack_spec_version_3.1.0" "objects_1623_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1623_spec_version_2.1" "objects_1623_x_mitre_domains_0_mobile-attack" "objects_1624_type_relationship" "objects_1624_id_relationship--dcf01e96-1498-4ebf-b46f-d4f4eb796f23" "objects_1624_created_2023-07-21T19:37:42.022Z" "objects_1624_revoked_False" "objects_1624_external_references_0_source_name_lookout_bouldspy_0423" "objects_1624_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1624_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1624_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1624_modified_2023-07-21T19:37:42.022Z" "objects_1624_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can retrieve the list of installed applications.(Citation: lookout_bouldspy_0423)" "objects_1624_relationship_type_uses" "objects_1624_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1624_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1624_x_mitre_deprecated_False" "objects_1624_x_mitre_version_0.1" "objects_1624_x_mitre_attack_spec_version_3.1.0" "objects_1624_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1624_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1624_spec_version_2.1" "objects_1624_x_mitre_domains_0_mobile-attack" "objects_1625_type_relationship" "objects_1625_id_relationship--dd54e35c-d68b-4aa8-ad2a-acd4c76243c8" "objects_1625_created_2023-01-18T19:58:00.503Z" "objects_1625_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1625_revoked_False" "objects_1625_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1625_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1625_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1625_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1625_modified_2023-03-27T18:57:14.522Z" "objects_1625_description_[SharkBot](https://attack.mitre.org/software/S1055) can use RC4 to encrypt C2 payloads.(Citation: nccgroup_sharkbot_0322)" "objects_1625_relationship_type_uses" "objects_1625_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1625_target_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_1625_x_mitre_deprecated_False" "objects_1625_x_mitre_version_0.1" "objects_1625_x_mitre_attack_spec_version_3.1.0" "objects_1625_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1625_spec_version_2.1" "objects_1625_x_mitre_domains_0_mobile-attack" "objects_1626_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1626_type_relationship" "objects_1626_id_relationship--ddb5ba6d-0549-44bd-a669-972bd48e927b" "objects_1626_created_2020-07-15T20:20:59.307Z" "objects_1626_x_mitre_version_1.0" "objects_1626_external_references_0_source_name_Bitdefender Mandrake" "objects_1626_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1626_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1626_x_mitre_deprecated_False" "objects_1626_revoked_False" "objects_1626_description_[Mandrake](https://attack.mitre.org/software/S0485) has used domain generation algorithms.(Citation: Bitdefender Mandrake)" "objects_1626_modified_2022-04-12T10:01:44.682Z" "objects_1626_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1626_relationship_type_uses" "objects_1626_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1626_target_ref_attack-pattern--fd211238-f767-4599-8c0d-9dca36624626" "objects_1626_x_mitre_attack_spec_version_2.1.0" "objects_1626_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1626_spec_version_2.1" "objects_1626_x_mitre_domains_0_mobile-attack" "objects_1627_type_relationship" "objects_1627_id_relationship--ddca1254-b404-4850-9566-0be35c6d7564" "objects_1627_created_2020-11-10T17:08:35.771Z" "objects_1627_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1627_revoked_False" "objects_1627_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1627_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1627_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1627_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1627_modified_2023-04-05T17:00:11.412Z" "objects_1627_description_[CarbonSteal](https://attack.mitre.org/software/S0529) can access the device\u2019s SMS and MMS messages.(Citation: Lookout Uyghur Campaign)" "objects_1627_relationship_type_uses" "objects_1627_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1627_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1627_x_mitre_deprecated_False" "objects_1627_x_mitre_version_1.0" "objects_1627_x_mitre_attack_spec_version_3.1.0" "objects_1627_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1627_spec_version_2.1" "objects_1627_x_mitre_domains_0_mobile-attack" "objects_1628_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1628_type_relationship" "objects_1628_id_relationship--ddfc5d8c-750d-424a-88d9-acc99bc5f69e" "objects_1628_created_2022-03-30T19:29:07.379Z" "objects_1628_x_mitre_version_0.1" "objects_1628_x_mitre_deprecated_False" "objects_1628_revoked_False" "objects_1628_description_Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge." "objects_1628_modified_2022-03-30T19:29:07.379Z" "objects_1628_relationship_type_mitigates" "objects_1628_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1628_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1628_x_mitre_attack_spec_version_2.1.0" "objects_1628_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1628_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1628_spec_version_2.1" "objects_1628_x_mitre_domains_0_mobile-attack" "objects_1629_type_relationship" "objects_1629_id_relationship--de45db46-2251-4a29-b4d7-3fcf679e9484" "objects_1629_created_2019-09-04T15:38:56.877Z" "objects_1629_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1629_revoked_False" "objects_1629_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_1629_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1629_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1629_external_references_1_source_name_FlexiSpy-Features" "objects_1629_external_references_1_description_FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019." "objects_1629_external_references_1_url_https://www.flexispy.com/en/features-overview.htm" "objects_1629_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1629_modified_2023-04-05T20:32:16.401Z" "objects_1629_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can intercept SMS and MMS messages as well as monitor messages for keywords.(Citation: CyberMerchants-FlexiSpy)(Citation: FlexiSpy-Features)" "objects_1629_relationship_type_uses" "objects_1629_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1629_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1629_x_mitre_deprecated_False" "objects_1629_x_mitre_version_1.0" "objects_1629_x_mitre_attack_spec_version_3.1.0" "objects_1629_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1629_spec_version_2.1" "objects_1629_x_mitre_domains_0_mobile-attack" "objects_1630_type_relationship" "objects_1630_id_relationship--de4ecfa3-fa91-4377-810c-5c567de9688b" "objects_1630_created_2021-01-05T20:16:20.490Z" "objects_1630_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1630_revoked_False" "objects_1630_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1630_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1630_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1630_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1630_modified_2023-04-05T20:38:01.842Z" "objects_1630_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can delete attacker-specified files.(Citation: Zscaler TikTok Spyware)" "objects_1630_relationship_type_uses" "objects_1630_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1630_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1630_x_mitre_deprecated_False" "objects_1630_x_mitre_version_1.0" "objects_1630_x_mitre_attack_spec_version_3.1.0" "objects_1630_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1630_spec_version_2.1" "objects_1630_x_mitre_domains_0_mobile-attack" "objects_1631_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1631_type_relationship" "objects_1631_id_relationship--de69fd86-aaef-4a1e-99e9-ee32c71997d6" "objects_1631_created_2022-04-05T19:54:12.660Z" "objects_1631_x_mitre_version_0.1" "objects_1631_x_mitre_deprecated_False" "objects_1631_revoked_False" "objects_1631_description_" "objects_1631_modified_2022-04-05T19:54:12.660Z" "objects_1631_relationship_type_revoked-by" "objects_1631_source_ref_attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5" "objects_1631_target_ref_attack-pattern--0f4fb01b-d57a-4375-b7a2-342c9d3248f7" "objects_1631_x_mitre_attack_spec_version_2.1.0" "objects_1631_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1631_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1631_spec_version_2.1" "objects_1631_x_mitre_domains_0_mobile-attack" "objects_1632_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1632_type_relationship" "objects_1632_id_relationship--de7e3a71-1152-481c-8e5c-88f53852cab6" "objects_1632_created_2022-04-01T15:16:53.239Z" "objects_1632_x_mitre_version_0.1" "objects_1632_x_mitre_deprecated_False" "objects_1632_revoked_False" "objects_1632_description_" "objects_1632_modified_2022-04-01T15:16:53.239Z" "objects_1632_relationship_type_subtechnique-of" "objects_1632_source_ref_attack-pattern--789ef15a-34d9-4b32-a779-8cbbc9eb32f5" "objects_1632_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_1632_x_mitre_attack_spec_version_2.1.0" "objects_1632_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1632_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1632_spec_version_2.1" "objects_1632_x_mitre_domains_0_mobile-attack" "objects_1633_type_relationship" "objects_1633_id_relationship--def81edd-4410-47b2-a80f-d47b3f353f54" "objects_1633_created_2023-03-16T18:27:42.656Z" "objects_1633_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1633_revoked_False" "objects_1633_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1633_modified_2023-08-08T14:59:40.699Z" "objects_1633_description_Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. " "objects_1633_relationship_type_detects" "objects_1633_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1633_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1633_x_mitre_deprecated_False" "objects_1633_x_mitre_version_0.1" "objects_1633_x_mitre_attack_spec_version_3.1.0" "objects_1633_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1633_spec_version_2.1" "objects_1633_x_mitre_domains_0_mobile-attack" "objects_1634_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1634_type_relationship" "objects_1634_id_relationship--df036f55-f749-4dad-9473-d69535e0f98d" "objects_1634_created_2020-06-26T14:55:13.385Z" "objects_1634_x_mitre_version_1.0" "objects_1634_external_references_0_source_name_Cybereason EventBot" "objects_1634_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1634_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1634_x_mitre_deprecated_False" "objects_1634_revoked_False" "objects_1634_description_[EventBot](https://attack.mitre.org/software/S0478) can abuse Android\u2019s accessibility service to record the screen PIN.(Citation: Cybereason EventBot)" "objects_1634_modified_2022-04-15T17:39:39.931Z" "objects_1634_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1634_relationship_type_uses" "objects_1634_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1634_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1634_x_mitre_attack_spec_version_2.1.0" "objects_1634_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1634_spec_version_2.1" "objects_1634_x_mitre_domains_0_mobile-attack" "objects_1635_type_relationship" "objects_1635_id_relationship--df07166f-917e-4bc4-899e-d689d1d3f785" "objects_1635_created_2023-10-10T15:33:58.104Z" "objects_1635_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1635_revoked_False" "objects_1635_external_references_0_source_name_CheckPoint Agent Smith" "objects_1635_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1635_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1635_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1635_modified_2023-10-10T15:33:58.104Z" "objects_1635_description_[Agent Smith](https://attack.mitre.org/software/S0440) can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. [Agent Smith](https://attack.mitre.org/software/S0440)'s dropper is a weaponized legitimate Feng Shui Bundle.(Citation: CheckPoint Agent Smith) " "objects_1635_relationship_type_uses" "objects_1635_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1635_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1635_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1635_x_mitre_deprecated_False" "objects_1635_x_mitre_version_1.0" "objects_1635_x_mitre_attack_spec_version_2.1.0" "objects_1635_spec_version_2.1" "objects_1635_x_mitre_domains_0_mobile-attack" "objects_1636_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1636_id_relationship--df337ad4-c88e-425f-b869-ecac29674bf4" "objects_1636_type_relationship" "objects_1636_created_2021-03-25T16:39:40.200Z" "objects_1636_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1636_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1636_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1636_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1636_modified_2021-03-25T16:39:40.200Z" "objects_1636_description_(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1636_relationship_type_uses" "objects_1636_source_ref_intrusion-set--381fcf73-60f6-4ab2-9991-6af3cbc35192" "objects_1636_target_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1636_x_mitre_version_1.0" "objects_1636_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1636_spec_version_2.1" "objects_1636_x_mitre_attack_spec_version_2.1.0" "objects_1636_x_mitre_domains_0_mobile-attack" "objects_1637_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1637_id_relationship--dfe6d454-1a24-4c42-97eb-4ddfd1dbb09b" "objects_1637_type_relationship" "objects_1637_created_2018-10-17T00:14:20.652Z" "objects_1637_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1637_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_1637_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_1637_external_references_0_source_name_Kaspersky-Skygofree" "objects_1637_modified_2020-03-31T14:49:39.188Z" "objects_1637_description_[Skygofree](https://attack.mitre.org/software/S0327) has the capability to exploit several known vulnerabilities and escalate privileges.(Citation: Kaspersky-Skygofree)" "objects_1637_relationship_type_uses" "objects_1637_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_1637_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1637_x_mitre_version_1.0" "objects_1637_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1637_spec_version_2.1" "objects_1637_x_mitre_attack_spec_version_2.1.0" "objects_1637_x_mitre_domains_0_mobile-attack" "objects_1638_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1638_type_relationship" "objects_1638_id_relationship--dff37d8a-b7ca-409b-b4eb-581ca3a74bb5" "objects_1638_created_2020-04-08T15:41:19.445Z" "objects_1638_x_mitre_version_1.0" "objects_1638_external_references_0_source_name_Trend Micro Anubis" "objects_1638_external_references_0_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_1638_external_references_0_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_1638_external_references_1_source_name_Cofense Anubis" "objects_1638_external_references_1_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1638_external_references_1_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1638_x_mitre_deprecated_False" "objects_1638_revoked_False" "objects_1638_description_[Anubis](https://attack.mitre.org/software/S0422) can retrieve the C2 address from Twitter and Telegram.(Citation: Cofense Anubis)(Citation: Trend Micro Anubis)" "objects_1638_modified_2022-04-20T17:57:23.327Z" "objects_1638_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1638_relationship_type_uses" "objects_1638_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1638_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_1638_x_mitre_attack_spec_version_2.1.0" "objects_1638_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1638_spec_version_2.1" "objects_1638_x_mitre_domains_0_mobile-attack" "objects_1639_type_relationship" "objects_1639_id_relationship--e0121f6c-0312-4fff-9d6c-0a8aea945bea" "objects_1639_created_2023-02-06T19:45:58.793Z" "objects_1639_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1639_revoked_False" "objects_1639_external_references_0_source_name_threatfabric_sova_0921" "objects_1639_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1639_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1639_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1639_modified_2023-04-11T22:08:45.192Z" "objects_1639_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) can use the open-source project RetroFit for C2 communication.(Citation: threatfabric_sova_0921)" "objects_1639_relationship_type_uses" "objects_1639_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1639_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1639_x_mitre_deprecated_False" "objects_1639_x_mitre_version_0.1" "objects_1639_x_mitre_attack_spec_version_3.1.0" "objects_1639_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1639_spec_version_2.1" "objects_1639_x_mitre_domains_0_mobile-attack" "objects_1640_type_relationship" "objects_1640_id_relationship--e012da15-7669-4764-ad9d-8a1d817bcca9" "objects_1640_created_2023-03-20T18:23:04.068Z" "objects_1640_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1640_revoked_False" "objects_1640_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1640_modified_2023-08-08T16:22:19.012Z" "objects_1640_description_Application vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities)." "objects_1640_relationship_type_detects" "objects_1640_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1640_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1640_x_mitre_deprecated_False" "objects_1640_x_mitre_version_0.1" "objects_1640_x_mitre_attack_spec_version_3.1.0" "objects_1640_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1640_spec_version_2.1" "objects_1640_x_mitre_domains_0_mobile-attack" "objects_1641_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1641_id_relationship--e03b0eb5-32c6-4867-9235-77fe32192983" "objects_1641_type_relationship" "objects_1641_created_2019-09-04T15:38:56.916Z" "objects_1641_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1641_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_1641_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1641_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1641_modified_2020-03-31T14:49:39.188Z" "objects_1641_description_ [FlexiSpy](https://attack.mitre.org/software/S0408) can track the device's location.(Citation: CyberMerchants-FlexiSpy)" "objects_1641_relationship_type_uses" "objects_1641_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1641_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1641_x_mitre_version_1.0" "objects_1641_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1641_spec_version_2.1" "objects_1641_x_mitre_attack_spec_version_2.1.0" "objects_1641_x_mitre_domains_0_mobile-attack" "objects_1642_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1642_id_relationship--e03b25b0-0779-48da-b5d7-28f1f6106363" "objects_1642_type_relationship" "objects_1642_created_2020-12-24T22:04:27.992Z" "objects_1642_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1642_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1642_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1642_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1642_modified_2020-12-24T22:04:27.992Z" "objects_1642_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has taken screenshots.(Citation: Lookout Uyghur Campaign)" "objects_1642_relationship_type_uses" "objects_1642_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1642_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1642_x_mitre_version_1.0" "objects_1642_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1642_spec_version_2.1" "objects_1642_x_mitre_attack_spec_version_2.1.0" "objects_1642_x_mitre_domains_0_mobile-attack" "objects_1643_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1643_id_relationship--e05b61a4-ba8a-4aa5-813b-ad76de5945a8" "objects_1643_type_relationship" "objects_1643_created_2020-09-24T15:34:51.433Z" "objects_1643_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1643_external_references_0_source_name_Lookout-Dendroid" "objects_1643_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1643_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1643_modified_2020-09-24T15:34:51.433Z" "objects_1643_description_[Dendroid](https://attack.mitre.org/software/S0301) can record audio and outgoing calls.(Citation: Lookout-Dendroid)" "objects_1643_relationship_type_uses" "objects_1643_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1643_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1643_x_mitre_version_1.0" "objects_1643_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1643_spec_version_2.1" "objects_1643_x_mitre_attack_spec_version_2.1.0" "objects_1643_x_mitre_domains_0_mobile-attack" "objects_1644_type_relationship" "objects_1644_id_relationship--e0c3afc8-4b23-45fc-89cf-2cafbb51291e" "objects_1644_created_2023-03-03T16:25:52.931Z" "objects_1644_revoked_False" "objects_1644_external_references_0_source_name_paloalto_yispecter_1015" "objects_1644_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1644_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1644_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1644_modified_2023-03-03T16:25:52.931Z" "objects_1644_description_[YiSpecter](https://attack.mitre.org/software/S0311) has collected information about installed applications.(Citation: paloalto_yispecter_1015)" "objects_1644_relationship_type_uses" "objects_1644_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1644_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1644_x_mitre_deprecated_False" "objects_1644_x_mitre_version_0.1" "objects_1644_x_mitre_attack_spec_version_3.1.0" "objects_1644_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1644_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1644_spec_version_2.1" "objects_1644_x_mitre_domains_0_mobile-attack" "objects_1645_type_relationship" "objects_1645_id_relationship--e0ebf0cd-9244-4cef-9171-128a12b87b58" "objects_1645_created_2017-12-14T16:46:06.044Z" "objects_1645_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1645_revoked_False" "objects_1645_external_references_0_source_name_Zscaler-SpyNote" "objects_1645_external_references_0_description_Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017." "objects_1645_external_references_0_url_https://www.zscaler.com/blogs/research/spynote-rat-posing-netflix-app" "objects_1645_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1645_modified_2023-04-05T20:32:29.636Z" "objects_1645_description_[SpyNote RAT](https://attack.mitre.org/software/S0305) can read SMS messages.(Citation: Zscaler-SpyNote)" "objects_1645_relationship_type_uses" "objects_1645_source_ref_malware--20dbaf05-59b8-4dc6-8777-0b17f4553a23" "objects_1645_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1645_x_mitre_deprecated_False" "objects_1645_x_mitre_version_1.0" "objects_1645_x_mitre_attack_spec_version_3.1.0" "objects_1645_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1645_spec_version_2.1" "objects_1645_x_mitre_domains_0_mobile-attack" "objects_1646_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1646_id_relationship--e0f58ab7-b246-4c41-9afc-89b582590809" "objects_1646_type_relationship" "objects_1646_created_2020-12-18T20:14:47.374Z" "objects_1646_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1646_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1646_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1646_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1646_modified_2020-12-18T20:14:47.374Z" "objects_1646_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) can download additional modules at runtime via JavaScript `eval` statements.(Citation: WhiteOps TERRACOTTA)" "objects_1646_relationship_type_uses" "objects_1646_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1646_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1646_x_mitre_version_1.0" "objects_1646_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1646_spec_version_2.1" "objects_1646_x_mitre_attack_spec_version_2.1.0" "objects_1646_x_mitre_domains_0_mobile-attack" "objects_1647_type_relationship" "objects_1647_id_relationship--e135cefa-f019-479d-86eb-438972df73e0" "objects_1647_created_2019-09-04T15:38:56.702Z" "objects_1647_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1647_revoked_False" "objects_1647_external_references_0_source_name_FortiGuard-FlexiSpy" "objects_1647_external_references_0_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1647_external_references_0_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1647_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1647_modified_2023-04-05T20:48:30.652Z" "objects_1647_description_[FlexiSpy](https://attack.mitre.org/software/S0408) installs boot hooks into `/system/su.d`.(Citation: FortiGuard-FlexiSpy)" "objects_1647_relationship_type_uses" "objects_1647_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1647_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_1647_x_mitre_deprecated_False" "objects_1647_x_mitre_version_1.0" "objects_1647_x_mitre_attack_spec_version_3.1.0" "objects_1647_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1647_spec_version_2.1" "objects_1647_x_mitre_domains_0_mobile-attack" "objects_1648_type_relationship" "objects_1648_id_relationship--e14db7d0-4053-4e0a-8b43-b950133e6e36" "objects_1648_created_2023-03-20T18:41:31.300Z" "objects_1648_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1648_revoked_False" "objects_1648_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1648_modified_2023-08-07T22:18:26.965Z" "objects_1648_description_Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells." "objects_1648_relationship_type_detects" "objects_1648_source_ref_x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1" "objects_1648_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_1648_x_mitre_deprecated_False" "objects_1648_x_mitre_version_0.1" "objects_1648_x_mitre_attack_spec_version_3.1.0" "objects_1648_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1648_spec_version_2.1" "objects_1648_x_mitre_domains_0_mobile-attack" "objects_1649_type_relationship" "objects_1649_id_relationship--e245ad04-3fe9-4132-8bb4-77cdc4c3a1eb" "objects_1649_created_2023-10-10T15:33:58.272Z" "objects_1649_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1649_revoked_False" "objects_1649_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1649_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1649_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1649_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1649_modified_2023-10-10T15:33:58.272Z" "objects_1649_description_[XLoader for Android](https://attack.mitre.org/software/S0318) has masqueraded as an Android security application.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1649_relationship_type_uses" "objects_1649_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1649_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1649_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1649_x_mitre_deprecated_False" "objects_1649_x_mitre_version_1.0" "objects_1649_x_mitre_attack_spec_version_2.1.0" "objects_1649_spec_version_2.1" "objects_1649_x_mitre_domains_0_mobile-attack" "objects_1650_type_relationship" "objects_1650_id_relationship--e245e45a-71a8-408d-8f32-7b7337bffc26" "objects_1650_created_2023-01-18T19:19:58.007Z" "objects_1650_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1650_revoked_False" "objects_1650_external_references_0_source_name_cyble_drinik_1022" "objects_1650_external_references_0_description_Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023." "objects_1650_external_references_0_url_https://blog.cyble.com/2022/10/27/drinik-malware-returns-with-advanced-capabilities-targeting-indian-taxpayers/" "objects_1650_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1650_modified_2023-03-27T18:10:23.208Z" "objects_1650_description_[Drinik](https://attack.mitre.org/software/S1054) can hide its application icon.(Citation: cyble_drinik_1022)" "objects_1650_relationship_type_uses" "objects_1650_source_ref_malware--d6e009b7-df5e-447a-bfd2-d5b77374edfe" "objects_1650_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1650_x_mitre_deprecated_False" "objects_1650_x_mitre_version_0.1" "objects_1650_x_mitre_attack_spec_version_3.1.0" "objects_1650_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1650_spec_version_2.1" "objects_1650_x_mitre_domains_0_mobile-attack" "objects_1651_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1651_id_relationship--e269e6a2-a709-4aa1-a260-f3f0d0284056" "objects_1651_type_relationship" "objects_1651_created_2020-12-24T22:04:27.919Z" "objects_1651_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1651_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1651_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1651_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1651_modified_2020-12-24T22:04:27.919Z" "objects_1651_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has extracted messages from chat programs, such as WeChat.(Citation: Lookout Uyghur Campaign)" "objects_1651_relationship_type_uses" "objects_1651_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1651_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1651_x_mitre_version_1.0" "objects_1651_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1651_spec_version_2.1" "objects_1651_x_mitre_attack_spec_version_2.1.0" "objects_1651_x_mitre_domains_0_mobile-attack" "objects_1652_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1652_id_relationship--e29d91f0-ebee-481d-9344-702c90775109" "objects_1652_type_relationship" "objects_1652_created_2020-05-07T15:33:32.928Z" "objects_1652_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1652_external_references_0_source_name_CheckPoint Agent Smith" "objects_1652_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1652_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1652_modified_2020-05-07T15:33:32.928Z" "objects_1652_description_[Agent Smith](https://attack.mitre.org/software/S0440) can inject fraudulent ad modules into existing applications on a device.(Citation: CheckPoint Agent Smith)" "objects_1652_relationship_type_uses" "objects_1652_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1652_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_1652_x_mitre_version_1.0" "objects_1652_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1652_spec_version_2.1" "objects_1652_x_mitre_attack_spec_version_2.1.0" "objects_1652_x_mitre_domains_0_mobile-attack" "objects_1653_type_relationship" "objects_1653_id_relationship--e2ee6825-43c2-441f-ba96-404a330a9059" "objects_1653_created_2017-12-14T16:46:06.044Z" "objects_1653_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1653_revoked_False" "objects_1653_external_references_0_source_name_CheckPoint-Charger" "objects_1653_external_references_0_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_1653_external_references_0_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_1653_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1653_modified_2023-04-05T19:54:51.590Z" "objects_1653_description_[Charger](https://attack.mitre.org/software/S0323) steals contacts from the victim user's device.(Citation: CheckPoint-Charger)" "objects_1653_relationship_type_uses" "objects_1653_source_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_1653_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1653_x_mitre_deprecated_False" "objects_1653_x_mitre_version_1.0" "objects_1653_x_mitre_attack_spec_version_3.1.0" "objects_1653_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1653_spec_version_2.1" "objects_1653_x_mitre_domains_0_mobile-attack" "objects_1654_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1654_type_relationship" "objects_1654_id_relationship--e33106e1-16ef-41b8-8d47-78c9f2b4dceb" "objects_1654_created_2020-11-10T17:08:35.846Z" "objects_1654_x_mitre_version_1.0" "objects_1654_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1654_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1654_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1654_x_mitre_deprecated_False" "objects_1654_revoked_False" "objects_1654_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has used specially crafted SMS messages to control the target device.(Citation: Lookout Uyghur Campaign) " "objects_1654_modified_2022-04-19T14:25:41.669Z" "objects_1654_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1654_relationship_type_uses" "objects_1654_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1654_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1654_x_mitre_attack_spec_version_2.1.0" "objects_1654_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1654_spec_version_2.1" "objects_1654_x_mitre_domains_0_mobile-attack" "objects_1655_type_relationship" "objects_1655_id_relationship--e34c8c23-be8f-4da9-b051-5246e5f16ba8" "objects_1655_created_2023-03-01T22:18:19.004Z" "objects_1655_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1655_revoked_False" "objects_1655_external_references_0_source_name_proofpoint_flubot_0421" "objects_1655_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1655_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1655_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1655_modified_2023-03-31T22:14:48.174Z" "objects_1655_description_[FluBot](https://attack.mitre.org/software/S1067) can send contact lists to its C2 server.(Citation: proofpoint_flubot_0421)" "objects_1655_relationship_type_uses" "objects_1655_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1655_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1655_x_mitre_deprecated_False" "objects_1655_x_mitre_version_0.1" "objects_1655_x_mitre_attack_spec_version_3.1.0" "objects_1655_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1655_spec_version_2.1" "objects_1655_x_mitre_domains_0_mobile-attack" "objects_1656_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1656_id_relationship--e35b013b-89e8-41b3-a518-7737234ab71b" "objects_1656_type_relationship" "objects_1656_created_2020-01-27T17:05:58.312Z" "objects_1656_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1656_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1656_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1656_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1656_modified_2020-01-27T17:05:58.312Z" "objects_1656_description_[GolfSpy](https://attack.mitre.org/software/S0421) can take screenshots.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1656_relationship_type_uses" "objects_1656_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1656_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1656_x_mitre_version_1.0" "objects_1656_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1656_spec_version_2.1" "objects_1656_x_mitre_attack_spec_version_2.1.0" "objects_1656_x_mitre_domains_0_mobile-attack" "objects_1657_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1657_id_relationship--e3a961ec-8184-4143-b8c2-c33ea0503678" "objects_1657_type_relationship" "objects_1657_created_2020-09-24T15:34:51.315Z" "objects_1657_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1657_external_references_0_source_name_Lookout-Dendroid" "objects_1657_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1657_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1657_modified_2020-09-24T15:34:51.315Z" "objects_1657_description_[Dendroid](https://attack.mitre.org/software/S0301) can take photos and record videos.(Citation: Lookout-Dendroid)" "objects_1657_relationship_type_uses" "objects_1657_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1657_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1657_x_mitre_version_1.0" "objects_1657_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1657_spec_version_2.1" "objects_1657_x_mitre_attack_spec_version_2.1.0" "objects_1657_x_mitre_domains_0_mobile-attack" "objects_1658_type_relationship" "objects_1658_id_relationship--e3d04885-95a5-47cb-a038-b58542cf787d" "objects_1658_created_2019-09-03T19:45:48.487Z" "objects_1658_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1658_revoked_False" "objects_1658_external_references_0_source_name_SWB Exodus March 2019" "objects_1658_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1658_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1658_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1658_modified_2023-04-05T17:08:39.524Z" "objects_1658_description_[Exodus](https://attack.mitre.org/software/S0405) Two can exfiltrate the call log.(Citation: SWB Exodus March 2019) " "objects_1658_relationship_type_uses" "objects_1658_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1658_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1658_x_mitre_deprecated_False" "objects_1658_x_mitre_version_1.0" "objects_1658_x_mitre_attack_spec_version_3.1.0" "objects_1658_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1658_spec_version_2.1" "objects_1658_x_mitre_domains_0_mobile-attack" "objects_1659_type_relationship" "objects_1659_id_relationship--e4019493-bd52-4011-9355-8902be6ff3f3" "objects_1659_created_2018-10-17T00:14:20.652Z" "objects_1659_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1659_revoked_False" "objects_1659_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1659_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1659_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1659_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1659_modified_2023-04-05T17:49:19.083Z" "objects_1659_description_[SpyDealer](https://attack.mitre.org/software/S0324) registers the broadcast receiver to listen for events related to device boot-up.(Citation: PaloAlto-SpyDealer)" "objects_1659_relationship_type_uses" "objects_1659_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1659_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1659_x_mitre_deprecated_False" "objects_1659_x_mitre_version_1.0" "objects_1659_x_mitre_attack_spec_version_3.1.0" "objects_1659_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1659_spec_version_2.1" "objects_1659_x_mitre_domains_0_mobile-attack" "objects_1660_type_relationship" "objects_1660_id_relationship--e457921c-4a0b-4d6e-92e7-553929ddf943" "objects_1660_created_2023-02-06T18:51:14.919Z" "objects_1660_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1660_revoked_False" "objects_1660_external_references_0_source_name_lookout_abstractemu_1021" "objects_1660_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1660_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1660_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1660_modified_2023-03-27T17:23:48.120Z" "objects_1660_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can download and install additional malware after initial infection.(Citation: lookout_abstractemu_1021)" "objects_1660_relationship_type_uses" "objects_1660_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1660_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1660_x_mitre_deprecated_False" "objects_1660_x_mitre_version_0.1" "objects_1660_x_mitre_attack_spec_version_3.1.0" "objects_1660_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1660_spec_version_2.1" "objects_1660_x_mitre_domains_0_mobile-attack" "objects_1661_type_relationship" "objects_1661_id_relationship--e4beccfa-a9a5-447d-8164-d39a1b2c5532" "objects_1661_created_2023-02-06T19:46:43.041Z" "objects_1661_revoked_False" "objects_1661_external_references_0_source_name_threatfabric_sova_0921" "objects_1661_external_references_0_description_ThreatFabric. (2021, September 9). S.O.V.A. - A new Android Banking trojan with fowl intentions. Retrieved February 6, 2023." "objects_1661_external_references_0_url_https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions.html" "objects_1661_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1661_modified_2023-02-06T19:46:43.041Z" "objects_1661_description_[S.O.V.A.](https://attack.mitre.org/software/S1062) has included adversary-in-the-middle capabilities.(Citation: threatfabric_sova_0921)" "objects_1661_relationship_type_uses" "objects_1661_source_ref_malware--4b53eb01-57d7-47b4-b078-22766b002b36" "objects_1661_target_ref_attack-pattern--08e22979-d320-48ed-8711-e7bf94aabb13" "objects_1661_x_mitre_deprecated_False" "objects_1661_x_mitre_version_0.1" "objects_1661_x_mitre_attack_spec_version_3.1.0" "objects_1661_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1661_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1661_spec_version_2.1" "objects_1661_x_mitre_domains_0_mobile-attack" "objects_1662_type_relationship" "objects_1662_id_relationship--e4f90a20-f1c6-4820-8c3e-751c79cc82e8" "objects_1662_created_2023-03-20T18:56:24.246Z" "objects_1662_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1662_revoked_False" "objects_1662_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1662_modified_2023-08-09T15:54:20.664Z" "objects_1662_description_Application vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. " "objects_1662_relationship_type_detects" "objects_1662_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1662_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1662_x_mitre_deprecated_False" "objects_1662_x_mitre_version_0.1" "objects_1662_x_mitre_attack_spec_version_3.1.0" "objects_1662_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1662_spec_version_2.1" "objects_1662_x_mitre_domains_0_mobile-attack" "objects_1663_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1663_type_relationship" "objects_1663_id_relationship--e5113d45-05bd-499f-a2e0-9edc6d7c03b6" "objects_1663_created_2020-09-14T13:35:45.911Z" "objects_1663_x_mitre_version_1.0" "objects_1663_external_references_0_source_name_ESET-Twitoor" "objects_1663_external_references_0_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_1663_external_references_0_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_1663_x_mitre_deprecated_False" "objects_1663_revoked_False" "objects_1663_description_[Twitoor](https://attack.mitre.org/software/S0302) can be controlled via Twitter.(Citation: ESET-Twitoor)" "objects_1663_modified_2022-04-20T17:56:24.292Z" "objects_1663_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1663_relationship_type_uses" "objects_1663_source_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_1663_target_ref_attack-pattern--d916f176-a1ca-4a78-9fdd-4058bc28162e" "objects_1663_x_mitre_attack_spec_version_2.1.0" "objects_1663_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1663_spec_version_2.1" "objects_1663_x_mitre_domains_0_mobile-attack" "objects_1664_type_relationship" "objects_1664_id_relationship--e5ccc5c7-11ee-4357-8dd4-bf23ce2111bb" "objects_1664_created_2020-12-24T22:04:28.024Z" "objects_1664_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1664_revoked_False" "objects_1664_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1664_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1664_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1664_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1664_modified_2023-04-05T17:41:54.548Z" "objects_1664_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has collected call logs.(Citation: Lookout Uyghur Campaign)" "objects_1664_relationship_type_uses" "objects_1664_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1664_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1664_x_mitre_deprecated_False" "objects_1664_x_mitre_version_1.0" "objects_1664_x_mitre_attack_spec_version_3.1.0" "objects_1664_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1664_spec_version_2.1" "objects_1664_x_mitre_domains_0_mobile-attack" "objects_1665_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1665_id_relationship--e5e4567e-05a3-4d79-beab-191efc336473" "objects_1665_type_relationship" "objects_1665_created_2020-01-27T17:05:58.333Z" "objects_1665_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1665_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1665_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1665_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1665_modified_2020-03-26T20:50:07.266Z" "objects_1665_description_[GolfSpy](https://attack.mitre.org/software/S0421) encrypts data using a simple XOR operation with a pre-configured key prior to exfiltration.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1665_relationship_type_uses" "objects_1665_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1665_target_ref_attack-pattern--e3b936a4-6321-4172-9114-038a866362ec" "objects_1665_x_mitre_version_1.0" "objects_1665_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1665_spec_version_2.1" "objects_1665_x_mitre_attack_spec_version_2.1.0" "objects_1665_x_mitre_domains_0_mobile-attack" "objects_1666_type_relationship" "objects_1666_id_relationship--e723d78f-b6c3-4ba5-8946-b44e651834e3" "objects_1666_created_2023-03-16T13:32:02.290Z" "objects_1666_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1666_revoked_False" "objects_1666_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1666_modified_2023-08-10T21:06:58.988Z" "objects_1666_description_Android applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized.\n\nIn both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. " "objects_1666_relationship_type_detects" "objects_1666_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1666_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1666_x_mitre_deprecated_False" "objects_1666_x_mitre_version_0.1" "objects_1666_x_mitre_attack_spec_version_3.1.0" "objects_1666_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1666_spec_version_2.1" "objects_1666_x_mitre_domains_0_mobile-attack" "objects_1667_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1667_type_relationship" "objects_1667_id_relationship--e75c623a-f9ac-4f46-b093-dd0e40b50cc6" "objects_1667_created_2018-10-17T00:14:20.652Z" "objects_1667_x_mitre_version_1.0" "objects_1667_external_references_0_source_name_Proofpoint-Marcher" "objects_1667_external_references_0_url_https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks" "objects_1667_external_references_0_description_Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018." "objects_1667_x_mitre_deprecated_False" "objects_1667_revoked_False" "objects_1667_description_[Marcher](https://attack.mitre.org/software/S0317) attempts to overlay itself on top of legitimate banking apps in an effort to capture user credentials. [Marcher](https://attack.mitre.org/software/S0317) also attempts to overlay itself on top of legitimate apps such as the Google Play Store in an effort to capture user credit card information.(Citation: Proofpoint-Marcher)" "objects_1667_modified_2022-04-12T10:01:44.682Z" "objects_1667_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1667_relationship_type_uses" "objects_1667_source_ref_malware--f9854ba6-989d-43bf-828b-7240b8a65291" "objects_1667_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1667_x_mitre_attack_spec_version_2.1.0" "objects_1667_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1667_spec_version_2.1" "objects_1667_x_mitre_domains_0_mobile-attack" "objects_1668_type_relationship" "objects_1668_id_relationship--e767fc9e-5211-4e7c-b628-5dd03a24af39" "objects_1668_created_2020-12-14T15:02:35.294Z" "objects_1668_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1668_revoked_False" "objects_1668_external_references_0_source_name_Securelist Asacub" "objects_1668_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1668_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1668_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1668_modified_2023-04-05T20:32:42.890Z" "objects_1668_description_[Asacub](https://attack.mitre.org/software/S0540) can collect SMS messages as they are received.(Citation: Securelist Asacub)" "objects_1668_relationship_type_uses" "objects_1668_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1668_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1668_x_mitre_deprecated_False" "objects_1668_x_mitre_version_1.0" "objects_1668_x_mitre_attack_spec_version_3.1.0" "objects_1668_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1668_spec_version_2.1" "objects_1668_x_mitre_domains_0_mobile-attack" "objects_1669_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1669_id_relationship--e78b2cd9-ef73-45d9-9477-e2e95454e208" "objects_1669_type_relationship" "objects_1669_created_2020-07-20T13:27:33.546Z" "objects_1669_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1669_external_references_0_source_name_Talos-WolfRAT" "objects_1669_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_1669_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_1669_modified_2020-08-10T21:57:54.537Z" "objects_1669_description_[WolfRAT](https://attack.mitre.org/software/S0489) can receive system notifications.(Citation: Talos-WolfRAT)" "objects_1669_relationship_type_uses" "objects_1669_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_1669_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1669_x_mitre_version_1.0" "objects_1669_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1669_spec_version_2.1" "objects_1669_x_mitre_attack_spec_version_2.1.0" "objects_1669_x_mitre_domains_0_mobile-attack" "objects_1670_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1670_id_relationship--e7af5be1-721f-40c5-b647-659243a0a14b" "objects_1670_type_relationship" "objects_1670_created_2020-04-08T15:41:19.321Z" "objects_1670_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1670_external_references_0_source_name_Cofense Anubis" "objects_1670_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1670_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1670_modified_2021-09-20T13:50:02.057Z" "objects_1670_description_[Anubis](https://attack.mitre.org/software/S0422) can record phone calls and audio.(Citation: Cofense Anubis)" "objects_1670_relationship_type_uses" "objects_1670_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1670_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1670_x_mitre_version_1.0" "objects_1670_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1670_spec_version_2.1" "objects_1670_x_mitre_attack_spec_version_2.1.0" "objects_1670_x_mitre_domains_0_mobile-attack" "objects_1671_type_relationship" "objects_1671_id_relationship--e7b33eb5-6c2e-4743-ac8d-c27d5e7121ac" "objects_1671_created_2020-06-26T15:32:25.060Z" "objects_1671_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1671_revoked_False" "objects_1671_external_references_0_source_name_Threat Fabric Cerberus" "objects_1671_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1671_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1671_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1671_modified_2023-04-05T20:35:13.005Z" "objects_1671_description_[Cerberus](https://attack.mitre.org/software/S0480) can uninstall itself from a device on command.(Citation: Threat Fabric Cerberus)" "objects_1671_relationship_type_uses" "objects_1671_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1671_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_1671_x_mitre_deprecated_False" "objects_1671_x_mitre_version_1.0" "objects_1671_x_mitre_attack_spec_version_3.1.0" "objects_1671_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1671_spec_version_2.1" "objects_1671_x_mitre_domains_0_mobile-attack" "objects_1672_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1672_id_relationship--e7b7e813-4867-46fe-bf86-6f367553d765" "objects_1672_type_relationship" "objects_1672_created_2019-11-21T16:42:48.456Z" "objects_1672_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1672_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1672_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1672_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1672_external_references_1_source_name_Bitdefender - Triout 2018" "objects_1672_external_references_1_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_1672_external_references_1_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_1672_modified_2020-01-21T14:20:50.455Z" "objects_1672_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can copy arbitrary files from the device to the C2 server, can exfiltrate browsing history, can exfiltrate the SD card structure, and can exfiltrate pictures as the user takes them.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_1672_relationship_type_uses" "objects_1672_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1672_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1672_x_mitre_version_1.0" "objects_1672_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1672_spec_version_2.1" "objects_1672_x_mitre_attack_spec_version_2.1.0" "objects_1672_x_mitre_domains_0_mobile-attack" "objects_1673_type_relationship" "objects_1673_id_relationship--e84ad4b0-9f7a-48a5-89ae-33804b11eb56" "objects_1673_created_2017-12-14T16:46:06.044Z" "objects_1673_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1673_revoked_False" "objects_1673_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1673_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1673_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1673_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1673_modified_2023-04-05T17:12:22.002Z" "objects_1673_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses contact list information.(Citation: Lookout-PegasusAndroid)" "objects_1673_relationship_type_uses" "objects_1673_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1673_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1673_x_mitre_deprecated_False" "objects_1673_x_mitre_version_1.0" "objects_1673_x_mitre_attack_spec_version_3.1.0" "objects_1673_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1673_spec_version_2.1" "objects_1673_x_mitre_domains_0_mobile-attack" "objects_1674_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1674_type_relationship" "objects_1674_id_relationship--e8768455-4d0c-4e3c-a901-1fc871227745" "objects_1674_created_2022-03-30T17:54:56.603Z" "objects_1674_x_mitre_version_0.1" "objects_1674_x_mitre_deprecated_False" "objects_1674_revoked_False" "objects_1674_description_" "objects_1674_modified_2022-03-30T17:54:56.603Z" "objects_1674_relationship_type_revoked-by" "objects_1674_source_ref_attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b" "objects_1674_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_1674_x_mitre_attack_spec_version_2.1.0" "objects_1674_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1674_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1674_spec_version_2.1" "objects_1674_x_mitre_domains_0_mobile-attack" "objects_1675_type_relationship" "objects_1675_id_relationship--e87aa0d6-241f-4f72-bdb6-54e8d5584ae2" "objects_1675_created_2017-12-14T16:46:06.044Z" "objects_1675_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1675_revoked_False" "objects_1675_external_references_0_source_name_NYTimes-BackDoor" "objects_1675_external_references_0_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_1675_external_references_0_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_1675_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1675_modified_2023-04-05T17:42:14.121Z" "objects_1675_description_[Adups](https://attack.mitre.org/software/S0309) transmitted call logs.(Citation: NYTimes-BackDoor)" "objects_1675_relationship_type_uses" "objects_1675_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_1675_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1675_x_mitre_deprecated_False" "objects_1675_x_mitre_version_1.0" "objects_1675_x_mitre_attack_spec_version_3.1.0" "objects_1675_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1675_spec_version_2.1" "objects_1675_x_mitre_domains_0_mobile-attack" "objects_1676_type_relationship" "objects_1676_id_relationship--e889782a-f66b-448e-a466-e55b1bce7b64" "objects_1676_created_2023-02-28T20:38:25.598Z" "objects_1676_revoked_False" "objects_1676_external_references_0_source_name_proofpoint_flubot_0421" "objects_1676_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1676_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1676_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1676_modified_2023-02-28T20:38:25.598Z" "objects_1676_description_[FluBot](https://attack.mitre.org/software/S1067) has encrypted C2 message bodies with RSA and encoded them in base64.(Citation: proofpoint_flubot_0421)" "objects_1676_relationship_type_uses" "objects_1676_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1676_target_ref_attack-pattern--16d73b64-5681-4ea0-9af4-4ad86f7c96e8" "objects_1676_x_mitre_deprecated_False" "objects_1676_x_mitre_version_0.1" "objects_1676_x_mitre_attack_spec_version_3.1.0" "objects_1676_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1676_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1676_spec_version_2.1" "objects_1676_x_mitre_domains_0_mobile-attack" "objects_1677_type_relationship" "objects_1677_id_relationship--e8c833ee-4c7d-45a2-b29b-187fe3661c0d" "objects_1677_created_2020-12-17T20:15:22.496Z" "objects_1677_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1677_revoked_False" "objects_1677_external_references_0_source_name_Palo Alto HenBox" "objects_1677_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1677_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1677_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1677_modified_2023-04-05T19:55:35.453Z" "objects_1677_description_[HenBox](https://attack.mitre.org/software/S0544) can access the device\u2019s contact list.(Citation: Palo Alto HenBox)" "objects_1677_relationship_type_uses" "objects_1677_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1677_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1677_x_mitre_deprecated_False" "objects_1677_x_mitre_version_1.0" "objects_1677_x_mitre_attack_spec_version_3.1.0" "objects_1677_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1677_spec_version_2.1" "objects_1677_x_mitre_domains_0_mobile-attack" "objects_1678_type_relationship" "objects_1678_id_relationship--e928c0ce-2b98-4af5-a990-f690f4306681" "objects_1678_created_2023-03-20T18:43:46.070Z" "objects_1678_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1678_revoked_False" "objects_1678_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1678_modified_2023-08-08T14:56:32.077Z" "objects_1678_description_Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. " "objects_1678_relationship_type_detects" "objects_1678_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1678_target_ref_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_1678_x_mitre_deprecated_False" "objects_1678_x_mitre_version_0.1" "objects_1678_x_mitre_attack_spec_version_3.1.0" "objects_1678_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1678_spec_version_2.1" "objects_1678_x_mitre_domains_0_mobile-attack" "objects_1679_type_relationship" "objects_1679_id_relationship--e95ac47c-8822-4ce5-bd65-f61ca873854b" "objects_1679_created_2023-09-28T17:21:15.893Z" "objects_1679_revoked_False" "objects_1679_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1679_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1679_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1679_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1679_modified_2023-09-28T17:21:15.893Z" "objects_1679_description_[Escobar](https://attack.mitre.org/software/S1092) can collect application keylogs.(Citation: Bleeipng Computer Escobar)" "objects_1679_relationship_type_uses" "objects_1679_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1679_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1679_x_mitre_deprecated_False" "objects_1679_x_mitre_version_0.1" "objects_1679_x_mitre_attack_spec_version_3.2.0" "objects_1679_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1679_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1679_spec_version_2.1" "objects_1679_x_mitre_domains_0_mobile-attack" "objects_1680_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1680_id_relationship--e9607e4f-5743-4bbb-b7d4-5554d66c8be7" "objects_1680_type_relationship" "objects_1680_created_2019-08-07T15:57:13.388Z" "objects_1680_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1680_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_1680_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_1680_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_1680_modified_2020-03-31T14:49:39.188Z" "objects_1680_description_[Riltok](https://attack.mitre.org/software/S0403) injects input to set itself as the default SMS handler by clicking the appropriate places on the screen. It can also close or minimize targeted antivirus applications and the device security settings screen.(Citation: Kaspersky Riltok June 2019)" "objects_1680_relationship_type_uses" "objects_1680_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_1680_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1680_x_mitre_version_1.0" "objects_1680_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1680_spec_version_2.1" "objects_1680_x_mitre_attack_spec_version_2.1.0" "objects_1680_x_mitre_domains_0_mobile-attack" "objects_1681_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1681_id_relationship--e99fd1c9-441f-41bc-83a1-e7bed8f2d7fb" "objects_1681_type_relationship" "objects_1681_created_2020-12-17T20:15:22.444Z" "objects_1681_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1681_external_references_0_source_name_Palo Alto HenBox" "objects_1681_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1681_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1681_modified_2020-12-17T20:15:22.444Z" "objects_1681_description_[HenBox](https://attack.mitre.org/software/S0544) can load additional Dalvik code while running.(Citation: Palo Alto HenBox)" "objects_1681_relationship_type_uses" "objects_1681_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1681_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1681_x_mitre_version_1.0" "objects_1681_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1681_spec_version_2.1" "objects_1681_x_mitre_attack_spec_version_2.1.0" "objects_1681_x_mitre_domains_0_mobile-attack" "objects_1682_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1682_id_relationship--e9b262ba-1c32-40b3-8622-121b30d6df50" "objects_1682_type_relationship" "objects_1682_created_2019-10-10T15:14:57.378Z" "objects_1682_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1682_external_references_0_source_name_SWB Exodus March 2019" "objects_1682_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1682_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1682_modified_2020-03-31T14:49:39.188Z" "objects_1682_description_[Exodus](https://attack.mitre.org/software/S0405) Two can extract information on pictures from the Gallery, Chrome and SBrowser bookmarks, and the connected WiFi network's password.(Citation: SWB Exodus March 2019)" "objects_1682_relationship_type_uses" "objects_1682_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1682_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1682_x_mitre_version_1.0" "objects_1682_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1682_spec_version_2.1" "objects_1682_x_mitre_attack_spec_version_2.1.0" "objects_1682_x_mitre_domains_0_mobile-attack" "objects_1683_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1683_id_relationship--e9c5deb9-30d4-4bc3-98ca-6089d4b74b1e" "objects_1683_type_relationship" "objects_1683_created_2020-12-24T21:55:56.745Z" "objects_1683_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1683_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1683_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1683_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1683_modified_2020-12-24T21:55:56.745Z" "objects_1683_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed the list of installed apps.(Citation: Lookout Uyghur Campaign)" "objects_1683_relationship_type_uses" "objects_1683_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1683_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1683_x_mitre_version_1.0" "objects_1683_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1683_spec_version_2.1" "objects_1683_x_mitre_attack_spec_version_2.1.0" "objects_1683_x_mitre_domains_0_mobile-attack" "objects_1684_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1684_id_relationship--e9cbc901-38cb-4895-9dfb-7a4fe10ba6d7" "objects_1684_type_relationship" "objects_1684_created_2018-10-17T00:14:20.652Z" "objects_1684_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1684_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1684_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1684_external_references_0_source_name_Wandera-RedDrop" "objects_1684_modified_2020-03-31T14:49:39.188Z" "objects_1684_description_[RedDrop](https://attack.mitre.org/software/S0326) exfiltrates details of the victim device operating system and manufacturer.(Citation: Wandera-RedDrop)" "objects_1684_relationship_type_uses" "objects_1684_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1684_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1684_x_mitre_version_1.0" "objects_1684_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1684_spec_version_2.1" "objects_1684_x_mitre_attack_spec_version_2.1.0" "objects_1684_x_mitre_domains_0_mobile-attack" "objects_1685_type_relationship" "objects_1685_id_relationship--e9d5992e-04ef-4835-87df-cf6434dcabbc" "objects_1685_created_2023-03-20T18:49:38.917Z" "objects_1685_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1685_revoked_False" "objects_1685_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1685_modified_2023-08-09T15:51:08.240Z" "objects_1685_description_Application vetting services may be able to detect known privilege escalation exploits contained within applications, as well as searching application packages for strings that correlate to known password store locations." "objects_1685_relationship_type_detects" "objects_1685_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1685_target_ref_attack-pattern--8605a0ec-b44a-4e98-a7fc-87d4bd3acb66" "objects_1685_x_mitre_deprecated_False" "objects_1685_x_mitre_version_0.1" "objects_1685_x_mitre_attack_spec_version_3.1.0" "objects_1685_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1685_spec_version_2.1" "objects_1685_x_mitre_domains_0_mobile-attack" "objects_1686_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1686_id_relationship--ea2ad242-4365-4868-8beb-4a634f3ba6b7" "objects_1686_type_relationship" "objects_1686_created_2020-11-24T17:55:12.822Z" "objects_1686_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1686_external_references_0_source_name_Talos GPlayed" "objects_1686_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1686_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1686_modified_2020-11-24T17:55:12.822Z" "objects_1686_description_[GPlayed](https://attack.mitre.org/software/S0536) can request the device\u2019s location.(Citation: Talos GPlayed)" "objects_1686_relationship_type_uses" "objects_1686_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1686_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1686_x_mitre_version_1.0" "objects_1686_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1686_spec_version_2.1" "objects_1686_x_mitre_attack_spec_version_2.1.0" "objects_1686_x_mitre_domains_0_mobile-attack" "objects_1687_type_relationship" "objects_1687_id_relationship--eb052029-e1c9-4f24-8594-299aaec7f1df" "objects_1687_created_2020-12-14T14:52:03.351Z" "objects_1687_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1687_revoked_False" "objects_1687_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1687_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1687_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1687_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1687_modified_2023-04-05T17:42:46.952Z" "objects_1687_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can collect the device\u2019s call log.(Citation: Sophos Red Alert 2.0)" "objects_1687_relationship_type_uses" "objects_1687_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1687_target_ref_attack-pattern--1d1b1558-c833-482e-aabb-d07ef6eae63d" "objects_1687_x_mitre_deprecated_False" "objects_1687_x_mitre_version_1.0" "objects_1687_x_mitre_attack_spec_version_3.1.0" "objects_1687_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1687_spec_version_2.1" "objects_1687_x_mitre_domains_0_mobile-attack" "objects_1688_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1688_id_relationship--eb1eeb37-37a8-47b6-aff8-9703735a4d93" "objects_1688_type_relationship" "objects_1688_created_2020-09-11T15:50:18.937Z" "objects_1688_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1688_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1688_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1688_external_references_0_source_name_ThreatFabric Ginp" "objects_1688_modified_2020-09-11T15:50:18.937Z" "objects_1688_description_[Ginp](https://attack.mitre.org/software/S0423) can send SMS messages.(Citation: ThreatFabric Ginp)" "objects_1688_relationship_type_uses" "objects_1688_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1688_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1688_x_mitre_version_1.0" "objects_1688_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1688_spec_version_2.1" "objects_1688_x_mitre_attack_spec_version_2.1.0" "objects_1688_x_mitre_domains_0_mobile-attack" "objects_1689_type_relationship" "objects_1689_id_relationship--eb27258f-6bb9-49b5-928e-b66f37f8f16e" "objects_1689_created_2018-10-17T00:14:20.652Z" "objects_1689_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1689_revoked_False" "objects_1689_external_references_0_source_name_TrendMicro-XLoader" "objects_1689_external_references_0_description_Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018." "objects_1689_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing/" "objects_1689_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1689_modified_2023-04-05T21:24:55.047Z" "objects_1689_description_[XLoader for Android](https://attack.mitre.org/software/S0318) requests Android Device Administrator access.(Citation: TrendMicro-XLoader)" "objects_1689_relationship_type_uses" "objects_1689_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1689_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1689_x_mitre_deprecated_False" "objects_1689_x_mitre_version_1.0" "objects_1689_x_mitre_attack_spec_version_3.1.0" "objects_1689_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1689_spec_version_2.1" "objects_1689_x_mitre_domains_0_mobile-attack" "objects_1690_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1690_type_relationship" "objects_1690_id_relationship--eb58117c-5803-4f72-a499-5fa888a9a7a5" "objects_1690_created_2022-04-06T15:47:06.163Z" "objects_1690_x_mitre_version_0.1" "objects_1690_x_mitre_deprecated_False" "objects_1690_revoked_False" "objects_1690_description_" "objects_1690_modified_2022-04-06T15:47:06.163Z" "objects_1690_relationship_type_subtechnique-of" "objects_1690_source_ref_attack-pattern--939808a7-121d-467a-b028-4441ee8b7cee" "objects_1690_target_ref_attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380" "objects_1690_x_mitre_attack_spec_version_2.1.0" "objects_1690_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1690_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1690_spec_version_2.1" "objects_1690_x_mitre_domains_0_mobile-attack" "objects_1691_type_relationship" "objects_1691_id_relationship--eb69d3c1-aa16-429e-9b72-c1a993e584fa" "objects_1691_created_2023-07-14T19:11:45.176Z" "objects_1691_revoked_False" "objects_1691_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1691_modified_2023-07-14T19:11:45.176Z" "objects_1691_description_Unexpected behavior from an application could be an indicator of masquerading." "objects_1691_relationship_type_detects" "objects_1691_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1691_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1691_x_mitre_deprecated_False" "objects_1691_x_mitre_version_0.1" "objects_1691_x_mitre_attack_spec_version_3.1.0" "objects_1691_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1691_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1691_spec_version_2.1" "objects_1691_x_mitre_domains_0_mobile-attack" "objects_1692_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1692_id_relationship--eb6dbe2a-6f76-4bce-ab37-66ec67148041" "objects_1692_type_relationship" "objects_1692_created_2017-10-25T14:48:53.742Z" "objects_1692_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1692_modified_2020-06-24T15:08:18.481Z" "objects_1692_description_Enterprise policies should prevent enabling USB debugging on Android devices unless specifically needed (e.g., if the device is used for application development)." "objects_1692_relationship_type_mitigates" "objects_1692_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1692_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1692_x_mitre_version_1.0" "objects_1692_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1692_spec_version_2.1" "objects_1692_x_mitre_attack_spec_version_2.1.0" "objects_1692_x_mitre_domains_0_mobile-attack" "objects_1693_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1693_type_relationship" "objects_1693_id_relationship--eb784dcf-4188-47e2-9217-837b262acfb9" "objects_1693_created_2022-04-01T18:43:01.860Z" "objects_1693_x_mitre_version_0.1" "objects_1693_x_mitre_deprecated_False" "objects_1693_revoked_False" "objects_1693_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features." "objects_1693_modified_2022-04-01T18:43:01.860Z" "objects_1693_relationship_type_mitigates" "objects_1693_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1693_target_ref_attack-pattern--20b0931a-8952-42ca-975f-775bad295f1a" "objects_1693_x_mitre_attack_spec_version_2.1.0" "objects_1693_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1693_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1693_spec_version_2.1" "objects_1693_x_mitre_domains_0_mobile-attack" "objects_1694_type_relationship" "objects_1694_id_relationship--eba4b561-84c9-4d49-a8b8-1842c3ed94f3" "objects_1694_created_2023-02-06T19:01:39.599Z" "objects_1694_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1694_revoked_False" "objects_1694_external_references_0_source_name_lookout_abstractemu_1021" "objects_1694_external_references_0_description_P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023." "objects_1694_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-global-rooting-malware-campaign" "objects_1694_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1694_modified_2023-03-27T17:25:11.903Z" "objects_1694_description_[AbstractEmu](https://attack.mitre.org/software/S1061) can grant itself contact list access.(Citation: lookout_abstractemu_1021)" "objects_1694_relationship_type_uses" "objects_1694_source_ref_malware--2aec175b-4429-4048-8e09-3ef6cbecfc64" "objects_1694_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1694_x_mitre_deprecated_False" "objects_1694_x_mitre_version_0.1" "objects_1694_x_mitre_attack_spec_version_3.1.0" "objects_1694_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1694_spec_version_2.1" "objects_1694_x_mitre_domains_0_mobile-attack" "objects_1695_type_relationship" "objects_1695_id_relationship--ec734b52-a823-495c-9684-c4649269723e" "objects_1695_created_2023-09-28T17:22:03.028Z" "objects_1695_revoked_False" "objects_1695_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1695_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1695_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1695_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1695_modified_2023-09-28T17:22:03.028Z" "objects_1695_description_[Escobar](https://attack.mitre.org/software/S1092) can uninstall itself and other applications.(Citation: Bleeipng Computer Escobar)" "objects_1695_relationship_type_uses" "objects_1695_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1695_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_1695_x_mitre_deprecated_False" "objects_1695_x_mitre_version_0.1" "objects_1695_x_mitre_attack_spec_version_3.2.0" "objects_1695_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1695_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1695_spec_version_2.1" "objects_1695_x_mitre_domains_0_mobile-attack" "objects_1696_type_relationship" "objects_1696_id_relationship--ec819008-396a-4ca3-b8d3-fda7f28128d0" "objects_1696_created_2023-08-14T16:33:56.635Z" "objects_1696_revoked_False" "objects_1696_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1696_modified_2023-08-14T16:33:56.635Z" "objects_1696_description_Many properly configured firewalls may naturally block command and control traffic." "objects_1696_relationship_type_detects" "objects_1696_source_ref_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_1696_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_1696_x_mitre_deprecated_False" "objects_1696_x_mitre_version_0.1" "objects_1696_x_mitre_attack_spec_version_3.1.0" "objects_1696_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1696_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1696_spec_version_2.1" "objects_1696_x_mitre_domains_0_mobile-attack" "objects_1697_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1697_id_relationship--eca02e5c-f8de-4436-a7dd-0f656c759a42" "objects_1697_type_relationship" "objects_1697_created_2021-10-01T14:42:48.913Z" "objects_1697_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1697_external_references_0_source_name_SecureList BusyGasper" "objects_1697_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1697_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1697_modified_2021-10-06T15:32:46.477Z" "objects_1697_description_[BusyGasper](https://attack.mitre.org/software/S0655) can use its keylogger module to take screenshots of the area of the screen that the user tapped.(Citation: SecureList BusyGasper)" "objects_1697_relationship_type_uses" "objects_1697_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1697_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1697_x_mitre_version_1.0" "objects_1697_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1697_spec_version_2.1" "objects_1697_x_mitre_attack_spec_version_2.1.0" "objects_1697_x_mitre_domains_0_mobile-attack" "objects_1698_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1698_id_relationship--eca69d9c-7c27-4147-ad7a-a1c30317df1d" "objects_1698_type_relationship" "objects_1698_created_2019-08-09T18:06:11.672Z" "objects_1698_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1698_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1698_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1698_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1698_modified_2020-03-31T14:49:39.188Z" "objects_1698_description_[Pallas](https://attack.mitre.org/software/S0399) can take pictures with both the front and rear-facing cameras.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1698_relationship_type_uses" "objects_1698_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1698_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1698_x_mitre_version_1.0" "objects_1698_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1698_spec_version_2.1" "objects_1698_x_mitre_attack_spec_version_2.1.0" "objects_1698_x_mitre_domains_0_mobile-attack" "objects_1699_type_relationship" "objects_1699_id_relationship--ece70dca-803c-4209-8792-7e56e9901288" "objects_1699_created_2020-07-15T20:20:59.291Z" "objects_1699_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1699_revoked_False" "objects_1699_external_references_0_source_name_Bitdefender Mandrake" "objects_1699_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1699_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1699_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1699_modified_2023-04-05T20:38:15.470Z" "objects_1699_description_[Mandrake](https://attack.mitre.org/software/S0485) can delete all data from an infected device.(Citation: Bitdefender Mandrake)" "objects_1699_relationship_type_uses" "objects_1699_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1699_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1699_x_mitre_deprecated_False" "objects_1699_x_mitre_version_1.0" "objects_1699_x_mitre_attack_spec_version_3.1.0" "objects_1699_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1699_spec_version_2.1" "objects_1699_x_mitre_domains_0_mobile-attack" "objects_1700_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1700_id_relationship--eceeb39e-887c-4a9b-a93b-a6fd768e455a" "objects_1700_type_relationship" "objects_1700_created_2020-07-15T20:20:59.186Z" "objects_1700_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1700_external_references_0_source_name_Bitdefender Mandrake" "objects_1700_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1700_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1700_modified_2020-07-15T20:20:59.186Z" "objects_1700_description_[Mandrake](https://attack.mitre.org/software/S0485) can access device configuration information and status, including Android version, battery level, device model, country, and SIM operator.(Citation: Bitdefender Mandrake)" "objects_1700_relationship_type_uses" "objects_1700_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1700_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1700_x_mitre_version_1.0" "objects_1700_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1700_spec_version_2.1" "objects_1700_x_mitre_attack_spec_version_2.1.0" "objects_1700_x_mitre_domains_0_mobile-attack" "objects_1701_type_relationship" "objects_1701_id_relationship--ed3293cf-de4f-4a73-98af-24325e8187c9" "objects_1701_created_2020-04-24T17:46:31.598Z" "objects_1701_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1701_revoked_False" "objects_1701_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1701_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1701_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1701_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1701_modified_2023-04-05T20:51:43.135Z" "objects_1701_description_[TrickMo](https://attack.mitre.org/software/S0427) can detect if it is running on a rooted device or an emulator.(Citation: SecurityIntelligence TrickMo)" "objects_1701_relationship_type_uses" "objects_1701_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1701_target_ref_attack-pattern--6ffad4be-bfe0-424f-abde-4d9a84a800ad" "objects_1701_x_mitre_deprecated_False" "objects_1701_x_mitre_version_1.0" "objects_1701_x_mitre_attack_spec_version_3.1.0" "objects_1701_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1701_spec_version_2.1" "objects_1701_x_mitre_domains_0_mobile-attack" "objects_1702_type_relationship" "objects_1702_id_relationship--ed48a86f-e55f-4abf-8f18-98591b756399" "objects_1702_created_2023-03-03T16:19:30.443Z" "objects_1702_revoked_False" "objects_1702_external_references_0_source_name_paloalto_yispecter_1015" "objects_1702_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1702_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1702_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1702_modified_2023-03-03T16:19:30.443Z" "objects_1702_description_[YiSpecter](https://attack.mitre.org/software/S0311) has hidden the app icon from iOS springboard.(Citation: paloalto_yispecter_1015)" "objects_1702_relationship_type_uses" "objects_1702_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1702_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1702_x_mitre_deprecated_False" "objects_1702_x_mitre_version_0.1" "objects_1702_x_mitre_attack_spec_version_3.1.0" "objects_1702_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1702_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1702_spec_version_2.1" "objects_1702_x_mitre_domains_0_mobile-attack" "objects_1703_type_relationship" "objects_1703_id_relationship--ed7e9368-004c-484f-9eed-03b158325564" "objects_1703_created_2023-03-20T18:54:40.401Z" "objects_1703_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1703_revoked_False" "objects_1703_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1703_modified_2023-08-09T14:39:38.390Z" "objects_1703_description_Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code." "objects_1703_relationship_type_detects" "objects_1703_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1703_target_ref_attack-pattern--51636761-2e35-44bf-9e56-e337adf97174" "objects_1703_x_mitre_deprecated_False" "objects_1703_x_mitre_version_0.1" "objects_1703_x_mitre_attack_spec_version_3.1.0" "objects_1703_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1703_spec_version_2.1" "objects_1703_x_mitre_domains_0_mobile-attack" "objects_1704_type_relationship" "objects_1704_id_relationship--eda3c5c4-d062-48d3-a78e-051f0c9d62f6" "objects_1704_created_2023-02-28T20:31:55.191Z" "objects_1704_revoked_False" "objects_1704_external_references_0_source_name_proofpoint_flubot_0421" "objects_1704_external_references_0_description_Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023." "objects_1704_external_references_0_url_https://www.proofpoint.com/us/blog/threat-insight/flubot-android-malware-spreading-rapidly-through-europe-may-hit-us-soon" "objects_1704_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1704_modified_2023-02-28T20:31:55.191Z" "objects_1704_description_[FluBot](https://attack.mitre.org/software/S1067) can access app notifications.(Citation: proofpoint_flubot_0421)" "objects_1704_relationship_type_uses" "objects_1704_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1704_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1704_x_mitre_deprecated_False" "objects_1704_x_mitre_version_0.1" "objects_1704_x_mitre_attack_spec_version_3.1.0" "objects_1704_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1704_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1704_spec_version_2.1" "objects_1704_x_mitre_domains_0_mobile-attack" "objects_1705_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1705_type_relationship" "objects_1705_id_relationship--ede5c314-5988-4151-bb30-b6a6983d02c0" "objects_1705_created_2020-12-31T18:25:05.164Z" "objects_1705_x_mitre_version_1.0" "objects_1705_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1705_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1705_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1705_x_mitre_deprecated_False" "objects_1705_revoked_False" "objects_1705_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has been distributed as updates to legitimate applications. This was accomplished by compromising legitimate app developers, and subsequently gaining access to their Google Play Store developer account.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1705_modified_2022-04-15T15:16:53.317Z" "objects_1705_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1705_relationship_type_uses" "objects_1705_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1705_target_ref_attack-pattern--9558a84e-2d5e-4872-918e-d847494a8ffc" "objects_1705_x_mitre_attack_spec_version_2.1.0" "objects_1705_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1705_spec_version_2.1" "objects_1705_x_mitre_domains_0_mobile-attack" "objects_1706_type_relationship" "objects_1706_id_relationship--edfb68d0-5efd-4fb5-93f9-c432535686cb" "objects_1706_created_2019-09-04T15:38:56.881Z" "objects_1706_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1706_revoked_False" "objects_1706_external_references_0_source_name_CyberMerchants-FlexiSpy" "objects_1706_external_references_0_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1706_external_references_0_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1706_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1706_modified_2023-04-05T19:56:00.761Z" "objects_1706_description_[FlexiSpy](https://attack.mitre.org/software/S0408) can collect device contacts.(Citation: CyberMerchants-FlexiSpy)" "objects_1706_relationship_type_uses" "objects_1706_source_ref_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1706_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1706_x_mitre_deprecated_False" "objects_1706_x_mitre_version_1.0" "objects_1706_x_mitre_attack_spec_version_3.1.0" "objects_1706_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1706_spec_version_2.1" "objects_1706_x_mitre_domains_0_mobile-attack" "objects_1707_type_relationship" "objects_1707_id_relationship--ee095f20-eef5-4dcc-a537-70b387592c2c" "objects_1707_created_2023-02-28T20:38:46.702Z" "objects_1707_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1707_revoked_False" "objects_1707_external_references_0_source_name_bitdefender_flubot_0524" "objects_1707_external_references_0_description_Filip TRU\u021a\u0102, R\u0103zvan GOSA, Adrian Mihai GOZOB. (2022, May 24). New FluBot Campaign Sweeps through Europe Targeting Android and iOS Users Alike. Retrieved February 28, 2023." "objects_1707_external_references_0_url_https://www.bitdefender.com/blog/labs/new-flubot-campaign-sweeps-through-europe-targeting-android-and-ios-users-alike/" "objects_1707_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1707_modified_2023-03-31T22:15:20.089Z" "objects_1707_description_[FluBot](https://attack.mitre.org/software/S1067) can use Accessibility Services to make removal of the malicious app difficult.(Citation: bitdefender_flubot_0524)" "objects_1707_relationship_type_uses" "objects_1707_source_ref_malware--f5ff006c-702f-4ded-8e60-ca6c540d91bc" "objects_1707_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1707_x_mitre_deprecated_False" "objects_1707_x_mitre_version_0.1" "objects_1707_x_mitre_attack_spec_version_3.1.0" "objects_1707_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1707_spec_version_2.1" "objects_1707_x_mitre_domains_0_mobile-attack" "objects_1708_type_relationship" "objects_1708_id_relationship--ee92911e-e2a2-4b40-916d-ce01b6e897f9" "objects_1708_created_2020-09-15T15:18:12.419Z" "objects_1708_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1708_revoked_False" "objects_1708_external_references_0_source_name_Cybereason FakeSpy" "objects_1708_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1708_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1708_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1708_modified_2023-04-05T19:56:18.859Z" "objects_1708_description_[FakeSpy](https://attack.mitre.org/software/S0509) can collect the device\u2019s contact list.(Citation: Cybereason FakeSpy)" "objects_1708_relationship_type_uses" "objects_1708_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1708_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1708_x_mitre_deprecated_False" "objects_1708_x_mitre_version_1.0" "objects_1708_x_mitre_attack_spec_version_3.1.0" "objects_1708_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1708_spec_version_2.1" "objects_1708_x_mitre_domains_0_mobile-attack" "objects_1709_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1709_id_relationship--ee9c1a8c-5f84-4571-8518-300a6412df0f" "objects_1709_type_relationship" "objects_1709_created_2019-09-23T13:36:08.448Z" "objects_1709_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1709_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1709_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1709_external_references_0_source_name_securelist rotexy 2018" "objects_1709_modified_2020-03-31T14:49:39.188Z" "objects_1709_description_[Rotexy](https://attack.mitre.org/software/S0411) collects information about the compromised device, including phone number, network operator, OS version, device model, and the device registration country.(Citation: securelist rotexy 2018)" "objects_1709_relationship_type_uses" "objects_1709_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1709_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1709_x_mitre_version_1.0" "objects_1709_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1709_spec_version_2.1" "objects_1709_x_mitre_attack_spec_version_2.1.0" "objects_1709_x_mitre_domains_0_mobile-attack" "objects_1710_type_relationship" "objects_1710_id_relationship--eee008fa-a46f-4542-93e3-8fe5f949130f" "objects_1710_created_2023-01-19T18:06:57.242Z" "objects_1710_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1710_revoked_False" "objects_1710_external_references_0_source_name_trendmicro_tianyspy_0122" "objects_1710_external_references_0_description_Trend Micro. (2022, January 25). TianySpy Malware Uses Smishing Disguised as Message From Telco. Retrieved January 11, 2023." "objects_1710_external_references_0_url_https://www.trendmicro.com/en_us/research/22/a/tianyspy-malware-uses-smishing-disguised-as-message-from-telco.html" "objects_1710_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1710_modified_2023-03-29T21:21:37.086Z" "objects_1710_description_[TianySpy](https://attack.mitre.org/software/S1056) can check to see if WiFi is enabled.(Citation: trendmicro_tianyspy_0122) " "objects_1710_relationship_type_uses" "objects_1710_source_ref_malware--fd6d56b2-d84e-4d2a-b37d-d4678d3e08a6" "objects_1710_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1710_x_mitre_deprecated_False" "objects_1710_x_mitre_version_0.1" "objects_1710_x_mitre_attack_spec_version_3.1.0" "objects_1710_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1710_spec_version_2.1" "objects_1710_x_mitre_domains_0_mobile-attack" "objects_1711_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1711_type_relationship" "objects_1711_id_relationship--eef4ffb7-892d-4d3f-826c-0b78d1f22671" "objects_1711_created_2021-02-08T16:36:20.709Z" "objects_1711_x_mitre_version_1.0" "objects_1711_external_references_0_source_name_BlackBerry Bahamut" "objects_1711_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1711_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1711_x_mitre_deprecated_False" "objects_1711_revoked_False" "objects_1711_description_[Windshift](https://attack.mitre.org/groups/G0112) has encrypted C2 communications using AES in CBC mode during Operation BULL and Operation ROCK.(Citation: BlackBerry Bahamut)" "objects_1711_modified_2022-04-18T16:07:26.671Z" "objects_1711_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1711_relationship_type_uses" "objects_1711_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1711_target_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_1711_x_mitre_attack_spec_version_2.1.0" "objects_1711_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1711_spec_version_2.1" "objects_1711_x_mitre_domains_0_mobile-attack" "objects_1712_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1712_type_relationship" "objects_1712_id_relationship--eef8fb1f-3e8c-44d7-b0d1-1fbad81e392f" "objects_1712_created_2019-07-16T14:33:12.107Z" "objects_1712_x_mitre_version_1.0" "objects_1712_external_references_0_source_name_Kaspersky Triada June 2016" "objects_1712_external_references_0_url_https://securelist.com/everyone-sees-not-what-they-want-to-see/74997/" "objects_1712_external_references_0_description_Kivva, A. (2016, June 6). Everyone sees not what they want to see. Retrieved July 16, 2019." "objects_1712_external_references_1_source_name_Google Triada June 2019" "objects_1712_external_references_1_url_https://security.googleblog.com/2019/06/pha-family-highlights-triada.html" "objects_1712_external_references_1_description_Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019." "objects_1712_x_mitre_deprecated_False" "objects_1712_revoked_False" "objects_1712_description_[Triada](https://attack.mitre.org/software/S0424) can redirect ad banner URLs on websites visited by the user to specific ad URLs.(Citation: Google Triada June 2019)(Citation: Kaspersky Triada June 2016) " "objects_1712_modified_2022-04-19T14:25:41.669Z" "objects_1712_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1712_relationship_type_uses" "objects_1712_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_1712_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1712_x_mitre_attack_spec_version_2.1.0" "objects_1712_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1712_spec_version_2.1" "objects_1712_x_mitre_domains_0_mobile-attack" "objects_1713_type_relationship" "objects_1713_id_relationship--ef792cb5-cb1f-4871-a2ef-20e6150d4005" "objects_1713_created_2023-10-10T15:33:57.735Z" "objects_1713_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1713_revoked_False" "objects_1713_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1713_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1713_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1713_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1713_modified_2023-10-10T15:33:57.735Z" "objects_1713_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has been embedded into trojanized versions of applications such as Voxer, TalkBox, and Amaq News.(Citation: Lookout Uyghur Campaign)" "objects_1713_relationship_type_uses" "objects_1713_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1713_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1713_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1713_x_mitre_deprecated_False" "objects_1713_x_mitre_version_1.0" "objects_1713_x_mitre_attack_spec_version_2.1.0" "objects_1713_spec_version_2.1" "objects_1713_x_mitre_domains_0_mobile-attack" "objects_1714_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1714_type_relationship" "objects_1714_id_relationship--efd35b6f-7a61-4998-97ff-608547e40f66" "objects_1714_created_2019-10-01T14:23:44.054Z" "objects_1714_x_mitre_version_1.0" "objects_1714_external_references_0_source_name_securelist rotexy 2018" "objects_1714_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_1714_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_1714_x_mitre_deprecated_False" "objects_1714_revoked_False" "objects_1714_description_ [Rotexy](https://attack.mitre.org/software/S0411) encrypts JSON HTTP payloads with AES.(Citation: securelist rotexy 2018) " "objects_1714_modified_2022-04-18T16:07:57.631Z" "objects_1714_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1714_relationship_type_uses" "objects_1714_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_1714_target_ref_attack-pattern--bb4387ab-7a51-468b-bf5f-a9a8612f0303" "objects_1714_x_mitre_attack_spec_version_2.1.0" "objects_1714_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1714_spec_version_2.1" "objects_1714_x_mitre_domains_0_mobile-attack" "objects_1715_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1715_type_relationship" "objects_1715_id_relationship--f012feab-5612-429f-81bd-ff75d6ffd04e" "objects_1715_created_2022-04-05T17:03:34.941Z" "objects_1715_x_mitre_version_0.1" "objects_1715_x_mitre_deprecated_False" "objects_1715_revoked_False" "objects_1715_description_" "objects_1715_modified_2022-04-05T17:03:34.941Z" "objects_1715_relationship_type_subtechnique-of" "objects_1715_source_ref_attack-pattern--fa801609-ca8e-415e-815e-65f3826ff4df" "objects_1715_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1715_x_mitre_attack_spec_version_2.1.0" "objects_1715_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1715_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1715_spec_version_2.1" "objects_1715_x_mitre_domains_0_mobile-attack" "objects_1716_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1716_type_relationship" "objects_1716_id_relationship--f051c943-998c-4db2-9dbc-d4755057bcf0" "objects_1716_created_2022-04-05T19:49:06.417Z" "objects_1716_x_mitre_version_0.1" "objects_1716_x_mitre_deprecated_False" "objects_1716_revoked_False" "objects_1716_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features." "objects_1716_modified_2022-04-05T19:49:06.417Z" "objects_1716_relationship_type_mitigates" "objects_1716_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1716_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1716_x_mitre_attack_spec_version_2.1.0" "objects_1716_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1716_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1716_spec_version_2.1" "objects_1716_x_mitre_domains_0_mobile-attack" "objects_1717_type_relationship" "objects_1717_id_relationship--f062ebc5-bad0-4b19-8c97-bf3915d687bd" "objects_1717_created_2023-03-20T18:51:58.152Z" "objects_1717_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1717_revoked_False" "objects_1717_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1717_modified_2023-08-14T16:23:02.162Z" "objects_1717_description_Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. " "objects_1717_relationship_type_detects" "objects_1717_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1717_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1717_x_mitre_deprecated_False" "objects_1717_x_mitre_version_0.1" "objects_1717_x_mitre_attack_spec_version_3.1.0" "objects_1717_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1717_spec_version_2.1" "objects_1717_x_mitre_domains_0_mobile-attack" "objects_1718_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1718_id_relationship--f0851531-e554-4658-920c-f2342632c19a" "objects_1718_type_relationship" "objects_1718_created_2017-12-14T16:46:06.044Z" "objects_1718_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1718_external_references_0_source_name_Lookout-Adware" "objects_1718_external_references_0_description_Michael Bentley. (2015, November 4). Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire. Retrieved December 21, 2016." "objects_1718_external_references_0_url_https://blog.lookout.com/blog/2015/11/04/trojanized-adware/" "objects_1718_modified_2020-03-31T14:49:39.188Z" "objects_1718_description_[ShiftyBug](https://attack.mitre.org/software/S0294) is packed with at least eight publicly available exploits that can perform rooting.(Citation: Lookout-Adware)" "objects_1718_relationship_type_uses" "objects_1718_source_ref_malware--c80a6bef-b3ce-44d0-b113-946e93124898" "objects_1718_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1718_x_mitre_version_1.0" "objects_1718_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1718_spec_version_2.1" "objects_1718_x_mitre_attack_spec_version_2.1.0" "objects_1718_x_mitre_domains_0_mobile-attack" "objects_1719_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1719_id_relationship--f0a0005e-cc38-4f7a-ba49-21a4c48ae1a1" "objects_1719_type_relationship" "objects_1719_created_2020-07-15T20:20:59.284Z" "objects_1719_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1719_external_references_0_source_name_Bitdefender Mandrake" "objects_1719_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1719_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1719_modified_2020-07-15T20:20:59.284Z" "objects_1719_description_[Mandrake](https://attack.mitre.org/software/S0485) can install attacker-specified components or applications.(Citation: Bitdefender Mandrake)" "objects_1719_relationship_type_uses" "objects_1719_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1719_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1719_x_mitre_version_1.0" "objects_1719_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1719_spec_version_2.1" "objects_1719_x_mitre_attack_spec_version_2.1.0" "objects_1719_x_mitre_domains_0_mobile-attack" "objects_1720_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1720_type_relationship" "objects_1720_id_relationship--f0e39856-4d2d-45c5-bf16-f683ee993010" "objects_1720_created_2022-03-30T18:18:15.915Z" "objects_1720_x_mitre_version_0.1" "objects_1720_x_mitre_deprecated_False" "objects_1720_revoked_False" "objects_1720_description_" "objects_1720_modified_2022-03-30T18:18:15.915Z" "objects_1720_relationship_type_revoked-by" "objects_1720_source_ref_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_1720_target_ref_attack-pattern--fcb11f06-ce0e-490b-bcc1-04a1623579f0" "objects_1720_x_mitre_attack_spec_version_2.1.0" "objects_1720_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1720_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1720_spec_version_2.1" "objects_1720_x_mitre_domains_0_mobile-attack" "objects_1721_type_relationship" "objects_1721_id_relationship--f1130c77-3d20-4c41-9e75-1953bf9b8abc" "objects_1721_created_2020-09-14T14:13:45.286Z" "objects_1721_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1721_revoked_False" "objects_1721_external_references_0_source_name_Lookout eSurv" "objects_1721_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_1721_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_1721_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1721_modified_2023-04-05T20:40:48.237Z" "objects_1721_description_[eSurv](https://attack.mitre.org/software/S0507) has exfiltrated data using HTTP PUT requests.(Citation: Lookout eSurv)" "objects_1721_relationship_type_uses" "objects_1721_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_1721_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1721_x_mitre_deprecated_False" "objects_1721_x_mitre_version_1.0" "objects_1721_x_mitre_attack_spec_version_3.1.0" "objects_1721_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1721_spec_version_2.1" "objects_1721_x_mitre_domains_0_mobile-attack" "objects_1722_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1722_type_relationship" "objects_1722_id_relationship--f157970b-4782-46d0-abdd-000ae6eea14b" "objects_1722_created_2018-10-17T00:14:20.652Z" "objects_1722_x_mitre_version_1.0" "objects_1722_x_mitre_deprecated_False" "objects_1722_revoked_False" "objects_1722_description_" "objects_1722_modified_2022-07-07T14:00:00.188Z" "objects_1722_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1722_relationship_type_revoked-by" "objects_1722_source_ref_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_1722_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1722_x_mitre_attack_spec_version_2.1.0" "objects_1722_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1722_spec_version_2.1" "objects_1722_x_mitre_domains_0_mobile-attack" "objects_1723_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1723_id_relationship--f240e06c-3a5b-4a34-a69c-5fccb4c94150" "objects_1723_type_relationship" "objects_1723_created_2020-05-11T16:37:36.673Z" "objects_1723_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1723_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1723_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1723_external_references_0_source_name_ThreatFabric Ginp" "objects_1723_modified_2020-05-11T16:37:36.673Z" "objects_1723_description_ [Ginp](https://attack.mitre.org/software/S0423) can download device logs.(Citation: ThreatFabric Ginp) " "objects_1723_relationship_type_uses" "objects_1723_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1723_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1723_x_mitre_version_1.0" "objects_1723_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1723_spec_version_2.1" "objects_1723_x_mitre_attack_spec_version_2.1.0" "objects_1723_x_mitre_domains_0_mobile-attack" "objects_1724_type_relationship" "objects_1724_id_relationship--f259b5a8-bf2f-48c9-ae1b-b20d53daf665" "objects_1724_created_2023-07-21T19:39:51.044Z" "objects_1724_revoked_False" "objects_1724_external_references_0_source_name_lookout_bouldspy_0423" "objects_1724_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1724_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1724_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1724_modified_2023-07-21T19:39:51.044Z" "objects_1724_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can exfiltrate data when the user boots the app, or on device boot.(Citation: lookout_bouldspy_0423)" "objects_1724_relationship_type_uses" "objects_1724_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1724_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_1724_x_mitre_deprecated_False" "objects_1724_x_mitre_version_0.1" "objects_1724_x_mitre_attack_spec_version_3.1.0" "objects_1724_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1724_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1724_spec_version_2.1" "objects_1724_x_mitre_domains_0_mobile-attack" "objects_1725_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1725_type_relationship" "objects_1725_id_relationship--f28a2873-281f-405b-bad0-4a93dac8a5ee" "objects_1725_created_2020-11-24T17:55:12.895Z" "objects_1725_x_mitre_version_1.0" "objects_1725_external_references_0_source_name_Talos GPlayed" "objects_1725_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1725_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1725_x_mitre_deprecated_False" "objects_1725_revoked_False" "objects_1725_description_[GPlayed](https://attack.mitre.org/software/S0536) can show a phishing WebView pretending to be a Google service that collects credit card information.(Citation: Talos GPlayed)" "objects_1725_modified_2022-04-12T10:01:44.682Z" "objects_1725_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1725_relationship_type_uses" "objects_1725_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1725_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1725_x_mitre_attack_spec_version_2.1.0" "objects_1725_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1725_spec_version_2.1" "objects_1725_x_mitre_domains_0_mobile-attack" "objects_1726_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1726_type_relationship" "objects_1726_id_relationship--f2d05b16-3565-453e-9fbb-1c02146e17e1" "objects_1726_created_2020-06-26T15:32:25.002Z" "objects_1726_x_mitre_version_1.0" "objects_1726_external_references_0_source_name_Threat Fabric Cerberus" "objects_1726_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1726_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1726_x_mitre_deprecated_False" "objects_1726_revoked_False" "objects_1726_description_[Cerberus](https://attack.mitre.org/software/S0480) can record keystrokes.(Citation: Threat Fabric Cerberus)" "objects_1726_modified_2022-04-15T17:33:17.868Z" "objects_1726_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1726_relationship_type_uses" "objects_1726_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1726_target_ref_attack-pattern--b1c95426-2550-4621-8028-ceebf28b3a47" "objects_1726_x_mitre_attack_spec_version_2.1.0" "objects_1726_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1726_spec_version_2.1" "objects_1726_x_mitre_domains_0_mobile-attack" "objects_1727_type_relationship" "objects_1727_id_relationship--f31490e8-ef81-40d5-bba9-24ca580d2ee6" "objects_1727_created_2020-01-21T14:20:50.409Z" "objects_1727_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1727_revoked_False" "objects_1727_external_references_0_source_name_Bitdefender - Triout 2018" "objects_1727_external_references_0_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_1727_external_references_0_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_1727_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1727_modified_2023-04-05T20:46:20.857Z" "objects_1727_description_[ViceLeaker](https://attack.mitre.org/software/S0418) includes code to hide its icon, but the function does not appear to be called in an analyzed version of the software.(Citation: Bitdefender - Triout 2018)" "objects_1727_relationship_type_uses" "objects_1727_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1727_target_ref_attack-pattern--f05fc151-aa62-47e3-ae57-2d1b23d64bf6" "objects_1727_x_mitre_deprecated_False" "objects_1727_x_mitre_version_1.0" "objects_1727_x_mitre_attack_spec_version_3.1.0" "objects_1727_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1727_spec_version_2.1" "objects_1727_x_mitre_domains_0_mobile-attack" "objects_1728_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1728_type_relationship" "objects_1728_id_relationship--f3599919-c4d1-4f2e-92d4-b34a04e33132" "objects_1728_created_2022-03-30T14:06:26.530Z" "objects_1728_x_mitre_version_0.1" "objects_1728_x_mitre_deprecated_False" "objects_1728_revoked_False" "objects_1728_description_Mobile security products can typically detect jailbroken or rooted devices. " "objects_1728_modified_2022-03-30T14:06:26.530Z" "objects_1728_relationship_type_mitigates" "objects_1728_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1728_target_ref_attack-pattern--693cdbff-ea73-49c6-ac3f-91e7285c31d1" "objects_1728_x_mitre_attack_spec_version_2.1.0" "objects_1728_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1728_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1728_spec_version_2.1" "objects_1728_x_mitre_domains_0_mobile-attack" "objects_1729_type_relationship" "objects_1729_id_relationship--f390ee16-a7c8-4ef2-b6f4-28940a8f0d81" "objects_1729_created_2023-03-20T15:45:44.000Z" "objects_1729_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1729_revoked_False" "objects_1729_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1729_modified_2023-08-09T15:40:17.754Z" "objects_1729_description_Mobile security products can potentially detect jailbroken devices." "objects_1729_relationship_type_detects" "objects_1729_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1729_target_ref_attack-pattern--cc6e0637-76d2-4af3-a604-9d8d3ff8a6b3" "objects_1729_x_mitre_deprecated_False" "objects_1729_x_mitre_version_0.1" "objects_1729_x_mitre_attack_spec_version_3.1.0" "objects_1729_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1729_spec_version_2.1" "objects_1729_x_mitre_domains_0_mobile-attack" "objects_1730_type_relationship" "objects_1730_id_relationship--f3e902fe-7eea-4b85-9067-25d29fd01dc5" "objects_1730_created_2023-03-20T15:21:12.492Z" "objects_1730_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1730_revoked_False" "objects_1730_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1730_modified_2023-08-07T17:20:13.644Z" "objects_1730_description_Integrity checking mechanisms can potentially detect unauthorized hardware modifications." "objects_1730_relationship_type_detects" "objects_1730_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1730_target_ref_attack-pattern--c08366bb-8d11-4921-853f-f0a3b6a2a1da" "objects_1730_x_mitre_deprecated_False" "objects_1730_x_mitre_version_0.1" "objects_1730_x_mitre_attack_spec_version_3.1.0" "objects_1730_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1730_spec_version_2.1" "objects_1730_x_mitre_domains_0_mobile-attack" "objects_1731_type_relationship" "objects_1731_id_relationship--f4aeacef-035c-4308-9e85-997703e27809" "objects_1731_created_2020-01-27T17:05:58.305Z" "objects_1731_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1731_revoked_False" "objects_1731_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1731_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1731_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1731_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1731_modified_2023-04-05T17:27:33.906Z" "objects_1731_description_[GolfSpy](https://attack.mitre.org/software/S0421) can delete arbitrary files on the device.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1731_relationship_type_uses" "objects_1731_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1731_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1731_x_mitre_deprecated_False" "objects_1731_x_mitre_version_1.0" "objects_1731_x_mitre_attack_spec_version_3.1.0" "objects_1731_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1731_spec_version_2.1" "objects_1731_x_mitre_domains_0_mobile-attack" "objects_1732_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1732_id_relationship--f4cc3b3a-284d-4a2d-9ab8-e7fa916c4012" "objects_1732_type_relationship" "objects_1732_created_2020-12-14T14:52:03.218Z" "objects_1732_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1732_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1732_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1732_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1732_modified_2020-12-14T14:52:03.218Z" "objects_1732_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) can obtain the running application.(Citation: Sophos Red Alert 2.0)" "objects_1732_relationship_type_uses" "objects_1732_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1732_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1732_x_mitre_version_1.0" "objects_1732_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1732_spec_version_2.1" "objects_1732_x_mitre_attack_spec_version_2.1.0" "objects_1732_x_mitre_domains_0_mobile-attack" "objects_1733_type_relationship" "objects_1733_id_relationship--f4d5e619-7c83-4845-aecd-de62c33cc0a1" "objects_1733_created_2019-07-10T15:35:43.661Z" "objects_1733_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1733_revoked_False" "objects_1733_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1733_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1733_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1733_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1733_modified_2023-04-05T20:32:57.154Z" "objects_1733_description_[Pallas](https://attack.mitre.org/software/S0399) captures and exfiltrates all SMS messages, including future messages as they are received.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1733_relationship_type_uses" "objects_1733_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1733_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1733_x_mitre_deprecated_False" "objects_1733_x_mitre_version_1.0" "objects_1733_x_mitre_attack_spec_version_3.1.0" "objects_1733_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1733_spec_version_2.1" "objects_1733_x_mitre_domains_0_mobile-attack" "objects_1734_type_relationship" "objects_1734_id_relationship--f4e4c3ae-4c4d-4eba-8330-022464cbf828" "objects_1734_created_2018-10-17T00:14:20.652Z" "objects_1734_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1734_revoked_False" "objects_1734_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1734_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1734_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1734_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1734_modified_2023-04-05T20:33:12.082Z" "objects_1734_description_[SpyDealer](https://attack.mitre.org/software/S0324) harvests SMS and MMS messages from victims.(Citation: PaloAlto-SpyDealer)" "objects_1734_relationship_type_uses" "objects_1734_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1734_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1734_x_mitre_deprecated_False" "objects_1734_x_mitre_version_1.0" "objects_1734_x_mitre_attack_spec_version_3.1.0" "objects_1734_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1734_spec_version_2.1" "objects_1734_x_mitre_domains_0_mobile-attack" "objects_1735_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1735_type_relationship" "objects_1735_id_relationship--f4f4660c-6324-4da4-be2f-ac87fda85a45" "objects_1735_created_2019-09-15T15:32:17.580Z" "objects_1735_x_mitre_version_1.0" "objects_1735_external_references_0_source_name_Android Notification Listeners" "objects_1735_external_references_0_url_https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setPermittedCrossProfileNotificationListeners(android.content.ComponentName,%20java.util.List%3Cjava.lang.String%3E)" "objects_1735_external_references_0_description_Android. (n.d.). DevicePolicyManager. Retrieved September 15, 2019." "objects_1735_x_mitre_deprecated_False" "objects_1735_revoked_False" "objects_1735_description_On Android devices with a work profile, the `DevicePolicyManager.setPermittedCrossProfileNotificationListeners` method can be used to manage the list of applications running within the personal profile that can access notifications generated within the work profile. This policy would not affect notifications generated by the rest of the device. The `DevicePolicyManager.setApplicationHidden` method can be used to disable notification access for unwanted applications, but this method would also block that entire application from running.(Citation: Android Notification Listeners) " "objects_1735_modified_2022-04-01T14:50:28.686Z" "objects_1735_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1735_relationship_type_mitigates" "objects_1735_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1735_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1735_x_mitre_attack_spec_version_2.1.0" "objects_1735_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1735_spec_version_2.1" "objects_1735_x_mitre_domains_0_mobile-attack" "objects_1736_type_relationship" "objects_1736_id_relationship--f517a7ce-dfdc-4f42-84c1-fef136e2ea19" "objects_1736_created_2020-09-24T15:26:15.607Z" "objects_1736_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1736_revoked_False" "objects_1736_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1736_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1736_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1736_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1736_modified_2023-04-05T20:41:01.468Z" "objects_1736_description_[XLoader for iOS](https://attack.mitre.org/software/S0490) has exfiltrated data using HTTP requests.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1736_relationship_type_uses" "objects_1736_source_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_1736_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1736_x_mitre_deprecated_False" "objects_1736_x_mitre_version_1.0" "objects_1736_x_mitre_attack_spec_version_3.1.0" "objects_1736_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1736_spec_version_2.1" "objects_1736_x_mitre_domains_0_mobile-attack" "objects_1737_type_relationship" "objects_1737_id_relationship--f5196775-2c99-4dc5-b173-6a10af503c6e" "objects_1737_created_2023-09-25T19:55:13.827Z" "objects_1737_revoked_False" "objects_1737_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1737_modified_2023-09-25T19:55:13.827Z" "objects_1737_description_Users should be encouraged to be very careful with granting dangerous permissions, such as device administrator or access to device accessibility." "objects_1737_relationship_type_mitigates" "objects_1737_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1737_target_ref_attack-pattern--0b761f2b-197a-40f2-b100-8152cb957c0c" "objects_1737_x_mitre_deprecated_False" "objects_1737_x_mitre_version_0.1" "objects_1737_x_mitre_attack_spec_version_3.1.0" "objects_1737_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1737_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1737_spec_version_2.1" "objects_1737_x_mitre_domains_0_mobile-attack" "objects_1738_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1738_id_relationship--f552ee2f-5e6a-47a1-b6a5-d5e5594feb0d" "objects_1738_type_relationship" "objects_1738_created_2018-10-17T00:14:20.652Z" "objects_1738_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1738_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1738_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1738_external_references_0_source_name_Lookout-StealthMango" "objects_1738_modified_2020-03-31T14:49:39.188Z" "objects_1738_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uploads information about installed packages.(Citation: Lookout-StealthMango)" "objects_1738_relationship_type_uses" "objects_1738_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1738_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1738_x_mitre_version_1.0" "objects_1738_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1738_spec_version_2.1" "objects_1738_x_mitre_attack_spec_version_2.1.0" "objects_1738_x_mitre_domains_0_mobile-attack" "objects_1739_type_relationship" "objects_1739_id_relationship--f56b8307-80e3-4d73-869f-1e8b9538dbc4" "objects_1739_created_2022-09-29T21:22:06.716Z" "objects_1739_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1739_revoked_False" "objects_1739_external_references_0_source_name_Cylance Dust Storm" "objects_1739_external_references_0_description_Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021." "objects_1739_external_references_0_url_https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf" "objects_1739_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1739_modified_2022-09-30T18:45:10.156Z" "objects_1739_description_During [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016), the threat actors used Android backdoors to continually forward all SMS messages and call information back to their C2 servers.(Citation: Cylance Dust Storm)" "objects_1739_relationship_type_uses" "objects_1739_source_ref_campaign--4603cf2f-06d0-4970-9c5d-5071b08c817f" "objects_1739_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1739_x_mitre_deprecated_False" "objects_1739_x_mitre_version_0.1" "objects_1739_x_mitre_attack_spec_version_2.1.0" "objects_1739_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1739_spec_version_2.1" "objects_1739_x_mitre_domains_0_mobile-attack" "objects_1740_type_relationship" "objects_1740_id_relationship--f58d3fc4-e0a2-4924-884d-85d7c8f00b8a" "objects_1740_created_2023-03-20T18:39:10.113Z" "objects_1740_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1740_revoked_False" "objects_1740_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1740_modified_2023-08-08T17:14:24.009Z" "objects_1740_description_The user can view a list of device administrators in device settings and revoke permission where appropriate. Applications that request device administrator permissions should be scrutinized further for malicious behavior." "objects_1740_relationship_type_detects" "objects_1740_source_ref_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1740_target_ref_attack-pattern--acf8fd2a-dc98-43b4-8d37-64e10728e591" "objects_1740_x_mitre_deprecated_False" "objects_1740_x_mitre_version_0.1" "objects_1740_x_mitre_attack_spec_version_3.1.0" "objects_1740_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1740_spec_version_2.1" "objects_1740_x_mitre_domains_0_mobile-attack" "objects_1741_type_relationship" "objects_1741_id_relationship--f5acd046-2943-48bf-836a-2109c4f1a5c4" "objects_1741_created_2023-09-28T17:20:50.748Z" "objects_1741_revoked_False" "objects_1741_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1741_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1741_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1741_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1741_modified_2023-09-28T17:20:50.748Z" "objects_1741_description_[Escobar](https://attack.mitre.org/software/S1092) can record audio from the device\u2019s microphone.(Citation: Bleeipng Computer Escobar)" "objects_1741_relationship_type_uses" "objects_1741_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1741_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1741_x_mitre_deprecated_False" "objects_1741_x_mitre_version_0.1" "objects_1741_x_mitre_attack_spec_version_3.2.0" "objects_1741_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1741_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1741_spec_version_2.1" "objects_1741_x_mitre_domains_0_mobile-attack" "objects_1742_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1742_type_relationship" "objects_1742_id_relationship--f5d24a31-53d2-4e84-9110-2da0582132cb" "objects_1742_created_2020-05-07T15:33:32.936Z" "objects_1742_x_mitre_version_1.0" "objects_1742_external_references_0_source_name_CheckPoint Agent Smith" "objects_1742_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1742_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1742_x_mitre_deprecated_False" "objects_1742_revoked_False" "objects_1742_description_[Agent Smith](https://attack.mitre.org/software/S0440)\u2019s core malware is disguised as a JPG file, and encrypted with an XOR cipher.(Citation: CheckPoint Agent Smith)" "objects_1742_modified_2022-04-15T16:44:17.145Z" "objects_1742_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1742_relationship_type_uses" "objects_1742_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1742_target_ref_attack-pattern--fa801609-ca8e-415e-815e-65f3826ff4df" "objects_1742_x_mitre_attack_spec_version_2.1.0" "objects_1742_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1742_spec_version_2.1" "objects_1742_x_mitre_domains_0_mobile-attack" "objects_1743_type_relationship" "objects_1743_id_relationship--f5e9afdc-1aeb-472f-b267-46e7978f9d78" "objects_1743_created_2023-03-20T18:54:09.674Z" "objects_1743_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1743_revoked_False" "objects_1743_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1743_modified_2023-08-09T15:58:57.985Z" "objects_1743_description_On Android, users may be presented with a popup to select the appropriate application to open a URI in. If the user sees an application they do not recognize, they can remove it." "objects_1743_relationship_type_detects" "objects_1743_source_ref_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1743_target_ref_attack-pattern--233fe2c0-cb41-4765-b454-e0087597fbce" "objects_1743_x_mitre_deprecated_False" "objects_1743_x_mitre_version_0.1" "objects_1743_x_mitre_attack_spec_version_3.1.0" "objects_1743_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1743_spec_version_2.1" "objects_1743_x_mitre_domains_0_mobile-attack" "objects_1744_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1744_id_relationship--f5fab17b-43e7-46ff-bdea-eb8c52a0c6c3" "objects_1744_type_relationship" "objects_1744_created_2017-12-14T16:46:06.044Z" "objects_1744_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1744_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1744_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1744_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1744_modified_2020-03-31T14:49:39.188Z" "objects_1744_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) accesses the list of installed applications.(Citation: Lookout-PegasusAndroid)" "objects_1744_relationship_type_uses" "objects_1744_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1744_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1744_x_mitre_version_1.0" "objects_1744_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1744_spec_version_2.1" "objects_1744_x_mitre_attack_spec_version_2.1.0" "objects_1744_x_mitre_domains_0_mobile-attack" "objects_1745_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1745_type_relationship" "objects_1745_id_relationship--f6098dca-3a9e-4991-8d51-1310b12161b6" "objects_1745_created_2017-12-14T16:46:06.044Z" "objects_1745_x_mitre_version_1.0" "objects_1745_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1745_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1745_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1745_x_mitre_deprecated_False" "objects_1745_revoked_False" "objects_1745_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) uses SMS for command and control.(Citation: Lookout-PegasusAndroid)" "objects_1745_modified_2022-04-19T14:25:41.669Z" "objects_1745_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1745_relationship_type_uses" "objects_1745_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1745_target_ref_attack-pattern--ec4c4baa-026f-43e8-8f56-58c36f3162dd" "objects_1745_x_mitre_attack_spec_version_2.1.0" "objects_1745_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1745_spec_version_2.1" "objects_1745_x_mitre_domains_0_mobile-attack" "objects_1746_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1746_type_relationship" "objects_1746_id_relationship--f622a267-7a58-4082-a3f5-10e9bb549a5e" "objects_1746_created_2022-03-30T20:43:31.249Z" "objects_1746_x_mitre_version_0.1" "objects_1746_x_mitre_deprecated_False" "objects_1746_revoked_False" "objects_1746_description_" "objects_1746_modified_2022-03-30T20:43:31.249Z" "objects_1746_relationship_type_revoked-by" "objects_1746_source_ref_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_1746_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1746_x_mitre_attack_spec_version_2.1.0" "objects_1746_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1746_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1746_spec_version_2.1" "objects_1746_x_mitre_domains_0_mobile-attack" "objects_1747_type_relationship" "objects_1747_id_relationship--f62e0aaf-e52f-40b9-a059-001f298a0660" "objects_1747_created_2018-10-17T00:14:20.652Z" "objects_1747_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1747_revoked_False" "objects_1747_external_references_0_source_name_Kaspersky-Skygofree" "objects_1747_external_references_0_description_Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018." "objects_1747_external_references_0_url_https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/" "objects_1747_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1747_modified_2023-04-05T17:19:00.168Z" "objects_1747_description_[Skygofree](https://attack.mitre.org/software/S0327) can be controlled via HTTP, XMPP, FirebaseCloudMessaging, or GoogleCloudMessaging in older versions.(Citation: Kaspersky-Skygofree)" "objects_1747_relationship_type_uses" "objects_1747_source_ref_malware--3a913bac-4fae-4d0e-bca8-cae452f1599b" "objects_1747_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1747_x_mitre_deprecated_False" "objects_1747_x_mitre_version_1.0" "objects_1747_x_mitre_attack_spec_version_3.1.0" "objects_1747_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1747_spec_version_2.1" "objects_1747_x_mitre_domains_0_mobile-attack" "objects_1748_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1748_id_relationship--f632b0bb-69ce-4678-bc3c-9ddff5a38794" "objects_1748_type_relationship" "objects_1748_created_2019-11-21T16:42:48.488Z" "objects_1748_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1748_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1748_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1748_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1748_external_references_1_source_name_Bitdefender - Triout 2018" "objects_1748_external_references_1_url_https://labs.bitdefender.com/2018/08/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities/" "objects_1748_external_references_1_description_L. Arsene, C. Ochinca. (2018, August 20). Triout \u2013 Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020." "objects_1748_modified_2020-01-21T14:20:50.474Z" "objects_1748_description_[ViceLeaker](https://attack.mitre.org/software/S0418) can record audio from the device\u2019s microphone and can record phone calls together with the caller ID.(Citation: SecureList - ViceLeaker 2019)(Citation: Bitdefender - Triout 2018)" "objects_1748_relationship_type_uses" "objects_1748_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1748_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1748_x_mitre_version_1.0" "objects_1748_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1748_spec_version_2.1" "objects_1748_x_mitre_attack_spec_version_2.1.0" "objects_1748_x_mitre_domains_0_mobile-attack" "objects_1749_type_relationship" "objects_1749_id_relationship--f6417788-0c6e-4172-9010-f20870ec2278" "objects_1749_created_2023-06-09T19:16:07.193Z" "objects_1749_revoked_False" "objects_1749_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1749_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1749_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1749_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1749_modified_2023-06-09T19:16:07.193Z" "objects_1749_description_[Hornbill](https://attack.mitre.org/software/S1077) can request device administrator privileges.(Citation: lookout_hornbill_sunbird_0221)" "objects_1749_relationship_type_uses" "objects_1749_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1749_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1749_x_mitre_deprecated_False" "objects_1749_x_mitre_version_0.1" "objects_1749_x_mitre_attack_spec_version_3.1.0" "objects_1749_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1749_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1749_spec_version_2.1" "objects_1749_x_mitre_domains_0_mobile-attack" "objects_1750_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1750_id_relationship--f65087b4-adf2-4292-a711-7ae829e91397" "objects_1750_type_relationship" "objects_1750_created_2019-09-04T14:28:16.385Z" "objects_1750_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1750_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1750_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1750_external_references_0_source_name_Lookout-Monokle" "objects_1750_modified_2020-03-31T14:49:39.188Z" "objects_1750_description_[Monokle](https://attack.mitre.org/software/S0407) can list applications installed on the device.(Citation: Lookout-Monokle)" "objects_1750_relationship_type_uses" "objects_1750_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1750_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1750_x_mitre_version_1.0" "objects_1750_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1750_spec_version_2.1" "objects_1750_x_mitre_attack_spec_version_2.1.0" "objects_1750_x_mitre_domains_0_mobile-attack" "objects_1751_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1751_id_relationship--f6770c26-ae93-468d-acaa-ab4ffea0e047" "objects_1751_type_relationship" "objects_1751_created_2018-10-17T00:14:20.652Z" "objects_1751_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1751_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1751_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1751_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1751_modified_2020-03-31T14:49:39.188Z" "objects_1751_description_[SpyDealer](https://attack.mitre.org/software/S0324) can record phone calls and surrounding audio.(Citation: PaloAlto-SpyDealer)" "objects_1751_relationship_type_uses" "objects_1751_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1751_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1751_x_mitre_version_1.0" "objects_1751_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1751_spec_version_2.1" "objects_1751_x_mitre_attack_spec_version_2.1.0" "objects_1751_x_mitre_domains_0_mobile-attack" "objects_1752_type_relationship" "objects_1752_id_relationship--f69ff81e-22e4-450c-b3dd-7f3f66610663" "objects_1752_created_2023-08-16T16:39:10.564Z" "objects_1752_revoked_False" "objects_1752_external_references_0_source_name_cyble_chameleon_0423" "objects_1752_external_references_0_description_Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023." "objects_1752_external_references_0_url_https://cyble.com/blog/chameleon-a-new-android-malware-spotted-in-the-wild/" "objects_1752_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1752_modified_2023-08-16T16:39:10.564Z" "objects_1752_description_[Chameleon](https://attack.mitre.org/software/S1083) can disable Google Play Protect.(Citation: cyble_chameleon_0423)" "objects_1752_relationship_type_uses" "objects_1752_source_ref_malware--2cf00c5a-857d-4cb6-8f03-82f15bee0f6f" "objects_1752_target_ref_attack-pattern--2aa78dfd-cb6f-4c70-9408-137cfd96be49" "objects_1752_x_mitre_deprecated_False" "objects_1752_x_mitre_version_0.1" "objects_1752_x_mitre_attack_spec_version_3.1.0" "objects_1752_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1752_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1752_spec_version_2.1" "objects_1752_x_mitre_domains_0_mobile-attack" "objects_1753_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1753_id_relationship--f6a451e8-2125-4bbe-be52-e682523cd169" "objects_1753_type_relationship" "objects_1753_created_2018-10-17T00:14:20.652Z" "objects_1753_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1753_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1753_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1753_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1753_modified_2020-03-31T14:49:39.188Z" "objects_1753_description_[SpyDealer](https://attack.mitre.org/software/S0324) harvests the device phone number, IMEI, and IMSI.(Citation: PaloAlto-SpyDealer)" "objects_1753_relationship_type_uses" "objects_1753_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1753_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1753_x_mitre_version_1.0" "objects_1753_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1753_spec_version_2.1" "objects_1753_x_mitre_attack_spec_version_2.1.0" "objects_1753_x_mitre_domains_0_mobile-attack" "objects_1754_type_relationship" "objects_1754_id_relationship--f6f21954-c592-40d8-b7a0-75f332c42eaa" "objects_1754_created_2020-11-10T17:08:35.761Z" "objects_1754_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1754_revoked_False" "objects_1754_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1754_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1754_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1754_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1754_modified_2023-04-05T17:00:38.611Z" "objects_1754_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has deleted call log entries coming from known C2 sources.(Citation: Lookout Uyghur Campaign)" "objects_1754_relationship_type_uses" "objects_1754_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_1754_target_ref_attack-pattern--ab7400b7-3476-4776-9545-ef3fa373de63" "objects_1754_x_mitre_deprecated_False" "objects_1754_x_mitre_version_1.0" "objects_1754_x_mitre_attack_spec_version_3.1.0" "objects_1754_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1754_spec_version_2.1" "objects_1754_x_mitre_domains_0_mobile-attack" "objects_1755_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1755_id_relationship--f7039142-dbdc-4ffc-a54f-136ad57a6ac1" "objects_1755_type_relationship" "objects_1755_created_2020-07-20T13:49:03.693Z" "objects_1755_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1755_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1755_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1755_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1755_modified_2020-09-24T15:12:24.242Z" "objects_1755_description_[XLoader for Android](https://attack.mitre.org/software/S0318) collects the device\u2019s IMSI and ICCID.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1755_relationship_type_uses" "objects_1755_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1755_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1755_x_mitre_version_1.0" "objects_1755_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1755_spec_version_2.1" "objects_1755_x_mitre_attack_spec_version_2.1.0" "objects_1755_x_mitre_domains_0_mobile-attack" "objects_1756_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1756_type_relationship" "objects_1756_id_relationship--f709a4a5-2d7f-4fa8-bad8-a536fd3cc7fc" "objects_1756_created_2022-04-01T13:18:40.460Z" "objects_1756_x_mitre_version_0.1" "objects_1756_x_mitre_deprecated_False" "objects_1756_revoked_False" "objects_1756_description_Contact list access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their contact list. " "objects_1756_modified_2022-04-01T13:18:40.460Z" "objects_1756_relationship_type_mitigates" "objects_1756_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1756_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1756_x_mitre_attack_spec_version_2.1.0" "objects_1756_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1756_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1756_spec_version_2.1" "objects_1756_x_mitre_domains_0_mobile-attack" "objects_1757_type_relationship" "objects_1757_id_relationship--f747ccb7-32c0-45fc-9842-bfb160a9db22" "objects_1757_created_2023-07-21T19:39:20.054Z" "objects_1757_revoked_False" "objects_1757_external_references_0_source_name_lookout_bouldspy_0423" "objects_1757_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1757_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1757_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1757_modified_2023-07-21T19:39:20.054Z" "objects_1757_description_[BOULDSPY](https://attack.mitre.org/software/S1079) uses a background service that can restart itself when the parent activity is stopped.(Citation: lookout_bouldspy_0423) " "objects_1757_relationship_type_uses" "objects_1757_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1757_target_ref_attack-pattern--d446b9f0-06a9-4a8d-97ee-298cfee84f14" "objects_1757_x_mitre_deprecated_False" "objects_1757_x_mitre_version_0.1" "objects_1757_x_mitre_attack_spec_version_3.1.0" "objects_1757_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1757_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1757_spec_version_2.1" "objects_1757_x_mitre_domains_0_mobile-attack" "objects_1758_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1758_id_relationship--f776a4da-0fa6-414c-a705-e9e8b419e056" "objects_1758_type_relationship" "objects_1758_created_2020-06-26T15:32:25.058Z" "objects_1758_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1758_external_references_0_source_name_Threat Fabric Cerberus" "objects_1758_external_references_0_url_https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html" "objects_1758_external_references_0_description_Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020." "objects_1758_external_references_1_source_name_CheckPoint Cerberus" "objects_1758_external_references_1_url_https://research.checkpoint.com/2020/mobile-as-attack-vector-using-mdm/" "objects_1758_external_references_1_description_A. Hazum, B. Melnykov, C. Efrati, D. Golubenko, I. Wernik, L. Kuperman, O. Mana. (2020, April 29). First seen in the wild \u2013 Malware uses Corporate MDM as attack vector. Retrieved June 26, 2020." "objects_1758_modified_2020-06-26T15:32:25.058Z" "objects_1758_description_[Cerberus](https://attack.mitre.org/software/S0480) can inject input to grant itself additional permissions without user interaction and to prevent application removal.(Citation: Threat Fabric Cerberus)(Citation: CheckPoint Cerberus)" "objects_1758_relationship_type_uses" "objects_1758_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1758_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1758_x_mitre_version_1.0" "objects_1758_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1758_spec_version_2.1" "objects_1758_x_mitre_attack_spec_version_2.1.0" "objects_1758_x_mitre_domains_0_mobile-attack" "objects_1759_type_relationship" "objects_1759_id_relationship--f7bebe78-2e21-466d-878b-f70be6c0e94a" "objects_1759_created_2021-01-07T17:02:31.805Z" "objects_1759_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1759_revoked_False" "objects_1759_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1759_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1759_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1759_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1759_modified_2023-04-05T19:56:32.861Z" "objects_1759_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can access the device's contact list.(Citation: Zscaler TikTok Spyware) " "objects_1759_relationship_type_uses" "objects_1759_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1759_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1759_x_mitre_deprecated_False" "objects_1759_x_mitre_version_1.0" "objects_1759_x_mitre_attack_spec_version_3.1.0" "objects_1759_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1759_spec_version_2.1" "objects_1759_x_mitre_domains_0_mobile-attack" "objects_1760_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1760_id_relationship--f7c5c344-4310-4e2a-a5aa-133f3d132fff" "objects_1760_type_relationship" "objects_1760_created_2018-10-17T00:14:20.652Z" "objects_1760_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1760_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1760_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1760_external_references_0_source_name_Lookout-StealthMango" "objects_1760_modified_2020-03-31T14:49:39.188Z" "objects_1760_description_[Stealth Mango](https://attack.mitre.org/software/S0328) can perform GPS location tracking as well as capturing coordinates as when an SMS message or call is received.(Citation: Lookout-StealthMango)" "objects_1760_relationship_type_uses" "objects_1760_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1760_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1760_x_mitre_version_1.0" "objects_1760_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1760_spec_version_2.1" "objects_1760_x_mitre_attack_spec_version_2.1.0" "objects_1760_x_mitre_domains_0_mobile-attack" "objects_1761_type_relationship" "objects_1761_id_relationship--f8151852-5a56-4c91-a691-1e50387a291d" "objects_1761_created_2023-09-28T17:39:14.900Z" "objects_1761_revoked_False" "objects_1761_external_references_0_source_name_Trend Micro FlyTrap" "objects_1761_external_references_0_description_Trend Micro. (2021, August 17). FlyTrap Android Malware Is Taking Over Facebook Accounts \u2014 Protect Yourself With a Malware Scanner. Retrieved September 28, 2023." "objects_1761_external_references_0_url_https://news.trendmicro.com/2021/08/17/flytrap-android-malware-is-taking-over-facebook-accounts-protect-yourself-with-a-malware-scanner/" "objects_1761_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1761_modified_2023-09-28T17:39:14.900Z" "objects_1761_description_[FlyTrap](https://attack.mitre.org/software/S1093) can collect IP address and network configuration information.(Citation: Trend Micro FlyTrap)" "objects_1761_relationship_type_uses" "objects_1761_source_ref_malware--8338393c-cb2e-4ee6-b944-34672499c785" "objects_1761_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1761_x_mitre_deprecated_False" "objects_1761_x_mitre_version_0.1" "objects_1761_x_mitre_attack_spec_version_3.2.0" "objects_1761_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1761_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1761_spec_version_2.1" "objects_1761_x_mitre_domains_0_mobile-attack" "objects_1762_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1762_type_relationship" "objects_1762_id_relationship--f84355c2-b829-4324-821a-b5148734bb6b" "objects_1762_created_2022-04-01T15:21:35.655Z" "objects_1762_x_mitre_version_0.1" "objects_1762_x_mitre_deprecated_False" "objects_1762_revoked_False" "objects_1762_description_Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to microphone or audio output. " "objects_1762_modified_2022-04-01T15:21:35.655Z" "objects_1762_relationship_type_mitigates" "objects_1762_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1762_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1762_x_mitre_attack_spec_version_2.1.0" "objects_1762_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1762_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1762_spec_version_2.1" "objects_1762_x_mitre_domains_0_mobile-attack" "objects_1763_type_relationship" "objects_1763_id_relationship--f857935b-653a-4b9a-a2dc-59c042059a39" "objects_1763_created_2023-03-20T15:56:04.673Z" "objects_1763_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1763_revoked_False" "objects_1763_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1763_modified_2023-08-14T16:28:45.049Z" "objects_1763_description_Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. " "objects_1763_relationship_type_detects" "objects_1763_source_ref_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1763_target_ref_attack-pattern--986f80f7-ff0e-4f48-87bd-0394814bbce5" "objects_1763_x_mitre_deprecated_False" "objects_1763_x_mitre_version_0.1" "objects_1763_x_mitre_attack_spec_version_3.1.0" "objects_1763_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1763_spec_version_2.1" "objects_1763_x_mitre_domains_0_mobile-attack" "objects_1764_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1764_id_relationship--f87bb2d2-e7fd-44ce-b537-e7e01086731c" "objects_1764_type_relationship" "objects_1764_created_2020-12-18T20:14:47.371Z" "objects_1764_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1764_external_references_0_source_name_WhiteOps TERRACOTTA" "objects_1764_external_references_0_url_https://www.whiteops.com/blog/terracotta-android-malware-a-technical-study" "objects_1764_external_references_0_description_Satori Threat Intelligence and Research Team. (2020, August). TERRACOTTA Android Malware: A Technical Study. Retrieved December 18, 2020." "objects_1764_modified_2020-12-18T21:00:05.246Z" "objects_1764_description_[TERRACOTTA](https://attack.mitre.org/software/S0545) can send SMS messages.(Citation: WhiteOps TERRACOTTA)" "objects_1764_relationship_type_uses" "objects_1764_source_ref_malware--e296b110-46d3-4f7a-894c-cc71ea50168c" "objects_1764_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_1764_x_mitre_version_1.0" "objects_1764_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1764_spec_version_2.1" "objects_1764_x_mitre_attack_spec_version_2.1.0" "objects_1764_x_mitre_domains_0_mobile-attack" "objects_1765_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1765_id_relationship--f88cbb0c-ca34-4a87-82fa-e0e567ee8d57" "objects_1765_type_relationship" "objects_1765_created_2020-04-08T15:51:25.120Z" "objects_1765_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1765_external_references_0_source_name_ThreatFabric Ginp" "objects_1765_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1765_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1765_modified_2020-04-08T15:51:25.120Z" "objects_1765_description_[Ginp](https://attack.mitre.org/software/S0423) obfuscates its payload, code, and strings.(Citation: ThreatFabric Ginp)" "objects_1765_relationship_type_uses" "objects_1765_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1765_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1765_x_mitre_version_1.0" "objects_1765_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1765_spec_version_2.1" "objects_1765_x_mitre_attack_spec_version_2.1.0" "objects_1765_x_mitre_domains_0_mobile-attack" "objects_1766_type_relationship" "objects_1766_id_relationship--f92fe9dd-7296-42f6-904e-e245c438376e" "objects_1766_created_2020-12-14T15:02:35.291Z" "objects_1766_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1766_revoked_False" "objects_1766_external_references_0_source_name_Securelist Asacub" "objects_1766_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1766_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1766_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1766_modified_2023-04-05T21:25:06.012Z" "objects_1766_description_[Asacub](https://attack.mitre.org/software/S0540) can request device administrator permissions.(Citation: Securelist Asacub)" "objects_1766_relationship_type_uses" "objects_1766_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1766_target_ref_attack-pattern--9c049d7b-c92a-4733-9381-27e2bd2ccadc" "objects_1766_x_mitre_deprecated_False" "objects_1766_x_mitre_version_1.0" "objects_1766_x_mitre_attack_spec_version_3.1.0" "objects_1766_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1766_spec_version_2.1" "objects_1766_x_mitre_domains_0_mobile-attack" "objects_1767_type_relationship" "objects_1767_id_relationship--f947d845-4d70-41f3-ae3c-18ea8b44e667" "objects_1767_created_2017-12-14T16:46:06.044Z" "objects_1767_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1767_revoked_False" "objects_1767_external_references_0_source_name_ArsTechnica-HummingBad" "objects_1767_external_references_0_description_Dan Goodin. (2016, July 7). 10 million Android phones infected by all-powerful auto-rooting apps. Retrieved January 24, 2017." "objects_1767_external_references_0_url_http://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/" "objects_1767_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1767_modified_2023-04-21T18:51:23.251Z" "objects_1767_description_[HummingBad](https://attack.mitre.org/software/S0322) can create fraudulent statistics inside the official Google Play Store, and has generated revenue from installing fraudulent apps and displaying malicious advertisements.(Citation: ArsTechnica-HummingBad)" "objects_1767_relationship_type_uses" "objects_1767_source_ref_malware--c8770c81-c29f-40d2-a140-38544206b2b4" "objects_1767_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1767_x_mitre_deprecated_False" "objects_1767_x_mitre_version_1.0" "objects_1767_x_mitre_attack_spec_version_3.1.0" "objects_1767_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1767_spec_version_2.1" "objects_1767_x_mitre_domains_0_mobile-attack" "objects_1768_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1768_type_relationship" "objects_1768_id_relationship--f95fec2e-f5cf-49c9-8e0b-1c6c5fd15d8f" "objects_1768_created_2019-10-18T14:50:57.494Z" "objects_1768_x_mitre_version_1.0" "objects_1768_x_mitre_deprecated_False" "objects_1768_revoked_False" "objects_1768_description_Security updates often contain patches for vulnerabilities." "objects_1768_modified_2022-04-11T14:26:44.192Z" "objects_1768_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1768_relationship_type_mitigates" "objects_1768_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1768_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_1768_x_mitre_attack_spec_version_2.1.0" "objects_1768_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1768_spec_version_2.1" "objects_1768_x_mitre_domains_0_mobile-attack" "objects_1769_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1769_id_relationship--f989562f-41a8-46d3-94ba-fca7269ae592" "objects_1769_type_relationship" "objects_1769_created_2018-10-17T00:14:20.652Z" "objects_1769_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1769_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1769_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1769_external_references_0_source_name_Lookout-StealthMango" "objects_1769_modified_2020-03-31T14:49:39.188Z" "objects_1769_description_[Stealth Mango](https://attack.mitre.org/software/S0328) is delivered via a a watering hole website that mimics the third-party Android app store APKMonk. In at least one case, the watering hole URL was distributed through Facebook Messenger.(Citation: Lookout-StealthMango)" "objects_1769_relationship_type_uses" "objects_1769_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1769_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1769_x_mitre_version_1.0" "objects_1769_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1769_spec_version_2.1" "objects_1769_x_mitre_attack_spec_version_2.1.0" "objects_1769_x_mitre_domains_0_mobile-attack" "objects_1770_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1770_type_relationship" "objects_1770_id_relationship--f9d0cfb5-aeda-4de4-9c72-7098297555ae" "objects_1770_created_2019-09-04T20:01:42.753Z" "objects_1770_x_mitre_version_1.0" "objects_1770_external_references_0_source_name_Nightwatch screencap April 2016" "objects_1770_external_references_0_url_https://wwws.nightwatchcybersecurity.com/2016/04/13/research-securing-android-applications-from-screen-capture/" "objects_1770_external_references_0_description_Nightwatch Cybersecurity. (2016, April 13). Research: Securing Android Applications from Screen Capture (FLAG_SECURE). Retrieved November 5, 2019." "objects_1770_x_mitre_deprecated_False" "objects_1770_revoked_False" "objects_1770_description_Application developers can apply the `FLAG_SECURE` property to sensitive screens within their apps to make it more difficult for the screen contents to be captured.(Citation: Nightwatch screencap April 2016) " "objects_1770_modified_2022-04-01T13:31:59.712Z" "objects_1770_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1770_relationship_type_mitigates" "objects_1770_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_1770_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1770_x_mitre_attack_spec_version_2.1.0" "objects_1770_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1770_spec_version_2.1" "objects_1770_x_mitre_domains_0_mobile-attack" "objects_1771_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1771_id_relationship--f9de9819-b131-459e-948b-bdf3fe6f1ef0" "objects_1771_type_relationship" "objects_1771_created_2020-12-24T21:55:56.686Z" "objects_1771_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1771_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1771_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1771_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1771_modified_2020-12-24T21:55:56.686Z" "objects_1771_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed common system information.(Citation: Lookout Uyghur Campaign)" "objects_1771_relationship_type_uses" "objects_1771_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1771_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1771_x_mitre_version_1.0" "objects_1771_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1771_spec_version_2.1" "objects_1771_x_mitre_attack_spec_version_2.1.0" "objects_1771_x_mitre_domains_0_mobile-attack" "objects_1772_type_relationship" "objects_1772_id_relationship--fa13936f-9b9d-4b48-a33f-81044f6cdedb" "objects_1772_created_2020-09-15T15:18:12.466Z" "objects_1772_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1772_revoked_False" "objects_1772_external_references_0_source_name_Cybereason FakeSpy" "objects_1772_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1772_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1772_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1772_modified_2023-04-05T20:17:07.033Z" "objects_1772_description_[FakeSpy](https://attack.mitre.org/software/S0509) exfiltrates data using HTTP requests.(Citation: Cybereason FakeSpy)" "objects_1772_relationship_type_uses" "objects_1772_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1772_target_ref_attack-pattern--2282a98b-5049-4f61-9381-55baca7c1add" "objects_1772_x_mitre_deprecated_False" "objects_1772_x_mitre_version_1.0" "objects_1772_x_mitre_attack_spec_version_3.1.0" "objects_1772_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1772_spec_version_2.1" "objects_1772_x_mitre_domains_0_mobile-attack" "objects_1773_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1773_id_relationship--fa1da6db-da32-45d2-98a8-6bbe153166da" "objects_1773_type_relationship" "objects_1773_created_2017-12-14T16:46:06.044Z" "objects_1773_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1773_external_references_0_source_name_Lookout-EnterpriseApps" "objects_1773_external_references_0_description_Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016." "objects_1773_external_references_0_url_https://blog.lookout.com/blog/2016/05/25/spoofed-apps/" "objects_1773_modified_2020-03-31T14:49:39.188Z" "objects_1773_description_[AndroRAT](https://attack.mitre.org/software/S0292) tracks the device location.(Citation: Lookout-EnterpriseApps)" "objects_1773_relationship_type_uses" "objects_1773_source_ref_malware--a3dad2be-ce62-4440-953b-00fbce7aba93" "objects_1773_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1773_x_mitre_version_1.0" "objects_1773_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1773_spec_version_2.1" "objects_1773_x_mitre_attack_spec_version_2.1.0" "objects_1773_x_mitre_domains_0_mobile-attack" "objects_1774_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1774_id_relationship--fa222de8-ba3a-45c1-a7eb-d7502843cc2d" "objects_1774_type_relationship" "objects_1774_created_2021-01-05T20:16:20.417Z" "objects_1774_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1774_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1774_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1774_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1774_modified_2021-01-05T20:16:20.417Z" "objects_1774_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) can capture photos and videos from the device\u2019s camera.(Citation: Zscaler TikTok Spyware)" "objects_1774_relationship_type_uses" "objects_1774_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1774_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1774_x_mitre_version_1.0" "objects_1774_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1774_spec_version_2.1" "objects_1774_x_mitre_attack_spec_version_2.1.0" "objects_1774_x_mitre_domains_0_mobile-attack" "objects_1775_type_relationship" "objects_1775_id_relationship--fa5f3aea-2131-4690-8833-dc428fae2b22" "objects_1775_created_2023-01-18T21:38:34.350Z" "objects_1775_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1775_revoked_False" "objects_1775_external_references_0_source_name_nccgroup_sharkbot_0322" "objects_1775_external_references_0_description_RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a \u201cnew\u201d generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023." "objects_1775_external_references_0_url_https://research.nccgroup.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/" "objects_1775_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1775_modified_2023-03-27T18:57:53.504Z" "objects_1775_description_[SharkBot](https://attack.mitre.org/software/S1055) can intercept notifications to send to the C2 server and take advantage of the Direct Reply feature.(Citation: nccgroup_sharkbot_0322)" "objects_1775_relationship_type_uses" "objects_1775_source_ref_malware--9cd72f5c-bec0-4f7e-bb6d-296937116291" "objects_1775_target_ref_attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2" "objects_1775_x_mitre_deprecated_False" "objects_1775_x_mitre_version_0.1" "objects_1775_x_mitre_attack_spec_version_3.1.0" "objects_1775_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1775_spec_version_2.1" "objects_1775_x_mitre_domains_0_mobile-attack" "objects_1776_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1776_type_relationship" "objects_1776_id_relationship--fada5ba5-7449-4878-b555-82f225473c8b" "objects_1776_created_2022-03-30T19:28:42.179Z" "objects_1776_x_mitre_version_0.1" "objects_1776_x_mitre_deprecated_False" "objects_1776_revoked_False" "objects_1776_description_Attestation can detect unauthorized modifications to devices. Mobile security software can then use this information and take appropriate mitigation action. " "objects_1776_modified_2022-03-30T19:28:42.179Z" "objects_1776_relationship_type_mitigates" "objects_1776_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1776_target_ref_attack-pattern--0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d" "objects_1776_x_mitre_attack_spec_version_2.1.0" "objects_1776_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1776_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1776_spec_version_2.1" "objects_1776_x_mitre_domains_0_mobile-attack" "objects_1777_type_relationship" "objects_1777_id_relationship--fadd27ec-56ac-4834-af40-76c9e8764eb9" "objects_1777_created_2023-07-21T19:34:53.934Z" "objects_1777_revoked_False" "objects_1777_external_references_0_source_name_lookout_bouldspy_0423" "objects_1777_external_references_0_description_Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023." "objects_1777_external_references_0_url_https://www.lookout.com/blog/iranian-spyware-bouldspy" "objects_1777_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1777_modified_2023-07-21T19:34:53.934Z" "objects_1777_description_[BOULDSPY](https://attack.mitre.org/software/S1079) can get a device\u2019s location using GPS or network.(Citation: lookout_bouldspy_0423)" "objects_1777_relationship_type_uses" "objects_1777_source_ref_malware--a2ee7d2d-fb45-44f3-8f67-9921c7810db1" "objects_1777_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1777_x_mitre_deprecated_False" "objects_1777_x_mitre_version_0.1" "objects_1777_x_mitre_attack_spec_version_3.1.0" "objects_1777_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1777_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1777_spec_version_2.1" "objects_1777_x_mitre_domains_0_mobile-attack" "objects_1778_type_relationship" "objects_1778_id_relationship--faf3396c-3a53-478c-b15c-7ff44ef4a5f5" "objects_1778_created_2023-06-09T19:16:53.458Z" "objects_1778_revoked_False" "objects_1778_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1778_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1778_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1778_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1778_modified_2023-06-09T19:16:53.458Z" "objects_1778_description_[Hornbill](https://attack.mitre.org/software/S1077) can access a device\u2019s camera and take photos.(Citation: lookout_hornbill_sunbird_0221)" "objects_1778_relationship_type_uses" "objects_1778_source_ref_malware--15d78a95-af6a-4b06-8dae-76bedb0ec5a1" "objects_1778_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1778_x_mitre_deprecated_False" "objects_1778_x_mitre_version_0.1" "objects_1778_x_mitre_attack_spec_version_3.1.0" "objects_1778_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1778_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1778_spec_version_2.1" "objects_1778_x_mitre_domains_0_mobile-attack" "objects_1779_type_relationship" "objects_1779_id_relationship--faff9f9c-9064-4b3a-bdf9-bbeced2447a6" "objects_1779_created_2020-09-11T16:22:03.266Z" "objects_1779_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1779_revoked_False" "objects_1779_external_references_0_source_name_Lookout ViperRAT" "objects_1779_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1779_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1779_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1779_modified_2023-04-05T20:33:34.466Z" "objects_1779_description_[ViperRAT](https://attack.mitre.org/software/S0506) can collect SMS messages.(Citation: Lookout ViperRAT)" "objects_1779_relationship_type_uses" "objects_1779_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1779_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1779_x_mitre_deprecated_False" "objects_1779_x_mitre_version_1.0" "objects_1779_x_mitre_attack_spec_version_3.1.0" "objects_1779_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1779_spec_version_2.1" "objects_1779_x_mitre_domains_0_mobile-attack" "objects_1780_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1780_id_relationship--fb2a14c1-bed9-4c3f-a60b-8df384c18b68" "objects_1780_type_relationship" "objects_1780_created_2020-12-24T21:45:56.979Z" "objects_1780_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1780_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1780_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1780_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1780_modified_2021-04-19T14:29:46.650Z" "objects_1780_description_[SilkBean](https://attack.mitre.org/software/S0549) can retrieve files from external storage and can collect browser data.(Citation: Lookout Uyghur Campaign)" "objects_1780_relationship_type_uses" "objects_1780_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_1780_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1780_x_mitre_version_1.0" "objects_1780_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1780_spec_version_2.1" "objects_1780_x_mitre_attack_spec_version_2.1.0" "objects_1780_x_mitre_domains_0_mobile-attack" "objects_1781_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1781_id_relationship--fb3b32a8-6422-4d44-91e3-27a58e569963" "objects_1781_type_relationship" "objects_1781_created_2019-09-03T19:45:48.494Z" "objects_1781_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1781_external_references_0_source_name_SWB Exodus March 2019" "objects_1781_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1781_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1781_modified_2020-03-31T14:49:39.188Z" "objects_1781_description_ [Exodus](https://attack.mitre.org/software/S0405) Two can take screenshots of any application in the foreground.(Citation: SWB Exodus March 2019) " "objects_1781_relationship_type_uses" "objects_1781_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1781_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1781_x_mitre_version_1.0" "objects_1781_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1781_spec_version_2.1" "objects_1781_x_mitre_attack_spec_version_2.1.0" "objects_1781_x_mitre_domains_0_mobile-attack" "objects_1782_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1782_id_relationship--fb51161a-ef2e-41a4-b5f9-bd1f64f95674" "objects_1782_type_relationship" "objects_1782_created_2020-12-24T22:04:28.025Z" "objects_1782_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1782_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1782_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1782_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1782_modified_2020-12-24T22:04:28.025Z" "objects_1782_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has retrieved .doc, .txt, .gif, .apk, .jpg, .png, .mp3, and .db files from external storage.(Citation: Lookout Uyghur Campaign)" "objects_1782_relationship_type_uses" "objects_1782_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_1782_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1782_x_mitre_version_1.0" "objects_1782_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1782_spec_version_2.1" "objects_1782_x_mitre_attack_spec_version_2.1.0" "objects_1782_x_mitre_domains_0_mobile-attack" "objects_1783_type_relationship" "objects_1783_id_relationship--fb587f81-1300-438d-a33b-f8d08530788b" "objects_1783_created_2019-07-10T15:35:43.704Z" "objects_1783_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1783_revoked_False" "objects_1783_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1783_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1783_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1783_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1783_modified_2023-04-05T20:41:13.182Z" "objects_1783_description_[Pallas](https://attack.mitre.org/software/S0399) exfiltrates data using HTTP.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1783_relationship_type_uses" "objects_1783_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1783_target_ref_attack-pattern--32063d7f-0a39-440d-a4a3-2694488f96cc" "objects_1783_x_mitre_deprecated_False" "objects_1783_x_mitre_version_1.0" "objects_1783_x_mitre_attack_spec_version_3.1.0" "objects_1783_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1783_spec_version_2.1" "objects_1783_x_mitre_domains_0_mobile-attack" "objects_1784_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1784_id_relationship--fb5c6c5e-53d4-4bb9-b9cf-74170058b19b" "objects_1784_type_relationship" "objects_1784_created_2018-10-17T00:14:20.652Z" "objects_1784_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1784_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1784_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1784_external_references_0_source_name_Lookout-StealthMango" "objects_1784_modified_2020-03-31T14:49:39.188Z" "objects_1784_description_[Stealth Mango](https://attack.mitre.org/software/S0328) collected and exfiltrated data from the device, including sensitive letters/documents, stored photos, and stored audio files.(Citation: Lookout-StealthMango)" "objects_1784_relationship_type_uses" "objects_1784_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1784_target_ref_attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a" "objects_1784_x_mitre_version_1.0" "objects_1784_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1784_spec_version_2.1" "objects_1784_x_mitre_attack_spec_version_2.1.0" "objects_1784_x_mitre_domains_0_mobile-attack" "objects_1785_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1785_type_relationship" "objects_1785_id_relationship--fb62afa9-d593-44f8-840d-bd5c595a1228" "objects_1785_created_2022-04-01T18:44:46.780Z" "objects_1785_x_mitre_version_0.1" "objects_1785_x_mitre_deprecated_False" "objects_1785_revoked_False" "objects_1785_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features." "objects_1785_modified_2022-04-01T18:44:46.780Z" "objects_1785_relationship_type_mitigates" "objects_1785_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1785_target_ref_attack-pattern--dc01774a-d1c1-45fb-b506-0a5d1d6593d9" "objects_1785_x_mitre_attack_spec_version_2.1.0" "objects_1785_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1785_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1785_spec_version_2.1" "objects_1785_x_mitre_domains_0_mobile-attack" "objects_1786_type_relationship" "objects_1786_id_relationship--fb6458b0-01b8-4c3f-b0f2-ef5d5bd9f6a8" "objects_1786_created_2018-10-17T00:14:20.652Z" "objects_1786_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1786_revoked_False" "objects_1786_external_references_0_source_name_Lookout-StealthMango" "objects_1786_external_references_0_description_Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018." "objects_1786_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf" "objects_1786_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1786_modified_2023-04-05T16:50:54.500Z" "objects_1786_description_[Stealth Mango](https://attack.mitre.org/software/S0328) uploads SMS messages.(Citation: Lookout-StealthMango)" "objects_1786_relationship_type_uses" "objects_1786_source_ref_malware--085eb36d-697d-4d9a-bac3-96eb879fe73c" "objects_1786_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1786_x_mitre_deprecated_False" "objects_1786_x_mitre_version_1.0" "objects_1786_x_mitre_attack_spec_version_3.1.0" "objects_1786_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1786_spec_version_2.1" "objects_1786_x_mitre_domains_0_mobile-attack" "objects_1787_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1787_id_relationship--fbdbddd7-4980-4061-9192-24a887bc6bad" "objects_1787_type_relationship" "objects_1787_created_2020-12-07T14:28:32.141Z" "objects_1787_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1787_external_references_0_source_name_Threat Fabric Exobot" "objects_1787_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1787_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1787_modified_2020-12-07T14:28:32.141Z" "objects_1787_description_[Exobot](https://attack.mitre.org/software/S0522) can open a SOCKS proxy connection through the compromised device.(Citation: Threat Fabric Exobot)" "objects_1787_relationship_type_uses" "objects_1787_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1787_target_ref_attack-pattern--5ca3c7ec-55b2-4587-9376-cf6c96f8047a" "objects_1787_x_mitre_version_1.0" "objects_1787_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1787_spec_version_2.1" "objects_1787_x_mitre_attack_spec_version_2.1.0" "objects_1787_x_mitre_domains_0_mobile-attack" "objects_1788_type_relationship" "objects_1788_id_relationship--fbeef07b-7aa1-461c-884a-d3c4f730d5f7" "objects_1788_created_2023-09-28T17:22:27.968Z" "objects_1788_revoked_False" "objects_1788_external_references_0_source_name_Bleeipng Computer Escobar" "objects_1788_external_references_0_description_B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023." "objects_1788_external_references_0_url_https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/" "objects_1788_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1788_modified_2023-09-28T17:22:27.968Z" "objects_1788_description_[Escobar](https://attack.mitre.org/software/S1092) can collect credentials using phishing overlays.(Citation: Bleeipng Computer Escobar)" "objects_1788_relationship_type_uses" "objects_1788_source_ref_malware--ec13d292-6d8d-4c7a-b07c-a2bd2402569a" "objects_1788_target_ref_attack-pattern--4c58b7c6-a839-4789-bda9-9de33e4d4512" "objects_1788_x_mitre_deprecated_False" "objects_1788_x_mitre_version_0.1" "objects_1788_x_mitre_attack_spec_version_3.2.0" "objects_1788_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1788_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1788_spec_version_2.1" "objects_1788_x_mitre_domains_0_mobile-attack" "objects_1789_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1789_id_relationship--fc22c1f0-6888-43c0-ac7e-ee3d21feafc4" "objects_1789_type_relationship" "objects_1789_created_2019-09-03T19:45:48.485Z" "objects_1789_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1789_external_references_0_source_name_SWB Exodus March 2019" "objects_1789_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1789_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1789_modified_2020-03-31T14:49:39.188Z" "objects_1789_description_ [Exodus](https://attack.mitre.org/software/S0405) Two can obtain a list of installed applications.(Citation: SWB Exodus March 2019) " "objects_1789_relationship_type_uses" "objects_1789_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1789_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1789_x_mitre_version_1.0" "objects_1789_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1789_spec_version_2.1" "objects_1789_x_mitre_attack_spec_version_2.1.0" "objects_1789_x_mitre_domains_0_mobile-attack" "objects_1790_type_relationship" "objects_1790_id_relationship--fc7639c8-0e52-4f6f-9cf3-7840be81ad55" "objects_1790_created_2023-03-03T16:23:56.031Z" "objects_1790_revoked_False" "objects_1790_external_references_0_source_name_paloalto_yispecter_1015" "objects_1790_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved March 3, 2023." "objects_1790_external_references_0_url_https://unit42.paloaltonetworks.com/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1790_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1790_modified_2023-03-03T16:23:56.031Z" "objects_1790_description_[YiSpecter](https://attack.mitre.org/software/S0311) has collected the device UUID.(Citation: paloalto_yispecter_1015)" "objects_1790_relationship_type_uses" "objects_1790_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1790_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_1790_x_mitre_deprecated_False" "objects_1790_x_mitre_version_0.1" "objects_1790_x_mitre_attack_spec_version_3.1.0" "objects_1790_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1790_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1790_spec_version_2.1" "objects_1790_x_mitre_domains_0_mobile-attack" "objects_1791_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1791_id_relationship--fc816ddc-199d-47b0-93af-c81305d0919f" "objects_1791_type_relationship" "objects_1791_created_2020-06-02T14:32:31.767Z" "objects_1791_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1791_external_references_0_source_name_Volexity Insomnia" "objects_1791_external_references_0_url_https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/" "objects_1791_external_references_0_description_A. Case, D. Lassalle, M. Meltzer, S. Koessel, et al.. (2020, April 21). Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant. Retrieved June 2, 2020." "objects_1791_modified_2020-06-02T14:32:31.767Z" "objects_1791_description_[INSOMNIA](https://attack.mitre.org/software/S0463) has utilized malicious JavaScript and iframes to exploit WebKit running on vulnerable iOS 12 devices.(Citation: Volexity Insomnia)" "objects_1791_relationship_type_uses" "objects_1791_source_ref_malware--21b7e0b0-0dea-4ccc-8ad4-8da51fe3a901" "objects_1791_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1791_x_mitre_version_1.0" "objects_1791_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1791_spec_version_2.1" "objects_1791_x_mitre_attack_spec_version_2.1.0" "objects_1791_x_mitre_domains_0_mobile-attack" "objects_1792_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1792_id_relationship--fcb3a139-f644-45c9-8123-dfea0455143a" "objects_1792_type_relationship" "objects_1792_created_2019-08-09T17:56:05.588Z" "objects_1792_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1792_external_references_0_url_https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/" "objects_1792_external_references_0_description_Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018." "objects_1792_external_references_0_source_name_PaloAlto-SpyDealer" "objects_1792_modified_2020-03-31T14:49:39.188Z" "objects_1792_description_[SpyDealer](https://attack.mitre.org/software/S0324) can record video and take photos via front and rear cameras.(Citation: PaloAlto-SpyDealer)" "objects_1792_relationship_type_uses" "objects_1792_source_ref_malware--86fc6f0c-86d9-473e-89f3-f50f3cb9319b" "objects_1792_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1792_x_mitre_version_1.0" "objects_1792_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1792_spec_version_2.1" "objects_1792_x_mitre_attack_spec_version_2.1.0" "objects_1792_x_mitre_domains_0_mobile-attack" "objects_1793_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1793_id_relationship--fcc42341-ec3a-4e24-a374-46bed72d061f" "objects_1793_type_relationship" "objects_1793_created_2021-10-01T14:42:49.191Z" "objects_1793_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1793_external_references_0_source_name_SecureList BusyGasper" "objects_1793_external_references_0_url_https://securelist.com/busygasper-the-unfriendly-spy/87627/" "objects_1793_external_references_0_description_Alexey Firsh. (2018, August 29). BusyGasper \u2013 the unfriendly spy. Retrieved October 1, 2021." "objects_1793_modified_2021-10-01T14:42:49.191Z" "objects_1793_description_[BusyGasper](https://attack.mitre.org/software/S0655) can collect data from messaging applications, including WhatsApp, Viber, and Facebook.(Citation: SecureList BusyGasper)" "objects_1793_relationship_type_uses" "objects_1793_source_ref_malware--e110f94a-e2c5-4f5f-ba78-9c2ab6d2d9e4" "objects_1793_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_1793_x_mitre_version_1.0" "objects_1793_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1793_spec_version_2.1" "objects_1793_x_mitre_attack_spec_version_2.1.0" "objects_1793_x_mitre_domains_0_mobile-attack" "objects_1794_type_relationship" "objects_1794_id_relationship--fcda686d-0c3a-457a-a34d-6dcfb28f54bd" "objects_1794_created_2020-06-26T14:55:13.333Z" "objects_1794_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1794_revoked_False" "objects_1794_external_references_0_source_name_Cybereason EventBot" "objects_1794_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1794_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1794_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1794_modified_2023-04-05T17:49:38.924Z" "objects_1794_description_[EventBot](https://attack.mitre.org/software/S0478) registers for the `BOOT_COMPLETED` intent to auto-start after the device boots.(Citation: Cybereason EventBot)" "objects_1794_relationship_type_uses" "objects_1794_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1794_target_ref_attack-pattern--3775a580-a1d1-46c4-8147-c614a715f2e9" "objects_1794_x_mitre_deprecated_False" "objects_1794_x_mitre_version_1.0" "objects_1794_x_mitre_attack_spec_version_3.1.0" "objects_1794_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1794_spec_version_2.1" "objects_1794_x_mitre_domains_0_mobile-attack" "objects_1795_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1795_id_relationship--fcdc2f1f-9787-4faa-86bf-2ed73f15a576" "objects_1795_type_relationship" "objects_1795_created_2020-09-14T14:13:45.294Z" "objects_1795_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1795_external_references_0_source_name_Lookout eSurv" "objects_1795_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_1795_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_1795_modified_2020-09-14T15:39:17.961Z" "objects_1795_description_[eSurv](https://attack.mitre.org/software/S0507)\u2019s Android version is distributed in three stages: the dropper, the second stage payload, and the third stage payload which is [Exodus](https://attack.mitre.org/software/S0405).(Citation: Lookout eSurv)" "objects_1795_relationship_type_uses" "objects_1795_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_1795_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1795_x_mitre_version_1.0" "objects_1795_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1795_spec_version_2.1" "objects_1795_x_mitre_attack_spec_version_2.1.0" "objects_1795_x_mitre_domains_0_mobile-attack" "objects_1796_type_relationship" "objects_1796_id_relationship--fd50cda0-66d4-4ae1-864e-9345d8124ce2" "objects_1796_created_2023-08-08T16:14:27.679Z" "objects_1796_revoked_False" "objects_1796_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1796_modified_2023-08-08T16:14:27.679Z" "objects_1796_description_Application vetting services may potentially determine if an application contains suspicious code and/or metadata." "objects_1796_relationship_type_detects" "objects_1796_source_ref_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1796_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1796_x_mitre_deprecated_False" "objects_1796_x_mitre_version_0.1" "objects_1796_x_mitre_attack_spec_version_3.1.0" "objects_1796_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1796_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1796_spec_version_2.1" "objects_1796_x_mitre_domains_0_mobile-attack" "objects_1797_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1797_id_relationship--fd5b3d4b-5d56-4d66-8b57-f858bc139901" "objects_1797_type_relationship" "objects_1797_created_2020-04-24T17:46:31.607Z" "objects_1797_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1797_external_references_0_source_name_SecurityIntelligence TrickMo" "objects_1797_external_references_0_url_https://securityintelligence.com/posts/trickbot-pushing-a-2fa-bypass-app-to-bank-customers-in-germany/" "objects_1797_external_references_0_description_P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020." "objects_1797_modified_2020-04-24T17:46:31.607Z" "objects_1797_description_[TrickMo](https://attack.mitre.org/software/S0427) contains obfuscated function, class, and variable names, and encrypts its shared preferences using Java\u2019s `PBEWithMD5AndDES` algorithm.(Citation: SecurityIntelligence TrickMo)" "objects_1797_relationship_type_uses" "objects_1797_source_ref_malware--21170624-89db-4e99-bf27-58d26be07c3a" "objects_1797_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_1797_x_mitre_version_1.0" "objects_1797_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1797_spec_version_2.1" "objects_1797_x_mitre_attack_spec_version_2.1.0" "objects_1797_x_mitre_domains_0_mobile-attack" "objects_1798_type_relationship" "objects_1798_id_relationship--fd6c7f4b-ce0f-4770-8487-786e41b63549" "objects_1798_created_2023-03-20T18:24:56.396Z" "objects_1798_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1798_revoked_False" "objects_1798_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1798_modified_2023-08-07T17:12:07.475Z" "objects_1798_description_Mobile security products can often alert the user if their device is vulnerable to known exploits." "objects_1798_relationship_type_detects" "objects_1798_source_ref_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1798_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1798_x_mitre_deprecated_False" "objects_1798_x_mitre_version_0.1" "objects_1798_x_mitre_attack_spec_version_3.1.0" "objects_1798_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1798_spec_version_2.1" "objects_1798_x_mitre_domains_0_mobile-attack" "objects_1799_type_relationship" "objects_1799_id_relationship--fd8a4b6d-0e7b-4105-ad7b-576836be6394" "objects_1799_created_2021-02-08T16:36:20.639Z" "objects_1799_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1799_revoked_False" "objects_1799_external_references_0_source_name_BlackBerry Bahamut" "objects_1799_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1799_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1799_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1799_modified_2023-04-05T17:07:15.780Z" "objects_1799_description_[Windshift](https://attack.mitre.org/groups/G0112) has region-locked their malicious applications during their Operation BULL campaign.(Citation: BlackBerry Bahamut)" "objects_1799_relationship_type_uses" "objects_1799_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1799_target_ref_attack-pattern--e422b6fa-4739-46b9-992e-82f1b350c780" "objects_1799_x_mitre_deprecated_False" "objects_1799_x_mitre_version_1.0" "objects_1799_x_mitre_attack_spec_version_3.1.0" "objects_1799_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1799_spec_version_2.1" "objects_1799_x_mitre_domains_0_mobile-attack" "objects_1800_type_relationship" "objects_1800_id_relationship--fda8fe32-6121-4b81-9aa0-4e9596db88b1" "objects_1800_created_2020-07-15T20:20:59.227Z" "objects_1800_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1800_revoked_False" "objects_1800_external_references_0_source_name_Bitdefender Mandrake" "objects_1800_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1800_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1800_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1800_modified_2023-04-05T20:33:57.748Z" "objects_1800_description_[Mandrake](https://attack.mitre.org/software/S0485) can access SMS messages.(Citation: Bitdefender Mandrake)" "objects_1800_relationship_type_uses" "objects_1800_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1800_target_ref_attack-pattern--c6421411-ae61-42bb-9098-73fddb315002" "objects_1800_x_mitre_deprecated_False" "objects_1800_x_mitre_version_1.0" "objects_1800_x_mitre_attack_spec_version_3.1.0" "objects_1800_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1800_spec_version_2.1" "objects_1800_x_mitre_domains_0_mobile-attack" "objects_1801_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1801_type_relationship" "objects_1801_id_relationship--fdf06a0b-08d2-4cac-9d49-b3f1454ec4ea" "objects_1801_created_2022-03-30T19:32:43.015Z" "objects_1801_x_mitre_version_0.1" "objects_1801_x_mitre_deprecated_False" "objects_1801_revoked_False" "objects_1801_description_Attestation can detect rooted devices. Mobile security software can then use this information and take appropriate mitigation action. Attestation can detect rooted devices." "objects_1801_modified_2022-03-30T19:32:43.015Z" "objects_1801_relationship_type_mitigates" "objects_1801_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1801_target_ref_attack-pattern--0cdd66ad-26ac-4338-a764-4972a1e17ee3" "objects_1801_x_mitre_attack_spec_version_2.1.0" "objects_1801_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1801_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1801_spec_version_2.1" "objects_1801_x_mitre_domains_0_mobile-attack" "objects_1802_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1802_type_relationship" "objects_1802_id_relationship--fe794ba6-42be-4d42-a16f-a41473874331" "objects_1802_created_2022-03-30T15:08:13.679Z" "objects_1802_x_mitre_version_0.1" "objects_1802_external_references_0_source_name_Android-VerifiedBoot" "objects_1802_external_references_0_url_https://source.android.com/security/verifiedboot/" "objects_1802_external_references_0_description_Android. (n.d.). Verified Boot. Retrieved December 21, 2016." "objects_1802_x_mitre_deprecated_False" "objects_1802_revoked_False" "objects_1802_description_Android Verified Boot can detect unauthorized modifications made to the system partition, which could lead to execution flow hijacking.(Citation: Android-VerifiedBoot) " "objects_1802_modified_2022-03-30T15:08:13.679Z" "objects_1802_relationship_type_mitigates" "objects_1802_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_1802_target_ref_attack-pattern--c6e17ca2-08b5-4379-9786-89bd05241831" "objects_1802_x_mitre_attack_spec_version_2.1.0" "objects_1802_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1802_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1802_spec_version_2.1" "objects_1802_x_mitre_domains_0_mobile-attack" "objects_1803_type_relationship" "objects_1803_id_relationship--ff3aa49b-c054-44ec-89da-6c67d4995193" "objects_1803_created_2023-03-20T18:44:44.257Z" "objects_1803_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1803_revoked_False" "objects_1803_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1803_modified_2023-08-09T15:52:15.261Z" "objects_1803_description_Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay." "objects_1803_relationship_type_detects" "objects_1803_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1803_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_1803_x_mitre_deprecated_False" "objects_1803_x_mitre_version_0.1" "objects_1803_x_mitre_attack_spec_version_3.1.0" "objects_1803_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1803_spec_version_2.1" "objects_1803_x_mitre_domains_0_mobile-attack" "objects_1804_type_relationship" "objects_1804_id_relationship--ff410bea-7b23-4b0c-9979-b7ae3050d938" "objects_1804_created_2023-08-04T18:34:26.118Z" "objects_1804_revoked_False" "objects_1804_external_references_0_source_name_lookout_hornbill_sunbird_0221" "objects_1804_external_references_0_description_Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023." "objects_1804_external_references_0_url_https://www.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict" "objects_1804_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1804_modified_2023-08-04T18:34:26.118Z" "objects_1804_description_[Sunbird](https://attack.mitre.org/software/S1082) can exfiltrate calendar information.(Citation: lookout_hornbill_sunbird_0221)" "objects_1804_relationship_type_uses" "objects_1804_source_ref_malware--feae299d-e34f-4fc9-8545-486d0905bd41" "objects_1804_target_ref_attack-pattern--a9fa0d30-a8ff-45bf-922e-7720da0b7922" "objects_1804_x_mitre_deprecated_False" "objects_1804_x_mitre_version_0.1" "objects_1804_x_mitre_attack_spec_version_3.1.0" "objects_1804_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1804_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1804_spec_version_2.1" "objects_1804_x_mitre_domains_0_mobile-attack" "objects_1805_type_relationship" "objects_1805_id_relationship--ff55feec-669d-4199-a05c-e8dfaebaaf8f" "objects_1805_created_2023-10-10T15:33:57.463Z" "objects_1805_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1805_revoked_False" "objects_1805_external_references_0_source_name_Microsoft MalLockerB" "objects_1805_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_1805_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_1805_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1805_modified_2023-10-10T15:33:57.463Z" "objects_1805_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has masqueraded as popular apps, cracked games, and video players. (Citation: Microsoft MalLockerB)" "objects_1805_relationship_type_uses" "objects_1805_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_1805_target_ref_attack-pattern--114fed8b-7eed-4136-8b9c-411c5c7fff4b" "objects_1805_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1805_x_mitre_deprecated_False" "objects_1805_x_mitre_version_1.0" "objects_1805_x_mitre_attack_spec_version_2.1.0" "objects_1805_spec_version_2.1" "objects_1805_x_mitre_domains_0_mobile-attack" "objects_1806_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1806_id_relationship--ffc24804-42db-4be1-a418-7f5ab9de453c" "objects_1806_type_relationship" "objects_1806_created_2017-12-14T16:46:06.044Z" "objects_1806_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1806_external_references_0_source_name_Lookout-NotCompatible" "objects_1806_external_references_0_description_Tim Strazzere. (2014, November 19). The new NotCompatible: Sophisticated and evasive threat harbors the potential to compromise enterprise networks. Retrieved December 22, 2016." "objects_1806_external_references_0_url_https://blog.lookout.com/blog/2014/11/19/notcompatible/" "objects_1806_modified_2020-03-31T14:49:39.188Z" "objects_1806_description_[NotCompatible](https://attack.mitre.org/software/S0299) has the capability to exploit systems on an enterprise network.(Citation: Lookout-NotCompatible)" "objects_1806_relationship_type_uses" "objects_1806_source_ref_malware--23040c15-e7d8-47b5-8c16-8fd3e0e297fe" "objects_1806_target_ref_attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d" "objects_1806_x_mitre_version_1.0" "objects_1806_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1806_spec_version_2.1" "objects_1806_x_mitre_attack_spec_version_2.1.0" "objects_1806_x_mitre_domains_0_mobile-attack" "objects_1807_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1807_id_relationship--ffc82546-f4da-4f47-88ec-b215edb1d695" "objects_1807_type_relationship" "objects_1807_created_2021-02-08T16:36:20.799Z" "objects_1807_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1807_external_references_0_source_name_BlackBerry Bahamut" "objects_1807_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_1807_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_1807_modified_2021-05-24T13:16:56.589Z" "objects_1807_description_[Windshift](https://attack.mitre.org/groups/G0112) has included malware functionality capable of downloading new DEX files at runtime during Operation BULL.(Citation: BlackBerry Bahamut)" "objects_1807_relationship_type_uses" "objects_1807_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_1807_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1807_x_mitre_version_1.0" "objects_1807_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1807_spec_version_2.1" "objects_1807_x_mitre_attack_spec_version_2.1.0" "objects_1807_x_mitre_domains_0_mobile-attack" "objects_1808_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1808_id_relationship--ffddcabb-0f03-46ae-abd6-7ab94e91b055" "objects_1808_type_relationship" "objects_1808_created_2018-10-17T00:14:20.652Z" "objects_1808_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1808_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1808_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1808_external_references_0_source_name_Wandera-RedDrop" "objects_1808_modified_2020-03-31T14:49:39.188Z" "objects_1808_description_[RedDrop](https://attack.mitre.org/software/S0326) captures live recordings of the device's surroundings.(Citation: Wandera-RedDrop)" "objects_1808_relationship_type_uses" "objects_1808_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1808_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1808_x_mitre_version_1.0" "objects_1808_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1808_spec_version_2.1" "objects_1808_x_mitre_attack_spec_version_2.1.0" "objects_1808_x_mitre_domains_0_mobile-attack" "objects_1809_type_relationship" "objects_1809_id_relationship--fff16b5e-49c2-45e2-8b3a-fd5f82c96dd9" "objects_1809_created_2020-04-08T15:51:25.149Z" "objects_1809_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1809_revoked_False" "objects_1809_external_references_0_source_name_ThreatFabric Ginp" "objects_1809_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1809_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1809_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1809_modified_2023-04-05T17:30:28.587Z" "objects_1809_description_[Ginp](https://attack.mitre.org/software/S0423) can download the device\u2019s contact list.(Citation: ThreatFabric Ginp)" "objects_1809_relationship_type_uses" "objects_1809_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1809_target_ref_attack-pattern--e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86" "objects_1809_x_mitre_deprecated_False" "objects_1809_x_mitre_version_1.0" "objects_1809_x_mitre_attack_spec_version_3.1.0" "objects_1809_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1809_spec_version_2.1" "objects_1809_x_mitre_domains_0_mobile-attack" "objects_1810_x_mitre_platforms_0_Android" "objects_1810_x_mitre_domains_0_mobile-attack" "objects_1810_x_mitre_contributors_0_Emily Ratliff, IBM" "objects_1810_x_mitre_aliases_0_FlexiSpy" "objects_1810_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1810_id_tool--1622fd3d-fcfc-4d02-ac49-f2d786f79b81" "objects_1810_type_tool" "objects_1810_created_2019-09-04T15:38:56.070Z" "objects_1810_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1810_external_references_0_external_id_S0408" "objects_1810_external_references_0_source_name_mitre-attack" "objects_1810_external_references_0_url_https://attack.mitre.org/software/S0408" "objects_1810_external_references_1_description_K. Lu. (n.d.). Deep Technical Analysis of the Spyware FlexiSpy for Android. Retrieved September 10, 2019." "objects_1810_external_references_1_url_https://d3gpjj9d20n0p3.cloudfront.net/fortiguard/research/Dig%20Deep%20into%20FlexiSpy%20for%20Android%28white%20paper%29_KaiLu.pdf" "objects_1810_external_references_1_source_name_FortiGuard-FlexiSpy" "objects_1810_external_references_2_source_name_CyberMerchants-FlexiSpy" "objects_1810_external_references_2_url_http://www.cybermerchantsofdeath.com/blog/2017/04/22/FlexiSpy.html" "objects_1810_external_references_2_description_Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019." "objects_1810_external_references_3_source_name_FlexiSpy-Website" "objects_1810_external_references_3_url_https://www.flexispy.com/" "objects_1810_external_references_3_description_FlexiSpy. (n.d.). FlexiSpy. Retrieved September 4, 2019." "objects_1810_modified_2019-10-14T18:08:28.349Z" "objects_1810_name_FlexiSpy" "objects_1810_description_[FlexiSpy](https://attack.mitre.org/software/S0408) is sophisticated surveillanceware for iOS and Android. Publicly-available, comprehensive analysis has only been found for the Android version.(Citation: FortiGuard-FlexiSpy)(Citation: CyberMerchants-FlexiSpy)\n\n[FlexiSpy](https://attack.mitre.org/software/S0408) markets itself as a parental control and employee monitoring application.(Citation: FlexiSpy-Website)" "objects_1810_x_mitre_version_1.0" "objects_1810_x_mitre_attack_spec_version_2.1.0" "objects_1810_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1810_spec_version_2.1" "objects_1811_modified_2022-10-24T15:09:07.609Z" "objects_1811_name_Xbot" "objects_1811_description_[Xbot](https://attack.mitre.org/software/S0298) is an Android malware family that was observed in 2016 primarily targeting Android users in Russia and Australia. (Citation: PaloAlto-Xbot)" "objects_1811_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1811_x_mitre_domains_0_mobile-attack" "objects_1811_x_mitre_version_1.0" "objects_1811_x_mitre_attack_spec_version_2.1.0" "objects_1811_type_tool" "objects_1811_id_tool--da21929e-40c0-443d-bdf4-6b60d15448b4" "objects_1811_created_2017-10-25T14:48:48.609Z" "objects_1811_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1811_external_references_0_source_name_mitre-attack" "objects_1811_external_references_0_url_https://attack.mitre.org/software/S0298" "objects_1811_external_references_0_external_id_S0298" "objects_1811_external_references_1_source_name_Xbot" "objects_1811_external_references_1_description_(Citation: PaloAlto-Xbot)" "objects_1811_external_references_2_source_name_PaloAlto-Xbot" "objects_1811_external_references_2_description_Cong Zheng, Claud Xiao and Zhi Xu. (2016, February 18). New Android Trojan \u201cXbot\u201d Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom. Retrieved December 21, 2016." "objects_1811_external_references_2_url_http://researchcenter.paloaltonetworks.com/2016/02/new-android-trojan-xbot-phishes-credit-cards-and-bank-accounts-encrypts-devices-for-ransom/" "objects_1811_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1811_spec_version_2.1" "objects_1812_modified_2022-10-20T20:18:06.745Z" "objects_1812_name_Network Connection Creation" "objects_1812_description_Initial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)" "objects_1812_x_mitre_data_source_ref_x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3" "objects_1812_x_mitre_deprecated_False" "objects_1812_x_mitre_version_1.1" "objects_1812_type_x-mitre-data-component" "objects_1812_id_x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba" "objects_1812_created_2021-10-20T15:05:19.274Z" "objects_1812_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1812_revoked_False" "objects_1812_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1812_x_mitre_attack_spec_version_2.1.0" "objects_1812_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1812_spec_version_2.1" "objects_1812_x_mitre_domains_0_mobile-attack" "objects_1813_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1813_id_x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c" "objects_1813_type_x-mitre-data-component" "objects_1813_created_2021-10-20T15:05:19.274Z" "objects_1813_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1813_modified_2021-10-20T15:05:19.274Z" "objects_1813_name_Network Traffic Content" "objects_1813_description_Logged network traffic data showing both protocol header and body values (ex: PCAP)" "objects_1813_x_mitre_data_source_ref_x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3" "objects_1813_x_mitre_version_1.0" "objects_1813_x_mitre_attack_spec_version_2.1.0" "objects_1813_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1813_spec_version_2.1" "objects_1813_x_mitre_domains_0_mobile-attack" "objects_1814_modified_2022-10-07T16:15:56.932Z" "objects_1814_name_Process Creation" "objects_1814_description_The initial construction of an executable managed by the OS, that may involve one or more tasks or threads. (e.g. Win EID 4688, Sysmon EID 1, cmd.exe > net use, etc.)" "objects_1814_x_mitre_data_source_ref_x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22" "objects_1814_x_mitre_deprecated_False" "objects_1814_x_mitre_version_1.1" "objects_1814_type_x-mitre-data-component" "objects_1814_id_x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077" "objects_1814_created_2021-10-20T15:05:19.272Z" "objects_1814_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1814_revoked_False" "objects_1814_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1814_x_mitre_attack_spec_version_2.1.0" "objects_1814_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1814_spec_version_2.1" "objects_1814_x_mitre_domains_0_mobile-attack" "objects_1815_modified_2023-03-13T20:48:14.540Z" "objects_1815_name_System Settings" "objects_1815_description_Settings visible to the user on the device" "objects_1815_x_mitre_data_source_ref_x-mitre-data-source--55ba7d30-887f-42c1-a24e-c4e90aff24b8" "objects_1815_x_mitre_deprecated_False" "objects_1815_x_mitre_domains_0_mobile-attack" "objects_1815_x_mitre_version_1.0" "objects_1815_type_x-mitre-data-component" "objects_1815_id_x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6" "objects_1815_created_2023-03-13T20:48:14.540Z" "objects_1815_revoked_False" "objects_1815_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1815_x_mitre_attack_spec_version_3.1.0" "objects_1815_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1815_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1815_spec_version_2.1" "objects_1816_modified_2023-03-13T19:59:14.491Z" "objects_1816_name_API Calls" "objects_1816_description_API calls utilized by an application that could indicate malicious activity" "objects_1816_x_mitre_data_source_ref_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_1816_x_mitre_deprecated_False" "objects_1816_x_mitre_domains_0_mobile-attack" "objects_1816_x_mitre_version_1.0" "objects_1816_type_x-mitre-data-component" "objects_1816_id_x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962" "objects_1816_created_2023-03-13T19:59:14.491Z" "objects_1816_revoked_False" "objects_1816_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1816_x_mitre_attack_spec_version_3.1.0" "objects_1816_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1816_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1816_spec_version_2.1" "objects_1817_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1817_id_x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f" "objects_1817_type_x-mitre-data-component" "objects_1817_created_2021-10-20T15:05:19.272Z" "objects_1817_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1817_modified_2021-10-20T15:05:19.272Z" "objects_1817_name_Process Termination" "objects_1817_description_Exit of a running process (ex: Sysmon EID 5 or Windows EID 4689)" "objects_1817_x_mitre_data_source_ref_x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22" "objects_1817_x_mitre_version_1.0" "objects_1817_x_mitre_attack_spec_version_2.1.0" "objects_1817_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1817_spec_version_2.1" "objects_1817_x_mitre_domains_0_mobile-attack" "objects_1818_modified_2022-10-07T16:14:39.124Z" "objects_1818_name_Command Execution" "objects_1818_description_The execution of a line of text, potentially with arguments, created from program code (e.g. a cmdlet executed via powershell.exe, interactive commands like >dir, shell executions, etc. )" "objects_1818_x_mitre_data_source_ref_x-mitre-data-source--73691708-ffb5-4e29-906d-f485f6fa7089" "objects_1818_x_mitre_deprecated_False" "objects_1818_x_mitre_version_1.1" "objects_1818_type_x-mitre-data-component" "objects_1818_id_x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0" "objects_1818_created_2021-10-20T15:05:19.273Z" "objects_1818_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1818_revoked_False" "objects_1818_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1818_x_mitre_attack_spec_version_2.1.0" "objects_1818_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1818_spec_version_2.1" "objects_1818_x_mitre_domains_0_mobile-attack" "objects_1819_modified_2023-03-13T20:00:38.029Z" "objects_1819_name_Protected Configuration" "objects_1819_description_Device configuration options that are not typically utilized by benign applications" "objects_1819_x_mitre_data_source_ref_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_1819_x_mitre_deprecated_False" "objects_1819_x_mitre_domains_0_mobile-attack" "objects_1819_x_mitre_version_1.0" "objects_1819_type_x-mitre-data-component" "objects_1819_id_x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2" "objects_1819_created_2023-03-13T20:00:38.029Z" "objects_1819_revoked_False" "objects_1819_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1819_x_mitre_attack_spec_version_3.1.0" "objects_1819_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1819_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1819_spec_version_2.1" "objects_1820_modified_2023-03-13T19:59:42.141Z" "objects_1820_name_Network Communication" "objects_1820_description_Network requests made by an application or domains contacted" "objects_1820_x_mitre_data_source_ref_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_1820_x_mitre_deprecated_False" "objects_1820_x_mitre_domains_0_mobile-attack" "objects_1820_x_mitre_version_1.0" "objects_1820_type_x-mitre-data-component" "objects_1820_id_x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0" "objects_1820_created_2023-03-13T19:59:42.141Z" "objects_1820_revoked_False" "objects_1820_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1820_x_mitre_attack_spec_version_3.1.0" "objects_1820_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1820_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1820_spec_version_2.1" "objects_1821_modified_2022-10-20T20:22:45.613Z" "objects_1821_name_Host Status" "objects_1821_description_Logging, messaging, and other artifacts highlighting the health of host sensors (ex: metrics, errors, and/or exceptions from logging applications)" "objects_1821_x_mitre_data_source_ref_x-mitre-data-source--4523e7f3-8de2-4078-96f8-1227eb537159" "objects_1821_x_mitre_deprecated_False" "objects_1821_x_mitre_version_1.1" "objects_1821_type_x-mitre-data-component" "objects_1821_id_x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6" "objects_1821_created_2021-10-20T15:05:19.272Z" "objects_1821_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1821_revoked_False" "objects_1821_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1821_x_mitre_attack_spec_version_2.1.0" "objects_1821_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1821_spec_version_2.1" "objects_1821_x_mitre_domains_0_mobile-attack" "objects_1822_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1822_id_x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a" "objects_1822_type_x-mitre-data-component" "objects_1822_created_2021-10-20T15:05:19.274Z" "objects_1822_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1822_modified_2021-10-20T15:05:19.274Z" "objects_1822_name_Network Traffic Flow" "objects_1822_description_Summarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)" "objects_1822_x_mitre_data_source_ref_x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3" "objects_1822_x_mitre_version_1.0" "objects_1822_x_mitre_attack_spec_version_2.1.0" "objects_1822_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1822_spec_version_2.1" "objects_1822_x_mitre_domains_0_mobile-attack" "objects_1823_modified_2023-03-13T20:00:08.487Z" "objects_1823_name_Permissions Requests" "objects_1823_description_Permissions declared in an application's manifest or property list file" "objects_1823_x_mitre_data_source_ref_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_1823_x_mitre_deprecated_False" "objects_1823_x_mitre_domains_0_mobile-attack" "objects_1823_x_mitre_version_1.0" "objects_1823_type_x-mitre-data-component" "objects_1823_id_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1823_created_2023-03-13T20:00:08.487Z" "objects_1823_revoked_False" "objects_1823_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1823_x_mitre_attack_spec_version_3.1.0" "objects_1823_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1823_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1823_spec_version_2.1" "objects_1824_modified_2023-03-13T20:47:52.557Z" "objects_1824_name_System Notifications" "objects_1824_description_Notifications generated by the OS" "objects_1824_x_mitre_data_source_ref_x-mitre-data-source--55ba7d30-887f-42c1-a24e-c4e90aff24b8" "objects_1824_x_mitre_deprecated_False" "objects_1824_x_mitre_domains_0_mobile-attack" "objects_1824_x_mitre_version_1.0" "objects_1824_type_x-mitre-data-component" "objects_1824_id_x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4" "objects_1824_created_2023-03-13T20:47:52.557Z" "objects_1824_revoked_False" "objects_1824_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1824_x_mitre_attack_spec_version_3.1.0" "objects_1824_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1824_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1824_spec_version_2.1" "objects_1825_modified_2023-03-13T20:47:24.038Z" "objects_1825_name_Permissions Request" "objects_1825_description_System prompts triggered when an application requests new or additional permissions" "objects_1825_x_mitre_data_source_ref_x-mitre-data-source--55ba7d30-887f-42c1-a24e-c4e90aff24b8" "objects_1825_x_mitre_deprecated_False" "objects_1825_x_mitre_domains_0_mobile-attack" "objects_1825_x_mitre_version_1.0" "objects_1825_type_x-mitre-data-component" "objects_1825_id_x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456" "objects_1825_created_2023-03-13T20:47:24.038Z" "objects_1825_revoked_False" "objects_1825_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1825_x_mitre_attack_spec_version_3.1.0" "objects_1825_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1825_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1825_spec_version_2.1" "objects_1826_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1826_id_x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1" "objects_1826_type_x-mitre-data-component" "objects_1826_created_2021-10-20T15:05:19.272Z" "objects_1826_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1826_modified_2021-10-20T15:05:19.272Z" "objects_1826_name_Process Metadata" "objects_1826_description_Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc." "objects_1826_x_mitre_data_source_ref_x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22" "objects_1826_x_mitre_version_1.0" "objects_1826_x_mitre_attack_spec_version_2.1.0" "objects_1826_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1826_spec_version_2.1" "objects_1826_x_mitre_domains_0_mobile-attack" "objects_1827_modified_2023-04-20T18:38:40.409Z" "objects_1827_name_Sensor Health" "objects_1827_description_Information from host telemetry providing insights about system status, errors, or other notable functional activity" "objects_1827_x_mitre_platforms_0_Linux" "objects_1827_x_mitre_platforms_1_Windows" "objects_1827_x_mitre_platforms_2_macOS" "objects_1827_x_mitre_platforms_3_Android" "objects_1827_x_mitre_platforms_4_iOS" "objects_1827_x_mitre_deprecated_False" "objects_1827_x_mitre_domains_0_enterprise-attack" "objects_1827_x_mitre_domains_1_mobile-attack" "objects_1827_x_mitre_version_1.1" "objects_1827_x_mitre_contributors_0_Center for Threat-Informed Defense (CTID)" "objects_1827_x_mitre_collection_layers_0_Host" "objects_1827_type_x-mitre-data-source" "objects_1827_id_x-mitre-data-source--4523e7f3-8de2-4078-96f8-1227eb537159" "objects_1827_created_2021-10-20T15:05:19.272Z" "objects_1827_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1827_revoked_False" "objects_1827_external_references_0_source_name_mitre-attack" "objects_1827_external_references_0_url_https://attack.mitre.org/datasources/DS0013" "objects_1827_external_references_0_external_id_DS0013" "objects_1827_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1827_x_mitre_attack_spec_version_3.1.0" "objects_1827_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1827_spec_version_2.1" "objects_1828_modified_2023-03-13T19:36:25.108Z" "objects_1828_name_User Interface" "objects_1828_description_Visual activity on the device that could alert the user to potentially malicious behavior." "objects_1828_x_mitre_platforms_0_Android" "objects_1828_x_mitre_platforms_1_iOS" "objects_1828_x_mitre_deprecated_False" "objects_1828_x_mitre_domains_0_mobile-attack" "objects_1828_x_mitre_version_1.0" "objects_1828_x_mitre_collection_layers_0_Device" "objects_1828_type_x-mitre-data-source" "objects_1828_id_x-mitre-data-source--55ba7d30-887f-42c1-a24e-c4e90aff24b8" "objects_1828_created_2023-03-13T19:36:25.108Z" "objects_1828_revoked_False" "objects_1828_external_references_0_source_name_mitre-attack" "objects_1828_external_references_0_url_https://attack.mitre.org/datasources/DS0042" "objects_1828_external_references_0_external_id_DS0042" "objects_1828_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1828_x_mitre_attack_spec_version_3.1.0" "objects_1828_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1828_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1828_spec_version_2.1" "objects_1829_modified_2023-04-20T18:38:00.625Z" "objects_1829_name_Command" "objects_1829_description_A directive given to a computer program, acting as an interpreter of some kind, in order to perform a specific task(Citation: Confluence Linux Command Line)(Citation: Audit OSX)" "objects_1829_x_mitre_platforms_0_Containers" "objects_1829_x_mitre_platforms_1_Linux" "objects_1829_x_mitre_platforms_2_Network" "objects_1829_x_mitre_platforms_3_Windows" "objects_1829_x_mitre_platforms_4_macOS" "objects_1829_x_mitre_platforms_5_Android" "objects_1829_x_mitre_platforms_6_iOS" "objects_1829_x_mitre_deprecated_False" "objects_1829_x_mitre_domains_0_enterprise-attack" "objects_1829_x_mitre_domains_1_mobile-attack" "objects_1829_x_mitre_version_1.1" "objects_1829_x_mitre_contributors_0_Center for Threat-Informed Defense (CTID)" "objects_1829_x_mitre_contributors_1_Austin Clark, @c2defense" "objects_1829_x_mitre_collection_layers_0_Container" "objects_1829_x_mitre_collection_layers_1_Host" "objects_1829_type_x-mitre-data-source" "objects_1829_id_x-mitre-data-source--73691708-ffb5-4e29-906d-f485f6fa7089" "objects_1829_created_2021-10-20T15:05:19.273Z" "objects_1829_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1829_revoked_False" "objects_1829_external_references_0_source_name_mitre-attack" "objects_1829_external_references_0_url_https://attack.mitre.org/datasources/DS0017" "objects_1829_external_references_0_external_id_DS0017" "objects_1829_external_references_1_source_name_Confluence Linux Command Line" "objects_1829_external_references_1_description_Confluence Support. (2021, September 8). How to enable command line audit logging in linux. Retrieved September 23, 2021." "objects_1829_external_references_1_url_https://confluence.atlassian.com/confkb/how-to-enable-command-line-audit-logging-in-linux-956166545.html" "objects_1829_external_references_2_source_name_Audit OSX" "objects_1829_external_references_2_description_Gagliardi, R. (n.d.). Audit in a OS X System. Retrieved September 23, 2021." "objects_1829_external_references_2_url_https://www.scip.ch/en/?labs.20150108" "objects_1829_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1829_x_mitre_attack_spec_version_3.1.0" "objects_1829_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1829_spec_version_2.1" "objects_1830_modified_2023-04-20T18:38:13.356Z" "objects_1830_name_Network Traffic" "objects_1830_description_Data transmitted across a network (ex: Web, DNS, Mail, File, etc.), that is either summarized (ex: Netflow) and/or captured as raw data in an analyzable format (ex: PCAP)" "objects_1830_x_mitre_platforms_0_IaaS" "objects_1830_x_mitre_platforms_1_Linux" "objects_1830_x_mitre_platforms_2_Windows" "objects_1830_x_mitre_platforms_3_macOS" "objects_1830_x_mitre_platforms_4_Android" "objects_1830_x_mitre_platforms_5_iOS" "objects_1830_x_mitre_deprecated_False" "objects_1830_x_mitre_domains_0_enterprise-attack" "objects_1830_x_mitre_domains_1_mobile-attack" "objects_1830_x_mitre_version_1.1" "objects_1830_x_mitre_contributors_0_Center for Threat-Informed Defense (CTID)" "objects_1830_x_mitre_contributors_1_ExtraHop" "objects_1830_x_mitre_collection_layers_0_Cloud Control Plane" "objects_1830_x_mitre_collection_layers_1_Host" "objects_1830_x_mitre_collection_layers_2_Network" "objects_1830_type_x-mitre-data-source" "objects_1830_id_x-mitre-data-source--c000cd5c-bbb3-4606-af6f-6c6d9de0bbe3" "objects_1830_created_2021-10-20T15:05:19.274Z" "objects_1830_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1830_revoked_False" "objects_1830_external_references_0_source_name_mitre-attack" "objects_1830_external_references_0_url_https://attack.mitre.org/datasources/DS0029" "objects_1830_external_references_0_external_id_DS0029" "objects_1830_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1830_x_mitre_attack_spec_version_3.1.0" "objects_1830_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1830_spec_version_2.1" "objects_1831_modified_2023-03-13T19:30:41.131Z" "objects_1831_name_Application Vetting" "objects_1831_description_Application vetting report generated by an external cloud service." "objects_1831_x_mitre_platforms_0_Android" "objects_1831_x_mitre_platforms_1_iOS" "objects_1831_x_mitre_deprecated_False" "objects_1831_x_mitre_domains_0_mobile-attack" "objects_1831_x_mitre_version_1.0" "objects_1831_x_mitre_collection_layers_0_Report" "objects_1831_type_x-mitre-data-source" "objects_1831_id_x-mitre-data-source--e156f007-c5bf-45cc-8dd5-d442ffb0d203" "objects_1831_created_2023-03-13T19:30:41.131Z" "objects_1831_revoked_False" "objects_1831_external_references_0_source_name_mitre-attack" "objects_1831_external_references_0_url_https://attack.mitre.org/datasources/DS0041" "objects_1831_external_references_0_external_id_DS0041" "objects_1831_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1831_x_mitre_attack_spec_version_3.1.0" "objects_1831_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1831_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1831_spec_version_2.1" "objects_1832_modified_2023-04-20T18:38:26.515Z" "objects_1832_name_Process" "objects_1832_description_Instances of computer programs that are being executed by at least one thread. Processes have memory space for process executables, loaded modules (DLLs or shared libraries), and allocated memory regions containing everything from user input to application-specific data structures(Citation: Microsoft Processes and Threads)" "objects_1832_x_mitre_platforms_0_Linux" "objects_1832_x_mitre_platforms_1_Windows" "objects_1832_x_mitre_platforms_2_macOS" "objects_1832_x_mitre_platforms_3_Android" "objects_1832_x_mitre_platforms_4_iOS" "objects_1832_x_mitre_deprecated_False" "objects_1832_x_mitre_domains_0_enterprise-attack" "objects_1832_x_mitre_domains_1_mobile-attack" "objects_1832_x_mitre_version_1.1" "objects_1832_x_mitre_contributors_0_Center for Threat-Informed Defense (CTID)" "objects_1832_x_mitre_collection_layers_0_Host" "objects_1832_type_x-mitre-data-source" "objects_1832_id_x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22" "objects_1832_created_2021-10-20T15:05:19.272Z" "objects_1832_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1832_revoked_False" "objects_1832_external_references_0_source_name_mitre-attack" "objects_1832_external_references_0_url_https://attack.mitre.org/datasources/DS0009" "objects_1832_external_references_0_external_id_DS0009" "objects_1832_external_references_1_source_name_Microsoft Processes and Threads" "objects_1832_external_references_1_description_Microsoft. (2018, May 31). Processes and Threads. Retrieved September 28, 2021." "objects_1832_external_references_1_url_https://docs.microsoft.com/en-us/windows/win32/procthread/processes-and-threads" "objects_1832_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1832_x_mitre_attack_spec_version_3.1.0" "objects_1832_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1832_spec_version_2.1" "objects_1833_tactic_refs_0_x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210" "objects_1833_tactic_refs_1_x-mitre-tactic--e78d7d60-41b5-49b7-b0a9-5c5d4cbabe17" "objects_1833_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1833_type_x-mitre-matrix" "objects_1833_id_x-mitre-matrix--5104d5f0-16b7-4aec-8ae3-0a90cd5494fc" "objects_1833_created_2018-10-17T00:14:20.652Z" "objects_1833_x_mitre_version_1.0" "objects_1833_external_references_0_source_name_mitre-attack" "objects_1833_external_references_0_external_id_mobile-attack" "objects_1833_external_references_0_url_https://attack.mitre.org/matrices/mobile-attack" "objects_1833_x_mitre_deprecated_True" "objects_1833_revoked_False" "objects_1833_description_Below are the tactics and techniques representing the two MITRE ATT&CK Matrices for Mobile. The Matrices cover techniques involving device access and network-based effects that can be used by adversaries without device access. The Matrices contains information for the following platforms: Android, iOS." "objects_1833_modified_2022-04-06T15:44:04.736Z" "objects_1833_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1833_name_Network-Based Effects" "objects_1833_x_mitre_attack_spec_version_2.1.0" "objects_1833_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1833_spec_version_2.1" "objects_1833_x_mitre_domains_0_mobile-attack" "objects_1834_tactic_refs_0_x-mitre-tactic--0a93fd8e-4a83-4c15-8203-db290e5f2ac6" "objects_1834_tactic_refs_1_x-mitre-tactic--4a800987-a3a8-4d56-a1bd-0d7171431756" "objects_1834_tactic_refs_2_x-mitre-tactic--363bbeff-bb2a-4734-ac74-d6d37202fe54" "objects_1834_tactic_refs_3_x-mitre-tactic--3e962de5-3280-43b7-bc10-334fbc1d6fa8" "objects_1834_tactic_refs_4_x-mitre-tactic--987cda6d-eb77-406b-bf68-bcb5f3d2e1df" "objects_1834_tactic_refs_5_x-mitre-tactic--6fcb36b8-3776-483b-8699-42215714fb10" "objects_1834_tactic_refs_6_x-mitre-tactic--d418cdeb-1b9f-4a6b-a15d-2f89f549f8c1" "objects_1834_tactic_refs_7_x-mitre-tactic--7be441c2-0095-4b1e-8125-fa8ffda29b0f" "objects_1834_tactic_refs_8_x-mitre-tactic--7a0d25d3-f0c0-40bf-bf90-c743871b19ba" "objects_1834_tactic_refs_9_x-mitre-tactic--3f660805-fa2e-42e8-8851-57f9e9b653e3" "objects_1834_tactic_refs_10_x-mitre-tactic--10fa8d8d-1b04-4176-917e-738724239981" "objects_1834_tactic_refs_11_x-mitre-tactic--6ebce653-294a-444a-bffb-14c04c8d137e" "objects_1834_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1834_type_x-mitre-matrix" "objects_1834_id_x-mitre-matrix--a382db5e-d009-4135-b893-0e0ff021c95b" "objects_1834_created_2018-10-17T00:14:20.652Z" "objects_1834_x_mitre_version_2.0" "objects_1834_external_references_0_source_name_mitre-attack" "objects_1834_external_references_0_external_id_mobile-attack" "objects_1834_external_references_0_url_https://attack.mitre.org/matrices/mobile-attack" "objects_1834_x_mitre_deprecated_False" "objects_1834_revoked_False" "objects_1834_description_Below are the tactics and technique representing the MITRE ATT&CK Matrix for Mobile. The Matrix contains information for the following platforms: Android, iOS." "objects_1834_modified_2022-04-06T15:43:22.080Z" "objects_1834_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1834_name_Mobile ATT&CK" "objects_1834_x_mitre_attack_spec_version_2.1.0" "objects_1834_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1834_spec_version_2.1" "objects_1834_x_mitre_domains_0_mobile-attack" "objects_1835_x_mitre_domains_0_mobile-attack" "objects_1835_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1835_id_x-mitre-tactic--0a93fd8e-4a83-4c15-8203-db290e5f2ac6" "objects_1835_type_x-mitre-tactic" "objects_1835_created_2018-10-17T00:14:20.652Z" "objects_1835_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1835_external_references_0_external_id_TA0027" "objects_1835_external_references_0_url_https://attack.mitre.org/tactics/TA0027" "objects_1835_external_references_0_source_name_mitre-attack" "objects_1835_modified_2020-01-27T14:02:36.744Z" "objects_1835_name_Initial Access" "objects_1835_description_The adversary is trying to get into your device.\n\nThe initial access tactic represents the vectors adversaries use to gain an initial foothold onto a mobile device." "objects_1835_x_mitre_version_1.0" "objects_1835_x_mitre_attack_spec_version_2.1.0" "objects_1835_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1835_x_mitre_shortname_initial-access" "objects_1835_spec_version_2.1" "objects_1836_x_mitre_domains_0_mobile-attack" "objects_1836_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1836_id_x-mitre-tactic--10fa8d8d-1b04-4176-917e-738724239981" "objects_1836_type_x-mitre-tactic" "objects_1836_created_2018-10-17T00:14:20.652Z" "objects_1836_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1836_external_references_0_external_id_TA0036" "objects_1836_external_references_0_url_https://attack.mitre.org/tactics/TA0036" "objects_1836_external_references_0_source_name_mitre-attack" "objects_1836_modified_2020-01-27T14:06:42.009Z" "objects_1836_name_Exfiltration" "objects_1836_description_The adversary is trying to steal data.\n\nExfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from the targeted mobile device.\n\nIn the mobile environment, mobile devices are frequently connected to networks outside enterprise control such as cellular networks or public Wi-Fi networks. Adversaries could attempt to evade detection by communicating on these networks, and potentially even by using non-Internet Protocol mechanisms such as Short Message Service (SMS). However, cellular networks often have data caps and/or extra data charges that could increase the potential for adversarial communication to be detected." "objects_1836_x_mitre_version_1.0" "objects_1836_x_mitre_attack_spec_version_2.1.0" "objects_1836_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1836_x_mitre_shortname_exfiltration" "objects_1836_spec_version_2.1" "objects_1837_x_mitre_domains_0_mobile-attack" "objects_1837_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1837_id_x-mitre-tactic--363bbeff-bb2a-4734-ac74-d6d37202fe54" "objects_1837_type_x-mitre-tactic" "objects_1837_created_2018-10-17T00:14:20.652Z" "objects_1837_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1837_external_references_0_external_id_TA0028" "objects_1837_external_references_0_url_https://attack.mitre.org/tactics/TA0028" "objects_1837_external_references_0_source_name_mitre-attack" "objects_1837_modified_2020-01-27T14:03:15.455Z" "objects_1837_name_Persistence" "objects_1837_description_ The adversary is trying to maintain their foothold.\n\nPersistence is any access, action, or configuration change to a mobile device that gives an attacker a persistent presence on the device. Attackers often will need to maintain access to mobile devices through interruptions such as device reboots and potentially even factory data resets." "objects_1837_x_mitre_version_1.0" "objects_1837_x_mitre_attack_spec_version_2.1.0" "objects_1837_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1837_x_mitre_shortname_persistence" "objects_1837_spec_version_2.1" "objects_1838_x_mitre_domains_0_mobile-attack" "objects_1838_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1838_id_x-mitre-tactic--3e962de5-3280-43b7-bc10-334fbc1d6fa8" "objects_1838_type_x-mitre-tactic" "objects_1838_created_2018-10-17T00:14:20.652Z" "objects_1838_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1838_external_references_0_external_id_TA0029" "objects_1838_external_references_0_url_https://attack.mitre.org/tactics/TA0029" "objects_1838_external_references_0_source_name_mitre-attack" "objects_1838_modified_2020-01-27T14:03:49.343Z" "objects_1838_name_Privilege Escalation" "objects_1838_description_ The adversary is trying to gain higher-level permissions.\n\nPrivilege escalation includes techniques that allow an attacker to obtain a higher level of permissions on the mobile device. Attackers may enter the mobile device with very limited privileges and may be required to take advantage of a device weakness to obtain higher privileges necessary to successfully carry out their mission objectives." "objects_1838_x_mitre_version_1.0" "objects_1838_x_mitre_attack_spec_version_2.1.0" "objects_1838_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1838_x_mitre_shortname_privilege-escalation" "objects_1838_spec_version_2.1" "objects_1839_x_mitre_domains_0_mobile-attack" "objects_1839_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1839_id_x-mitre-tactic--3f660805-fa2e-42e8-8851-57f9e9b653e3" "objects_1839_type_x-mitre-tactic" "objects_1839_created_2018-10-17T00:14:20.652Z" "objects_1839_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1839_external_references_0_external_id_TA0037" "objects_1839_external_references_0_url_https://attack.mitre.org/tactics/TA0037" "objects_1839_external_references_0_source_name_mitre-attack" "objects_1839_modified_2020-01-27T14:06:59.132Z" "objects_1839_name_Command and Control" "objects_1839_description_The adversary is trying to communicate with compromised devices to control them.\n\nThe command and control tactic represents how adversaries communicate with systems under their control within a target network. There are many ways an adversary can establish command and control with various levels of covertness, depending on system configuration and network topology. Due to the wide degree of variation available to the adversary at the network level, only the most common factors were used to describe the differences in command and control. There are still a great many specific techniques within the documented methods, largely due to how easy it is to define new protocols and use existing, legitimate protocols and network services for communication. \n\nThe resulting breakdown should help convey the concept that detecting intrusion through command and control protocols without prior knowledge is a difficult proposition over the long term. Adversaries' main constraints in network-level defense avoidance are testing and deployment of tools to rapidly change their protocols, awareness of existing defensive technologies, and access to legitimate Web services that, when used appropriately, make their tools difficult to distinguish from benign traffic.\n\nAdditionally, in the mobile environment, mobile devices are frequently connected to networks outside enterprise control such as cellular networks or public Wi-Fi networks. Adversaries could attempt to evade detection by communicating on these networks, and potentially even by using non-Internet Protocol mechanisms such as Short Message Service (SMS). However, cellular networks often have data caps and/or extra data charges that could increase the potential for adversarial communication to be detected." "objects_1839_x_mitre_version_1.0" "objects_1839_x_mitre_attack_spec_version_2.1.0" "objects_1839_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1839_x_mitre_shortname_command-and-control" "objects_1839_spec_version_2.1" "objects_1840_x_mitre_domains_0_mobile-attack" "objects_1840_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1840_id_x-mitre-tactic--4a800987-a3a8-4d56-a1bd-0d7171431756" "objects_1840_type_x-mitre-tactic" "objects_1840_created_2020-01-27T14:00:49.089Z" "objects_1840_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1840_external_references_0_external_id_TA0041" "objects_1840_external_references_0_source_name_mitre-attack" "objects_1840_external_references_0_url_https://attack.mitre.org/tactics/TA0041" "objects_1840_modified_2020-01-27T14:00:49.089Z" "objects_1840_name_Execution" "objects_1840_description_The adversary is trying to run malicious code.\n\nExecution consists of techniques that result in adversary-controlled code running on a mobile device. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data." "objects_1840_x_mitre_version_1.0" "objects_1840_x_mitre_attack_spec_version_2.1.0" "objects_1840_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1840_x_mitre_shortname_execution" "objects_1840_spec_version_2.1" "objects_1841_x_mitre_domains_0_mobile-attack" "objects_1841_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1841_id_x-mitre-tactic--6ebce653-294a-444a-bffb-14c04c8d137e" "objects_1841_type_x-mitre-tactic" "objects_1841_created_2018-10-17T00:14:20.652Z" "objects_1841_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1841_external_references_0_external_id_TA0034" "objects_1841_external_references_0_url_https://attack.mitre.org/tactics/TA0034" "objects_1841_external_references_0_source_name_mitre-attack" "objects_1841_modified_2020-01-27T16:09:15.308Z" "objects_1841_name_Impact" "objects_1841_description_The adversary is trying to manipulate, interrupt, or destroy your devices and data.\n\nThe impact tactic consists of techniques used by the adversary to execute his or her mission objectives but that do not cleanly fit into another category such as Collection. Mission objectives vary based on each adversary's goals, but examples include toll fraud, destruction of device data, or locking the user out of his or her device until a ransom is paid." "objects_1841_x_mitre_version_1.0" "objects_1841_x_mitre_attack_spec_version_2.1.0" "objects_1841_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1841_x_mitre_shortname_impact" "objects_1841_spec_version_2.1" "objects_1842_x_mitre_domains_0_mobile-attack" "objects_1842_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1842_id_x-mitre-tactic--6fcb36b8-3776-483b-8699-42215714fb10" "objects_1842_type_x-mitre-tactic" "objects_1842_created_2018-10-17T00:14:20.652Z" "objects_1842_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1842_external_references_0_external_id_TA0031" "objects_1842_external_references_0_url_https://attack.mitre.org/tactics/TA0031" "objects_1842_external_references_0_source_name_mitre-attack" "objects_1842_modified_2020-01-27T14:05:02.718Z" "objects_1842_name_Credential Access" "objects_1842_description_The adversary is trying to steal account names, passwords, or other secrets that enable access to resources.\n\nCredential access represents techniques that can be used by adversaries to obtain access to or control over passwords, tokens, cryptographic keys, or other values that could be used by an adversary to gain unauthorized access to resources. Credential access allows the adversary to assume the identity of an account, with all of that account's permissions on the system and network, and makes it harder for defenders to detect the adversary. With sufficient access within a network, an adversary can create accounts for later use within the environment." "objects_1842_x_mitre_version_1.0" "objects_1842_x_mitre_attack_spec_version_2.1.0" "objects_1842_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1842_x_mitre_shortname_credential-access" "objects_1842_spec_version_2.1" "objects_1843_x_mitre_domains_0_mobile-attack" "objects_1843_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1843_id_x-mitre-tactic--7a0d25d3-f0c0-40bf-bf90-c743871b19ba" "objects_1843_type_x-mitre-tactic" "objects_1843_created_2018-10-17T00:14:20.652Z" "objects_1843_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1843_external_references_0_external_id_TA0035" "objects_1843_external_references_0_url_https://attack.mitre.org/tactics/TA0035" "objects_1843_external_references_0_source_name_mitre-attack" "objects_1843_modified_2020-01-27T14:06:10.915Z" "objects_1843_name_Collection" "objects_1843_description_The adversary is trying to gather data of interest to their goal.\n\nCollection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate." "objects_1843_x_mitre_version_1.0" "objects_1843_x_mitre_attack_spec_version_2.1.0" "objects_1843_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1843_x_mitre_shortname_collection" "objects_1843_spec_version_2.1" "objects_1844_x_mitre_domains_0_mobile-attack" "objects_1844_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1844_id_x-mitre-tactic--7be441c2-0095-4b1e-8125-fa8ffda29b0f" "objects_1844_type_x-mitre-tactic" "objects_1844_created_2018-10-17T00:14:20.652Z" "objects_1844_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1844_external_references_0_external_id_TA0033" "objects_1844_external_references_0_url_https://attack.mitre.org/tactics/TA0033" "objects_1844_external_references_0_source_name_mitre-attack" "objects_1844_modified_2020-01-27T14:05:37.854Z" "objects_1844_name_Lateral Movement" "objects_1844_description_The adversary is trying to move through your environment.\n\nLateral movement consists of techniques that enable an adversary to access and control remote systems on a network and could, but does not necessarily, include execution of tools on remote systems. The lateral movement techniques could allow an adversary to gather information from a system without needing additional tools, such as a remote access tool." "objects_1844_x_mitre_version_1.0" "objects_1844_x_mitre_attack_spec_version_2.1.0" "objects_1844_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1844_x_mitre_shortname_lateral-movement" "objects_1844_spec_version_2.1" "objects_1845_x_mitre_domains_0_mobile-attack" "objects_1845_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1845_id_x-mitre-tactic--987cda6d-eb77-406b-bf68-bcb5f3d2e1df" "objects_1845_type_x-mitre-tactic" "objects_1845_created_2018-10-17T00:14:20.652Z" "objects_1845_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1845_external_references_0_external_id_TA0030" "objects_1845_external_references_0_url_https://attack.mitre.org/tactics/TA0030" "objects_1845_external_references_0_source_name_mitre-attack" "objects_1845_modified_2020-01-27T14:04:46.497Z" "objects_1845_name_Defense Evasion" "objects_1845_description_ The adversary is trying to avoid being detected.\n\nDefense evasion consists of techniques an adversary may use to evade detection or avoid other defenses. Sometimes these actions are the same as or variations of techniques in other categories that have the added benefit of subverting a particular defense or mitigation. Defense evasion may be considered a set of attributes the adversary applies to all other phases of the operation." "objects_1845_x_mitre_version_1.0" "objects_1845_x_mitre_attack_spec_version_2.1.0" "objects_1845_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1845_x_mitre_shortname_defense-evasion" "objects_1845_spec_version_2.1" "objects_1846_modified_2022-11-07T21:01:17.781Z" "objects_1846_name_Network Effects" "objects_1846_description_The adversary is trying to intercept or manipulate network traffic to or from a device.\n\nThis category refers to network-based techniques that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself. These include techniques to intercept or manipulate network traffic to and from the mobile device." "objects_1846_x_mitre_deprecated_True" "objects_1846_x_mitre_domains_0_mobile-attack" "objects_1846_x_mitre_version_1.0" "objects_1846_x_mitre_shortname_network-effects" "objects_1846_type_x-mitre-tactic" "objects_1846_id_x-mitre-tactic--9eb4c21e-4fa8-44c9-b167-dbfc455f9210" "objects_1846_created_2018-10-17T00:14:20.652Z" "objects_1846_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1846_revoked_False" "objects_1846_external_references_0_source_name_mitre-attack" "objects_1846_external_references_0_url_https://attack.mitre.org/tactics/TA0038" "objects_1846_external_references_0_external_id_TA0038" "objects_1846_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1846_x_mitre_attack_spec_version_3.0.0" "objects_1846_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1846_spec_version_2.1" "objects_1847_x_mitre_domains_0_mobile-attack" "objects_1847_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1847_id_x-mitre-tactic--d418cdeb-1b9f-4a6b-a15d-2f89f549f8c1" "objects_1847_type_x-mitre-tactic" "objects_1847_created_2018-10-17T00:14:20.652Z" "objects_1847_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1847_external_references_0_external_id_TA0032" "objects_1847_external_references_0_url_https://attack.mitre.org/tactics/TA0032" "objects_1847_external_references_0_source_name_mitre-attack" "objects_1847_modified_2020-01-27T16:09:00.466Z" "objects_1847_name_Discovery" "objects_1847_description_The adversary is trying to figure out your environment.\n\nDiscovery consists of techniques that allow the adversary to gain knowledge about the characteristics of the mobile device and potentially other networked systems. When adversaries gain access to a new system, they must orient themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system may provide capabilities that aid in this post-compromise information-gathering phase." "objects_1847_x_mitre_version_1.0" "objects_1847_x_mitre_attack_spec_version_2.1.0" "objects_1847_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1847_x_mitre_shortname_discovery" "objects_1847_spec_version_2.1" "objects_1848_modified_2022-11-07T21:01:36.112Z" "objects_1848_name_Remote Service Effects" "objects_1848_description_The adversary is trying to control or monitor the device using remote services.\n\nThis category refers to techniques involving remote services, such as vendor-provided cloud services (e.g. Google Drive, Google Find My Device, or Apple iCloud), or enterprise mobility management (EMM)/mobile device management (MDM) services that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself." "objects_1848_x_mitre_deprecated_True" "objects_1848_x_mitre_domains_0_mobile-attack" "objects_1848_x_mitre_version_1.0" "objects_1848_x_mitre_shortname_remote-service-effects" "objects_1848_type_x-mitre-tactic" "objects_1848_id_x-mitre-tactic--e78d7d60-41b5-49b7-b0a9-5c5d4cbabe17" "objects_1848_created_2018-10-17T00:14:20.652Z" "objects_1848_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1848_revoked_False" "objects_1848_external_references_0_source_name_mitre-attack" "objects_1848_external_references_0_url_https://attack.mitre.org/tactics/TA0039" "objects_1848_external_references_0_external_id_TA0039" "objects_1848_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1848_x_mitre_attack_spec_version_3.0.0" "objects_1848_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1848_spec_version_2.1" "objects_1849_type_relationship" "objects_1849_id_relationship--bde9304b-4421-4185-a2c6-dabe1c080587" "objects_1849_created_2023-03-16T18:31:48.708Z" "objects_1849_revoked_False" "objects_1849_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1849_modified_2023-10-31T14:00:00.188Z" "objects_1849_description_" "objects_1849_relationship_type_detects" "objects_1849_source_ref_x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43" "objects_1849_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_1849_x_mitre_deprecated_True" "objects_1849_x_mitre_version_0.1" "objects_1849_x_mitre_attack_spec_version_3.1.0" "objects_1849_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1849_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1849_spec_version_2.1" "objects_1849_x_mitre_domains_0_mobile-attack" "objects_1850_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1850_id_relationship--55f12292-dc9d-4bfd-9de9-2d07cd67b044" "objects_1850_type_relationship" "objects_1850_created_2017-10-25T14:48:53.734Z" "objects_1850_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1850_modified_2023-04-25T14:00:00.188Z" "objects_1850_description_Android 7.0 and higher includes additional protections against this technique." "objects_1850_relationship_type_mitigates" "objects_1850_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1850_target_ref_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_1850_x_mitre_version_1.0" "objects_1850_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1850_spec_version_2.1" "objects_1850_x_mitre_attack_spec_version_2.1.0" "objects_1850_x_mitre_domains_0_mobile-attack" "objects_1850_x_mitre_deprecated_True" "objects_1851_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1851_type_relationship" "objects_1851_id_relationship--ac523dfb-36be-4402-acf2-abe98e183eef" "objects_1851_created_2017-12-14T16:46:06.044Z" "objects_1851_x_mitre_version_1.0" "objects_1851_external_references_0_source_name_ArsTechnica-HummingBad" "objects_1851_external_references_0_url_http://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/" "objects_1851_external_references_0_description_Dan Goodin. (2016, July 7). 10 million Android phones infected by all-powerful auto-rooting apps. Retrieved January 24, 2017." "objects_1851_x_mitre_deprecated_True" "objects_1851_revoked_False" "objects_1851_description_In July 2016, [HummingBad](https://attack.mitre.org/software/S0322) generated more than $300,000 per month in revenue from installing fraudulent apps and displaying malicious advertisements.(Citation: ArsTechnica-HummingBad)" "objects_1851_modified_2023-04-25T14:00:00.188Z" "objects_1851_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1851_relationship_type_uses" "objects_1851_source_ref_malware--c8770c81-c29f-40d2-a140-38544206b2b4" "objects_1851_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1851_x_mitre_attack_spec_version_2.1.0" "objects_1851_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1851_spec_version_2.1" "objects_1851_x_mitre_domains_0_mobile-attack" "objects_1852_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1852_type_relationship" "objects_1852_id_relationship--fb1fe91d-0997-4403-b2a6-88400f174791" "objects_1852_created_2020-05-07T15:06:51.458Z" "objects_1852_x_mitre_version_1.0" "objects_1852_external_references_0_source_name_Google Bread" "objects_1852_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_1852_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_1852_x_mitre_deprecated_True" "objects_1852_revoked_False" "objects_1852_description_[Bread](https://attack.mitre.org/software/S0432) had many fake reviews and ratings on the Play Store.(Citation: Google Bread) " "objects_1852_modified_2023-04-25T14:00:00.188Z" "objects_1852_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1852_relationship_type_uses" "objects_1852_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1852_target_ref_attack-pattern--a8e971b8-8dc7-4514-8249-ae95427ec467" "objects_1852_x_mitre_attack_spec_version_2.1.0" "objects_1852_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1852_spec_version_2.1" "objects_1852_x_mitre_domains_0_mobile-attack" "objects_1853_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1853_id_relationship--fbd2d4f7-96ff-4624-a567-d4882f0c10ca" "objects_1853_type_relationship" "objects_1853_created_2019-07-23T15:35:23.530Z" "objects_1853_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1853_modified_2023-04-25T14:00:00.188Z" "objects_1853_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to whitelist applications that are allowed to use Android's accessibility features." "objects_1853_relationship_type_mitigates" "objects_1853_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1853_target_ref_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_1853_x_mitre_version_1.0" "objects_1853_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1853_spec_version_2.1" "objects_1853_x_mitre_attack_spec_version_2.1.0" "objects_1853_x_mitre_domains_0_mobile-attack" "objects_1853_x_mitre_deprecated_True" "objects_1854_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1854_id_relationship--00e80df1-33e4-4b1b-8c6b-79197945c4e5" "objects_1854_target_ref_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_1854_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1854_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1854_description_Device attestation can often detect jailbroken or rooted devices." "objects_1854_created_2020-12-16T20:16:08.068Z" "objects_1854_type_relationship" "objects_1854_relationship_type_mitigates" "objects_1854_modified_2022-07-07T14:00:00.188Z" "objects_1854_spec_version_2.1" "objects_1854_x_mitre_attack_spec_version_2.1.0" "objects_1854_x_mitre_domains_0_mobile-attack" "objects_1854_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1854_x_mitre_version_1.0" "objects_1854_x_mitre_deprecated_True" "objects_1855_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1855_id_relationship--018c744e-8d14-4b75-8c58-f661857dcb85" "objects_1855_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1855_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1855_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1855_description_[ViperRAT](https://attack.mitre.org/software/S0506)\u2019s second stage has masqueraded as \u201cSystem Updates\u201d, \u201cViber Update\u201d, and \u201cWhatsApp Update\u201d.(Citation: Lookout ViperRAT)" "objects_1855_external_references_0_source_name_Lookout ViperRAT" "objects_1855_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1855_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1855_created_2020-09-11T16:22:03.253Z" "objects_1855_type_relationship" "objects_1855_relationship_type_uses" "objects_1855_modified_2022-07-07T14:00:00.188Z" "objects_1855_spec_version_2.1" "objects_1855_x_mitre_attack_spec_version_2.1.0" "objects_1855_x_mitre_domains_0_mobile-attack" "objects_1855_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1855_x_mitre_version_1.0" "objects_1855_x_mitre_deprecated_True" "objects_1856_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1856_id_relationship--02f9a60a-2115-4c43-b9c2-c49809fb9e76" "objects_1856_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_1856_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1856_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1856_modified_2022-07-07T14:00:00.188Z" "objects_1856_type_relationship" "objects_1856_created_2019-10-18T14:50:57.566Z" "objects_1856_relationship_type_mitigates" "objects_1856_spec_version_2.1" "objects_1856_x_mitre_attack_spec_version_2.1.0" "objects_1856_x_mitre_domains_0_mobile-attack" "objects_1856_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1856_x_mitre_version_1.0" "objects_1856_x_mitre_deprecated_True" "objects_1857_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1857_id_relationship--03683255-a5fa-44ef-83b8-0bd55386c4b9" "objects_1857_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1857_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1857_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1857_description_[SimBad](https://attack.mitre.org/software/S0419) can install attacker-specified applications.(Citation: CheckPoint SimBad 2019)" "objects_1857_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1857_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1857_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1857_created_2019-11-21T19:16:34.805Z" "objects_1857_type_relationship" "objects_1857_relationship_type_uses" "objects_1857_modified_2022-07-07T14:00:00.188Z" "objects_1857_spec_version_2.1" "objects_1857_x_mitre_attack_spec_version_2.1.0" "objects_1857_x_mitre_domains_0_mobile-attack" "objects_1857_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1857_x_mitre_version_1.0" "objects_1857_x_mitre_deprecated_True" "objects_1858_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1858_id_relationship--08327d65-1a15-4d65-961f-4c088c971a25" "objects_1858_target_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_1858_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1858_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1858_modified_2022-07-07T14:00:00.188Z" "objects_1858_type_relationship" "objects_1858_created_2019-10-18T14:50:57.432Z" "objects_1858_relationship_type_mitigates" "objects_1858_spec_version_2.1" "objects_1858_x_mitre_attack_spec_version_2.1.0" "objects_1858_x_mitre_domains_0_mobile-attack" "objects_1858_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1858_x_mitre_version_1.0" "objects_1858_x_mitre_deprecated_True" "objects_1859_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1859_id_relationship--08662ec2-e5c0-4512-960e-bc2e44804f1e" "objects_1859_target_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_1859_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1859_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1859_modified_2022-07-07T14:00:00.188Z" "objects_1859_type_relationship" "objects_1859_created_2019-10-18T15:53:07.541Z" "objects_1859_relationship_type_mitigates" "objects_1859_spec_version_2.1" "objects_1859_x_mitre_attack_spec_version_2.1.0" "objects_1859_x_mitre_domains_0_mobile-attack" "objects_1859_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1859_x_mitre_version_1.0" "objects_1859_x_mitre_deprecated_True" "objects_1860_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1860_id_relationship--08e7c0ad-f2d7-472c-97de-3627ca5d2991" "objects_1860_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_1860_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1860_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1860_modified_2022-07-07T14:00:00.188Z" "objects_1860_type_relationship" "objects_1860_created_2017-10-25T14:48:53.745Z" "objects_1860_relationship_type_mitigates" "objects_1860_spec_version_2.1" "objects_1860_x_mitre_attack_spec_version_2.1.0" "objects_1860_x_mitre_domains_0_mobile-attack" "objects_1860_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1860_x_mitre_version_1.0" "objects_1860_x_mitre_deprecated_True" "objects_1861_source_ref_course-of-action--7b1cf46f-784b-405a-a8dd-4624c19d8321" "objects_1861_id_relationship--0977107c-9dd3-4cc5-b769-7e29da9f4bb6" "objects_1861_target_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_1861_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1861_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1861_modified_2022-07-07T14:00:00.188Z" "objects_1861_type_relationship" "objects_1861_created_2017-10-25T14:48:53.746Z" "objects_1861_relationship_type_mitigates" "objects_1861_spec_version_2.1" "objects_1861_x_mitre_attack_spec_version_2.1.0" "objects_1861_x_mitre_domains_0_mobile-attack" "objects_1861_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1861_x_mitre_version_1.0" "objects_1861_x_mitre_deprecated_True" "objects_1862_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1862_id_relationship--09fa9342-34cb-4f0d-8cdf-df4d51d0ae12" "objects_1862_target_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_1862_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1862_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1862_modified_2022-07-07T14:00:00.188Z" "objects_1862_type_relationship" "objects_1862_created_2017-10-25T14:48:53.737Z" "objects_1862_relationship_type_mitigates" "objects_1862_spec_version_2.1" "objects_1862_x_mitre_attack_spec_version_2.1.0" "objects_1862_x_mitre_domains_0_mobile-attack" "objects_1862_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1862_x_mitre_version_1.0" "objects_1862_x_mitre_deprecated_True" "objects_1863_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1863_id_relationship--0aab3d6b-a2b7-4e55-9614-4f2af8543af6" "objects_1863_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1863_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1863_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1863_description_[Anubis](https://attack.mitre.org/software/S0422) has requested accessibility service privileges while masquerading as \"Google Play Protect\" and has disguised additional malicious application installs as legitimate system updates.(Citation: Cofense Anubis)(Citation: Trend Micro Anubis)" "objects_1863_external_references_0_source_name_Cofense Anubis" "objects_1863_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_1863_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_1863_external_references_1_source_name_Trend Micro Anubis" "objects_1863_external_references_1_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_1863_external_references_1_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_1863_created_2020-04-08T15:41:19.368Z" "objects_1863_type_relationship" "objects_1863_relationship_type_uses" "objects_1863_modified_2022-07-07T14:00:00.188Z" "objects_1863_spec_version_2.1" "objects_1863_x_mitre_attack_spec_version_2.1.0" "objects_1863_x_mitre_domains_0_mobile-attack" "objects_1863_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1863_x_mitre_version_1.0" "objects_1863_x_mitre_deprecated_True" "objects_1864_source_ref_malware--c0efbaae-9e7d-4716-a92d-68373aac7424" "objects_1864_id_relationship--0c53692d-16a1-4c25-8a3e-30802b2d0c7f" "objects_1864_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1864_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1864_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1864_description_[Riltok](https://attack.mitre.org/software/S0403) is distributed via phishing SMS messages from infected devices.(Citation: Kaspersky Riltok June 2019)" "objects_1864_external_references_0_source_name_Kaspersky Riltok June 2019" "objects_1864_external_references_0_description_Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019." "objects_1864_external_references_0_url_https://securelist.com/mobile-banker-riltok/91374/" "objects_1864_created_2019-08-07T15:57:13.380Z" "objects_1864_type_relationship" "objects_1864_relationship_type_uses" "objects_1864_modified_2022-07-07T14:00:00.188Z" "objects_1864_spec_version_2.1" "objects_1864_x_mitre_attack_spec_version_2.1.0" "objects_1864_x_mitre_domains_0_mobile-attack" "objects_1864_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1864_x_mitre_version_1.0" "objects_1864_x_mitre_deprecated_True" "objects_1865_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1865_id_relationship--0cb64ad4-bf3b-482c-be22-ce75e065691d" "objects_1865_target_ref_attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e" "objects_1865_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1865_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1865_description_Applications can be vetted for their use of the Android MediaProjectionManager class, with extra scrutiny applied to any application that uses the class." "objects_1865_created_2019-10-18T15:33:18.675Z" "objects_1865_type_relationship" "objects_1865_relationship_type_mitigates" "objects_1865_modified_2022-07-07T14:00:00.188Z" "objects_1865_spec_version_2.1" "objects_1865_x_mitre_attack_spec_version_2.1.0" "objects_1865_x_mitre_domains_0_mobile-attack" "objects_1865_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1865_x_mitre_version_1.0" "objects_1865_x_mitre_deprecated_True" "objects_1866_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_1866_id_relationship--0d2c663e-ac1a-402d-957b-b078654e57c1" "objects_1866_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1866_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1866_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1866_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has masqueraded as popular apps, cracked games, and video players. (Citation: Microsoft MalLockerB)" "objects_1866_external_references_0_source_name_Microsoft MalLockerB" "objects_1866_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_1866_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_1866_created_2020-10-29T19:01:13.810Z" "objects_1866_type_relationship" "objects_1866_relationship_type_uses" "objects_1866_modified_2022-07-07T14:00:00.188Z" "objects_1866_spec_version_2.1" "objects_1866_x_mitre_attack_spec_version_2.1.0" "objects_1866_x_mitre_domains_0_mobile-attack" "objects_1866_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1866_x_mitre_version_1.0" "objects_1866_x_mitre_deprecated_True" "objects_1867_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1867_id_relationship--0e302702-222a-4239-bdc9-0f7500497983" "objects_1867_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1867_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1867_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1867_description_[Mandrake](https://attack.mitre.org/software/S0485) can mimic an app called \u201cStorage Settings\u201d if it cannot hide its icon.(Citation: Bitdefender Mandrake)" "objects_1867_external_references_0_source_name_Bitdefender Mandrake" "objects_1867_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1867_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1867_created_2020-07-15T20:20:59.312Z" "objects_1867_type_relationship" "objects_1867_relationship_type_uses" "objects_1867_modified_2022-07-07T14:00:00.188Z" "objects_1867_spec_version_2.1" "objects_1867_x_mitre_attack_spec_version_2.1.0" "objects_1867_x_mitre_domains_0_mobile-attack" "objects_1867_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1867_x_mitre_version_1.0" "objects_1867_x_mitre_deprecated_True" "objects_1868_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1868_id_relationship--0fa68550-d0de-405b-acb3-b6a4b219753e" "objects_1868_target_ref_attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d" "objects_1868_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1868_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1868_description_Mobile security products that are part of the Samsung Knox for Mobile Threat Defense program could examine running applications while the device is idle, potentially detecting malicious applications that are running primarily when the device is not being used." "objects_1868_created_2021-09-30T18:18:52.628Z" "objects_1868_type_relationship" "objects_1868_relationship_type_mitigates" "objects_1868_modified_2022-07-07T14:00:00.188Z" "objects_1868_spec_version_2.1" "objects_1868_x_mitre_attack_spec_version_2.1.0" "objects_1868_x_mitre_domains_0_mobile-attack" "objects_1868_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1868_x_mitre_version_1.0" "objects_1868_x_mitre_deprecated_True" "objects_1869_source_ref_malware--aecc0097-c9f8-4786-9b39-e891ff173f54" "objects_1869_id_relationship--108e8cb9-8f35-4b63-8b0b-466f4ab0ed02" "objects_1869_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1869_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1869_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1869_description_[EventBot](https://attack.mitre.org/software/S0478) has used icons from popular applications.(Citation: Cybereason EventBot)" "objects_1869_external_references_0_source_name_Cybereason EventBot" "objects_1869_external_references_0_description_D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020." "objects_1869_external_references_0_url_https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born" "objects_1869_created_2020-06-26T14:55:13.313Z" "objects_1869_type_relationship" "objects_1869_relationship_type_uses" "objects_1869_modified_2022-07-07T14:00:00.188Z" "objects_1869_spec_version_2.1" "objects_1869_x_mitre_attack_spec_version_2.1.0" "objects_1869_x_mitre_domains_0_mobile-attack" "objects_1869_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1869_x_mitre_version_1.0" "objects_1869_x_mitre_deprecated_True" "objects_1870_source_ref_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_1870_id_relationship--10c503d7-850b-4ae2-8b14-186cbe214d33" "objects_1870_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1870_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1870_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1870_description_[Bouncing Golf](https://attack.mitre.org/groups/G0097) delivered GolfSpy via a hosted application binary advertised on social media.(Citation: Trend Micro Bouncing Golf 2019) " "objects_1870_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1870_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1870_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1870_created_2020-01-27T16:55:40.098Z" "objects_1870_type_relationship" "objects_1870_relationship_type_uses" "objects_1870_modified_2022-07-07T14:00:00.188Z" "objects_1870_spec_version_2.1" "objects_1870_x_mitre_attack_spec_version_2.1.0" "objects_1870_x_mitre_domains_0_mobile-attack" "objects_1870_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1870_x_mitre_version_1.0" "objects_1870_x_mitre_deprecated_True" "objects_1871_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1871_id_relationship--1121d23e-a20a-4de2-a1d6-e0d519664850" "objects_1871_target_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_1871_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1871_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1871_modified_2022-07-07T14:00:00.188Z" "objects_1871_type_relationship" "objects_1871_created_2019-10-18T15:11:37.251Z" "objects_1871_relationship_type_mitigates" "objects_1871_spec_version_2.1" "objects_1871_x_mitre_attack_spec_version_2.1.0" "objects_1871_x_mitre_domains_0_mobile-attack" "objects_1871_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1871_x_mitre_version_1.0" "objects_1871_x_mitre_deprecated_True" "objects_1872_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1872_id_relationship--12332d52-6fd2-47a6-a3b5-d673150a9d12" "objects_1872_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_1872_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1872_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1872_description_A static analysis approach may be able to identify ransomware apps that encrypt user files on the device.(Citation: Maggi-Ransomware)" "objects_1872_external_references_0_description_Federico Maggi and Stefano Zanero. (2016). Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. Retrieved December 21, 2016." "objects_1872_external_references_0_source_name_Maggi-Ransomware" "objects_1872_external_references_0_url_https://www.blackhat.com/docs/eu-16/materials/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf" "objects_1872_created_2019-10-18T15:11:37.278Z" "objects_1872_type_relationship" "objects_1872_relationship_type_mitigates" "objects_1872_modified_2022-07-07T14:00:00.188Z" "objects_1872_spec_version_2.1" "objects_1872_x_mitre_attack_spec_version_2.1.0" "objects_1872_x_mitre_domains_0_mobile-attack" "objects_1872_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1872_x_mitre_version_1.0" "objects_1872_x_mitre_deprecated_True" "objects_1873_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1873_id_relationship--16a68568-f240-47f4-9f0c-5b4de449b5d6" "objects_1873_target_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_1873_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1873_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1873_modified_2022-07-07T14:00:00.188Z" "objects_1873_type_relationship" "objects_1873_created_2019-10-18T14:50:57.524Z" "objects_1873_relationship_type_mitigates" "objects_1873_spec_version_2.1" "objects_1873_x_mitre_attack_spec_version_2.1.0" "objects_1873_x_mitre_domains_0_mobile-attack" "objects_1873_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1873_x_mitre_version_1.0" "objects_1873_x_mitre_deprecated_True" "objects_1874_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1874_id_relationship--1bfffe11-00f6-449a-9e08-0395080147ef" "objects_1874_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_1874_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1874_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1874_description_During the vetting process applications using the android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be analyzed more closely." "objects_1874_created_2019-10-18T15:33:18.671Z" "objects_1874_type_relationship" "objects_1874_relationship_type_mitigates" "objects_1874_modified_2022-07-07T14:00:00.188Z" "objects_1874_spec_version_2.1" "objects_1874_x_mitre_attack_spec_version_2.1.0" "objects_1874_x_mitre_domains_0_mobile-attack" "objects_1874_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1874_x_mitre_version_1.0" "objects_1874_x_mitre_deprecated_True" "objects_1875_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1875_id_relationship--1ed76ca9-0ed6-40f9-89c6-64662fdd447d" "objects_1875_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1875_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1875_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1875_modified_2022-07-07T14:00:00.188Z" "objects_1875_type_relationship" "objects_1875_created_2017-10-25T14:48:53.740Z" "objects_1875_relationship_type_mitigates" "objects_1875_spec_version_2.1" "objects_1875_x_mitre_attack_spec_version_2.1.0" "objects_1875_x_mitre_domains_0_mobile-attack" "objects_1875_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1875_x_mitre_version_1.0" "objects_1875_x_mitre_deprecated_True" "objects_1876_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1876_id_relationship--1f5ce357-f273-4a97-9086-b74652063372" "objects_1876_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_1876_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1876_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1876_description_Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them." "objects_1876_created_2019-10-18T15:11:37.267Z" "objects_1876_type_relationship" "objects_1876_relationship_type_mitigates" "objects_1876_modified_2022-07-07T14:00:00.188Z" "objects_1876_spec_version_2.1" "objects_1876_x_mitre_attack_spec_version_2.1.0" "objects_1876_x_mitre_domains_0_mobile-attack" "objects_1876_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1876_x_mitre_version_1.0" "objects_1876_x_mitre_deprecated_True" "objects_1877_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1877_id_relationship--1fe03d39-31e0-4ecf-be7a-e14ec734b037" "objects_1877_target_ref_attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb" "objects_1877_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1877_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1877_description_Application vetting services could look for the `native` keyword in function definitions. However, this is widely used for legitimate purposes, so this may not be feasible. Application vetting services may also be able to detect behaviors carried out through the Native Development Kit (NDK) via dynamic analysis." "objects_1877_created_2020-04-28T14:35:37.685Z" "objects_1877_type_relationship" "objects_1877_relationship_type_mitigates" "objects_1877_modified_2022-07-07T14:00:00.188Z" "objects_1877_spec_version_2.1" "objects_1877_x_mitre_attack_spec_version_2.1.0" "objects_1877_x_mitre_domains_0_mobile-attack" "objects_1877_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1877_x_mitre_version_1.0" "objects_1877_x_mitre_deprecated_True" "objects_1878_source_ref_malware--3d6c4389-3489-40a3-beda-c56e650b6f68" "objects_1878_id_relationship--205e2cd0-3f0b-459f-95c9-4e2745b67d83" "objects_1878_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1878_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1878_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1878_description_[DoubleAgent](https://attack.mitre.org/software/S0550) has been embedded into trojanized versions of applications such as Voxer, TalkBox, and Amaq News.(Citation: Lookout Uyghur Campaign)" "objects_1878_external_references_0_source_name_Lookout Uyghur Campaign" "objects_1878_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_1878_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_1878_created_2020-12-24T21:55:56.655Z" "objects_1878_type_relationship" "objects_1878_relationship_type_uses" "objects_1878_modified_2022-07-07T14:00:00.188Z" "objects_1878_spec_version_2.1" "objects_1878_x_mitre_attack_spec_version_2.1.0" "objects_1878_x_mitre_domains_0_mobile-attack" "objects_1878_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1878_x_mitre_version_1.0" "objects_1878_x_mitre_deprecated_True" "objects_1879_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1879_id_relationship--208c99ae-cc99-4172-89e7-3503600a9338" "objects_1879_target_ref_attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce" "objects_1879_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1879_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1879_description_On Android, accessing the device contact list requires that the app hold the READ_CONTACTS permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access the device contact list, with extra scrutiny applied to any that do so." "objects_1879_created_2019-10-18T15:11:37.257Z" "objects_1879_type_relationship" "objects_1879_relationship_type_mitigates" "objects_1879_modified_2022-07-07T14:00:00.188Z" "objects_1879_spec_version_2.1" "objects_1879_x_mitre_attack_spec_version_2.1.0" "objects_1879_x_mitre_domains_0_mobile-attack" "objects_1879_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1879_x_mitre_version_1.0" "objects_1879_x_mitre_deprecated_True" "objects_1880_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1880_id_relationship--254a8d5f-8431-4364-96db-d34d740e1384" "objects_1880_target_ref_attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6" "objects_1880_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1880_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1880_modified_2022-07-07T14:00:00.188Z" "objects_1880_type_relationship" "objects_1880_created_2019-10-18T14:50:57.509Z" "objects_1880_relationship_type_mitigates" "objects_1880_spec_version_2.1" "objects_1880_x_mitre_attack_spec_version_2.1.0" "objects_1880_x_mitre_domains_0_mobile-attack" "objects_1880_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1880_x_mitre_version_1.0" "objects_1880_x_mitre_deprecated_True" "objects_1881_source_ref_malware--f9854ba6-989d-43bf-828b-7240b8a65291" "objects_1881_id_relationship--2555c438-cd9f-49ed-93f6-a935a9861c54" "objects_1881_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1881_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1881_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1881_description_[Marcher](https://attack.mitre.org/software/S0317) is delivered via a link sent by SMS or email, including instructions advising the user to modify their Android device security settings to enable apps to be installed from \"Unknown Sources.\"(Citation: Proofpoint-Marcher)" "objects_1881_external_references_0_source_name_Proofpoint-Marcher" "objects_1881_external_references_0_description_Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018." "objects_1881_external_references_0_url_https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks" "objects_1881_created_2018-10-17T00:14:20.652Z" "objects_1881_type_relationship" "objects_1881_relationship_type_uses" "objects_1881_modified_2022-07-07T14:00:00.188Z" "objects_1881_spec_version_2.1" "objects_1881_x_mitre_attack_spec_version_2.1.0" "objects_1881_x_mitre_domains_0_mobile-attack" "objects_1881_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1881_x_mitre_version_1.0" "objects_1881_x_mitre_deprecated_True" "objects_1882_source_ref_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_1882_id_relationship--26a9db86-5ecf-400a-bdd9-419448c2f776" "objects_1882_target_ref_attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d" "objects_1882_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1882_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1882_modified_2022-07-07T14:00:00.188Z" "objects_1882_type_relationship" "objects_1882_created_2017-10-25T14:48:53.733Z" "objects_1882_relationship_type_mitigates" "objects_1882_spec_version_2.1" "objects_1882_x_mitre_attack_spec_version_2.1.0" "objects_1882_x_mitre_domains_0_mobile-attack" "objects_1882_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1882_x_mitre_version_1.0" "objects_1882_x_mitre_deprecated_True" "objects_1883_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_1883_id_relationship--26c224fb-906a-48bd-b550-5608e2492c03" "objects_1883_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1883_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1883_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1883_description_[eSurv](https://attack.mitre.org/software/S0507)\u2019s Android version was available in the Google Play Store.(Citation: Lookout eSurv)" "objects_1883_external_references_0_source_name_Lookout eSurv" "objects_1883_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_1883_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_1883_created_2020-09-14T14:13:45.283Z" "objects_1883_type_relationship" "objects_1883_relationship_type_uses" "objects_1883_modified_2022-07-07T14:00:00.188Z" "objects_1883_spec_version_2.1" "objects_1883_x_mitre_attack_spec_version_2.1.0" "objects_1883_x_mitre_domains_0_mobile-attack" "objects_1883_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1883_x_mitre_version_1.0" "objects_1883_x_mitre_deprecated_True" "objects_1884_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1884_id_relationship--2758c6ce-8c56-462f-8cbc-fb32ab098646" "objects_1884_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1884_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1884_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1884_description_[SimBad](https://attack.mitre.org/software/S0419) was distributed via the Google Play Store.(Citation: CheckPoint SimBad 2019)" "objects_1884_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1884_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1884_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1884_created_2020-01-14T15:32:11.813Z" "objects_1884_type_relationship" "objects_1884_relationship_type_uses" "objects_1884_modified_2022-07-07T14:00:00.188Z" "objects_1884_spec_version_2.1" "objects_1884_x_mitre_attack_spec_version_2.1.0" "objects_1884_x_mitre_domains_0_mobile-attack" "objects_1884_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1884_x_mitre_version_1.0" "objects_1884_x_mitre_deprecated_True" "objects_1885_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1885_id_relationship--275a0930-7409-4238-a072-f194cbd84057" "objects_1885_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_1885_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1885_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1885_description_Application vetting techniques could be used to attempt to identify applications with this behavior." "objects_1885_created_2019-10-18T15:11:37.227Z" "objects_1885_type_relationship" "objects_1885_relationship_type_mitigates" "objects_1885_modified_2022-07-07T14:00:00.188Z" "objects_1885_spec_version_2.1" "objects_1885_x_mitre_attack_spec_version_2.1.0" "objects_1885_x_mitre_domains_0_mobile-attack" "objects_1885_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1885_x_mitre_version_1.0" "objects_1885_x_mitre_deprecated_True" "objects_1886_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_1886_id_relationship--282d2448-6fe8-4995-b17e-4ce7586f75b9" "objects_1886_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1886_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1886_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1886_description_[Asacub](https://attack.mitre.org/software/S0540) has masqueraded as a client of popular free ads services.(Citation: Securelist Asacub)" "objects_1886_external_references_0_source_name_Securelist Asacub" "objects_1886_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_1886_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_1886_created_2020-12-14T15:02:35.283Z" "objects_1886_type_relationship" "objects_1886_relationship_type_uses" "objects_1886_modified_2022-07-07T14:00:00.188Z" "objects_1886_spec_version_2.1" "objects_1886_x_mitre_attack_spec_version_2.1.0" "objects_1886_x_mitre_domains_0_mobile-attack" "objects_1886_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1886_x_mitre_version_1.0" "objects_1886_x_mitre_deprecated_True" "objects_1887_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_1887_id_relationship--283f4e8e-07dc-4d22-84f9-536f9024307a" "objects_1887_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1887_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1887_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1887_description_[Bread](https://attack.mitre.org/software/S0432) can install additional applications.(Citation: Check Point-Joker)" "objects_1887_external_references_0_source_name_Check Point-Joker" "objects_1887_external_references_0_description_Hazum, A., Melnykov, B., Wernik, I.. (2020, July 9). New Joker variant hits Google Play with an old trick. Retrieved July 20, 2020." "objects_1887_external_references_0_url_https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/" "objects_1887_created_2020-07-20T14:12:15.547Z" "objects_1887_type_relationship" "objects_1887_relationship_type_uses" "objects_1887_modified_2022-07-07T14:00:00.188Z" "objects_1887_spec_version_2.1" "objects_1887_x_mitre_attack_spec_version_2.1.0" "objects_1887_x_mitre_domains_0_mobile-attack" "objects_1887_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1887_x_mitre_version_1.0" "objects_1887_x_mitre_deprecated_True" "objects_1888_source_ref_malware--22b596a6-d288-4409-8520-5f2846f85514" "objects_1888_id_relationship--28638246-abfb-4964-aa0f-57eb825338cc" "objects_1888_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1888_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1888_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1888_description_[Dvmap](https://attack.mitre.org/software/S0420) was delivered via the Google Play Store. It evaded Google Play Store checks by uploading a clean application, and replacing it with a malicious version for a short period of time. This occurred at least 5 times in a one month period.(Citation: SecureList DVMap June 2017)" "objects_1888_external_references_0_source_name_SecureList DVMap June 2017" "objects_1888_external_references_0_description_R. Unuchek. (2017, June 8). Dvmap: the first Android malware with code injection. Retrieved December 10, 2019." "objects_1888_external_references_0_url_https://securelist.com/dvmap-the-first-android-malware-with-code-injection/78648/" "objects_1888_created_2019-12-10T16:07:41.048Z" "objects_1888_type_relationship" "objects_1888_relationship_type_uses" "objects_1888_modified_2022-07-07T14:00:00.188Z" "objects_1888_spec_version_2.1" "objects_1888_x_mitre_attack_spec_version_2.1.0" "objects_1888_x_mitre_domains_0_mobile-attack" "objects_1888_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1888_x_mitre_version_1.0" "objects_1888_x_mitre_deprecated_True" "objects_1889_source_ref_malware--a5528622-3a8a-4633-86ce-8cdaf8423858" "objects_1889_id_relationship--29c45d94-f985-4128-b845-bf1159d606cb" "objects_1889_target_ref_attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad" "objects_1889_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1889_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1889_description_[FinFisher](https://attack.mitre.org/software/S0182) exfiltrates data over commonly used ports, such as ports 21, 53, and 443.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1889_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1889_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1889_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1889_created_2019-07-10T15:25:57.607Z" "objects_1889_type_relationship" "objects_1889_relationship_type_uses" "objects_1889_modified_2022-07-07T14:00:00.188Z" "objects_1889_spec_version_2.1" "objects_1889_x_mitre_attack_spec_version_2.1.0" "objects_1889_x_mitre_domains_0_mobile-attack" "objects_1889_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1889_x_mitre_version_1.0" "objects_1889_x_mitre_deprecated_True" "objects_1890_source_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_1890_id_relationship--2a287c91-2792-407f-a9ee-8153a802b7c6" "objects_1890_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1890_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1890_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1890_description_[ZergHelper](https://attack.mitre.org/software/S0287) abuses enterprises certificate and personal certificates to sign and distribute apps.(Citation: Xiao-ZergHelper)" "objects_1890_external_references_0_source_name_Xiao-ZergHelper" "objects_1890_external_references_0_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_1890_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_1890_created_2018-10-17T00:14:20.652Z" "objects_1890_type_relationship" "objects_1890_relationship_type_uses" "objects_1890_modified_2022-07-07T14:00:00.188Z" "objects_1890_spec_version_2.1" "objects_1890_x_mitre_attack_spec_version_2.1.0" "objects_1890_x_mitre_domains_0_mobile-attack" "objects_1890_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1890_x_mitre_version_1.0" "objects_1890_x_mitre_deprecated_True" "objects_1891_source_ref_malware--c19cfc89-5ac6-4d2d-a236-70d2b32e007c" "objects_1891_id_relationship--2a94bb7e-67af-4031-b4be-25c2a3ccd35c" "objects_1891_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1891_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1891_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1891_description_[GolfSpy](https://attack.mitre.org/software/S0421) can install attacker-specified applications.(Citation: Trend Micro Bouncing Golf 2019)" "objects_1891_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_1891_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_1891_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_1891_created_2020-01-27T17:05:58.182Z" "objects_1891_type_relationship" "objects_1891_relationship_type_uses" "objects_1891_modified_2022-07-07T14:00:00.188Z" "objects_1891_spec_version_2.1" "objects_1891_x_mitre_attack_spec_version_2.1.0" "objects_1891_x_mitre_domains_0_mobile-attack" "objects_1891_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1891_x_mitre_version_1.0" "objects_1891_x_mitre_deprecated_True" "objects_1892_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1892_id_relationship--2c2a572c-92d1-47aa-9809-4a470cfae83c" "objects_1892_target_ref_attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5" "objects_1892_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1892_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1892_description_Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs." "objects_1892_created_2019-10-18T15:33:18.550Z" "objects_1892_type_relationship" "objects_1892_relationship_type_mitigates" "objects_1892_modified_2022-07-07T14:00:00.188Z" "objects_1892_spec_version_2.1" "objects_1892_x_mitre_attack_spec_version_2.1.0" "objects_1892_x_mitre_domains_0_mobile-attack" "objects_1892_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1892_x_mitre_version_1.0" "objects_1892_x_mitre_deprecated_True" "objects_1893_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1893_id_relationship--2e58b22f-b889-49fd-bbe1-37a907a5fcb1" "objects_1893_target_ref_attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e" "objects_1893_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1893_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1893_description_Check for potential malicious definitions of URL schemes when vetting applications. Also, when examining apps for potential vulnerabilities, encourage use of universal links as an alternative to URL schemes. When examining apps that use OAuth, encourage use of best practices.(Citation: Apple-UniversalLinks)(Citation: IETF-OAuthNativeApps)" "objects_1893_external_references_0_description_Apple. (n.d.). Support Universal Links. Retrieved December 21, 2016." "objects_1893_external_references_0_source_name_Apple-UniversalLinks" "objects_1893_external_references_0_url_https://developer.apple.com/library/content/documentation/General/Conceptual/AppSearch/UniversalLinks.html" "objects_1893_external_references_1_source_name_IETF-OAuthNativeApps" "objects_1893_external_references_1_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_1893_external_references_1_url_https://tools.ietf.org/html/rfc8252" "objects_1893_created_2019-10-18T15:11:37.264Z" "objects_1893_type_relationship" "objects_1893_relationship_type_mitigates" "objects_1893_modified_2022-07-07T14:00:00.188Z" "objects_1893_spec_version_2.1" "objects_1893_x_mitre_attack_spec_version_2.1.0" "objects_1893_x_mitre_domains_0_mobile-attack" "objects_1893_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1893_x_mitre_version_1.0" "objects_1893_x_mitre_deprecated_True" "objects_1894_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1894_id_relationship--308823b4-c0de-4416-9d4a-26e2b69577f6" "objects_1894_target_ref_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_1894_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1894_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1894_description_Mobile security products can often detect jailbroken or rooted devices." "objects_1894_created_2020-12-16T20:16:08.083Z" "objects_1894_type_relationship" "objects_1894_relationship_type_mitigates" "objects_1894_modified_2022-07-07T14:00:00.188Z" "objects_1894_spec_version_2.1" "objects_1894_x_mitre_attack_spec_version_2.1.0" "objects_1894_x_mitre_domains_0_mobile-attack" "objects_1894_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1894_x_mitre_version_1.0" "objects_1894_x_mitre_deprecated_True" "objects_1895_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1895_id_relationship--30c39439-27e9-4247-bf2c-e8d2d7fd3b6d" "objects_1895_target_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_1895_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1895_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1895_description_Application vetting services could look for use of the accessibility service or features that typically require root access." "objects_1895_created_2020-05-04T13:49:35.216Z" "objects_1895_type_relationship" "objects_1895_relationship_type_mitigates" "objects_1895_modified_2022-07-07T14:00:00.188Z" "objects_1895_spec_version_2.1" "objects_1895_x_mitre_attack_spec_version_2.1.0" "objects_1895_x_mitre_domains_0_mobile-attack" "objects_1895_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1895_x_mitre_version_1.0" "objects_1895_x_mitre_deprecated_True" "objects_1896_source_ref_malware--c41a8b7c-3e42-4eee-b87d-ad8a100ee878" "objects_1896_id_relationship--32625429-e05a-48a5-8f0b-53c6046e9b1a" "objects_1896_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1896_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1896_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1896_description_[Pallas](https://attack.mitre.org/software/S0399) has the ability to download and install attacker-specified applications.(Citation: Lookout Dark Caracal Jan 2018)" "objects_1896_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1896_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1896_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1896_created_2019-07-10T15:35:43.702Z" "objects_1896_type_relationship" "objects_1896_relationship_type_uses" "objects_1896_modified_2022-07-07T14:00:00.188Z" "objects_1896_spec_version_2.1" "objects_1896_x_mitre_attack_spec_version_2.1.0" "objects_1896_x_mitre_domains_0_mobile-attack" "objects_1896_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1896_x_mitre_version_1.0" "objects_1896_x_mitre_deprecated_True" "objects_1897_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1897_id_relationship--32d0832c-be5e-4939-a25a-a448cd679225" "objects_1897_target_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_1897_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1897_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1897_description_Newer OS releases typically patch known root exploits disclosed in previous versions." "objects_1897_created_2020-06-24T17:33:50.612Z" "objects_1897_type_relationship" "objects_1897_relationship_type_mitigates" "objects_1897_modified_2022-07-07T14:00:00.188Z" "objects_1897_spec_version_2.1" "objects_1897_x_mitre_attack_spec_version_2.1.0" "objects_1897_x_mitre_domains_0_mobile-attack" "objects_1897_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1897_x_mitre_version_1.0" "objects_1897_x_mitre_deprecated_True" "objects_1898_source_ref_malware--f666e17c-b290-43b3-8947-b96bd5148fbb" "objects_1898_id_relationship--336f139f-b771-48d4-a3d6-7ef94289d56e" "objects_1898_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1898_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1898_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1898_description_[ViperRAT](https://attack.mitre.org/software/S0506) has been distributed through 3rd party websites.(Citation: Lookout ViperRAT)" "objects_1898_external_references_0_source_name_Lookout ViperRAT" "objects_1898_external_references_0_description_M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020." "objects_1898_external_references_0_url_https://blog.lookout.com/viperrat-mobile-apt" "objects_1898_created_2020-09-11T16:22:03.251Z" "objects_1898_type_relationship" "objects_1898_relationship_type_uses" "objects_1898_modified_2022-07-07T14:00:00.188Z" "objects_1898_spec_version_2.1" "objects_1898_x_mitre_attack_spec_version_2.1.0" "objects_1898_x_mitre_domains_0_mobile-attack" "objects_1898_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1898_x_mitre_version_1.0" "objects_1898_x_mitre_deprecated_True" "objects_1899_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_1899_id_relationship--34cd9b65-70c5-4be4-958c-32dc4673934c" "objects_1899_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_1899_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1899_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1899_description_[Pegasus for iOS](https://attack.mitre.org/software/S0289) was delivered via an SMS message containing a link to a web site with malicious code.(Citation: PegasusCitizenLab)" "objects_1899_external_references_0_description_Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group\u2019s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016." "objects_1899_external_references_0_source_name_PegasusCitizenLab" "objects_1899_external_references_0_url_https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/" "objects_1899_created_2018-10-17T00:14:20.652Z" "objects_1899_type_relationship" "objects_1899_relationship_type_uses" "objects_1899_modified_2022-07-07T14:00:00.188Z" "objects_1899_spec_version_2.1" "objects_1899_x_mitre_attack_spec_version_2.1.0" "objects_1899_x_mitre_domains_0_mobile-attack" "objects_1899_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1899_x_mitre_version_1.0" "objects_1899_x_mitre_deprecated_True" "objects_1900_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1900_id_relationship--37459382-00b7-4699-a294-d25f53bf1096" "objects_1900_target_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_1900_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1900_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1900_description_iOS 11 introduced a first-come-first-served principle for URIs, allowing only the prior installed app to be launched via the URI.(Citation: Trend Micro iOS URL Hijacking)" "objects_1900_external_references_0_source_name_Trend Micro iOS URL Hijacking" "objects_1900_external_references_0_description_L. Wu, Y. Zhou, M. Li. (2019, July 12). iOS URL Scheme Susceptible to Hijacking. Retrieved September 11, 2020." "objects_1900_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/ios-url-scheme-susceptible-to-hijacking/" "objects_1900_created_2020-09-30T14:36:43.256Z" "objects_1900_type_relationship" "objects_1900_relationship_type_mitigates" "objects_1900_modified_2022-07-07T14:00:00.188Z" "objects_1900_spec_version_2.1" "objects_1900_x_mitre_attack_spec_version_2.1.0" "objects_1900_x_mitre_domains_0_mobile-attack" "objects_1900_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1900_x_mitre_version_1.0" "objects_1900_x_mitre_deprecated_True" "objects_1901_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1901_id_relationship--376b8f2a-636e-4fa7-be6a-4300410c1954" "objects_1901_target_ref_attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf" "objects_1901_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1901_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1901_modified_2022-07-07T14:00:00.188Z" "objects_1901_type_relationship" "objects_1901_created_2019-10-18T15:11:37.225Z" "objects_1901_relationship_type_mitigates" "objects_1901_spec_version_2.1" "objects_1901_x_mitre_attack_spec_version_2.1.0" "objects_1901_x_mitre_domains_0_mobile-attack" "objects_1901_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1901_x_mitre_version_1.0" "objects_1901_x_mitre_deprecated_True" "objects_1902_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1902_id_relationship--37c4a0cf-0552-46fd-b067-419b15833044" "objects_1902_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_1902_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1902_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1902_modified_2022-07-07T14:00:00.188Z" "objects_1902_type_relationship" "objects_1902_created_2017-10-25T14:48:53.743Z" "objects_1902_relationship_type_mitigates" "objects_1902_spec_version_2.1" "objects_1902_x_mitre_attack_spec_version_2.1.0" "objects_1902_x_mitre_domains_0_mobile-attack" "objects_1902_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1902_x_mitre_version_1.0" "objects_1902_x_mitre_deprecated_True" "objects_1903_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1903_id_relationship--3a869988-15a7-4ec8-9d7b-d460dc0ee494" "objects_1903_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1903_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1903_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1903_description_[Dendroid](https://attack.mitre.org/software/S0301) can be bound to legitimate applications prior to installation on devices.(Citation: Lookout-Dendroid)" "objects_1903_external_references_0_source_name_Lookout-Dendroid" "objects_1903_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1903_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1903_created_2020-09-24T15:34:51.448Z" "objects_1903_type_relationship" "objects_1903_relationship_type_uses" "objects_1903_modified_2022-07-07T14:00:00.188Z" "objects_1903_spec_version_2.1" "objects_1903_x_mitre_attack_spec_version_2.1.0" "objects_1903_x_mitre_domains_0_mobile-attack" "objects_1903_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1903_x_mitre_version_1.0" "objects_1903_x_mitre_deprecated_True" "objects_1904_source_ref_course-of-action--cf2cccb1-cab8-431a-8ecf-f7874d05f433" "objects_1904_id_relationship--3b5d6c4f-1669-47d9-84fc-8af0adce2a29" "objects_1904_target_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_1904_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1904_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1904_description_Mobile security products can potentially detect jailbroken devices and take responsive action." "objects_1904_created_2020-06-24T17:33:50.614Z" "objects_1904_type_relationship" "objects_1904_relationship_type_mitigates" "objects_1904_modified_2022-07-07T14:00:00.188Z" "objects_1904_spec_version_2.1" "objects_1904_x_mitre_attack_spec_version_2.1.0" "objects_1904_x_mitre_domains_0_mobile-attack" "objects_1904_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1904_x_mitre_version_1.0" "objects_1904_x_mitre_deprecated_True" "objects_1905_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1905_id_relationship--3f3d63f0-1f03-4931-9624-10eaf4b207b4" "objects_1905_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_1905_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1905_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1905_modified_2022-07-07T14:00:00.188Z" "objects_1905_type_relationship" "objects_1905_created_2017-10-25T14:48:53.733Z" "objects_1905_relationship_type_mitigates" "objects_1905_spec_version_2.1" "objects_1905_x_mitre_attack_spec_version_2.1.0" "objects_1905_x_mitre_domains_0_mobile-attack" "objects_1905_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1905_x_mitre_version_1.0" "objects_1905_x_mitre_deprecated_True" "objects_1906_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_1906_id_relationship--3f984e70-7826-4208-872f-48844fd0ab82" "objects_1906_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1906_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1906_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1906_description_[Mandrake](https://attack.mitre.org/software/S0485) has had the first stage (dropper) distributed via the Google Play Store.(Citation: Bitdefender Mandrake)" "objects_1906_external_references_0_source_name_Bitdefender Mandrake" "objects_1906_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_1906_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_1906_created_2020-07-15T20:20:59.303Z" "objects_1906_type_relationship" "objects_1906_relationship_type_uses" "objects_1906_modified_2022-07-07T14:00:00.188Z" "objects_1906_spec_version_2.1" "objects_1906_x_mitre_attack_spec_version_2.1.0" "objects_1906_x_mitre_domains_0_mobile-attack" "objects_1906_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1906_x_mitre_version_1.0" "objects_1906_x_mitre_deprecated_True" "objects_1907_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1907_id_relationship--409570bb-77c9-4021-920e-1600a7f4efbd" "objects_1907_target_ref_attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb" "objects_1907_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1907_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1907_description_Android 10 prevents applications from accessing clipboard data unless the application is on the foreground or is set as the device\u2019s default input method editor (IME).(Citation: Android 10 Privacy Changes)" "objects_1907_external_references_0_source_name_Android 10 Privacy Changes" "objects_1907_external_references_0_description_Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019." "objects_1907_external_references_0_url_https://developer.android.com/about/versions/10/privacy/changes#clipboard-data" "objects_1907_created_2019-07-26T14:26:57.207Z" "objects_1907_type_relationship" "objects_1907_relationship_type_mitigates" "objects_1907_modified_2022-07-07T14:00:00.188Z" "objects_1907_spec_version_2.1" "objects_1907_x_mitre_attack_spec_version_2.1.0" "objects_1907_x_mitre_domains_0_mobile-attack" "objects_1907_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1907_x_mitre_version_1.0" "objects_1907_x_mitre_deprecated_True" "objects_1908_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_1908_id_relationship--41e58a79-f8e4-4929-82ad-e15ce384f7a1" "objects_1908_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1908_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1908_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1908_description_[Agent Smith](https://attack.mitre.org/software/S0440) can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. [Agent Smith](https://attack.mitre.org/software/S0440)'s dropper is a weaponized legitimate Feng Shui Bundle.(Citation: CheckPoint Agent Smith) " "objects_1908_external_references_0_source_name_CheckPoint Agent Smith" "objects_1908_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_1908_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_1908_created_2020-05-07T15:33:32.921Z" "objects_1908_type_relationship" "objects_1908_relationship_type_uses" "objects_1908_modified_2022-07-07T14:00:00.188Z" "objects_1908_spec_version_2.1" "objects_1908_x_mitre_attack_spec_version_2.1.0" "objects_1908_x_mitre_domains_0_mobile-attack" "objects_1908_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1908_x_mitre_version_1.0" "objects_1908_x_mitre_deprecated_True" "objects_1909_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1909_id_relationship--4386e7d1-f21f-4055-9468-6af209ec4731" "objects_1909_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_1909_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1909_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1909_description_Application vetting techniques could search for use of the Android PackageManager class to enumerate other apps, and such applications could have extra scrutiny applied to them. However, this technique may not be practical if many apps invoke these methods as part of their legitimate behavior. On iOS, application vetting techniques could similarly search for use of the private API call necessary to obtain a list of apps installed on the device. Additionally, on iOS, use of the private API call is likely to result in the app not being accepted into Apple's App Store." "objects_1909_created_2019-10-18T15:11:37.277Z" "objects_1909_type_relationship" "objects_1909_relationship_type_mitigates" "objects_1909_modified_2022-07-07T14:00:00.188Z" "objects_1909_spec_version_2.1" "objects_1909_x_mitre_attack_spec_version_2.1.0" "objects_1909_x_mitre_domains_0_mobile-attack" "objects_1909_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1909_x_mitre_version_1.0" "objects_1909_x_mitre_deprecated_True" "objects_1910_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1910_id_relationship--443da947-76ab-4e1e-aefd-24aa83dcc131" "objects_1910_target_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_1910_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1910_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1910_description_Advise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debugging)." "objects_1910_created_2019-10-18T15:51:48.488Z" "objects_1910_type_relationship" "objects_1910_relationship_type_mitigates" "objects_1910_modified_2022-07-07T14:00:00.188Z" "objects_1910_spec_version_2.1" "objects_1910_x_mitre_attack_spec_version_2.1.0" "objects_1910_x_mitre_domains_0_mobile-attack" "objects_1910_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1910_x_mitre_version_1.0" "objects_1910_x_mitre_deprecated_True" "objects_1911_source_ref_course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9" "objects_1911_id_relationship--465ff71b-2b1b-43b6-ab78-afb273d956d2" "objects_1911_target_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_1911_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1911_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1911_description_There are very limited circumstances under which device administrator access should be granted." "objects_1911_modified_2022-07-07T14:00:00.188Z" "objects_1911_type_relationship" "objects_1911_created_2017-10-25T14:48:53.746Z" "objects_1911_relationship_type_mitigates" "objects_1911_spec_version_2.1" "objects_1911_x_mitre_attack_spec_version_2.1.0" "objects_1911_x_mitre_domains_0_mobile-attack" "objects_1911_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1911_x_mitre_version_1.0" "objects_1911_x_mitre_deprecated_True" "objects_1912_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1912_id_relationship--4727b752-0dc3-49b7-9fb1-2909ee560836" "objects_1912_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_1912_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1912_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1912_description_On Android, applications must request the ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission to access the device's physical location. Extra scrutiny could be given to applications that request these permissions. On iOS, calls to the relevant APIs could be detected during the vetting process." "objects_1912_created_2019-10-18T15:11:37.271Z" "objects_1912_type_relationship" "objects_1912_relationship_type_mitigates" "objects_1912_modified_2022-07-07T14:00:00.188Z" "objects_1912_spec_version_2.1" "objects_1912_x_mitre_attack_spec_version_2.1.0" "objects_1912_x_mitre_domains_0_mobile-attack" "objects_1912_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1912_x_mitre_version_1.0" "objects_1912_x_mitre_deprecated_True" "objects_1913_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1913_id_relationship--47f9195c-d7b5-4336-9f65-814fa90d6bd2" "objects_1913_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1913_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1913_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1913_description_[Ginp](https://attack.mitre.org/software/S0423) has masqueraded as \u201cAdobe Flash Player\u201d and \u201cGoogle Play Verificator\u201d.(Citation: ThreatFabric Ginp)" "objects_1913_external_references_0_source_name_ThreatFabric Ginp" "objects_1913_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1913_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1913_created_2020-04-08T15:51:25.102Z" "objects_1913_type_relationship" "objects_1913_relationship_type_uses" "objects_1913_modified_2022-07-07T14:00:00.188Z" "objects_1913_spec_version_2.1" "objects_1913_x_mitre_attack_spec_version_2.1.0" "objects_1913_x_mitre_domains_0_mobile-attack" "objects_1913_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1913_x_mitre_version_1.0" "objects_1913_x_mitre_deprecated_True" "objects_1914_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1914_id_relationship--4bac7e76-7a1f-4091-9e38-ab5af842d73a" "objects_1914_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1914_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1914_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1914_description_[XLoader for Android](https://attack.mitre.org/software/S0318) has masqueraded as an Android security application.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1914_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1914_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1914_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1914_created_2020-07-20T13:49:03.633Z" "objects_1914_type_relationship" "objects_1914_relationship_type_uses" "objects_1914_modified_2022-07-07T14:00:00.188Z" "objects_1914_spec_version_2.1" "objects_1914_x_mitre_attack_spec_version_2.1.0" "objects_1914_x_mitre_domains_0_mobile-attack" "objects_1914_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1914_x_mitre_version_1.0" "objects_1914_x_mitre_deprecated_True" "objects_1915_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1915_id_relationship--4d2d892c-9d3a-445c-b9bf-1eab45703dcc" "objects_1915_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1915_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1915_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1915_modified_2022-07-07T14:00:00.188Z" "objects_1915_type_relationship" "objects_1915_created_2017-10-25T14:48:53.740Z" "objects_1915_relationship_type_mitigates" "objects_1915_spec_version_2.1" "objects_1915_x_mitre_attack_spec_version_2.1.0" "objects_1915_x_mitre_domains_0_mobile-attack" "objects_1915_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1915_x_mitre_version_1.0" "objects_1915_x_mitre_deprecated_True" "objects_1916_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_1916_id_relationship--4df969b3-f5a0-4802-b87e-a458e3e439ed" "objects_1916_target_ref_attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3" "objects_1916_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1916_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1916_description_Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate use of untrusted Wi-Fi networks." "objects_1916_modified_2022-07-07T14:00:00.188Z" "objects_1916_type_relationship" "objects_1916_created_2017-10-25T14:48:53.741Z" "objects_1916_relationship_type_mitigates" "objects_1916_spec_version_2.1" "objects_1916_x_mitre_attack_spec_version_2.1.0" "objects_1916_x_mitre_domains_0_mobile-attack" "objects_1916_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1916_x_mitre_version_1.0" "objects_1916_x_mitre_deprecated_True" "objects_1917_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1917_id_relationship--4ed2e379-ce9c-44b2-b862-666b0b008427" "objects_1917_target_ref_attack-pattern--f1c3d071-0c24-483d-aca0-e8b8496ce468" "objects_1917_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1917_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1917_modified_2022-07-07T14:00:00.188Z" "objects_1917_type_relationship" "objects_1917_created_2019-10-18T14:50:57.564Z" "objects_1917_relationship_type_mitigates" "objects_1917_spec_version_2.1" "objects_1917_x_mitre_attack_spec_version_2.1.0" "objects_1917_x_mitre_domains_0_mobile-attack" "objects_1917_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1917_x_mitre_version_1.0" "objects_1917_x_mitre_deprecated_True" "objects_1918_source_ref_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_1918_id_relationship--4fc45b06-287d-4151-9f5a-37bb34dcdeec" "objects_1918_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1918_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1918_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1918_description_[MazarBOT](https://attack.mitre.org/software/S0303) is delivered via an unsolicited text message containing a link to a web download URI.(Citation: Tripwire-MazarBOT)" "objects_1918_external_references_0_source_name_Tripwire-MazarBOT" "objects_1918_external_references_0_description_Graham Cluley. (2016, February 16). Android users warned of malware attack spreading via SMS. Retrieved December 23, 2016." "objects_1918_external_references_0_url_https://www.tripwire.com/state-of-security/security-data-protection/android-malware-sms/" "objects_1918_created_2018-10-17T00:14:20.652Z" "objects_1918_type_relationship" "objects_1918_relationship_type_uses" "objects_1918_modified_2022-07-07T14:00:00.188Z" "objects_1918_spec_version_2.1" "objects_1918_x_mitre_attack_spec_version_2.1.0" "objects_1918_x_mitre_domains_0_mobile-attack" "objects_1918_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1918_x_mitre_version_1.0" "objects_1918_x_mitre_deprecated_True" "objects_1919_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1919_id_relationship--51186ad6-e721-49cf-9cf7-89466d5f29f4" "objects_1919_target_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_1919_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1919_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1919_modified_2022-07-07T14:00:00.188Z" "objects_1919_type_relationship" "objects_1919_created_2017-10-25T14:48:53.742Z" "objects_1919_relationship_type_mitigates" "objects_1919_spec_version_2.1" "objects_1919_x_mitre_attack_spec_version_2.1.0" "objects_1919_x_mitre_domains_0_mobile-attack" "objects_1919_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1919_x_mitre_version_1.0" "objects_1919_x_mitre_deprecated_True" "objects_1920_source_ref_malware--5a5dca4c-03c1-4b99-bfcf-c206e20aa663" "objects_1920_id_relationship--525211c1-6c8c-4d0c-899e-c31664c9629e" "objects_1920_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1920_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1920_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1920_description_[DEFENSOR ID](https://attack.mitre.org/software/S0479) was delivered via the Google Play Store.(Citation: ESET DEFENSOR ID)" "objects_1920_external_references_0_source_name_ESET DEFENSOR ID" "objects_1920_external_references_0_description_L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020." "objects_1920_external_references_0_url_https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/" "objects_1920_created_2020-06-26T15:12:40.074Z" "objects_1920_type_relationship" "objects_1920_relationship_type_uses" "objects_1920_modified_2022-07-07T14:00:00.188Z" "objects_1920_spec_version_2.1" "objects_1920_x_mitre_attack_spec_version_2.1.0" "objects_1920_x_mitre_domains_0_mobile-attack" "objects_1920_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1920_x_mitre_version_1.0" "objects_1920_x_mitre_deprecated_True" "objects_1921_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1921_id_relationship--52a18c72-4370-485b-9a40-837eeddffd0d" "objects_1921_target_ref_attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62" "objects_1921_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1921_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1921_description_Applications that register an accessibility service should be scrutinized further for malicious behavior." "objects_1921_created_2019-10-18T15:33:18.568Z" "objects_1921_type_relationship" "objects_1921_relationship_type_mitigates" "objects_1921_modified_2022-07-07T14:00:00.188Z" "objects_1921_spec_version_2.1" "objects_1921_x_mitre_attack_spec_version_2.1.0" "objects_1921_x_mitre_domains_0_mobile-attack" "objects_1921_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1921_x_mitre_version_1.0" "objects_1921_x_mitre_deprecated_True" "objects_1922_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1922_id_relationship--535113f0-0a0b-4a2e-b812-bba3fe995c0b" "objects_1922_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1922_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1922_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1922_description_It is rare for applications to utilize Device Administrator access. App vetting can detect apps that do so, and those apps should be closely scrutinized. A static analysis approach can be used to identify ransomware apps including apps that abuse Device Administrator access.(Citation: Maggi-Ransomware)" "objects_1922_external_references_0_source_name_Maggi-Ransomware" "objects_1922_external_references_0_description_Federico Maggi and Stefano Zanero. (2016). Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. Retrieved December 21, 2016." "objects_1922_external_references_0_url_https://www.blackhat.com/docs/eu-16/materials/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf" "objects_1922_created_2019-10-18T15:33:18.566Z" "objects_1922_type_relationship" "objects_1922_relationship_type_mitigates" "objects_1922_modified_2022-07-07T14:00:00.188Z" "objects_1922_spec_version_2.1" "objects_1922_x_mitre_attack_spec_version_2.1.0" "objects_1922_x_mitre_domains_0_mobile-attack" "objects_1922_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1922_x_mitre_version_1.0" "objects_1922_x_mitre_deprecated_True" "objects_1923_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1923_id_relationship--5592b50e-a184-4a75-8501-99072d3a5b5f" "objects_1923_target_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_1923_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1923_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1923_description_Application vetting can check for the string `BIND_DEVICE_ADMIN` in the application\u2019s manifest." "objects_1923_created_2019-10-18T15:11:37.106Z" "objects_1923_type_relationship" "objects_1923_relationship_type_mitigates" "objects_1923_modified_2022-07-07T14:00:00.188Z" "objects_1923_spec_version_2.1" "objects_1923_x_mitre_attack_spec_version_2.1.0" "objects_1923_x_mitre_domains_0_mobile-attack" "objects_1923_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1923_x_mitre_version_1.0" "objects_1923_x_mitre_deprecated_True" "objects_1924_source_ref_malware--9b86f8c3-33ab-44cf-a66d-c0fd6070e2ce" "objects_1924_id_relationship--55ce7832-8322-4cb3-b300-1abae68ce2ac" "objects_1924_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1924_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1924_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1924_description_[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has been spread using direct download links. (Citation: Microsoft MalLockerB)" "objects_1924_external_references_0_source_name_Microsoft MalLockerB" "objects_1924_external_references_0_description_D. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020." "objects_1924_external_references_0_url_https://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/" "objects_1924_created_2020-10-29T18:41:49.478Z" "objects_1924_type_relationship" "objects_1924_relationship_type_uses" "objects_1924_modified_2022-07-07T14:00:00.188Z" "objects_1924_spec_version_2.1" "objects_1924_x_mitre_attack_spec_version_2.1.0" "objects_1924_x_mitre_domains_0_mobile-attack" "objects_1924_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1924_x_mitre_version_1.0" "objects_1924_x_mitre_deprecated_True" "objects_1925_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1925_id_relationship--56c28b61-6372-4bd8-b711-772232eebbb5" "objects_1925_target_ref_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_1925_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1925_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1925_description_Typically, insecure or malicious configuration settings are not installed without the user's consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning)." "objects_1925_created_2019-10-18T15:51:48.523Z" "objects_1925_type_relationship" "objects_1925_relationship_type_mitigates" "objects_1925_modified_2022-07-07T14:00:00.188Z" "objects_1925_spec_version_2.1" "objects_1925_x_mitre_attack_spec_version_2.1.0" "objects_1925_x_mitre_domains_0_mobile-attack" "objects_1925_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1925_x_mitre_version_1.0" "objects_1925_x_mitre_deprecated_True" "objects_1926_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1926_id_relationship--58de1b14-43bb-4788-915b-9cd15cd11bf0" "objects_1926_target_ref_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_1926_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1926_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1926_description_In Android 8, broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest.(Citation: Android Changes to System Broadcasts)" "objects_1926_external_references_0_source_name_Android Changes to System Broadcasts" "objects_1926_external_references_0_description_Google. (2019, December 27). Broadcasts Overview. Retrieved January 27, 2020." "objects_1926_external_references_0_url_https://developer.android.com/guide/components/broadcasts#changes-system-broadcasts" "objects_1926_created_2020-01-27T16:22:11.510Z" "objects_1926_type_relationship" "objects_1926_relationship_type_mitigates" "objects_1926_modified_2022-07-07T14:00:00.188Z" "objects_1926_spec_version_2.1" "objects_1926_x_mitre_attack_spec_version_2.1.0" "objects_1926_x_mitre_domains_0_mobile-attack" "objects_1926_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1926_x_mitre_version_1.0" "objects_1926_x_mitre_deprecated_True" "objects_1927_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1927_id_relationship--5aaf8838-d4c3-4d11-b70a-0dc1e72c3c07" "objects_1927_target_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_1927_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1927_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1927_modified_2022-07-07T14:00:00.188Z" "objects_1927_type_relationship" "objects_1927_created_2019-10-18T14:50:57.475Z" "objects_1927_relationship_type_mitigates" "objects_1927_spec_version_2.1" "objects_1927_x_mitre_attack_spec_version_2.1.0" "objects_1927_x_mitre_domains_0_mobile-attack" "objects_1927_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1927_x_mitre_version_1.0" "objects_1927_x_mitre_deprecated_True" "objects_1928_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1928_id_relationship--5ab9a1e6-cd16-4553-bc29-b0f01c1cc7e1" "objects_1928_target_ref_attack-pattern--039bc59c-ecc7-4997-b2b4-4ab728bd91aa" "objects_1928_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1928_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1928_description_Static or dynamic code analysis to look for misuse of dynamic libraries. Increased focus on applications utilizing `DexClassLoader`. " "objects_1928_created_2019-10-30T15:37:55.249Z" "objects_1928_type_relationship" "objects_1928_relationship_type_mitigates" "objects_1928_modified_2022-07-07T14:00:00.188Z" "objects_1928_spec_version_2.1" "objects_1928_x_mitre_attack_spec_version_2.1.0" "objects_1928_x_mitre_domains_0_mobile-attack" "objects_1928_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1928_x_mitre_version_1.0" "objects_1928_x_mitre_deprecated_True" "objects_1929_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_1929_id_relationship--5eb0452b-63c2-4f47-8a1e-4268a08f0802" "objects_1929_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1929_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1929_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1929_description_[Dendroid](https://attack.mitre.org/software/S0301) has been distributed via the Google Play Store.(Citation: Lookout-Dendroid)" "objects_1929_external_references_0_source_name_Lookout-Dendroid" "objects_1929_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_1929_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_1929_created_2020-09-24T15:34:51.185Z" "objects_1929_type_relationship" "objects_1929_relationship_type_uses" "objects_1929_modified_2022-07-07T14:00:00.188Z" "objects_1929_spec_version_2.1" "objects_1929_x_mitre_attack_spec_version_2.1.0" "objects_1929_x_mitre_domains_0_mobile-attack" "objects_1929_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1929_x_mitre_version_1.0" "objects_1929_x_mitre_deprecated_True" "objects_1930_source_ref_malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1" "objects_1930_id_relationship--5f82db63-d7c2-43c7-a056-3cf718201ced" "objects_1930_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1930_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1930_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1930_description_[DroidJack](https://attack.mitre.org/software/S0320) included code from the legitimate Pokemon GO app in order to appear identical to the user, but it also included additional malicious code.(Citation: Proofpoint-Droidjack)" "objects_1930_external_references_0_description_Proofpoint. (2016, July 7). DroidJack Uses Side-Load\u2026It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017." "objects_1930_external_references_0_source_name_Proofpoint-Droidjack" "objects_1930_external_references_0_url_https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app" "objects_1930_created_2017-12-14T16:46:06.044Z" "objects_1930_type_relationship" "objects_1930_relationship_type_uses" "objects_1930_modified_2022-07-07T14:00:00.188Z" "objects_1930_spec_version_2.1" "objects_1930_x_mitre_attack_spec_version_2.1.0" "objects_1930_x_mitre_domains_0_mobile-attack" "objects_1930_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1930_x_mitre_version_1.0" "objects_1930_x_mitre_deprecated_True" "objects_1931_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1931_id_relationship--5fddb05c-6123-4354-8844-3e8a7d624d78" "objects_1931_target_ref_attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a" "objects_1931_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1931_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1931_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_1931_created_2019-10-18T15:51:48.526Z" "objects_1931_type_relationship" "objects_1931_relationship_type_mitigates" "objects_1931_modified_2022-07-07T14:00:00.188Z" "objects_1931_spec_version_2.1" "objects_1931_x_mitre_attack_spec_version_2.1.0" "objects_1931_x_mitre_domains_0_mobile-attack" "objects_1931_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1931_x_mitre_version_1.0" "objects_1931_x_mitre_deprecated_True" "objects_1932_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1932_id_relationship--60e02651-278f-4f84-9dbc-cbbadaa18086" "objects_1932_target_ref_attack-pattern--2f0e8d80-4b8b-4f4a-b5cc-132afe7e057d" "objects_1932_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1932_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1932_description_Application vetting services could look for usage of the `SensorManager` class, indicating that the application is attempting to access device sensors." "objects_1932_created_2021-09-30T18:18:52.623Z" "objects_1932_type_relationship" "objects_1932_relationship_type_mitigates" "objects_1932_modified_2022-07-07T14:00:00.188Z" "objects_1932_spec_version_2.1" "objects_1932_x_mitre_attack_spec_version_2.1.0" "objects_1932_x_mitre_domains_0_mobile-attack" "objects_1932_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1932_x_mitre_version_1.0" "objects_1932_x_mitre_deprecated_True" "objects_1933_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1933_id_relationship--62c3656a-e771-4da1-80f9-2c93fc42e7ec" "objects_1933_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_1933_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1933_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1933_description_Application vetting techniques could (either statically or dynamically) look for indications that the application downloads and executes new code at runtime (e.g., on Android use of DexClassLoader, System.load, or the WebView JavaScriptInterface capability, or on iOS use of JSPatch or similar capabilities). Unfortunately, this is only a partial mitigation, as additional scrutiny would still need to be applied to applications that use these techniques, as the techniques are often used without malicious intent, and because applications may employ other techniques such as to hide their use of these techniques." "objects_1933_created_2019-10-18T15:11:37.270Z" "objects_1933_type_relationship" "objects_1933_relationship_type_mitigates" "objects_1933_modified_2022-07-07T14:00:00.188Z" "objects_1933_spec_version_2.1" "objects_1933_x_mitre_attack_spec_version_2.1.0" "objects_1933_x_mitre_domains_0_mobile-attack" "objects_1933_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1933_x_mitre_version_1.0" "objects_1933_x_mitre_deprecated_True" "objects_1934_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1934_id_relationship--655c98a5-5af0-4b51-95fb-30100d52a0f1" "objects_1934_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1934_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1934_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1934_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has masqueraded as TikTok.(Citation: Zscaler TikTok Spyware)" "objects_1934_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1934_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1934_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1934_created_2021-01-05T20:16:20.422Z" "objects_1934_type_relationship" "objects_1934_relationship_type_uses" "objects_1934_modified_2022-07-07T14:00:00.188Z" "objects_1934_spec_version_2.1" "objects_1934_x_mitre_attack_spec_version_2.1.0" "objects_1934_x_mitre_domains_0_mobile-attack" "objects_1934_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1934_x_mitre_version_1.0" "objects_1934_x_mitre_deprecated_True" "objects_1935_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_1935_id_relationship--690111d3-c281-4d55-a7ed-73b8dab72a85" "objects_1935_target_ref_attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34" "objects_1935_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1935_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1935_description_Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate weaknesses in the cellular network encryption." "objects_1935_modified_2022-07-07T14:00:00.188Z" "objects_1935_type_relationship" "objects_1935_created_2017-10-25T14:48:53.741Z" "objects_1935_relationship_type_mitigates" "objects_1935_spec_version_2.1" "objects_1935_x_mitre_attack_spec_version_2.1.0" "objects_1935_x_mitre_domains_0_mobile-attack" "objects_1935_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1935_x_mitre_version_1.0" "objects_1935_x_mitre_deprecated_True" "objects_1936_source_ref_malware--22faaa56-a8ac-4292-9be6-b571b255ee40" "objects_1936_id_relationship--6a0ce31a-72bb-4634-8d24-daa5880a99b0" "objects_1936_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1936_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1936_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1936_description_[Zen](https://attack.mitre.org/software/S0494) has been distributed via the Google Play Store.(Citation: Google Security Zen)" "objects_1936_external_references_0_source_name_Google Security Zen" "objects_1936_external_references_0_description_Siewierski, L. (2019, January 11). PHA Family Highlights: Zen and its cousins . Retrieved July 27, 2020." "objects_1936_external_references_0_url_https://security.googleblog.com/2019/01/pha-family-highlights-zen-and-its.html" "objects_1936_created_2020-07-27T14:14:56.989Z" "objects_1936_type_relationship" "objects_1936_relationship_type_uses" "objects_1936_modified_2022-07-07T14:00:00.188Z" "objects_1936_spec_version_2.1" "objects_1936_x_mitre_attack_spec_version_2.1.0" "objects_1936_x_mitre_domains_0_mobile-attack" "objects_1936_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1936_x_mitre_version_1.0" "objects_1936_x_mitre_deprecated_True" "objects_1937_source_ref_malware--6146be90-470c-4049-bb3a-9986b8ffb65b" "objects_1937_id_relationship--6b7a37c7-42a5-49ab-810a-4cf60784dea1" "objects_1937_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_1937_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1937_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1937_description_[Ginp](https://attack.mitre.org/software/S0423) can download device log data.(Citation: ThreatFabric Ginp)" "objects_1937_external_references_0_source_name_ThreatFabric Ginp" "objects_1937_external_references_0_description_ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020." "objects_1937_external_references_0_url_https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis.html" "objects_1937_created_2020-04-08T15:51:25.131Z" "objects_1937_type_relationship" "objects_1937_relationship_type_uses" "objects_1937_modified_2022-07-07T14:00:00.188Z" "objects_1937_spec_version_2.1" "objects_1937_x_mitre_attack_spec_version_2.1.0" "objects_1937_x_mitre_domains_0_mobile-attack" "objects_1937_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1937_x_mitre_version_1.0" "objects_1937_x_mitre_deprecated_True" "objects_1938_source_ref_course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9" "objects_1938_id_relationship--6bb99599-aa51-4492-9c79-296a772233b4" "objects_1938_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1938_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1938_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1938_modified_2022-07-07T14:00:00.188Z" "objects_1938_type_relationship" "objects_1938_created_2017-10-25T14:48:53.740Z" "objects_1938_relationship_type_mitigates" "objects_1938_spec_version_2.1" "objects_1938_x_mitre_attack_spec_version_2.1.0" "objects_1938_x_mitre_domains_0_mobile-attack" "objects_1938_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1938_x_mitre_version_1.0" "objects_1938_x_mitre_deprecated_True" "objects_1939_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1939_id_relationship--6e135f1d-e947-4079-8363-9a1344c57560" "objects_1939_target_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_1939_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1939_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1939_description_Application vetting services could be extra scrutinous of applications that request device administrator permissions." "objects_1939_created_2020-09-11T14:08:08.686Z" "objects_1939_type_relationship" "objects_1939_relationship_type_mitigates" "objects_1939_modified_2022-07-07T14:00:00.188Z" "objects_1939_spec_version_2.1" "objects_1939_x_mitre_attack_spec_version_2.1.0" "objects_1939_x_mitre_domains_0_mobile-attack" "objects_1939_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1939_x_mitre_version_1.0" "objects_1939_x_mitre_deprecated_True" "objects_1940_source_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_1940_id_relationship--6ee89b0e-a2ab-40c8-88fd-54f974ea00b1" "objects_1940_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1940_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1940_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1940_description_[Twitoor](https://attack.mitre.org/software/S0302) can install attacker-specified applications.(Citation: ESET-Twitoor)" "objects_1940_external_references_0_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_1940_external_references_0_source_name_ESET-Twitoor" "objects_1940_external_references_0_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_1940_created_2020-09-14T13:35:45.906Z" "objects_1940_type_relationship" "objects_1940_relationship_type_uses" "objects_1940_modified_2022-07-07T14:00:00.188Z" "objects_1940_spec_version_2.1" "objects_1940_x_mitre_attack_spec_version_2.1.0" "objects_1940_x_mitre_domains_0_mobile-attack" "objects_1940_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1940_x_mitre_version_1.0" "objects_1940_x_mitre_deprecated_True" "objects_1941_source_ref_course-of-action--e829ee51-1caf-4665-ba15-7f8979634124" "objects_1941_id_relationship--6f8b3839-ea91-44d5-ba68-b9d1e6076c19" "objects_1941_target_ref_attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5" "objects_1941_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1941_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1941_modified_2022-07-07T14:00:00.188Z" "objects_1941_type_relationship" "objects_1941_created_2017-10-25T14:48:53.735Z" "objects_1941_relationship_type_mitigates" "objects_1941_spec_version_2.1" "objects_1941_x_mitre_attack_spec_version_2.1.0" "objects_1941_x_mitre_domains_0_mobile-attack" "objects_1941_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1941_x_mitre_version_1.0" "objects_1941_x_mitre_deprecated_True" "objects_1942_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1942_id_relationship--710071cc-efa5-4428-b0cd-f153f34ff5a4" "objects_1942_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1942_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1942_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1942_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has masqueraded as popular South Korean applications.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1942_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1942_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1942_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1942_created_2020-12-31T18:25:05.123Z" "objects_1942_type_relationship" "objects_1942_relationship_type_uses" "objects_1942_modified_2022-07-07T14:00:00.188Z" "objects_1942_spec_version_2.1" "objects_1942_x_mitre_attack_spec_version_2.1.0" "objects_1942_x_mitre_domains_0_mobile-attack" "objects_1942_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1942_x_mitre_version_1.0" "objects_1942_x_mitre_deprecated_True" "objects_1943_source_ref_malware--c6abcaf8-1765-41f8-9fe5-03d42fd0f6c0" "objects_1943_id_relationship--71b8f72c-72da-4547-9729-0f60b11917c4" "objects_1943_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1943_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1943_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1943_description_[Tiktok Pro](https://attack.mitre.org/software/S0558) has been distributed via direct download on 3rd party websites, with the link sent in phishing SMS messsages.(Citation: Zscaler TikTok Spyware)" "objects_1943_external_references_0_source_name_Zscaler TikTok Spyware" "objects_1943_external_references_0_description_S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021." "objects_1943_external_references_0_url_https://www.zscaler.com/blogs/security-research/tiktok-spyware" "objects_1943_created_2021-01-05T20:16:20.409Z" "objects_1943_type_relationship" "objects_1943_relationship_type_uses" "objects_1943_modified_2022-07-07T14:00:00.188Z" "objects_1943_spec_version_2.1" "objects_1943_x_mitre_attack_spec_version_2.1.0" "objects_1943_x_mitre_domains_0_mobile-attack" "objects_1943_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1943_x_mitre_version_1.0" "objects_1943_x_mitre_deprecated_True" "objects_1944_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_1944_id_relationship--7351f186-991d-42aa-a426-d839178d4124" "objects_1944_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1944_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1944_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1944_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has been identified in 42 apps in the Google Play Store.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_1944_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_1944_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_1944_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_1944_created_2020-10-29T19:19:09.046Z" "objects_1944_type_relationship" "objects_1944_relationship_type_uses" "objects_1944_modified_2022-07-07T14:00:00.188Z" "objects_1944_spec_version_2.1" "objects_1944_x_mitre_attack_spec_version_2.1.0" "objects_1944_x_mitre_domains_0_mobile-attack" "objects_1944_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1944_x_mitre_version_1.0" "objects_1944_x_mitre_deprecated_True" "objects_1945_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1945_id_relationship--737b3964-d09c-4e62-94bc-208302402c9b" "objects_1945_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1945_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1945_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1945_description_App store operators and enterprises could assess reputational characteristics of the app, including the popularity of the app or other apps from the same developer and whether or not security issues have been found in other apps from the same developer." "objects_1945_created_2019-10-18T15:11:37.248Z" "objects_1945_type_relationship" "objects_1945_relationship_type_mitigates" "objects_1945_modified_2022-07-07T14:00:00.188Z" "objects_1945_spec_version_2.1" "objects_1945_x_mitre_attack_spec_version_2.1.0" "objects_1945_x_mitre_domains_0_mobile-attack" "objects_1945_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1945_x_mitre_version_1.0" "objects_1945_x_mitre_deprecated_True" "objects_1946_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_1946_id_relationship--74155759-4c76-42d3-b64f-a898f7b582f9" "objects_1946_target_ref_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_1946_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1946_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1946_description_App developers should be advised to use the Android Network Security Configuration feature and the iOS App Transport Security feature to gain some level of assurance that app network traffic is protected.(Citation: Google-TrustManager)" "objects_1946_external_references_0_source_name_Google-TrustManager" "objects_1946_external_references_0_description_Google. (n.d.). How to fix apps containing an unsafe implementation of TrustManager. Retrieved December 24, 2016." "objects_1946_external_references_0_url_https://support.google.com/faqs/answer/6346016?hl=en" "objects_1946_created_2017-10-25T14:48:53.743Z" "objects_1946_type_relationship" "objects_1946_relationship_type_mitigates" "objects_1946_modified_2022-07-07T14:00:00.188Z" "objects_1946_spec_version_2.1" "objects_1946_x_mitre_attack_spec_version_2.1.0" "objects_1946_x_mitre_domains_0_mobile-attack" "objects_1946_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1946_x_mitre_version_1.0" "objects_1946_x_mitre_deprecated_True" "objects_1947_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1947_id_relationship--75d99f9b-aa91-45c0-803e-60f462ee3ab3" "objects_1947_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1947_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1947_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1947_description_[FakeSpy](https://attack.mitre.org/software/S0509) masquerades as local postal service applications.(Citation: Cybereason FakeSpy)" "objects_1947_external_references_0_source_name_Cybereason FakeSpy" "objects_1947_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1947_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1947_created_2020-09-15T15:18:12.309Z" "objects_1947_type_relationship" "objects_1947_relationship_type_uses" "objects_1947_modified_2022-07-07T14:00:00.188Z" "objects_1947_spec_version_2.1" "objects_1947_x_mitre_attack_spec_version_2.1.0" "objects_1947_x_mitre_domains_0_mobile-attack" "objects_1947_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1947_x_mitre_version_1.0" "objects_1947_x_mitre_deprecated_True" "objects_1948_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1948_id_relationship--77812d6a-4d1a-432e-805a-d810a742e93f" "objects_1948_target_ref_attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067" "objects_1948_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1948_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1948_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_1948_created_2019-10-18T15:51:48.529Z" "objects_1948_type_relationship" "objects_1948_relationship_type_mitigates" "objects_1948_modified_2022-07-07T14:00:00.188Z" "objects_1948_spec_version_2.1" "objects_1948_x_mitre_attack_spec_version_2.1.0" "objects_1948_x_mitre_domains_0_mobile-attack" "objects_1948_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1948_x_mitre_version_1.0" "objects_1948_x_mitre_deprecated_True" "objects_1949_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_1949_id_relationship--7ba3b225-5446-4e9d-886b-1eb5c503e77a" "objects_1949_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1949_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1949_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1949_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has been distributed via webpages designed to look like the Play Store.(Citation: Sophos Red Alert 2.0)" "objects_1949_external_references_0_source_name_Sophos Red Alert 2.0" "objects_1949_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_1949_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_1949_created_2020-12-14T14:52:03.103Z" "objects_1949_type_relationship" "objects_1949_relationship_type_uses" "objects_1949_modified_2022-07-07T14:00:00.188Z" "objects_1949_spec_version_2.1" "objects_1949_x_mitre_attack_spec_version_2.1.0" "objects_1949_x_mitre_domains_0_mobile-attack" "objects_1949_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1949_x_mitre_version_1.0" "objects_1949_x_mitre_deprecated_True" "objects_1950_source_ref_malware--a0d774e4-bafc-4292-8651-3ec899391341" "objects_1950_id_relationship--7c86cc89-2c2d-43fc-a5b6-bc5047af7cb4" "objects_1950_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1950_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1950_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1950_description_[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has been distributed via the Google Play Store.(Citation: CYBERWARCON CHEMISTGAMES)" "objects_1950_external_references_0_source_name_CYBERWARCON CHEMISTGAMES" "objects_1950_external_references_0_description_B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020." "objects_1950_external_references_0_url_https://www.youtube.com/watch?v=xoNSbm1aX_w" "objects_1950_created_2020-12-31T18:25:05.129Z" "objects_1950_type_relationship" "objects_1950_relationship_type_uses" "objects_1950_modified_2022-07-07T14:00:00.188Z" "objects_1950_spec_version_2.1" "objects_1950_x_mitre_attack_spec_version_2.1.0" "objects_1950_x_mitre_domains_0_mobile-attack" "objects_1950_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1950_x_mitre_version_1.0" "objects_1950_x_mitre_deprecated_True" "objects_1951_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1951_id_relationship--7e030fba-c123-4515-bc4f-482ea0947e2c" "objects_1951_target_ref_attack-pattern--351ddf79-2d3a-41b4-9bef-82ea5d3ccd69" "objects_1951_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1951_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1951_description_Application vetting services could provide further scrutiny to applications that request permissions related to phone calls." "objects_1951_created_2021-09-20T13:42:21.096Z" "objects_1951_type_relationship" "objects_1951_relationship_type_mitigates" "objects_1951_modified_2022-07-07T14:00:00.188Z" "objects_1951_spec_version_2.1" "objects_1951_x_mitre_attack_spec_version_2.1.0" "objects_1951_x_mitre_domains_0_mobile-attack" "objects_1951_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1951_x_mitre_version_1.0" "objects_1951_x_mitre_deprecated_True" "objects_1952_source_ref_malware--680f680c-eef9-4f8a-b5f5-f451bf47e403" "objects_1952_id_relationship--7e189d23-1317-4c1d-a8b1-c5877eeb7a02" "objects_1952_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1952_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1952_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1952_description_[eSurv](https://attack.mitre.org/software/S0507) has been distributed via phishing websites with geo-restrictions that allow access to only Italian and Turkmenistani mobile carriers. [eSurv](https://attack.mitre.org/software/S0507) can install applications via malicious iOS provisioning profiles containing the developer\u2019s certificate.(Citation: Lookout eSurv)" "objects_1952_external_references_0_source_name_Lookout eSurv" "objects_1952_external_references_0_description_A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020." "objects_1952_external_references_0_url_https://blog.lookout.com/esurv-research" "objects_1952_created_2020-09-14T14:13:45.288Z" "objects_1952_type_relationship" "objects_1952_relationship_type_uses" "objects_1952_modified_2022-07-07T14:00:00.188Z" "objects_1952_spec_version_2.1" "objects_1952_x_mitre_attack_spec_version_2.1.0" "objects_1952_x_mitre_domains_0_mobile-attack" "objects_1952_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1952_x_mitre_version_1.0" "objects_1952_x_mitre_deprecated_True" "objects_1953_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_1953_id_relationship--822a677b-6d7b-4aa2-9cc3-878029b2ba4c" "objects_1953_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1953_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1953_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1953_description_[Cerberus](https://attack.mitre.org/software/S0480) has pretended to be an Adobe Flash Player installer.(Citation: Forbes Cerberus)" "objects_1953_external_references_0_source_name_Forbes Cerberus" "objects_1953_external_references_0_description_Z. Doffman. (2019, August 16). Warning As Devious New Android Malware Hides In Fake Adobe Flash Player Installations (Updated). Retrieved June 26, 2020." "objects_1953_external_references_0_url_https://www.forbes.com/sites/zakdoffman/2019/08/16/dangerous-new-android-trojan-hides-from-malware-researchers-and-taunts-them-on-twitter/#1563fef26d9c" "objects_1953_created_2020-06-26T15:32:25.158Z" "objects_1953_type_relationship" "objects_1953_relationship_type_uses" "objects_1953_modified_2022-07-07T14:00:00.188Z" "objects_1953_spec_version_2.1" "objects_1953_x_mitre_attack_spec_version_2.1.0" "objects_1953_x_mitre_domains_0_mobile-attack" "objects_1953_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1953_x_mitre_version_1.0" "objects_1953_x_mitre_deprecated_True" "objects_1954_source_ref_malware--366c800f-97a8-48d5-b0a6-79d00198252a" "objects_1954_id_relationship--826a8c49-a137-4cbe-9efe-6395365a9adc" "objects_1954_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1954_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1954_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1954_description_[Corona Updates](https://attack.mitre.org/software/S0425) has been distributed through the Play Store.(Citation: TrendMicro Coronavirus Updates)" "objects_1954_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_1954_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_1954_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_1954_created_2020-04-24T15:06:33.463Z" "objects_1954_type_relationship" "objects_1954_relationship_type_uses" "objects_1954_modified_2022-07-07T14:00:00.188Z" "objects_1954_spec_version_2.1" "objects_1954_x_mitre_attack_spec_version_2.1.0" "objects_1954_x_mitre_domains_0_mobile-attack" "objects_1954_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1954_x_mitre_version_1.0" "objects_1954_x_mitre_deprecated_True" "objects_1955_source_ref_malware--a993495c-9813-4372-b9ec-d168c7f7ec0a" "objects_1955_id_relationship--8719ab74-a3d7-4e00-84f0-040541aa6698" "objects_1955_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1955_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1955_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1955_description_[GPlayed](https://attack.mitre.org/software/S0536) has used the Play Store icon as well as the name \u201cGoogle Play Marketplace\u201d.(Citation: Talos GPlayed)" "objects_1955_external_references_0_source_name_Talos GPlayed" "objects_1955_external_references_0_description_V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020." "objects_1955_external_references_0_url_https://blog.talosintelligence.com/2018/10/gplayedtrojan.html" "objects_1955_created_2020-11-24T17:55:12.784Z" "objects_1955_type_relationship" "objects_1955_relationship_type_uses" "objects_1955_modified_2022-07-07T14:00:00.188Z" "objects_1955_spec_version_2.1" "objects_1955_x_mitre_attack_spec_version_2.1.0" "objects_1955_x_mitre_domains_0_mobile-attack" "objects_1955_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1955_x_mitre_version_1.0" "objects_1955_x_mitre_deprecated_True" "objects_1956_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_1956_id_relationship--8a9ab14a-c666-47ef-a92e-57872a5a82ae" "objects_1956_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1956_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1956_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1956_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) has been distributed via the Google Play Store.(Citation: Lookout Desert Scorpion)" "objects_1956_external_references_0_source_name_Lookout Desert Scorpion" "objects_1956_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_1956_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_1956_created_2020-09-11T14:54:16.521Z" "objects_1956_type_relationship" "objects_1956_relationship_type_uses" "objects_1956_modified_2022-07-07T14:00:00.188Z" "objects_1956_spec_version_2.1" "objects_1956_x_mitre_attack_spec_version_2.1.0" "objects_1956_x_mitre_domains_0_mobile-attack" "objects_1956_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1956_x_mitre_version_1.0" "objects_1956_x_mitre_deprecated_True" "objects_1957_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1957_id_relationship--8ccfab20-58cf-4af6-9fb0-6bbf59258ac9" "objects_1957_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_1957_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1957_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1957_modified_2022-07-07T14:00:00.188Z" "objects_1957_type_relationship" "objects_1957_created_2017-10-25T14:48:53.738Z" "objects_1957_relationship_type_mitigates" "objects_1957_spec_version_2.1" "objects_1957_x_mitre_attack_spec_version_2.1.0" "objects_1957_x_mitre_domains_0_mobile-attack" "objects_1957_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1957_x_mitre_version_1.0" "objects_1957_x_mitre_deprecated_True" "objects_1958_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1958_id_relationship--8ea95198-d36f-44fd-a4a9-195237a0ed5e" "objects_1958_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_1958_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1958_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1958_description_Applications using the android permission `android.permission.RECORD_AUDIO` or iOS applications using `RequestRecordPermission` could be more closely scrutinized and monitored. If `android.permission.CAPTURE_AUDIO_OUTPUT` is found in a third-party application, it should be heavily scrutinized." "objects_1958_created_2019-10-18T15:33:18.625Z" "objects_1958_type_relationship" "objects_1958_relationship_type_mitigates" "objects_1958_modified_2022-07-07T14:00:00.188Z" "objects_1958_spec_version_2.1" "objects_1958_x_mitre_attack_spec_version_2.1.0" "objects_1958_x_mitre_domains_0_mobile-attack" "objects_1958_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1958_x_mitre_version_1.0" "objects_1958_x_mitre_deprecated_True" "objects_1959_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1959_id_relationship--9047dd87-40da-4d01-a4fd-23cc56df6a08" "objects_1959_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_1959_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1959_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1959_description_Application vetting could be used to analyze applications to determine whether they access this information, including determining whether the application requests the Android ACCESS_NETWORK_STATE permission (required in order to access NetworkInterface information) or the READ_PHONE_STATE permission (required in order to access TelephonyManager information)." "objects_1959_created_2019-10-18T15:11:37.273Z" "objects_1959_type_relationship" "objects_1959_relationship_type_mitigates" "objects_1959_modified_2022-07-07T14:00:00.188Z" "objects_1959_spec_version_2.1" "objects_1959_x_mitre_attack_spec_version_2.1.0" "objects_1959_x_mitre_domains_0_mobile-attack" "objects_1959_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1959_x_mitre_version_1.0" "objects_1959_x_mitre_deprecated_True" "objects_1960_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1960_id_relationship--91160659-69ef-452d-8668-5497a68e0e75" "objects_1960_target_ref_attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b" "objects_1960_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1960_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1960_description_Applications attempting to get `android.os.SystemProperties` or `getprop` with the runtime `exec()` commands should be closely scrutinized. Google does not recommend the use of system properties within applications." "objects_1960_created_2019-10-18T15:33:18.670Z" "objects_1960_type_relationship" "objects_1960_relationship_type_mitigates" "objects_1960_modified_2022-07-07T14:00:00.188Z" "objects_1960_spec_version_2.1" "objects_1960_x_mitre_attack_spec_version_2.1.0" "objects_1960_x_mitre_domains_0_mobile-attack" "objects_1960_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1960_x_mitre_version_1.0" "objects_1960_x_mitre_deprecated_True" "objects_1961_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_1961_id_relationship--91477b6c-38d3-447a-981a-ea11652f4bc2" "objects_1961_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1961_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1961_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1961_description_[HenBox](https://attack.mitre.org/software/S0544) has masqueraded as VPN and Android system apps.(Citation: Palo Alto HenBox)" "objects_1961_external_references_0_source_name_Palo Alto HenBox" "objects_1961_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_1961_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_1961_created_2020-12-17T20:15:22.390Z" "objects_1961_type_relationship" "objects_1961_relationship_type_uses" "objects_1961_modified_2022-07-07T14:00:00.188Z" "objects_1961_spec_version_2.1" "objects_1961_x_mitre_attack_spec_version_2.1.0" "objects_1961_x_mitre_domains_0_mobile-attack" "objects_1961_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1961_x_mitre_version_1.0" "objects_1961_x_mitre_deprecated_True" "objects_1962_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_1962_id_relationship--93103ac2-0e3b-4f0f-a054-7f9b947b3172" "objects_1962_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1962_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1962_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1962_description_[Pegasus for Android](https://attack.mitre.org/software/S0316) attempts to detect whether it is running in an emulator rather than a real device.(Citation: Lookout-PegasusAndroid)" "objects_1962_external_references_0_source_name_Lookout-PegasusAndroid" "objects_1962_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_1962_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_1962_created_2018-10-17T00:14:20.652Z" "objects_1962_type_relationship" "objects_1962_relationship_type_uses" "objects_1962_modified_2022-07-07T14:00:00.188Z" "objects_1962_spec_version_2.1" "objects_1962_x_mitre_attack_spec_version_2.1.0" "objects_1962_x_mitre_domains_0_mobile-attack" "objects_1962_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1962_x_mitre_version_1.0" "objects_1962_x_mitre_deprecated_True" "objects_1963_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1963_id_relationship--94b368c8-7983-4f42-983b-3b89fb824943" "objects_1963_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_1963_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1963_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1963_description_During application vetting, applications could be examined to see if they have this behavior, and extra scrutiny could potentially be given to applications that do." "objects_1963_created_2019-10-18T15:11:37.254Z" "objects_1963_type_relationship" "objects_1963_relationship_type_mitigates" "objects_1963_modified_2022-07-07T14:00:00.188Z" "objects_1963_spec_version_2.1" "objects_1963_x_mitre_attack_spec_version_2.1.0" "objects_1963_x_mitre_domains_0_mobile-attack" "objects_1963_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1963_x_mitre_version_1.0" "objects_1963_x_mitre_deprecated_True" "objects_1964_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_1964_id_relationship--955942ac-cb07-45e3-8ff1-1a2113c6aa49" "objects_1964_target_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_1964_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1964_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1964_description_An EMM/MDM can use the Android `DevicePolicyManager.setPermittedAccessibilityServices` method to set an explicit list of applications that are allowed to use Android's accessibility features." "objects_1964_created_2019-09-18T19:04:47.108Z" "objects_1964_type_relationship" "objects_1964_relationship_type_mitigates" "objects_1964_modified_2022-07-07T14:00:00.188Z" "objects_1964_spec_version_2.1" "objects_1964_x_mitre_attack_spec_version_2.1.0" "objects_1964_x_mitre_domains_0_mobile-attack" "objects_1964_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1964_x_mitre_version_1.0" "objects_1964_x_mitre_deprecated_True" "objects_1965_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1965_id_relationship--95e1941a-23a1-4c04-be62-726b1097bb3b" "objects_1965_target_ref_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_1965_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1965_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1965_description_Users should be advised to be extra scrutinous of applications that request location permissions, and to deny any permissions requests for applications they do not recognize." "objects_1965_created_2020-09-11T15:04:14.837Z" "objects_1965_type_relationship" "objects_1965_relationship_type_mitigates" "objects_1965_modified_2022-07-07T14:00:00.188Z" "objects_1965_spec_version_2.1" "objects_1965_x_mitre_attack_spec_version_2.1.0" "objects_1965_x_mitre_domains_0_mobile-attack" "objects_1965_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1965_x_mitre_version_1.0" "objects_1965_x_mitre_deprecated_True" "objects_1966_source_ref_malware--838f647e-8ff8-48bd-bbd5-613cee7736cb" "objects_1966_id_relationship--979e6503-41a2-43f5-a30f-045272faa7d0" "objects_1966_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1966_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1966_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1966_description_[FakeSpy](https://attack.mitre.org/software/S0509) is spread via direct download links in SMS phishing messages.(Citation: Cybereason FakeSpy)" "objects_1966_external_references_0_source_name_Cybereason FakeSpy" "objects_1966_external_references_0_description_O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020." "objects_1966_external_references_0_url_https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world" "objects_1966_created_2020-09-15T15:18:12.430Z" "objects_1966_type_relationship" "objects_1966_relationship_type_uses" "objects_1966_modified_2022-07-07T14:00:00.188Z" "objects_1966_spec_version_2.1" "objects_1966_x_mitre_attack_spec_version_2.1.0" "objects_1966_x_mitre_domains_0_mobile-attack" "objects_1966_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1966_x_mitre_version_1.0" "objects_1966_x_mitre_deprecated_True" "objects_1967_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_1967_id_relationship--9861a2c9-88b6-4e63-88d1-31cd574fd763" "objects_1967_target_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_1967_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1967_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1967_description_Attestation can detect rooted devices." "objects_1967_created_2020-05-04T13:49:35.233Z" "objects_1967_type_relationship" "objects_1967_relationship_type_mitigates" "objects_1967_modified_2022-07-07T14:00:00.188Z" "objects_1967_spec_version_2.1" "objects_1967_x_mitre_attack_spec_version_2.1.0" "objects_1967_x_mitre_domains_0_mobile-attack" "objects_1967_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1967_x_mitre_version_1.0" "objects_1967_x_mitre_deprecated_True" "objects_1968_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1968_id_relationship--986cb3bf-98bb-4558-bec4-bd8c015449fd" "objects_1968_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1968_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1968_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1968_description_[ViceLeaker](https://attack.mitre.org/software/S0418) was primarily distributed via Telegram and WhatsApp messages.(Citation: SecureList - ViceLeaker 2019)" "objects_1968_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1968_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1968_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1968_created_2019-11-21T16:42:48.529Z" "objects_1968_type_relationship" "objects_1968_relationship_type_uses" "objects_1968_modified_2022-07-07T14:00:00.188Z" "objects_1968_spec_version_2.1" "objects_1968_x_mitre_attack_spec_version_2.1.0" "objects_1968_x_mitre_domains_0_mobile-attack" "objects_1968_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1968_x_mitre_version_1.0" "objects_1968_x_mitre_deprecated_True" "objects_1969_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_1969_id_relationship--9b818e26-0be8-4f03-9587-364c0e9f6a74" "objects_1969_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1969_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1969_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1969_description_[Anubis](https://attack.mitre.org/software/S0422) has been delivered via the Google Play Store.(Citation: Trend Micro Anubis)" "objects_1969_external_references_0_source_name_Trend Micro Anubis" "objects_1969_external_references_0_description_K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021." "objects_1969_external_references_0_url_https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html" "objects_1969_created_2021-01-20T16:01:19.497Z" "objects_1969_type_relationship" "objects_1969_relationship_type_uses" "objects_1969_modified_2022-07-07T14:00:00.188Z" "objects_1969_spec_version_2.1" "objects_1969_x_mitre_attack_spec_version_2.1.0" "objects_1969_x_mitre_domains_0_mobile-attack" "objects_1969_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1969_x_mitre_version_1.0" "objects_1969_x_mitre_deprecated_True" "objects_1970_source_ref_malware--f79c01eb-2954-40d8-a819-00b342f47ce7" "objects_1970_id_relationship--9c834f8f-390e-4c60-b0be-9bdd8d9815c9" "objects_1970_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1970_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1970_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1970_description_[SimBad](https://attack.mitre.org/software/S0419) was embedded into legitimate applications.(Citation: CheckPoint SimBad 2019)" "objects_1970_external_references_0_description_Elena Root, Andrey Polkovnichenko. (2019, March 13). SimBad: A Rogue Adware Campaign On Google Play. Retrieved November 21, 2019." "objects_1970_external_references_0_source_name_CheckPoint SimBad 2019" "objects_1970_external_references_0_url_https://research.checkpoint.com/simbad-a-rogue-adware-campaign-on-google-play/" "objects_1970_created_2020-01-14T15:32:11.804Z" "objects_1970_type_relationship" "objects_1970_relationship_type_uses" "objects_1970_modified_2022-07-07T14:00:00.188Z" "objects_1970_spec_version_2.1" "objects_1970_x_mitre_attack_spec_version_2.1.0" "objects_1970_x_mitre_domains_0_mobile-attack" "objects_1970_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1970_x_mitre_version_1.0" "objects_1970_x_mitre_deprecated_True" "objects_1971_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1971_id_relationship--9c8bbd04-0e12-4066-a276-feec87db8271" "objects_1971_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_1971_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1971_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1971_modified_2022-07-07T14:00:00.188Z" "objects_1971_type_relationship" "objects_1971_created_2019-10-18T14:50:57.496Z" "objects_1971_relationship_type_mitigates" "objects_1971_spec_version_2.1" "objects_1971_x_mitre_attack_spec_version_2.1.0" "objects_1971_x_mitre_domains_0_mobile-attack" "objects_1971_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1971_x_mitre_version_1.0" "objects_1971_x_mitre_deprecated_True" "objects_1972_source_ref_malware--2740eaf6-2db2-4a40-a63f-f5b166c7059c" "objects_1972_id_relationship--9d087e80-c58e-45ed-bc5d-bc99e3e3e42e" "objects_1972_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1972_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1972_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1972_description_[XLoader for Android](https://attack.mitre.org/software/S0318) has been distributed via phishing websites.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1972_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1972_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1972_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1972_created_2020-07-20T13:49:03.672Z" "objects_1972_type_relationship" "objects_1972_relationship_type_uses" "objects_1972_modified_2022-07-07T14:00:00.188Z" "objects_1972_spec_version_2.1" "objects_1972_x_mitre_attack_spec_version_2.1.0" "objects_1972_x_mitre_domains_0_mobile-attack" "objects_1972_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1972_x_mitre_version_1.0" "objects_1972_x_mitre_deprecated_True" "objects_1973_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_1973_id_relationship--9d7f01ed-f9aa-4545-8ce3-4654d8e86f48" "objects_1973_target_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_1973_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1973_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1973_description_Developers should use Android App Links(Citation: Android App Links) and iOS Universal Links(Citation: iOS Universal Links) to provide a secure binding between URIs and applications, preventing malicious applications from intercepting redirections. Additionally, for OAuth use cases, PKCE(Citation: IETF-PKCE) should be used to prevent use of stolen authorization codes." "objects_1973_external_references_0_source_name_Android App Links" "objects_1973_external_references_0_description_Google. (n.d.). Verify Android App Links. Retrieved September 11, 2020." "objects_1973_external_references_0_url_https://developer.android.com/training/app-links/verify-site-associations" "objects_1973_external_references_1_source_name_iOS Universal Links" "objects_1973_external_references_1_description_Apple. (n.d.). Universal Links for Developers. Retrieved September 11, 2020." "objects_1973_external_references_1_url_https://developer.apple.com/ios/universal-links/" "objects_1973_external_references_2_source_name_IETF-PKCE" "objects_1973_external_references_2_description_N. Sakimura, J. Bradley, and N. Agarwal. (2015, September). IETF RFC 7636: Proof Key for Code Exchange by OAuth Public Clients. Retrieved December 21, 2016." "objects_1973_external_references_2_url_https://tools.ietf.org/html/rfc7636" "objects_1973_created_2020-09-11T15:39:28.206Z" "objects_1973_type_relationship" "objects_1973_relationship_type_mitigates" "objects_1973_modified_2022-07-07T14:00:00.188Z" "objects_1973_spec_version_2.1" "objects_1973_x_mitre_attack_spec_version_2.1.0" "objects_1973_x_mitre_domains_0_mobile-attack" "objects_1973_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1973_x_mitre_version_1.0" "objects_1973_x_mitre_deprecated_True" "objects_1974_source_ref_malware--c6a07c89-a24c-4c7e-9e3e-6153cc595e24" "objects_1974_id_relationship--9de24ec5-63bc-4520-9f81-d1b93a31cd02" "objects_1974_target_ref_attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d" "objects_1974_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1974_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1974_description_[Circles](https://attack.mitre.org/software/S0602) can intercept voice calls and SMS messages.(Citation: CitizenLab Circles)" "objects_1974_external_references_0_source_name_CitizenLab Circles" "objects_1974_external_references_0_description_Bill Marczak, John Scott-Railton, Siddharth Prakash Rao, Siena Anstis, and Ron Deibert. (2020, December 1). Running in Circles Uncovering the Clients of Cyberespionage Firm Circles. Retrieved December 23, 2020." "objects_1974_external_references_0_url_https://citizenlab.ca/2020/12/running-in-circles-uncovering-the-clients-of-cyberespionage-firm-circles/" "objects_1974_created_2021-04-26T15:33:55.897Z" "objects_1974_type_relationship" "objects_1974_relationship_type_uses" "objects_1974_modified_2022-07-07T14:00:00.188Z" "objects_1974_spec_version_2.1" "objects_1974_x_mitre_attack_spec_version_2.1.0" "objects_1974_x_mitre_domains_0_mobile-attack" "objects_1974_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1974_x_mitre_version_1.0" "objects_1974_x_mitre_deprecated_True" "objects_1975_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1975_id_relationship--9e87b99f-9ff6-4e40-aeaf-4e35668f72e9" "objects_1975_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_1975_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1975_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1975_description_Applications with network connections to unknown domains or IP addresses could be further scrutinized to detect unauthorized file copying. Further, some application vetting services may indicate precisely what content was requested during application execution." "objects_1975_created_2020-01-21T15:27:30.478Z" "objects_1975_type_relationship" "objects_1975_relationship_type_mitigates" "objects_1975_modified_2022-07-07T14:00:00.188Z" "objects_1975_spec_version_2.1" "objects_1975_x_mitre_attack_spec_version_2.1.0" "objects_1975_x_mitre_domains_0_mobile-attack" "objects_1975_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1975_x_mitre_version_1.0" "objects_1975_x_mitre_deprecated_True" "objects_1976_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1976_id_relationship--9ea1777b-44d5-4763-bee9-fe782e29e68f" "objects_1976_target_ref_attack-pattern--0c71033e-401e-4b97-9309-7a7c95e43a5d" "objects_1976_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1976_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1976_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_1976_created_2019-10-18T15:51:48.520Z" "objects_1976_type_relationship" "objects_1976_relationship_type_mitigates" "objects_1976_modified_2022-07-07T14:00:00.188Z" "objects_1976_spec_version_2.1" "objects_1976_x_mitre_attack_spec_version_2.1.0" "objects_1976_x_mitre_domains_0_mobile-attack" "objects_1976_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1976_x_mitre_version_1.0" "objects_1976_x_mitre_deprecated_True" "objects_1977_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_1977_id_relationship--9ea81224-70ef-46c2-89d4-2261c11789b4" "objects_1977_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1977_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1977_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1977_description_[YiSpecter](https://attack.mitre.org/software/S0311)'s malicious apps were signed with iOS enterprise certificates issued by Apple to allow the apps to be installed as enterprise apps on non-jailbroken iOS devices.(Citation: PaloAlto-YiSpecter)" "objects_1977_external_references_0_source_name_PaloAlto-YiSpecter" "objects_1977_external_references_0_description_Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved January 20, 2017." "objects_1977_external_references_0_url_https://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/" "objects_1977_created_2018-10-17T00:14:20.652Z" "objects_1977_type_relationship" "objects_1977_relationship_type_uses" "objects_1977_modified_2022-07-07T14:00:00.188Z" "objects_1977_spec_version_2.1" "objects_1977_x_mitre_attack_spec_version_2.1.0" "objects_1977_x_mitre_domains_0_mobile-attack" "objects_1977_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1977_x_mitre_version_1.0" "objects_1977_x_mitre_deprecated_True" "objects_1978_source_ref_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_1978_id_relationship--9f737872-3503-4ef4-b575-ab6037b33a98" "objects_1978_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_1978_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1978_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1978_description_[KeyRaider](https://attack.mitre.org/software/S0288) has built-in functionality to lock victims out of devices and hold them for ransom.(Citation: Xiao-KeyRaider)" "objects_1978_external_references_0_source_name_Xiao-KeyRaider" "objects_1978_external_references_0_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_1978_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_1978_created_2017-12-14T16:46:06.044Z" "objects_1978_type_relationship" "objects_1978_relationship_type_uses" "objects_1978_modified_2022-07-07T14:00:00.188Z" "objects_1978_spec_version_2.1" "objects_1978_x_mitre_attack_spec_version_2.1.0" "objects_1978_x_mitre_domains_0_mobile-attack" "objects_1978_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1978_x_mitre_version_1.0" "objects_1978_x_mitre_deprecated_True" "objects_1979_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1979_id_relationship--a2b67309-7912-4fe2-a689-aaa1ce8778e0" "objects_1979_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1979_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1979_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1979_description_Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps." "objects_1979_created_2019-10-18T15:51:48.472Z" "objects_1979_type_relationship" "objects_1979_relationship_type_mitigates" "objects_1979_modified_2022-07-07T14:00:00.188Z" "objects_1979_spec_version_2.1" "objects_1979_x_mitre_attack_spec_version_2.1.0" "objects_1979_x_mitre_domains_0_mobile-attack" "objects_1979_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1979_x_mitre_version_1.0" "objects_1979_x_mitre_deprecated_True" "objects_1980_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1980_id_relationship--a32a8f00-8168-4aed-a928-4c107cda3328" "objects_1980_target_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_1980_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1980_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1980_description_Application vetting services may be able to detect known privilege escalation exploits contained within applications." "objects_1980_created_2020-06-24T17:33:50.593Z" "objects_1980_type_relationship" "objects_1980_relationship_type_mitigates" "objects_1980_modified_2022-07-07T14:00:00.188Z" "objects_1980_spec_version_2.1" "objects_1980_x_mitre_attack_spec_version_2.1.0" "objects_1980_x_mitre_domains_0_mobile-attack" "objects_1980_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1980_x_mitre_version_1.0" "objects_1980_x_mitre_deprecated_True" "objects_1981_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_1981_id_relationship--a3ba222d-8dcd-4222-b1d0-169eff16922f" "objects_1981_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1981_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1981_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1981_description_[RedDrop](https://attack.mitre.org/software/S0326) uses ads or other links within websites to encourage users to download the malicious apps using a complex content distribution network (CDN) and series of network redirects. [RedDrop](https://attack.mitre.org/software/S0326) also downloads additional components (APKs, JAR files) from different C2 servers.(Citation: Wandera-RedDrop)" "objects_1981_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_1981_external_references_0_source_name_Wandera-RedDrop" "objects_1981_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_1981_created_2018-10-17T00:14:20.652Z" "objects_1981_type_relationship" "objects_1981_relationship_type_uses" "objects_1981_modified_2022-07-07T14:00:00.188Z" "objects_1981_spec_version_2.1" "objects_1981_x_mitre_attack_spec_version_2.1.0" "objects_1981_x_mitre_domains_0_mobile-attack" "objects_1981_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1981_x_mitre_version_1.0" "objects_1981_x_mitre_deprecated_True" "objects_1982_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1982_id_relationship--a4b53160-fdb8-4cab-90cc-ad12ab13a8a0" "objects_1982_target_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_1982_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1982_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1982_modified_2022-07-07T14:00:00.188Z" "objects_1982_type_relationship" "objects_1982_created_2017-10-25T14:48:53.738Z" "objects_1982_relationship_type_mitigates" "objects_1982_spec_version_2.1" "objects_1982_x_mitre_attack_spec_version_2.1.0" "objects_1982_x_mitre_domains_0_mobile-attack" "objects_1982_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1982_x_mitre_version_1.0" "objects_1982_x_mitre_deprecated_True" "objects_1983_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1983_id_relationship--a62f9f72-d5a6-4e12-ac53-62bd4c81aa4d" "objects_1983_target_ref_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_1983_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1983_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1983_description_Application vetting services can check for applications that request SMS permissions, and can provide extra scrutiny to those that do." "objects_1983_created_2019-10-18T15:11:37.282Z" "objects_1983_type_relationship" "objects_1983_relationship_type_mitigates" "objects_1983_modified_2022-07-07T14:00:00.188Z" "objects_1983_spec_version_2.1" "objects_1983_x_mitre_attack_spec_version_2.1.0" "objects_1983_x_mitre_domains_0_mobile-attack" "objects_1983_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1983_x_mitre_version_1.0" "objects_1983_x_mitre_deprecated_True" "objects_1984_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_1984_id_relationship--a6876100-1ed4-4c26-8de7-dc5ee09a8feb" "objects_1984_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1984_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1984_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1984_description_[Exobot](https://attack.mitre.org/software/S0522) has been spread using direct download links.(Citation: Threat Fabric Exobot)" "objects_1984_external_references_0_source_name_Threat Fabric Exobot" "objects_1984_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_1984_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_1984_created_2020-10-29T13:32:21.089Z" "objects_1984_type_relationship" "objects_1984_relationship_type_uses" "objects_1984_modified_2022-07-07T14:00:00.188Z" "objects_1984_spec_version_2.1" "objects_1984_x_mitre_attack_spec_version_2.1.0" "objects_1984_x_mitre_domains_0_mobile-attack" "objects_1984_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1984_x_mitre_version_1.0" "objects_1984_x_mitre_deprecated_True" "objects_1985_source_ref_malware--3049b2f2-e323-4cdb-91cb-13b37b904cbb" "objects_1985_id_relationship--a6cfae27-9ba8-458e-85cc-ec1b1dc22d8a" "objects_1985_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1985_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1985_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1985_description_ [Exodus](https://attack.mitre.org/software/S0405) One has been distributed via the Play Store.(Citation: SWB Exodus March 2019) " "objects_1985_external_references_0_source_name_SWB Exodus March 2019" "objects_1985_external_references_0_description_Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019." "objects_1985_external_references_0_url_https://securitywithoutborders.org/blog/2019/03/29/exodus.html" "objects_1985_created_2019-09-03T19:45:48.480Z" "objects_1985_type_relationship" "objects_1985_relationship_type_uses" "objects_1985_modified_2022-07-07T14:00:00.188Z" "objects_1985_spec_version_2.1" "objects_1985_x_mitre_attack_spec_version_2.1.0" "objects_1985_x_mitre_domains_0_mobile-attack" "objects_1985_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1985_x_mitre_version_1.0" "objects_1985_x_mitre_deprecated_True" "objects_1986_source_ref_malware--29944858-da52-4d3d-b428-f8a6eb8dde6f" "objects_1986_id_relationship--a7c74081-2844-4f0a-9fcc-c30a98717798" "objects_1986_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1986_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1986_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1986_description_[XLoader for Android](https://attack.mitre.org/software/S0318) has been distributed via phishing SMS messages, which link to a malicious website hosting a device profile.(Citation: TrendMicro-XLoader-FakeSpy)" "objects_1986_external_references_0_source_name_TrendMicro-XLoader-FakeSpy" "objects_1986_external_references_0_description_Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020." "objects_1986_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy/" "objects_1986_created_2020-09-24T15:26:15.629Z" "objects_1986_type_relationship" "objects_1986_relationship_type_uses" "objects_1986_modified_2022-07-07T14:00:00.188Z" "objects_1986_spec_version_2.1" "objects_1986_x_mitre_attack_spec_version_2.1.0" "objects_1986_x_mitre_domains_0_mobile-attack" "objects_1986_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1986_x_mitre_version_1.0" "objects_1986_x_mitre_deprecated_True" "objects_1987_source_ref_malware--96ea1e13-d50f-45f1-b0cf-4ac9bc5a2d62" "objects_1987_id_relationship--a7cb8193-7a07-45e8-b2a4-6f650ccac1f3" "objects_1987_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1987_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1987_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1987_description_[FrozenCell](https://attack.mitre.org/software/S0577) has masqueraded as fake updates to chat applications such as Facebook, WhatsApp, Messenger, LINE, and LoveChat, as well as apps targeting Middle Eastern demographics.(Citation: Lookout FrozenCell) " "objects_1987_external_references_0_source_name_Lookout FrozenCell" "objects_1987_external_references_0_description_Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020." "objects_1987_external_references_0_url_https://blog.lookout.com/frozencell-mobile-threat" "objects_1987_created_2021-02-17T20:43:52.417Z" "objects_1987_type_relationship" "objects_1987_relationship_type_uses" "objects_1987_modified_2022-07-07T14:00:00.188Z" "objects_1987_spec_version_2.1" "objects_1987_x_mitre_attack_spec_version_2.1.0" "objects_1987_x_mitre_domains_0_mobile-attack" "objects_1987_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1987_x_mitre_version_1.0" "objects_1987_x_mitre_deprecated_True" "objects_1988_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_1988_id_relationship--a976221c-7ed2-4e4e-a8db-ca87d49fb5eb" "objects_1988_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_1988_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1988_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1988_modified_2022-07-07T14:00:00.188Z" "objects_1988_type_relationship" "objects_1988_created_2019-10-18T14:50:57.430Z" "objects_1988_relationship_type_mitigates" "objects_1988_spec_version_2.1" "objects_1988_x_mitre_attack_spec_version_2.1.0" "objects_1988_x_mitre_domains_0_mobile-attack" "objects_1988_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1988_x_mitre_version_1.0" "objects_1988_x_mitre_deprecated_True" "objects_1989_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1989_id_relationship--ab28edec-a105-4dee-a3f0-3090daafb7f3" "objects_1989_target_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_1989_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1989_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1989_description_Users should be told that it is very rare for an app to request device administrator permissions, and that any requests for the permissions should be scrutinized. " "objects_1989_created_2020-11-20T16:55:36.784Z" "objects_1989_type_relationship" "objects_1989_relationship_type_mitigates" "objects_1989_modified_2022-07-07T14:00:00.188Z" "objects_1989_spec_version_2.1" "objects_1989_x_mitre_attack_spec_version_2.1.0" "objects_1989_x_mitre_domains_0_mobile-attack" "objects_1989_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1989_x_mitre_version_1.0" "objects_1989_x_mitre_deprecated_True" "objects_1990_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_1990_id_relationship--ab5e939b-bd6f-4301-b341-85e70965f193" "objects_1990_target_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_1990_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1990_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1990_description_Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge." "objects_1990_created_2020-05-04T13:49:35.249Z" "objects_1990_type_relationship" "objects_1990_relationship_type_mitigates" "objects_1990_modified_2022-07-07T14:00:00.188Z" "objects_1990_spec_version_2.1" "objects_1990_x_mitre_attack_spec_version_2.1.0" "objects_1990_x_mitre_domains_0_mobile-attack" "objects_1990_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1990_x_mitre_version_1.0" "objects_1990_x_mitre_deprecated_True" "objects_1991_source_ref_malware--f3975cc0-72bc-4308-836e-ac701b83860e" "objects_1991_id_relationship--ac6c2133-e50e-4c17-804d-484653d2881f" "objects_1991_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_1991_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1991_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1991_description_[Golden Cup](https://attack.mitre.org/software/S0535) has been distributed via the Google Play Store.(Citation: Symantec GoldenCup)" "objects_1991_external_references_0_source_name_Symantec GoldenCup" "objects_1991_external_references_0_description_R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020." "objects_1991_external_references_0_url_https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/goldencup-new-cyber-threat-targeting-world-cup-fans" "objects_1991_created_2020-11-20T15:44:57.431Z" "objects_1991_type_relationship" "objects_1991_relationship_type_uses" "objects_1991_modified_2022-07-07T14:00:00.188Z" "objects_1991_spec_version_2.1" "objects_1991_x_mitre_attack_spec_version_2.1.0" "objects_1991_x_mitre_domains_0_mobile-attack" "objects_1991_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1991_x_mitre_version_1.0" "objects_1991_x_mitre_deprecated_True" "objects_1992_source_ref_malware--6fcaf9b0-b509-4644-9f93-556222c81ed2" "objects_1992_id_relationship--ac9704b7-a4d0-4f85-9f7d-53b05809719b" "objects_1992_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_1992_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1992_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1992_description_[ViceLeaker](https://attack.mitre.org/software/S0418) was embedded into legitimate applications using Smali injection.(Citation: SecureList - ViceLeaker 2019)" "objects_1992_external_references_0_source_name_SecureList - ViceLeaker 2019" "objects_1992_external_references_0_description_GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019." "objects_1992_external_references_0_url_https://securelist.com/fanning-the-flames-viceleaker-operation/90877/" "objects_1992_created_2019-11-21T16:42:48.413Z" "objects_1992_type_relationship" "objects_1992_relationship_type_uses" "objects_1992_modified_2022-07-07T14:00:00.188Z" "objects_1992_spec_version_2.1" "objects_1992_x_mitre_attack_spec_version_2.1.0" "objects_1992_x_mitre_domains_0_mobile-attack" "objects_1992_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1992_x_mitre_version_1.0" "objects_1992_x_mitre_deprecated_True" "objects_1993_source_ref_intrusion-set--8a831aaa-f3e0-47a3-bed8-a9ced744dd12" "objects_1993_id_relationship--ae9a0fb3-901b-4da2-b6ad-633ddbfa0a5f" "objects_1993_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_1993_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1993_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1993_description_[Dark Caracal](https://attack.mitre.org/groups/G0070) distributes [Pallas](https://attack.mitre.org/software/S0399) via trojanized applications hosted on watering hole websites.(Citation: Lookout Dark Caracal Jan 2018) " "objects_1993_external_references_0_description_Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018." "objects_1993_external_references_0_source_name_Lookout Dark Caracal Jan 2018" "objects_1993_external_references_0_url_https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf" "objects_1993_created_2019-07-10T15:42:09.591Z" "objects_1993_type_relationship" "objects_1993_relationship_type_uses" "objects_1993_modified_2022-07-07T14:00:00.188Z" "objects_1993_spec_version_2.1" "objects_1993_x_mitre_attack_spec_version_2.1.0" "objects_1993_x_mitre_domains_0_mobile-attack" "objects_1993_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1993_x_mitre_version_1.0" "objects_1993_x_mitre_deprecated_True" "objects_1994_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1994_id_relationship--b28c1e81-4f78-4e40-9899-2872cdbcceba" "objects_1994_target_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_1994_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1994_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1994_description_Decrease likelihood of successful privilege escalation attack." "objects_1994_modified_2022-07-07T14:00:00.188Z" "objects_1994_type_relationship" "objects_1994_created_2017-10-25T14:48:53.736Z" "objects_1994_relationship_type_mitigates" "objects_1994_spec_version_2.1" "objects_1994_x_mitre_attack_spec_version_2.1.0" "objects_1994_x_mitre_domains_0_mobile-attack" "objects_1994_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1994_x_mitre_version_1.0" "objects_1994_x_mitre_deprecated_True" "objects_1995_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_1995_id_relationship--b2b31911-5b7e-4df3-89c6-00b5b372fb4f" "objects_1995_target_ref_attack-pattern--a5de0540-73e7-4c67-96da-4143afedc7ed" "objects_1995_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1995_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1995_modified_2022-07-07T14:00:00.188Z" "objects_1995_type_relationship" "objects_1995_created_2017-10-25T14:48:53.741Z" "objects_1995_relationship_type_mitigates" "objects_1995_spec_version_2.1" "objects_1995_x_mitre_attack_spec_version_2.1.0" "objects_1995_x_mitre_domains_0_mobile-attack" "objects_1995_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1995_x_mitre_version_1.0" "objects_1995_x_mitre_deprecated_True" "objects_1996_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1996_id_relationship--b2c289bf-e981-4bcd-87dd-b6c0680557e9" "objects_1996_target_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_1996_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1996_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1996_description_Changes were introduced in Android 7 to make abuse of device administrator permissions more difficult.(Citation: GoogleIO2016)" "objects_1996_external_references_0_source_name_GoogleIO2016" "objects_1996_external_references_0_description_Adrian Ludwig. (2016, May 19). What's new in Android security (M and N Version). Retrieved December 9, 2016." "objects_1996_external_references_0_url_https://www.youtube.com/watch?v=XZzLjllizYs" "objects_1996_modified_2022-07-07T14:00:00.188Z" "objects_1996_type_relationship" "objects_1996_created_2017-10-25T14:48:53.745Z" "objects_1996_relationship_type_mitigates" "objects_1996_spec_version_2.1" "objects_1996_x_mitre_attack_spec_version_2.1.0" "objects_1996_x_mitre_domains_0_mobile-attack" "objects_1996_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1996_x_mitre_version_1.0" "objects_1996_x_mitre_deprecated_True" "objects_1997_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_1997_id_relationship--b2c43f7d-f0df-46f8-9257-40ded1948307" "objects_1997_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_1997_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1997_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1997_description_Closely scrutinize applications that request VPN access before allowing their use." "objects_1997_created_2019-10-18T15:11:37.261Z" "objects_1997_type_relationship" "objects_1997_relationship_type_mitigates" "objects_1997_modified_2022-07-07T14:00:00.188Z" "objects_1997_spec_version_2.1" "objects_1997_x_mitre_attack_spec_version_2.1.0" "objects_1997_x_mitre_domains_0_mobile-attack" "objects_1997_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1997_x_mitre_version_1.0" "objects_1997_x_mitre_deprecated_True" "objects_1998_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_1998_id_relationship--b2c61294-707f-4735-8874-e36ed6c1ff47" "objects_1998_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_1998_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1998_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1998_modified_2022-07-07T14:00:00.188Z" "objects_1998_type_relationship" "objects_1998_created_2018-10-17T00:14:20.652Z" "objects_1998_relationship_type_mitigates" "objects_1998_spec_version_2.1" "objects_1998_x_mitre_attack_spec_version_2.1.0" "objects_1998_x_mitre_domains_0_mobile-attack" "objects_1998_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1998_x_mitre_version_1.0" "objects_1998_x_mitre_deprecated_True" "objects_1999_source_ref_malware--6a7aaab1-3e0a-48bb-ba66-bbf7665c0a65" "objects_1999_id_relationship--b3cdaa2c-30a2-496b-b577-db2e18045ff8" "objects_1999_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_1999_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1999_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_1999_description_ [Monokle](https://attack.mitre.org/software/S0407) can install attacker-specified certificates to the device's trusted certificate store, enabling an adversary to perform adversary-in-the-middle attacks.(Citation: Lookout-Monokle) " "objects_1999_external_references_0_description_Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019." "objects_1999_external_references_0_source_name_Lookout-Monokle" "objects_1999_external_references_0_url_https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf" "objects_1999_created_2019-09-04T14:28:15.205Z" "objects_1999_type_relationship" "objects_1999_relationship_type_uses" "objects_1999_modified_2022-07-07T14:00:00.188Z" "objects_1999_spec_version_2.1" "objects_1999_x_mitre_attack_spec_version_2.1.0" "objects_1999_x_mitre_domains_0_mobile-attack" "objects_1999_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_1999_x_mitre_version_1.0" "objects_1999_x_mitre_deprecated_True" "objects_2000_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_2000_id_relationship--b5097495-f417-46ed-88e2-02cba2371936" "objects_2000_target_ref_attack-pattern--393e8c12-a416-4575-ba90-19cc85656796" "objects_2000_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2000_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2000_modified_2022-07-07T14:00:00.188Z" "objects_2000_type_relationship" "objects_2000_created_2017-10-25T14:48:53.744Z" "objects_2000_relationship_type_mitigates" "objects_2000_spec_version_2.1" "objects_2000_x_mitre_attack_spec_version_2.1.0" "objects_2000_x_mitre_domains_0_mobile-attack" "objects_2000_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2000_x_mitre_version_1.0" "objects_2000_x_mitre_deprecated_True" "objects_2001_source_ref_malware--3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50" "objects_2001_id_relationship--b596251a-73db-4e53-a04d-51be783b0241" "objects_2001_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_2001_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2001_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2001_description_Most [KeyRaider](https://attack.mitre.org/software/S0288) samples hook SSLRead and SSLWrite functions in the itunesstored process to intercept device communication with the Apple App Store.(Citation: Xiao-KeyRaider)" "objects_2001_external_references_0_source_name_Xiao-KeyRaider" "objects_2001_external_references_0_description_Claud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016." "objects_2001_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/" "objects_2001_created_2017-12-14T16:46:06.044Z" "objects_2001_type_relationship" "objects_2001_relationship_type_uses" "objects_2001_modified_2022-07-07T14:00:00.188Z" "objects_2001_spec_version_2.1" "objects_2001_x_mitre_attack_spec_version_2.1.0" "objects_2001_x_mitre_domains_0_mobile-attack" "objects_2001_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2001_x_mitre_version_1.0" "objects_2001_x_mitre_deprecated_True" "objects_2002_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2002_id_relationship--b6cf5e3a-84a1-4b76-81d4-f1420b0acdb5" "objects_2002_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2002_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2002_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2002_description_iOS 9 and above requires explicit user consent before allowing installation of applications signed with enterprise distribution keys rather than installed from Apple's App Store. Users should be encouraged to not agree to installation of applications signed with enterprise distribution keys unless absolutely certain of the source of the application. On Android, the \"Unknown Sources\" setting must be enabled for users to install apps from sources other than an authorized app store (such as the Google Play Store), so users should be encouraged not to enable that setting." "objects_2002_created_2019-10-18T15:51:48.519Z" "objects_2002_type_relationship" "objects_2002_relationship_type_mitigates" "objects_2002_modified_2022-07-07T14:00:00.188Z" "objects_2002_spec_version_2.1" "objects_2002_x_mitre_attack_spec_version_2.1.0" "objects_2002_x_mitre_domains_0_mobile-attack" "objects_2002_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2002_x_mitre_version_1.0" "objects_2002_x_mitre_deprecated_True" "objects_2003_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2003_id_relationship--b6e43431-5312-44ae-bc61-54d4d6283bcc" "objects_2003_target_ref_attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb" "objects_2003_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2003_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2003_description_Applications could be vetted for their use of the clipboard manager APIs with extra scrutiny given to application that make use of them." "objects_2003_created_2019-10-18T15:33:18.678Z" "objects_2003_type_relationship" "objects_2003_relationship_type_mitigates" "objects_2003_modified_2022-07-07T14:00:00.188Z" "objects_2003_spec_version_2.1" "objects_2003_x_mitre_attack_spec_version_2.1.0" "objects_2003_x_mitre_domains_0_mobile-attack" "objects_2003_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2003_x_mitre_version_1.0" "objects_2003_x_mitre_deprecated_True" "objects_2004_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2004_id_relationship--b8afc5b9-3ffc-4b3c-b2d8-ee2888a7b6ad" "objects_2004_target_ref_attack-pattern--a64a820a-cb21-471f-920c-506a2ff04fa5" "objects_2004_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2004_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2004_description_Users should be instructed to use forms of multifactor authentication not subject to being intercepted by a SIM card swap, where possible. More secure methods include application-based one-time passcodes (such as Google Authenticator), hardware tokens, and biometrics." "objects_2004_created_2021-09-24T13:59:11.505Z" "objects_2004_type_relationship" "objects_2004_relationship_type_mitigates" "objects_2004_modified_2022-07-07T14:00:00.188Z" "objects_2004_spec_version_2.1" "objects_2004_x_mitre_attack_spec_version_2.1.0" "objects_2004_x_mitre_domains_0_mobile-attack" "objects_2004_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2004_x_mitre_version_1.0" "objects_2004_x_mitre_deprecated_True" "objects_2005_source_ref_malware--108b2817-bc01-404e-8e1b-8cdeec846326" "objects_2005_id_relationship--b8be7302-e02c-4ca8-927b-0460558a0441" "objects_2005_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2005_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2005_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2005_description_ [Bread](https://attack.mitre.org/software/S0432) has been distributed through the Play Store. Some versions started off as clean to build a userbase and developer reputation. These versions were then updated to introduce malicious code.(Citation: Google Bread) " "objects_2005_external_references_0_source_name_Google Bread" "objects_2005_external_references_0_description_A. Guertin, V. Kotov, Android Security & Privacy Team. (2020, January 9). PHA Family Highlights: Bread (and Friends) . Retrieved April 27, 2020." "objects_2005_external_references_0_url_https://security.googleblog.com/2020/01/pha-family-highlights-bread-and-friends.html" "objects_2005_created_2020-05-07T15:11:36.673Z" "objects_2005_type_relationship" "objects_2005_relationship_type_uses" "objects_2005_modified_2022-07-07T14:00:00.188Z" "objects_2005_spec_version_2.1" "objects_2005_x_mitre_attack_spec_version_2.1.0" "objects_2005_x_mitre_domains_0_mobile-attack" "objects_2005_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2005_x_mitre_version_1.0" "objects_2005_x_mitre_deprecated_True" "objects_2006_source_ref_malware--f7e7b736-2cff-4c2a-9232-352cd383463a" "objects_2006_id_relationship--b985f78d-ba86-414d-8471-31311d96bee0" "objects_2006_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2006_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2006_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2006_description_[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has mimicked Facebook and Google icons on the \u201cRecent apps\u201d screen to avoid discovery and uses the `com.google.xxx` package name to avoid detection.(Citation: WeLiveSecurity AdDisplayAshas)" "objects_2006_external_references_0_source_name_WeLiveSecurity AdDisplayAshas" "objects_2006_external_references_0_description_L. Stefanko. (2019, October 24). Tracking down the developer of Android adware affecting millions of users. Retrieved October 29, 2020." "objects_2006_external_references_0_url_https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/" "objects_2006_created_2020-10-29T19:19:09.060Z" "objects_2006_type_relationship" "objects_2006_relationship_type_uses" "objects_2006_modified_2022-07-07T14:00:00.188Z" "objects_2006_spec_version_2.1" "objects_2006_x_mitre_attack_spec_version_2.1.0" "objects_2006_x_mitre_domains_0_mobile-attack" "objects_2006_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2006_x_mitre_version_1.0" "objects_2006_x_mitre_deprecated_True" "objects_2007_source_ref_malware--ddbe5657-e21e-4a89-8221-2f1362d397ec" "objects_2007_id_relationship--bb001e52-a649-43cb-bdba-64b331886e2b" "objects_2007_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2007_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2007_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2007_description_[SilkBean](https://attack.mitre.org/software/S0549) has been incorporated into trojanized applications, including Uyghur/Arabic focused keyboards, alphabets, and plugins, as well as official-looking Google applications.(Citation: Lookout Uyghur Campaign)" "objects_2007_external_references_0_source_name_Lookout Uyghur Campaign" "objects_2007_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_2007_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_2007_created_2020-12-24T21:45:56.913Z" "objects_2007_type_relationship" "objects_2007_relationship_type_uses" "objects_2007_modified_2022-07-07T14:00:00.188Z" "objects_2007_spec_version_2.1" "objects_2007_x_mitre_attack_spec_version_2.1.0" "objects_2007_x_mitre_domains_0_mobile-attack" "objects_2007_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2007_x_mitre_version_1.0" "objects_2007_x_mitre_deprecated_True" "objects_2008_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_2008_id_relationship--bbf13431-c3d2-4800-aada-273b3a47dcba" "objects_2008_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2008_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2008_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2008_description_[RuMMS](https://attack.mitre.org/software/S0313) is delivered via an SMS message containing a link to an APK (Android application package).(Citation: FireEye-RuMMS)" "objects_2008_external_references_0_source_name_FireEye-RuMMS" "objects_2008_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_2008_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_2008_created_2018-10-17T00:14:20.652Z" "objects_2008_type_relationship" "objects_2008_relationship_type_uses" "objects_2008_modified_2022-07-07T14:00:00.188Z" "objects_2008_spec_version_2.1" "objects_2008_x_mitre_attack_spec_version_2.1.0" "objects_2008_x_mitre_domains_0_mobile-attack" "objects_2008_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2008_x_mitre_version_1.0" "objects_2008_x_mitre_deprecated_True" "objects_2009_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2009_id_relationship--bd41c8b6-b587-4531-b015-55fdb357cb25" "objects_2009_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_2009_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2009_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2009_description_Application vetting techniques may be able to alert to the presence of obfuscated or encrypted code in applications, and such applications could have extra scrutiny applied. Unfortunately, this mitigation is likely impractical, as many legitimate applications apply code obfuscation or encryption to resist adversary techniques such as Repackaged Application. Dynamic analysis when used in application vetting may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code." "objects_2009_created_2019-10-18T15:11:37.252Z" "objects_2009_type_relationship" "objects_2009_relationship_type_mitigates" "objects_2009_modified_2022-07-07T14:00:00.188Z" "objects_2009_spec_version_2.1" "objects_2009_x_mitre_attack_spec_version_2.1.0" "objects_2009_x_mitre_domains_0_mobile-attack" "objects_2009_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2009_x_mitre_version_1.0" "objects_2009_x_mitre_deprecated_True" "objects_2010_source_ref_malware--a76b837b-93cc-417d-bf28-c47a6a284fa4" "objects_2010_id_relationship--be92314d-bf3f-4a02-852b-3d1ab85e8d7d" "objects_2010_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2010_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2010_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2010_description_[Asacub](https://attack.mitre.org/software/S0540) has been spread via phishing SMS messages that contain a link to a website that hosts the malicious APK file.(Citation: Securelist Asacub)" "objects_2010_external_references_0_source_name_Securelist Asacub" "objects_2010_external_references_0_description_T. Shishkova. (2018, August 28). The rise of mobile banker Asacub. Retrieved December 14, 2020." "objects_2010_external_references_0_url_https://securelist.com/the-rise-of-mobile-banker-asacub/87591/" "objects_2010_created_2020-12-14T15:02:35.238Z" "objects_2010_type_relationship" "objects_2010_relationship_type_uses" "objects_2010_modified_2022-07-07T14:00:00.188Z" "objects_2010_spec_version_2.1" "objects_2010_x_mitre_attack_spec_version_2.1.0" "objects_2010_x_mitre_domains_0_mobile-attack" "objects_2010_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2010_x_mitre_version_1.0" "objects_2010_x_mitre_deprecated_True" "objects_2011_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2011_id_relationship--c08a1ce8-2c04-4802-a08b-4ce86efd8d5a" "objects_2011_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2011_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2011_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2011_description_Encourage developers to protect their account credentials and enable multi-factor authentication if available. Encourage developers to protect their signing keys." "objects_2011_created_2019-10-18T15:51:48.490Z" "objects_2011_type_relationship" "objects_2011_relationship_type_mitigates" "objects_2011_modified_2022-07-07T14:00:00.188Z" "objects_2011_spec_version_2.1" "objects_2011_x_mitre_attack_spec_version_2.1.0" "objects_2011_x_mitre_domains_0_mobile-attack" "objects_2011_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2011_x_mitre_version_1.0" "objects_2011_x_mitre_deprecated_True" "objects_2012_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_2012_id_relationship--c16d8700-dadb-47df-8e17-2716a46ed663" "objects_2012_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2012_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2012_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2012_description_[Windshift](https://attack.mitre.org/groups/G0112) has distributed malicious apps via the Google Play Store and Apple App Store.(Citation: BlackBerry Bahamut)" "objects_2012_external_references_0_source_name_BlackBerry Bahamut" "objects_2012_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_2012_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_2012_created_2021-02-08T16:36:20.623Z" "objects_2012_type_relationship" "objects_2012_relationship_type_uses" "objects_2012_modified_2022-07-07T14:00:00.188Z" "objects_2012_spec_version_2.1" "objects_2012_x_mitre_attack_spec_version_2.1.0" "objects_2012_x_mitre_domains_0_mobile-attack" "objects_2012_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2012_x_mitre_version_1.0" "objects_2012_x_mitre_deprecated_True" "objects_2013_source_ref_malware--a3c59d82-2c7c-44e5-a869-68e0a3e5935e" "objects_2013_id_relationship--c200184f-3d11-452c-8362-bb66337df1f5" "objects_2013_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2013_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2013_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2013_description_[Anubis](https://attack.mitre.org/software/S0422) was distributed via phishing link in an email.(Citation: Cofense Anubis)" "objects_2013_external_references_0_source_name_Cofense Anubis" "objects_2013_external_references_0_description_M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020." "objects_2013_external_references_0_url_https://cofense.com/infostealer-keylogger-ransomware-one-anubis-targets-250-android-applications/" "objects_2013_created_2020-04-08T15:41:19.355Z" "objects_2013_type_relationship" "objects_2013_relationship_type_uses" "objects_2013_modified_2022-07-07T14:00:00.188Z" "objects_2013_spec_version_2.1" "objects_2013_x_mitre_attack_spec_version_2.1.0" "objects_2013_x_mitre_domains_0_mobile-attack" "objects_2013_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2013_x_mitre_version_1.0" "objects_2013_x_mitre_deprecated_True" "objects_2014_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2014_id_relationship--c2f436e1-cdd7-4d5c-ae62-9aaa31e47b10" "objects_2014_target_ref_attack-pattern--ccde43e4-78f9-4f32-b401-c081e7db71ea" "objects_2014_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2014_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2014_description_Application vetting services could look for attempts to invoke the superuser (su) binary or modules related to rooting frameworks." "objects_2014_created_2021-09-24T14:47:34.459Z" "objects_2014_type_relationship" "objects_2014_relationship_type_mitigates" "objects_2014_modified_2022-07-07T14:00:00.188Z" "objects_2014_spec_version_2.1" "objects_2014_x_mitre_attack_spec_version_2.1.0" "objects_2014_x_mitre_domains_0_mobile-attack" "objects_2014_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2014_x_mitre_version_1.0" "objects_2014_x_mitre_deprecated_True" "objects_2015_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2015_id_relationship--c761ed82-24cc-4c40-94ef-c4d0f4d1cd7a" "objects_2015_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2015_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2015_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2015_description_Starting in Android 4.1, this technique requires privilege escalation for malicious applications to perform, as apps can no longer access the system log (other than log entries added by a particular app itself). (Additionally, with physical access to the device, the system log could be accessed via USB through the Android Debug Bridge.)(Citation: Android-ReadLogs)" "objects_2015_external_references_0_source_name_Android-ReadLogs" "objects_2015_external_references_0_description_Dianne Hackborn. (2012, July 12). Re: READ_LOGS permission is not granted to 3rd party applications in Jelly Bean (api 16). Retrieved December 21, 2016." "objects_2015_external_references_0_url_https://groups.google.com/d/msg/android-developers/6U4A5irWang/AvZsrTdfICIJ" "objects_2015_created_2017-10-25T14:48:53.739Z" "objects_2015_type_relationship" "objects_2015_relationship_type_mitigates" "objects_2015_modified_2022-07-07T14:00:00.188Z" "objects_2015_spec_version_2.1" "objects_2015_x_mitre_attack_spec_version_2.1.0" "objects_2015_x_mitre_domains_0_mobile-attack" "objects_2015_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2015_x_mitre_version_1.0" "objects_2015_x_mitre_deprecated_True" "objects_2016_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2016_id_relationship--c8516d70-8992-4946-90b3-37435be40822" "objects_2016_target_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_2016_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2016_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2016_description_When vetting applications for potential security weaknesses, the vetting process could look for insecure use of intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or the App Links feature added in Android 6.0). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)" "objects_2016_external_references_0_source_name_IETF-OAuthNativeApps" "objects_2016_external_references_0_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_2016_external_references_0_url_https://tools.ietf.org/html/rfc8252" "objects_2016_external_references_1_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_2016_external_references_1_source_name_Android-AppLinks" "objects_2016_external_references_1_url_https://developer.android.com/training/app-links/index.html" "objects_2016_created_2019-10-18T15:11:37.274Z" "objects_2016_type_relationship" "objects_2016_relationship_type_mitigates" "objects_2016_modified_2022-07-07T14:00:00.188Z" "objects_2016_spec_version_2.1" "objects_2016_x_mitre_attack_spec_version_2.1.0" "objects_2016_x_mitre_domains_0_mobile-attack" "objects_2016_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2016_x_mitre_version_1.0" "objects_2016_x_mitre_deprecated_True" "objects_2017_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2017_id_relationship--c8b04178-2aa8-44c0-8bf6-787caa3f64e7" "objects_2017_target_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_2017_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2017_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2017_description_Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups." "objects_2017_created_2020-09-11T14:08:08.666Z" "objects_2017_type_relationship" "objects_2017_relationship_type_mitigates" "objects_2017_modified_2022-07-07T14:00:00.188Z" "objects_2017_spec_version_2.1" "objects_2017_x_mitre_attack_spec_version_2.1.0" "objects_2017_x_mitre_domains_0_mobile-attack" "objects_2017_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2017_x_mitre_version_1.0" "objects_2017_x_mitre_deprecated_True" "objects_2018_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2018_id_relationship--c9ece136-83fe-446f-abde-f3f30a5ceaa3" "objects_2018_target_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_2018_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2018_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2018_description_Enterprises performing application vetting could search for applications that declare the RECEIVE_SMS permission and scrutinize them closely." "objects_2018_created_2019-10-18T15:11:37.223Z" "objects_2018_type_relationship" "objects_2018_relationship_type_mitigates" "objects_2018_modified_2022-07-07T14:00:00.188Z" "objects_2018_spec_version_2.1" "objects_2018_x_mitre_attack_spec_version_2.1.0" "objects_2018_x_mitre_domains_0_mobile-attack" "objects_2018_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2018_x_mitre_version_1.0" "objects_2018_x_mitre_deprecated_True" "objects_2019_source_ref_malware--0626c181-93cb-4860-9cb0-dff3b1c13063" "objects_2019_id_relationship--cbde808a-08b3-4afc-bb87-21acc4b767c1" "objects_2019_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2019_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2019_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2019_description_[Rotexy](https://attack.mitre.org/software/S0411) is distributed through phishing links sent in SMS messages as `AvitoPay.apk`.(Citation: securelist rotexy 2018)" "objects_2019_external_references_0_description_T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan \u2013 banker and ransomware. Retrieved September 23, 2019." "objects_2019_external_references_0_source_name_securelist rotexy 2018" "objects_2019_external_references_0_url_https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/" "objects_2019_created_2019-09-23T13:36:08.445Z" "objects_2019_type_relationship" "objects_2019_relationship_type_uses" "objects_2019_modified_2022-07-07T14:00:00.188Z" "objects_2019_spec_version_2.1" "objects_2019_x_mitre_attack_spec_version_2.1.0" "objects_2019_x_mitre_domains_0_mobile-attack" "objects_2019_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2019_x_mitre_version_1.0" "objects_2019_x_mitre_deprecated_True" "objects_2020_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2020_id_relationship--ccdc17ba-eced-40df-ab9d-7734e0e9243c" "objects_2020_target_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_2020_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2020_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2020_modified_2022-07-07T14:00:00.188Z" "objects_2020_type_relationship" "objects_2020_created_2019-10-18T14:50:57.435Z" "objects_2020_relationship_type_mitigates" "objects_2020_spec_version_2.1" "objects_2020_x_mitre_attack_spec_version_2.1.0" "objects_2020_x_mitre_domains_0_mobile-attack" "objects_2020_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2020_x_mitre_version_1.0" "objects_2020_x_mitre_deprecated_True" "objects_2021_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2021_id_relationship--cda9f3cf-01e4-41b3-8e45-4dda9fe5eb30" "objects_2021_target_ref_attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3" "objects_2021_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2021_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2021_description_Enterprise policies could be provisioned to devices to control the Wi-Fi access points that they are allowed to connect to." "objects_2021_created_2017-10-25T14:48:53.741Z" "objects_2021_type_relationship" "objects_2021_relationship_type_mitigates" "objects_2021_modified_2022-07-07T14:00:00.188Z" "objects_2021_spec_version_2.1" "objects_2021_x_mitre_attack_spec_version_2.1.0" "objects_2021_x_mitre_domains_0_mobile-attack" "objects_2021_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2021_x_mitre_version_1.0" "objects_2021_x_mitre_deprecated_True" "objects_2022_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2022_id_relationship--cdc1b090-1ca8-4fb3-a149-ca8c4e070250" "objects_2022_target_ref_attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b" "objects_2022_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2022_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2022_description_Application vetting services could provide further scrutiny to applications that request SMS-based permissions." "objects_2022_created_2020-09-11T15:14:34.071Z" "objects_2022_type_relationship" "objects_2022_relationship_type_mitigates" "objects_2022_modified_2022-07-07T14:00:00.188Z" "objects_2022_spec_version_2.1" "objects_2022_x_mitre_attack_spec_version_2.1.0" "objects_2022_x_mitre_domains_0_mobile-attack" "objects_2022_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2022_x_mitre_version_1.0" "objects_2022_x_mitre_deprecated_True" "objects_2023_source_ref_intrusion-set--049cef3b-22d5-4be6-b50c-9839c7a34fdd" "objects_2023_id_relationship--cedf4ccb-7fbb-45bb-aab4-a5ae676d9f48" "objects_2023_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2023_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2023_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2023_description_[Bouncing Golf](https://attack.mitre.org/groups/G0097) distributed malware as repackaged legitimate applications, with the malicious code in the `com.golf` package.(Citation: Trend Micro Bouncing Golf 2019)" "objects_2023_external_references_0_source_name_Trend Micro Bouncing Golf 2019" "objects_2023_external_references_0_description_E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign \u2018Bouncing Golf\u2019 Affects Middle East. Retrieved January 27, 2020." "objects_2023_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east/" "objects_2023_created_2020-01-27T16:55:40.101Z" "objects_2023_type_relationship" "objects_2023_relationship_type_uses" "objects_2023_modified_2022-07-07T14:00:00.188Z" "objects_2023_spec_version_2.1" "objects_2023_x_mitre_attack_spec_version_2.1.0" "objects_2023_x_mitre_domains_0_mobile-attack" "objects_2023_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2023_x_mitre_version_1.0" "objects_2023_x_mitre_deprecated_True" "objects_2024_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_2024_id_relationship--cf09dc99-25fc-4434-82b0-ee6696e87f91" "objects_2024_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2024_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2024_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2024_description_[HenBox](https://attack.mitre.org/software/S0544) has been distributed via third-party app stores.(Citation: Palo Alto HenBox)" "objects_2024_external_references_0_source_name_Palo Alto HenBox" "objects_2024_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_2024_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_2024_created_2020-12-17T20:15:22.395Z" "objects_2024_type_relationship" "objects_2024_relationship_type_uses" "objects_2024_modified_2022-07-07T14:00:00.188Z" "objects_2024_spec_version_2.1" "objects_2024_x_mitre_attack_spec_version_2.1.0" "objects_2024_x_mitre_domains_0_mobile-attack" "objects_2024_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2024_x_mitre_version_1.0" "objects_2024_x_mitre_deprecated_True" "objects_2025_source_ref_malware--f082fc59-0317-49cf-971f-a1b6296ebb52" "objects_2025_id_relationship--cf23f54e-214b-4780-891f-99ab6e023951" "objects_2025_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2025_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2025_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2025_description_Early [Triada](https://attack.mitre.org/software/S0424) variants were delivered through trojanized apps that were distributed via the Play Store.(Citation: Kaspersky Triada March 2016) " "objects_2025_external_references_0_description_Snow, J. (2016, March 3). Triada: organized crime on Android. Retrieved July 16, 2019." "objects_2025_external_references_0_source_name_Kaspersky Triada March 2016" "objects_2025_external_references_0_url_https://www.kaspersky.com/blog/triada-trojan/11481/" "objects_2025_created_2019-07-16T14:33:12.178Z" "objects_2025_type_relationship" "objects_2025_relationship_type_uses" "objects_2025_modified_2022-07-07T14:00:00.188Z" "objects_2025_spec_version_2.1" "objects_2025_x_mitre_attack_spec_version_2.1.0" "objects_2025_x_mitre_domains_0_mobile-attack" "objects_2025_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2025_x_mitre_version_1.0" "objects_2025_x_mitre_deprecated_True" "objects_2026_source_ref_malware--ff8e0c38-be47-410f-a2d3-a3d24a87c617" "objects_2026_id_relationship--cfda3abb-4372-4dbf-ace3-b8d5a0a6ad60" "objects_2026_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2026_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2026_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2026_description_[Gustuff](https://attack.mitre.org/software/S0406) was distributed via SMS phishing messages to numbers exfiltrated from compromised devices\u2019 contact lists. The phishing SMS messages are sent from the compromised device to the target device.(Citation: Talos Gustuff Apr 2019)" "objects_2026_external_references_0_description_Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019." "objects_2026_external_references_0_source_name_Talos Gustuff Apr 2019" "objects_2026_external_references_0_url_https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html" "objects_2026_created_2019-09-03T20:08:00.701Z" "objects_2026_type_relationship" "objects_2026_relationship_type_uses" "objects_2026_modified_2022-07-07T14:00:00.188Z" "objects_2026_spec_version_2.1" "objects_2026_x_mitre_attack_spec_version_2.1.0" "objects_2026_x_mitre_domains_0_mobile-attack" "objects_2026_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2026_x_mitre_version_1.0" "objects_2026_x_mitre_deprecated_True" "objects_2027_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2027_id_relationship--d110c0b7-7187-4a0e-99c4-f64d8f9a3f99" "objects_2027_target_ref_attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c" "objects_2027_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2027_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2027_description_Application vetting services could look for attempted usage of the Janus vulnerability." "objects_2027_created_2020-05-07T15:24:49.520Z" "objects_2027_type_relationship" "objects_2027_relationship_type_mitigates" "objects_2027_modified_2022-07-07T14:00:00.188Z" "objects_2027_spec_version_2.1" "objects_2027_x_mitre_attack_spec_version_2.1.0" "objects_2027_x_mitre_domains_0_mobile-attack" "objects_2027_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2027_x_mitre_version_1.0" "objects_2027_x_mitre_deprecated_True" "objects_2028_source_ref_malware--89c3dbf6-f281-41b7-be1d-a0e641014853" "objects_2028_id_relationship--d227781f-94c0-4ddd-9b2e-0f5eac142d5d" "objects_2028_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2028_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2028_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2028_description_[Concipit1248](https://attack.mitre.org/software/S0426) has been distributed through the App Store.(Citation: TrendMicro Coronavirus Updates)" "objects_2028_external_references_0_source_name_TrendMicro Coronavirus Updates" "objects_2028_external_references_0_description_T. Bao, J. Lu. (2020, April 14). Coronavirus Update App Leads to Project Spy Android and iOS Spyware. Retrieved April 24, 2020." "objects_2028_external_references_0_url_https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/" "objects_2028_created_2020-04-24T15:12:11.148Z" "objects_2028_type_relationship" "objects_2028_relationship_type_uses" "objects_2028_modified_2022-07-07T14:00:00.188Z" "objects_2028_spec_version_2.1" "objects_2028_x_mitre_attack_spec_version_2.1.0" "objects_2028_x_mitre_domains_0_mobile-attack" "objects_2028_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2028_x_mitre_version_1.0" "objects_2028_x_mitre_deprecated_True" "objects_2029_source_ref_malware--007ebf84-4e14-44c7-a5aa-151d5de85320" "objects_2029_id_relationship--d4efa617-fd66-46db-ab25-94f761e2279e" "objects_2029_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2029_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2029_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2029_description_[CarbonSteal](https://attack.mitre.org/software/S0529) has impersonated several apps, including official Google apps, chat apps, VPN apps, and popular games.(Citation: Lookout Uyghur Campaign)" "objects_2029_external_references_0_source_name_Lookout Uyghur Campaign" "objects_2029_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_2029_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_2029_created_2020-11-10T16:50:39.121Z" "objects_2029_type_relationship" "objects_2029_relationship_type_uses" "objects_2029_modified_2022-07-07T14:00:00.188Z" "objects_2029_spec_version_2.1" "objects_2029_x_mitre_attack_spec_version_2.1.0" "objects_2029_x_mitre_domains_0_mobile-attack" "objects_2029_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2029_x_mitre_version_1.0" "objects_2029_x_mitre_deprecated_True" "objects_2030_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2030_id_relationship--d5110dc7-ffcc-4c8b-ad09-8697ad2f64e3" "objects_2030_target_ref_attack-pattern--62adb627-f647-498e-b4cc-41499361bacb" "objects_2030_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2030_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2030_description_On Android, accessing device calendar data requires that the app hold the READ_CALENDAR permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access device calendar data, with extra scrutiny applied to any that do so." "objects_2030_created_2019-10-18T15:11:37.179Z" "objects_2030_type_relationship" "objects_2030_relationship_type_mitigates" "objects_2030_modified_2022-07-07T14:00:00.188Z" "objects_2030_spec_version_2.1" "objects_2030_x_mitre_attack_spec_version_2.1.0" "objects_2030_x_mitre_domains_0_mobile-attack" "objects_2030_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2030_x_mitre_version_1.0" "objects_2030_x_mitre_deprecated_True" "objects_2031_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2031_id_relationship--d625bbc3-317c-4f94-a1b6-d51d03d20109" "objects_2031_target_ref_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_2031_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2031_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2031_description_Application vetting techniques can scan for use of cleartext communication, insecure TrustManager implementations, and other potential network communication weaknesses. The Google Play Store now automatically assesses submitted applications for insecure TrustManager implementations.(Citation: Google-TrustManager)" "objects_2031_external_references_0_description_Google. (n.d.). How to fix apps containing an unsafe implementation of TrustManager. Retrieved December 24, 2016." "objects_2031_external_references_0_source_name_Google-TrustManager" "objects_2031_external_references_0_url_https://support.google.com/faqs/answer/6346016?hl=en" "objects_2031_created_2019-10-18T15:11:37.280Z" "objects_2031_type_relationship" "objects_2031_relationship_type_mitigates" "objects_2031_modified_2022-07-07T14:00:00.188Z" "objects_2031_spec_version_2.1" "objects_2031_x_mitre_attack_spec_version_2.1.0" "objects_2031_x_mitre_domains_0_mobile-attack" "objects_2031_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2031_x_mitre_version_1.0" "objects_2031_x_mitre_deprecated_True" "objects_2032_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2032_id_relationship--d6930d98-f8a2-4556-baa4-95275d3fa23d" "objects_2032_target_ref_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_2032_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2032_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2032_description_Starting with Android 4.2 the user must provide consent before applications can send SMS messages to premium numbers.(Citation: AndroidSecurity2014)" "objects_2032_external_references_0_description_Google. (2014). Android Security 2014 Year in Review. Retrieved December 12, 2016." "objects_2032_external_references_0_source_name_AndroidSecurity2014" "objects_2032_external_references_0_url_https://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2014_Report_Final.pdf" "objects_2032_modified_2022-07-07T14:00:00.188Z" "objects_2032_type_relationship" "objects_2032_created_2017-10-25T14:48:53.735Z" "objects_2032_relationship_type_mitigates" "objects_2032_spec_version_2.1" "objects_2032_x_mitre_attack_spec_version_2.1.0" "objects_2032_x_mitre_domains_0_mobile-attack" "objects_2032_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2032_x_mitre_version_1.0" "objects_2032_x_mitre_deprecated_True" "objects_2033_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2033_id_relationship--d7b22dc7-24fa-4036-befb-83fc2eeab6f6" "objects_2033_target_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_2033_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2033_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2033_description_On Android, accessing the device call log requires that the app hold the READ_CALL_LOG permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate." "objects_2033_created_2019-10-18T15:11:37.181Z" "objects_2033_type_relationship" "objects_2033_relationship_type_mitigates" "objects_2033_modified_2022-07-07T14:00:00.188Z" "objects_2033_spec_version_2.1" "objects_2033_x_mitre_attack_spec_version_2.1.0" "objects_2033_x_mitre_domains_0_mobile-attack" "objects_2033_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2033_x_mitre_version_1.0" "objects_2033_x_mitre_deprecated_True" "objects_2034_source_ref_malware--aef537ba-10c2-40ed-a57a-80b8508aada4" "objects_2034_id_relationship--d8e82c46-436c-4d1b-98be-0c95b13d7628" "objects_2034_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2034_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2034_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2034_description_[HenBox](https://attack.mitre.org/software/S0544) can monitor system logs.(Citation: Palo Alto HenBox)" "objects_2034_external_references_0_source_name_Palo Alto HenBox" "objects_2034_external_references_0_description_A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019." "objects_2034_external_references_0_url_https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/" "objects_2034_created_2020-12-17T20:15:22.447Z" "objects_2034_type_relationship" "objects_2034_relationship_type_uses" "objects_2034_modified_2022-07-07T14:00:00.188Z" "objects_2034_spec_version_2.1" "objects_2034_x_mitre_attack_spec_version_2.1.0" "objects_2034_x_mitre_domains_0_mobile-attack" "objects_2034_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2034_x_mitre_version_1.0" "objects_2034_x_mitre_deprecated_True" "objects_2035_source_ref_intrusion-set--afec6dc3-a18e-4b62-b1a4-5510e1a498d1" "objects_2035_id_relationship--d8ee0bd2-3f05-4fc0-854b-63ee92a293ca" "objects_2035_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2035_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2035_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2035_description_[Windshift](https://attack.mitre.org/groups/G0112) has distributed malicious apps via their own websites during Operation BULL.(Citation: BlackBerry Bahamut)" "objects_2035_external_references_0_source_name_BlackBerry Bahamut" "objects_2035_external_references_0_description_The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021." "objects_2035_external_references_0_url_https://www.blackberry.com/us/en/pdfviewer?file=/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-spark-bahamut.pdf" "objects_2035_created_2021-02-08T16:36:20.772Z" "objects_2035_type_relationship" "objects_2035_relationship_type_uses" "objects_2035_modified_2022-07-07T14:00:00.188Z" "objects_2035_spec_version_2.1" "objects_2035_x_mitre_attack_spec_version_2.1.0" "objects_2035_x_mitre_domains_0_mobile-attack" "objects_2035_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2035_x_mitre_version_1.0" "objects_2035_x_mitre_deprecated_True" "objects_2036_source_ref_malware--dfdac962-9461-47f0-a212-36dfce2a97e6" "objects_2036_id_relationship--d9aac094-c5b6-437a-b457-0febe85f0db8" "objects_2036_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2036_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2036_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2036_description_[WolfRAT](https://attack.mitre.org/software/S0489) has masqueraded as \u201cGoogle service\u201d, \u201cGooglePlay\u201d, and \u201cFlash update\u201d.(Citation: Talos-WolfRAT)" "objects_2036_external_references_0_source_name_Talos-WolfRAT" "objects_2036_external_references_0_description_W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020." "objects_2036_external_references_0_url_https://blog.talosintelligence.com/2020/05/the-wolf-is-back.html" "objects_2036_created_2020-07-20T13:27:33.424Z" "objects_2036_type_relationship" "objects_2036_relationship_type_uses" "objects_2036_modified_2022-07-07T14:00:00.188Z" "objects_2036_spec_version_2.1" "objects_2036_x_mitre_attack_spec_version_2.1.0" "objects_2036_x_mitre_domains_0_mobile-attack" "objects_2036_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2036_x_mitre_version_1.0" "objects_2036_x_mitre_deprecated_True" "objects_2037_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2037_id_relationship--db2bbb61-e931-4059-97c8-863dff44b708" "objects_2037_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_2037_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2037_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2037_description_Applications that attempt to register themselves as a device keyboard or request the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration should be closely scrutinized during the vetting process." "objects_2037_created_2019-10-18T15:33:18.624Z" "objects_2037_type_relationship" "objects_2037_relationship_type_mitigates" "objects_2037_modified_2022-07-07T14:00:00.188Z" "objects_2037_spec_version_2.1" "objects_2037_x_mitre_attack_spec_version_2.1.0" "objects_2037_x_mitre_domains_0_mobile-attack" "objects_2037_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2037_x_mitre_version_1.0" "objects_2037_x_mitre_deprecated_True" "objects_2038_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_2038_id_relationship--dc6eb5d7-acef-4eb4-bece-4e8c90c914dc" "objects_2038_target_ref_attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d" "objects_2038_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2038_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2038_description_Use of end-to-end encryption of voice calls and text messages \"provides another layer in the defense against potential information compromise by SS7 enabled eavesdropping.\"(Citation: CSRIC5-WG10-FinalReport)" "objects_2038_external_references_0_source_name_CSRIC5-WG10-FinalReport" "objects_2038_external_references_0_description_Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017." "objects_2038_external_references_0_url_https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf" "objects_2038_created_2017-10-25T14:48:53.733Z" "objects_2038_type_relationship" "objects_2038_relationship_type_mitigates" "objects_2038_modified_2022-07-07T14:00:00.188Z" "objects_2038_spec_version_2.1" "objects_2038_x_mitre_attack_spec_version_2.1.0" "objects_2038_x_mitre_domains_0_mobile-attack" "objects_2038_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2038_x_mitre_version_1.0" "objects_2038_x_mitre_deprecated_True" "objects_2039_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2039_id_relationship--dd4dc3ef-6076-4232-8cf4-f0efe9c0b2f3" "objects_2039_target_ref_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_2039_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2039_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2039_description_Application vetting services can detect unnecessary and potentially abused location permissions or API calls." "objects_2039_created_2020-09-11T15:04:14.823Z" "objects_2039_type_relationship" "objects_2039_relationship_type_mitigates" "objects_2039_modified_2022-07-07T14:00:00.188Z" "objects_2039_spec_version_2.1" "objects_2039_x_mitre_attack_spec_version_2.1.0" "objects_2039_x_mitre_domains_0_mobile-attack" "objects_2039_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2039_x_mitre_version_1.0" "objects_2039_x_mitre_deprecated_True" "objects_2040_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2040_id_relationship--dfc1f490-f8b9-4287-8c79-652d42f0a64a" "objects_2040_target_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_2040_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2040_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2040_modified_2022-07-07T14:00:00.188Z" "objects_2040_type_relationship" "objects_2040_created_2017-10-25T14:48:53.747Z" "objects_2040_relationship_type_mitigates" "objects_2040_spec_version_2.1" "objects_2040_x_mitre_attack_spec_version_2.1.0" "objects_2040_x_mitre_domains_0_mobile-attack" "objects_2040_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2040_x_mitre_version_1.0" "objects_2040_x_mitre_deprecated_True" "objects_2041_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2041_id_relationship--e2173c11-f4be-4d50-882f-f83758782109" "objects_2041_target_ref_attack-pattern--e083305c-49e7-4c87-aae8-9689213bffbe" "objects_2041_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2041_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2041_description_Application vetting services could detect invocations of methods that could be used to execute shell commands." "objects_2041_created_2020-12-16T20:16:08.070Z" "objects_2041_type_relationship" "objects_2041_relationship_type_mitigates" "objects_2041_modified_2022-07-07T14:00:00.188Z" "objects_2041_spec_version_2.1" "objects_2041_x_mitre_attack_spec_version_2.1.0" "objects_2041_x_mitre_domains_0_mobile-attack" "objects_2041_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2041_x_mitre_version_1.0" "objects_2041_x_mitre_deprecated_True" "objects_2042_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2042_id_relationship--e373111c-aa34-4686-a286-7c9b4267e246" "objects_2042_target_ref_attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31" "objects_2042_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2042_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2042_description_New OS releases frequently contain additional limitations or controls around device location access." "objects_2042_created_2020-09-30T14:48:16.522Z" "objects_2042_type_relationship" "objects_2042_relationship_type_mitigates" "objects_2042_modified_2022-07-07T14:00:00.188Z" "objects_2042_spec_version_2.1" "objects_2042_x_mitre_attack_spec_version_2.1.0" "objects_2042_x_mitre_domains_0_mobile-attack" "objects_2042_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2042_x_mitre_version_1.0" "objects_2042_x_mitre_deprecated_True" "objects_2043_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2043_id_relationship--e3940ca1-1a78-4440-97a3-c9990151cc6a" "objects_2043_target_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_2043_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2043_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2043_description_Decrease likelihood of successful privilege escalation attack." "objects_2043_created_2019-10-18T14:50:57.402Z" "objects_2043_type_relationship" "objects_2043_relationship_type_mitigates" "objects_2043_modified_2022-07-07T14:00:00.188Z" "objects_2043_spec_version_2.1" "objects_2043_x_mitre_attack_spec_version_2.1.0" "objects_2043_x_mitre_domains_0_mobile-attack" "objects_2043_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2043_x_mitre_version_1.0" "objects_2043_x_mitre_deprecated_True" "objects_2044_source_ref_malware--52c994fa-b6c8-45a8-9586-a4275cf19307" "objects_2044_id_relationship--e4e207ff-dd64-45e2-b876-ef5c3012bff2" "objects_2044_target_ref_attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad" "objects_2044_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2044_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2044_description_[Mandrake](https://attack.mitre.org/software/S0485) has communicated with the C2 server over TCP port 443.(Citation: Bitdefender Mandrake)" "objects_2044_external_references_0_source_name_Bitdefender Mandrake" "objects_2044_external_references_0_description_R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020." "objects_2044_external_references_0_url_https://www.bitdefender.com/files/News/CaseStudies/study/329/Bitdefender-PR-Whitepaper-Mandrake-creat4464-en-EN-interactive.pdf" "objects_2044_created_2020-07-15T20:20:59.310Z" "objects_2044_type_relationship" "objects_2044_relationship_type_uses" "objects_2044_modified_2022-07-07T14:00:00.188Z" "objects_2044_spec_version_2.1" "objects_2044_x_mitre_attack_spec_version_2.1.0" "objects_2044_x_mitre_domains_0_mobile-attack" "objects_2044_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2044_x_mitre_version_1.0" "objects_2044_x_mitre_deprecated_True" "objects_2045_source_ref_malware--a6228601-03f6-4949-ae22-c1087627a637" "objects_2045_id_relationship--e723fde7-7fa9-4ac8-a8ec-3fcbf097dbc8" "objects_2045_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2045_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2045_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2045_description_[Agent Smith](https://attack.mitre.org/software/S0440) has been distributed through the 9apps app store.(Citation: CheckPoint Agent Smith) " "objects_2045_external_references_0_source_name_CheckPoint Agent Smith" "objects_2045_external_references_0_description_A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020." "objects_2045_external_references_0_url_https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/" "objects_2045_created_2020-05-11T16:13:43.111Z" "objects_2045_type_relationship" "objects_2045_relationship_type_uses" "objects_2045_modified_2022-07-07T14:00:00.188Z" "objects_2045_spec_version_2.1" "objects_2045_x_mitre_attack_spec_version_2.1.0" "objects_2045_x_mitre_domains_0_mobile-attack" "objects_2045_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2045_x_mitre_version_1.0" "objects_2045_x_mitre_deprecated_True" "objects_2046_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2046_id_relationship--e88151f0-f880-452e-9a00-8f38d33c4412" "objects_2046_target_ref_attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e" "objects_2046_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2046_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2046_description_Applications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found." "objects_2046_created_2019-11-19T17:32:21.107Z" "objects_2046_type_relationship" "objects_2046_relationship_type_mitigates" "objects_2046_modified_2022-07-07T14:00:00.188Z" "objects_2046_spec_version_2.1" "objects_2046_x_mitre_attack_spec_version_2.1.0" "objects_2046_x_mitre_domains_0_mobile-attack" "objects_2046_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2046_x_mitre_version_1.0" "objects_2046_x_mitre_deprecated_True" "objects_2047_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2047_id_relationship--e8dac11f-8c51-4b80-9ada-db15ff5f1114" "objects_2047_target_ref_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_2047_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2047_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2047_description_Enterprises could perform app vetting before allowing apps to be installed on devices and search for abuse of accessibility features as part of the analysis, or otherwise use mobile app reputation services to search for known malicious apps." "objects_2047_created_2019-10-18T15:11:37.091Z" "objects_2047_type_relationship" "objects_2047_relationship_type_mitigates" "objects_2047_modified_2022-07-07T14:00:00.188Z" "objects_2047_spec_version_2.1" "objects_2047_x_mitre_attack_spec_version_2.1.0" "objects_2047_x_mitre_domains_0_mobile-attack" "objects_2047_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2047_x_mitre_version_1.0" "objects_2047_x_mitre_deprecated_True" "objects_2048_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2048_id_relationship--e9f2a3ac-162c-4fa0-b23a-0da5746344bc" "objects_2048_target_ref_attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6" "objects_2048_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2048_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2048_modified_2022-07-07T14:00:00.188Z" "objects_2048_type_relationship" "objects_2048_created_2019-10-18T14:50:57.437Z" "objects_2048_relationship_type_mitigates" "objects_2048_spec_version_2.1" "objects_2048_x_mitre_attack_spec_version_2.1.0" "objects_2048_x_mitre_domains_0_mobile-attack" "objects_2048_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2048_x_mitre_version_1.0" "objects_2048_x_mitre_deprecated_True" "objects_2049_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2049_id_relationship--ebbae7c2-fd79-4191-9369-e3b35283d4e1" "objects_2049_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2049_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2049_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2049_modified_2022-07-07T14:00:00.188Z" "objects_2049_type_relationship" "objects_2049_created_2019-10-18T15:11:37.266Z" "objects_2049_relationship_type_mitigates" "objects_2049_spec_version_2.1" "objects_2049_x_mitre_attack_spec_version_2.1.0" "objects_2049_x_mitre_domains_0_mobile-attack" "objects_2049_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2049_x_mitre_version_1.0" "objects_2049_x_mitre_deprecated_True" "objects_2050_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2050_id_relationship--ebdb9385-6311-4532-b021-2da48734aab7" "objects_2050_target_ref_attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6" "objects_2050_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2050_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2050_description_For applications running on Android 10 and higher devices, application developers can indicate that DEX code should always be executed directly from the application package.(Citation: Android 10 DEX)" "objects_2050_external_references_0_source_name_Android 10 DEX" "objects_2050_external_references_0_description_Android Developers. (n.d.). Run embedded DEX code directly from APK. Retrieved September 20, 2019." "objects_2050_external_references_0_url_https://developer.android.com/topic/security/dex.md" "objects_2050_modified_2022-07-07T14:00:00.188Z" "objects_2050_type_relationship" "objects_2050_created_2017-10-25T14:48:53.744Z" "objects_2050_relationship_type_mitigates" "objects_2050_spec_version_2.1" "objects_2050_x_mitre_attack_spec_version_2.1.0" "objects_2050_x_mitre_domains_0_mobile-attack" "objects_2050_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2050_x_mitre_version_1.0" "objects_2050_x_mitre_deprecated_True" "objects_2051_source_ref_malware--6e282bbf-5f32-476a-b879-ba77eec463c8" "objects_2051_id_relationship--ec2742c3-9e55-448c-9661-f98ad933e65a" "objects_2051_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2051_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2051_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2051_description_[Red Alert 2.0](https://attack.mitre.org/software/S0539) has masqueraded as legitimate media player, social media, and VPN applications.(Citation: Sophos Red Alert 2.0)" "objects_2051_external_references_0_source_name_Sophos Red Alert 2.0" "objects_2051_external_references_0_description_J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020." "objects_2051_external_references_0_url_https://news.sophos.com/en-us/2018/07/23/red-alert-2-0-android-trojan-targets-security-seekers/" "objects_2051_created_2020-12-14T14:52:03.140Z" "objects_2051_type_relationship" "objects_2051_relationship_type_uses" "objects_2051_modified_2022-07-07T14:00:00.188Z" "objects_2051_spec_version_2.1" "objects_2051_x_mitre_attack_spec_version_2.1.0" "objects_2051_x_mitre_domains_0_mobile-attack" "objects_2051_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2051_x_mitre_version_1.0" "objects_2051_x_mitre_deprecated_True" "objects_2052_source_ref_course-of-action--8220b57e-c400-4525-bf69-f8edc6b389a8" "objects_2052_id_relationship--ee0afd88-a0fc-4b1d-b047-9b9bf04d36fe" "objects_2052_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_2052_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2052_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2052_description_This mitigation may not always be effective depending on the method used to encrypt network traffic. In some cases, an adversary may be able to capture traffic before it is encrypted." "objects_2052_modified_2022-07-07T14:00:00.188Z" "objects_2052_type_relationship" "objects_2052_created_2017-10-25T14:48:53.737Z" "objects_2052_relationship_type_mitigates" "objects_2052_spec_version_2.1" "objects_2052_x_mitre_attack_spec_version_2.1.0" "objects_2052_x_mitre_domains_0_mobile-attack" "objects_2052_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2052_x_mitre_version_1.0" "objects_2052_x_mitre_deprecated_True" "objects_2053_source_ref_course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58" "objects_2053_id_relationship--ef7f8f51-6aea-4f5c-9c96-f353a14cf062" "objects_2053_target_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_2053_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2053_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2053_modified_2022-07-07T14:00:00.188Z" "objects_2053_type_relationship" "objects_2053_created_2017-10-25T14:48:53.745Z" "objects_2053_relationship_type_mitigates" "objects_2053_spec_version_2.1" "objects_2053_x_mitre_attack_spec_version_2.1.0" "objects_2053_x_mitre_domains_0_mobile-attack" "objects_2053_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2053_x_mitre_version_1.0" "objects_2053_x_mitre_deprecated_True" "objects_2054_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2054_id_relationship--ef977f9e-c505-449f-883a-915c1de1015f" "objects_2054_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2054_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2054_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2054_description_On iOS, the `allowEnterpriseAppTrust` and `allowEnterpriseAppTrustModification` configuration profile restrictions can be used to prevent users from installing apps signed using enterprise distribution keys." "objects_2054_created_2018-10-17T00:14:20.652Z" "objects_2054_type_relationship" "objects_2054_relationship_type_mitigates" "objects_2054_modified_2022-07-07T14:00:00.188Z" "objects_2054_spec_version_2.1" "objects_2054_x_mitre_attack_spec_version_2.1.0" "objects_2054_x_mitre_domains_0_mobile-attack" "objects_2054_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2054_x_mitre_version_1.0" "objects_2054_x_mitre_deprecated_True" "objects_2055_source_ref_malware--56660521-6db4-4e5a-a927-464f22954b7c" "objects_2055_id_relationship--efcfe1a3-3351-4b4f-ae36-101f103b4798" "objects_2055_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2055_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2055_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2055_description_[X-Agent for Android](https://attack.mitre.org/software/S0314) was placed in a repackaged version of an application used by Ukrainian artillery forces.(Citation: CrowdStrike-Android)" "objects_2055_external_references_0_source_name_CrowdStrike-Android" "objects_2055_external_references_0_description_CrowdStrike Global Intelligence Team. (2016). Use of Fancy Bear Android Malware in Tracking of Ukrainian FIeld Artillery Units. Retrieved February 6, 2017." "objects_2055_external_references_0_url_https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf" "objects_2055_created_2017-12-14T16:46:06.044Z" "objects_2055_type_relationship" "objects_2055_relationship_type_uses" "objects_2055_modified_2022-07-07T14:00:00.188Z" "objects_2055_spec_version_2.1" "objects_2055_x_mitre_attack_spec_version_2.1.0" "objects_2055_x_mitre_domains_0_mobile-attack" "objects_2055_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2055_x_mitre_version_1.0" "objects_2055_x_mitre_deprecated_True" "objects_2056_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_2056_id_relationship--f0a81b31-97ce-403b-90e9-7a910a93a31f" "objects_2056_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2056_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2056_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2056_description_[Android/Chuli.A](https://attack.mitre.org/software/S0304) was delivered via a spearphishing message containing a malicious Android application as an attachment.(Citation: Kaspersky-WUC)" "objects_2056_external_references_0_source_name_Kaspersky-WUC" "objects_2056_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_2056_external_references_0_url_https://securelist.com/android-trojan-found-in-targeted-attack-58/35552/" "objects_2056_created_2018-10-17T00:14:20.652Z" "objects_2056_type_relationship" "objects_2056_relationship_type_uses" "objects_2056_modified_2022-07-07T14:00:00.188Z" "objects_2056_spec_version_2.1" "objects_2056_x_mitre_attack_spec_version_2.1.0" "objects_2056_x_mitre_domains_0_mobile-attack" "objects_2056_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2056_x_mitre_version_1.0" "objects_2056_x_mitre_deprecated_True" "objects_2057_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2057_id_relationship--f0becdb8-2772-4848-be23-8e821067ada5" "objects_2057_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_2057_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2057_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2057_description_Ensure applications do not store data in an insecure fashion, such as in unprotected external storage, without acknowledging the risk that the data can potentially be accessed or modified by other applications." "objects_2057_created_2019-10-18T15:33:18.628Z" "objects_2057_type_relationship" "objects_2057_relationship_type_mitigates" "objects_2057_modified_2022-07-07T14:00:00.188Z" "objects_2057_spec_version_2.1" "objects_2057_x_mitre_attack_spec_version_2.1.0" "objects_2057_x_mitre_domains_0_mobile-attack" "objects_2057_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2057_x_mitre_version_1.0" "objects_2057_x_mitre_deprecated_True" "objects_2058_source_ref_malware--037f44f0-0c07-4c7f-b40e-0325b5b228a9" "objects_2058_id_relationship--f101c454-affd-432b-b08b-a8dd7513684a" "objects_2058_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2058_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2058_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2058_description_[Cerberus](https://attack.mitre.org/software/S0480) has been delivered to the device via websites that prompt the user to \u201c[\u2026] install Adobe Flash Player\u201d and then downloads the malicious APK to the device.(Citation: Forbes Cerberus)" "objects_2058_external_references_0_source_name_Forbes Cerberus" "objects_2058_external_references_0_description_Z. Doffman. (2019, August 16). Warning As Devious New Android Malware Hides In Fake Adobe Flash Player Installations (Updated). Retrieved June 26, 2020." "objects_2058_external_references_0_url_https://www.forbes.com/sites/zakdoffman/2019/08/16/dangerous-new-android-trojan-hides-from-malware-researchers-and-taunts-them-on-twitter/#1563fef26d9c" "objects_2058_created_2020-06-26T15:32:25.140Z" "objects_2058_type_relationship" "objects_2058_relationship_type_uses" "objects_2058_modified_2022-07-07T14:00:00.188Z" "objects_2058_spec_version_2.1" "objects_2058_x_mitre_attack_spec_version_2.1.0" "objects_2058_x_mitre_domains_0_mobile-attack" "objects_2058_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2058_x_mitre_version_1.0" "objects_2058_x_mitre_deprecated_True" "objects_2059_source_ref_malware--0b9c5d11-651a-4378-b129-5c584d0242c5" "objects_2059_id_relationship--f4f983cc-1934-4b56-b5ec-d84ed3a9b40b" "objects_2059_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2059_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2059_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2059_description_[GoldenEagle](https://attack.mitre.org/software/S0551) has inserted trojan functionality into legitimate apps, including popular apps within the Uyghur community, VPNs, instant messaging apps, social networking, games, adult media, and Google searching.(Citation: Lookout Uyghur Campaign)" "objects_2059_external_references_0_source_name_Lookout Uyghur Campaign" "objects_2059_external_references_0_description_A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020." "objects_2059_external_references_0_url_https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf" "objects_2059_created_2020-12-24T22:04:27.920Z" "objects_2059_type_relationship" "objects_2059_relationship_type_uses" "objects_2059_modified_2022-07-07T14:00:00.188Z" "objects_2059_spec_version_2.1" "objects_2059_x_mitre_attack_spec_version_2.1.0" "objects_2059_x_mitre_domains_0_mobile-attack" "objects_2059_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2059_x_mitre_version_1.0" "objects_2059_x_mitre_deprecated_True" "objects_2060_source_ref_malware--c91cec55-634c-4670-ba10-2dc7ceb28e98" "objects_2060_id_relationship--f7d4d71b-d648-433a-90cb-bd758f25b715" "objects_2060_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2060_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2060_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2060_description_[Exobot](https://attack.mitre.org/software/S0522) has used names like WhatsApp and Netflix.(Citation: Threat Fabric Exobot)" "objects_2060_external_references_0_source_name_Threat Fabric Exobot" "objects_2060_external_references_0_description_Threat Fabric. (2017, February). Exobot - Android banking Trojan on the rise. Retrieved October 29, 2020." "objects_2060_external_references_0_url_https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise.html" "objects_2060_created_2020-10-29T17:48:27.480Z" "objects_2060_type_relationship" "objects_2060_relationship_type_uses" "objects_2060_modified_2022-07-07T14:00:00.188Z" "objects_2060_spec_version_2.1" "objects_2060_x_mitre_attack_spec_version_2.1.0" "objects_2060_x_mitre_domains_0_mobile-attack" "objects_2060_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2060_x_mitre_version_1.0" "objects_2060_x_mitre_deprecated_True" "objects_2061_source_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_2061_id_relationship--f8277cd5-b14a-4b59-9f29-8ce24dfbdf5e" "objects_2061_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2061_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2061_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2061_description_[ZergHelper](https://attack.mitre.org/software/S0287) apparently evaded Apple's app review process by performing different behaviors for users from different physical locations (e.g. performing differently for users in China versus outside of China), which could have bypassed the review process depending on the country from which it was performed.(Citation: Xiao-ZergHelper)" "objects_2061_external_references_0_source_name_Xiao-ZergHelper" "objects_2061_external_references_0_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_2061_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_2061_created_2018-10-17T00:14:20.652Z" "objects_2061_type_relationship" "objects_2061_relationship_type_uses" "objects_2061_modified_2022-07-07T14:00:00.188Z" "objects_2061_spec_version_2.1" "objects_2061_x_mitre_attack_spec_version_2.1.0" "objects_2061_x_mitre_domains_0_mobile-attack" "objects_2061_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2061_x_mitre_version_1.0" "objects_2061_x_mitre_deprecated_True" "objects_2062_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2062_id_relationship--f97e3b5d-531d-4d06-b876-baf9a43aa01c" "objects_2062_target_ref_attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38" "objects_2062_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2062_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2062_description_Apple regularly provides security updates for known OS vulnerabilities." "objects_2062_created_2020-06-24T17:33:50.610Z" "objects_2062_type_relationship" "objects_2062_relationship_type_mitigates" "objects_2062_modified_2022-07-07T14:00:00.188Z" "objects_2062_spec_version_2.1" "objects_2062_x_mitre_attack_spec_version_2.1.0" "objects_2062_x_mitre_domains_0_mobile-attack" "objects_2062_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2062_x_mitre_version_1.0" "objects_2062_x_mitre_deprecated_True" "objects_2063_source_ref_course-of-action--25dc1ce8-eb55-4333-ae30-a7cb4f5894a1" "objects_2063_id_relationship--fab8c40d-b934-4ee0-8e83-f017af2e347a" "objects_2063_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2063_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2063_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2063_description_Application developers should be discouraged from writing sensitive data to the system log in production apps." "objects_2063_modified_2022-07-07T14:00:00.188Z" "objects_2063_type_relationship" "objects_2063_created_2017-10-25T14:48:53.739Z" "objects_2063_relationship_type_mitigates" "objects_2063_spec_version_2.1" "objects_2063_x_mitre_attack_spec_version_2.1.0" "objects_2063_x_mitre_domains_0_mobile-attack" "objects_2063_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2063_x_mitre_version_1.0" "objects_2063_x_mitre_deprecated_True" "objects_2064_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2064_id_relationship--fad69d13-2611-43b7-ad06-55489011f182" "objects_2064_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_2064_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2064_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2064_description_App vetting procedures can search for apps that use the android.os.Build class, but these procedures could potentially be evaded and are likely not practical in this case, as many apps are likely to use this functionality as part of their legitimate behavior." "objects_2064_created_2019-10-18T15:11:37.258Z" "objects_2064_type_relationship" "objects_2064_relationship_type_mitigates" "objects_2064_modified_2022-07-07T14:00:00.188Z" "objects_2064_spec_version_2.1" "objects_2064_x_mitre_attack_spec_version_2.1.0" "objects_2064_x_mitre_domains_0_mobile-attack" "objects_2064_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2064_x_mitre_version_1.0" "objects_2064_x_mitre_deprecated_True" "objects_2065_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2065_id_relationship--fe3ac79b-8bd2-4d95-805c-6a38de402add" "objects_2065_target_ref_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_2065_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2065_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2065_description_iOS 10.3 and higher add an additional step for users to install new trusted CA certificates to make it more difficult to trick users into installing them. On Android, apps that target compatibility with Android 7 and higher (API Level 24) default to only trusting CA certificates that are bundled with the operating system, not CA certificates that are added by the user or administrator, hence decreasing their susceptibility to successful adversary-in-the-middle attack.(Citation: Symantec-iOSProfile2)(Citation: Android-TrustedCA)" "objects_2065_external_references_0_source_name_Symantec-iOSProfile2" "objects_2065_external_references_0_description_Brian Duckering. (2017, March 27). Apple iOS 10.3 Finally Battles Malicious Profiles. Retrieved September 24, 2018." "objects_2065_external_references_0_url_https://www.symantec.com/connect/blogs/apple-ios-103-finally-battles-malicious-profiles" "objects_2065_external_references_1_source_name_Android-TrustedCA" "objects_2065_external_references_1_description_Chad Brubaker. (2016, July 7). Changes to Trusted Certificate Authorities in Android Nougat. Retrieved September 24, 2018." "objects_2065_external_references_1_url_https://android-developers.googleblog.com/2016/07/changes-to-trusted-certificate.html" "objects_2065_modified_2022-07-07T14:00:00.188Z" "objects_2065_type_relationship" "objects_2065_created_2018-10-17T00:14:20.652Z" "objects_2065_relationship_type_mitigates" "objects_2065_spec_version_2.1" "objects_2065_x_mitre_attack_spec_version_2.1.0" "objects_2065_x_mitre_domains_0_mobile-attack" "objects_2065_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2065_x_mitre_version_1.0" "objects_2065_x_mitre_deprecated_True" "objects_2066_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2066_id_relationship--fedd60df-8d71-4799-8e94-73a3fd9700de" "objects_2066_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_2066_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2066_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2066_description_Application vetting may be able to identify the presence of exploit code within applications." "objects_2066_created_2019-10-18T15:11:37.260Z" "objects_2066_type_relationship" "objects_2066_relationship_type_mitigates" "objects_2066_modified_2022-07-07T14:00:00.188Z" "objects_2066_spec_version_2.1" "objects_2066_x_mitre_attack_spec_version_2.1.0" "objects_2066_x_mitre_domains_0_mobile-attack" "objects_2066_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2066_x_mitre_version_1.0" "objects_2066_x_mitre_deprecated_True" "objects_2067_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2067_id_relationship--ff628c18-8abf-4add-a055-d38031ca940d" "objects_2067_target_ref_attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5" "objects_2067_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2067_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2067_description_Security updates typically provide patches for vulnerabilities that enable device rooting." "objects_2067_created_2020-05-04T13:49:35.242Z" "objects_2067_type_relationship" "objects_2067_relationship_type_mitigates" "objects_2067_modified_2022-07-07T14:00:00.188Z" "objects_2067_spec_version_2.1" "objects_2067_x_mitre_attack_spec_version_2.1.0" "objects_2067_x_mitre_domains_0_mobile-attack" "objects_2067_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2067_x_mitre_version_1.0" "objects_2067_x_mitre_deprecated_True" "objects_2068_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2068_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2068_source_ref_malware--3271c107-92c4-442e-9506-e76d62230ee8" "objects_2068_target_ref_attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8" "objects_2068_external_references_0_source_name_Lookout Desert Scorpion" "objects_2068_external_references_0_url_https://blog.lookout.com/desert-scorpion-google-play" "objects_2068_external_references_0_description_A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020." "objects_2068_description_[Desert Scorpion](https://attack.mitre.org/software/S0505) can upload attacker-specified files to the C2 server.(Citation: Lookout Desert Scorpion)" "objects_2068_relationship_type_uses" "objects_2068_id_relationship--1fe811ec-9ca8-4956-9a94-02748f03ad8a" "objects_2068_type_relationship" "objects_2068_modified_2021-04-29T14:49:39.188Z" "objects_2068_created_2020-09-11T14:54:16.546Z" "objects_2068_spec_version_2.1" "objects_2068_x_mitre_attack_spec_version_2.1.0" "objects_2068_x_mitre_domains_0_mobile-attack" "objects_2068_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2068_x_mitre_version_1.0" "objects_2068_x_mitre_deprecated_True" "objects_2069_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2069_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2069_source_ref_attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e" "objects_2069_target_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_2069_relationship_type_revoked-by" "objects_2069_id_relationship--39f46abc-d9e3-463d-9340-3bc8334af314" "objects_2069_type_relationship" "objects_2069_modified_2021-04-29T14:49:39.188Z" "objects_2069_created_2020-10-23T15:05:40.967Z" "objects_2069_spec_version_2.1" "objects_2069_x_mitre_attack_spec_version_2.1.0" "objects_2069_x_mitre_domains_0_mobile-attack" "objects_2069_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2069_x_mitre_version_1.0" "objects_2069_x_mitre_deprecated_True" "objects_2070_id_relationship--3c2d7ccc-5980-4012-8aab-64979bcd0ea6" "objects_2070_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2070_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2070_type_relationship" "objects_2070_modified_2021-04-29T14:49:39.188Z" "objects_2070_created_2017-10-25T14:48:53.745Z" "objects_2070_source_ref_course-of-action--e944670c-d03a-4e93-a21c-b3d4c53ec4c9" "objects_2070_relationship_type_mitigates" "objects_2070_target_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_2070_spec_version_2.1" "objects_2070_x_mitre_attack_spec_version_2.1.0" "objects_2070_x_mitre_domains_0_mobile-attack" "objects_2070_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2070_x_mitre_version_1.0" "objects_2070_x_mitre_deprecated_True" "objects_2071_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2071_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2071_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_2071_target_ref_attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6" "objects_2071_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_2071_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_2071_external_references_0_source_name_Lookout-Dendroid" "objects_2071_description_[Dendroid](https://attack.mitre.org/software/S0301) can take pictures using the phone\u2019s camera as well as record video.(Citation: Lookout-Dendroid)" "objects_2071_relationship_type_uses" "objects_2071_id_relationship--4574a342-ab80-48b6-82d4-da3ea3536590" "objects_2071_type_relationship" "objects_2071_modified_2020-10-27T14:49:39.188Z" "objects_2071_created_2019-08-09T17:50:01.350Z" "objects_2071_spec_version_2.1" "objects_2071_x_mitre_attack_spec_version_2.1.0" "objects_2071_x_mitre_domains_0_mobile-attack" "objects_2071_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2071_x_mitre_version_1.0" "objects_2071_x_mitre_deprecated_True" "objects_2072_id_relationship--ed06f5dc-9d02-4896-a0a3-2f457c64f125" "objects_2072_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2072_description_[Dendroid](https://attack.mitre.org/software/S0301) can record audio using the device microphone.(Citation: Lookout-Dendroid)" "objects_2072_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2072_external_references_0_url_https://blog.lookout.com/blog/2014/03/06/dendroid/" "objects_2072_external_references_0_description_Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016." "objects_2072_external_references_0_source_name_Lookout-Dendroid" "objects_2072_source_ref_malware--317a2c10-d489-431e-b6b2-f0251fddc88e" "objects_2072_relationship_type_uses" "objects_2072_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_2072_type_relationship" "objects_2072_modified_2020-10-27T14:49:39.188Z" "objects_2072_created_2017-12-14T16:46:06.044Z" "objects_2072_spec_version_2.1" "objects_2072_x_mitre_attack_spec_version_2.1.0" "objects_2072_x_mitre_domains_0_mobile-attack" "objects_2072_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2072_x_mitre_version_1.0" "objects_2072_x_mitre_deprecated_True" "objects_2073_type_relationship" "objects_2073_target_ref_attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77" "objects_2073_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2073_created_2019-10-16T13:24:49.059Z" "objects_2073_id_relationship--8697ff31-22fa-4e9c-8961-0383086adf68" "objects_2073_source_ref_attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05" "objects_2073_modified_2020-03-31T14:49:39.188Z" "objects_2073_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2073_relationship_type_revoked-by" "objects_2073_spec_version_2.1" "objects_2073_x_mitre_attack_spec_version_2.1.0" "objects_2073_x_mitre_domains_0_mobile-attack" "objects_2073_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2073_x_mitre_version_1.0" "objects_2073_x_mitre_deprecated_True" "objects_2074_type_relationship" "objects_2074_target_ref_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_2074_description_Enterprises could potentially vet apps before allowing their use on devices, and carefully scrutinize apps that declare a BroadcastReceiver containing an intent-filter for BOOT_COMPLETED. Unfortunately this is likely not practical due to the vast number of apps with this behavior." "objects_2074_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2074_created_2019-10-18T15:11:37.247Z" "objects_2074_id_relationship--e8f2d694-cf28-4ac7-bd15-c298c07c7c22" "objects_2074_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2074_modified_2020-03-31T14:49:39.188Z" "objects_2074_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2074_relationship_type_mitigates" "objects_2074_spec_version_2.1" "objects_2074_x_mitre_attack_spec_version_2.1.0" "objects_2074_x_mitre_domains_0_mobile-attack" "objects_2074_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2074_x_mitre_version_1.0" "objects_2074_x_mitre_deprecated_True" "objects_2075_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2075_description_Application developers should use device-provided credential storage mechanisms such as Android's KeyStore or iOS's KeyChain. These can prevent credentials from being exposed to an adversary." "objects_2075_x_mitre_old_attack_id_MOB-M1008" "objects_2075_type_course-of-action" "objects_2075_name_Use Device-Provided Credential Storage" "objects_2075_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2075_id_course-of-action--d2a199d2-dfea-4d0c-987d-6195ed17be9c" "objects_2075_external_references_0_external_id_M1008" "objects_2075_external_references_0_source_name_mitre-attack" "objects_2075_external_references_0_url_https://attack.mitre.org/mitigations/M1008" "objects_2075_modified_2019-10-23T14:19:37.289Z" "objects_2075_x_mitre_version_1.0" "objects_2075_created_2017-10-25T14:48:51.053Z" "objects_2075_spec_version_2.1" "objects_2075_x_mitre_attack_spec_version_2.1.0" "objects_2075_x_mitre_domains_0_mobile-attack" "objects_2075_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2075_x_mitre_deprecated_True" "objects_2076_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2076_description_[Android Overlay Malware](https://attack.mitre.org/software/S0296) is malware that was used in a 2016 campaign targeting European countries. The malware attempted to trick users into providing banking credentials. (Citation: FireEye-AndroidOverlay)" "objects_2076_x_mitre_old_attack_id_MOB-S0012" "objects_2076_id_malware--b6d3657a-2d6a-400f-8b7e-4d60391aa1f7" "objects_2076_external_references_0_external_id_S0296" "objects_2076_external_references_0_source_name_mitre-mobile-attack" "objects_2076_external_references_0_url_https://attack.mitre.org/software/S0296" "objects_2076_external_references_1_source_name_Android Overlay Malware" "objects_2076_external_references_1_description_(Citation: FireEye-AndroidOverlay)" "objects_2076_external_references_2_source_name_FireEye-AndroidOverlay" "objects_2076_external_references_2_description_Wu Zhou et al. (2016, June 28). THE LATEST ANDROID OVERLAY MALWARE SPREADING VIA SMS PHISHING IN EUROPE. Retrieved December 21, 2016." "objects_2076_external_references_2_url_https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay-malware-spreading-in-europe.html" "objects_2076_x_mitre_version_1.1" "objects_2076_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2076_modified_2019-10-23T14:19:37.289Z" "objects_2076_type_malware" "objects_2076_created_2017-10-25T14:48:39.945Z" "objects_2076_x_mitre_platforms_0_Android" "objects_2076_name_Android Overlay Malware" "objects_2076_x_mitre_aliases_0_Android Overlay Malware" "objects_2076_spec_version_2.1" "objects_2076_x_mitre_attack_spec_version_2.1.0" "objects_2076_x_mitre_domains_0_mobile-attack" "objects_2076_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2076_is_family_True" "objects_2076_x_mitre_deprecated_True" "objects_2077_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2077_modified_2019-10-23T14:19:37.289Z" "objects_2077_type_relationship" "objects_2077_created_2017-10-25T14:48:53.742Z" "objects_2077_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2077_id_relationship--00b20e5c-5f52-4a07-bfec-e30872e793e3" "objects_2077_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2077_relationship_type_mitigates" "objects_2077_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_2077_spec_version_2.1" "objects_2077_x_mitre_attack_spec_version_2.1.0" "objects_2077_x_mitre_domains_0_mobile-attack" "objects_2077_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2077_x_mitre_version_1.0" "objects_2077_x_mitre_deprecated_True" "objects_2078_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2078_description_App vetting procedures can search for apps that use the android.os.Build class, but these procedures could potentially be evaded and are likely not practical in this case, as many apps are likely to use this functionality as part of their legitimate behavior." "objects_2078_type_relationship" "objects_2078_created_2017-10-25T14:48:53.744Z" "objects_2078_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2078_id_relationship--05c87985-4f8a-4a38-b1cd-ab01f0a628ed" "objects_2078_modified_2019-10-23T14:19:37.289Z" "objects_2078_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2078_relationship_type_mitigates" "objects_2078_target_ref_attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05" "objects_2078_spec_version_2.1" "objects_2078_x_mitre_attack_spec_version_2.1.0" "objects_2078_x_mitre_domains_0_mobile-attack" "objects_2078_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2078_x_mitre_version_1.0" "objects_2078_x_mitre_deprecated_True" "objects_2079_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2079_description_Enterprises could perform app vetting before allowing apps to be installed on devices and search for abuse of accessibility features as part of the analysis, or otherwise use mobile app reputation services to search for known malicious apps." "objects_2079_type_relationship" "objects_2079_id_relationship--077da2d7-0913-4040-b25e-2f6913ed4ea0" "objects_2079_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2079_created_2017-10-25T14:48:53.734Z" "objects_2079_modified_2019-10-23T14:19:37.289Z" "objects_2079_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2079_relationship_type_mitigates" "objects_2079_target_ref_attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a" "objects_2079_spec_version_2.1" "objects_2079_x_mitre_attack_spec_version_2.1.0" "objects_2079_x_mitre_domains_0_mobile-attack" "objects_2079_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2079_x_mitre_version_1.0" "objects_2079_x_mitre_deprecated_True" "objects_2080_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2080_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_2080_type_relationship" "objects_2080_created_2017-10-25T14:48:53.741Z" "objects_2080_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2080_id_relationship--0818895a-0d6d-47cc-ad34-a09bdb76a81b" "objects_2080_modified_2019-10-23T14:19:37.289Z" "objects_2080_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2080_relationship_type_mitigates" "objects_2080_target_ref_attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a" "objects_2080_spec_version_2.1" "objects_2080_x_mitre_attack_spec_version_2.1.0" "objects_2080_x_mitre_domains_0_mobile-attack" "objects_2080_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2080_x_mitre_version_1.0" "objects_2080_x_mitre_deprecated_True" "objects_2081_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2081_modified_2019-10-23T14:19:37.289Z" "objects_2081_type_relationship" "objects_2081_created_2017-10-25T14:48:53.747Z" "objects_2081_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2081_id_relationship--095f71ad-9a93-45ce-9b77-a101f6c894de" "objects_2081_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2081_relationship_type_mitigates" "objects_2081_target_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_2081_spec_version_2.1" "objects_2081_x_mitre_attack_spec_version_2.1.0" "objects_2081_x_mitre_domains_0_mobile-attack" "objects_2081_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2081_x_mitre_version_1.0" "objects_2081_x_mitre_deprecated_True" "objects_2082_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2082_modified_2019-10-23T14:19:37.289Z" "objects_2082_type_relationship" "objects_2082_created_2017-10-25T14:48:53.737Z" "objects_2082_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2082_id_relationship--15a2702e-4e49-4255-909d-bbf94abfd1d7" "objects_2082_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2082_relationship_type_mitigates" "objects_2082_target_ref_attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6" "objects_2082_spec_version_2.1" "objects_2082_x_mitre_attack_spec_version_2.1.0" "objects_2082_x_mitre_domains_0_mobile-attack" "objects_2082_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2082_x_mitre_version_1.0" "objects_2082_x_mitre_deprecated_True" "objects_2083_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2083_description_Enterprises performing application vetting could search for applications that declare the RECEIVE_SMS permission and scrutinize them closely." "objects_2083_type_relationship" "objects_2083_created_2017-10-25T14:48:53.739Z" "objects_2083_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2083_id_relationship--16f55053-285d-411d-881c-6f8c1bdef8d7" "objects_2083_modified_2019-10-23T14:19:37.289Z" "objects_2083_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2083_relationship_type_mitigates" "objects_2083_target_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_2083_spec_version_2.1" "objects_2083_x_mitre_attack_spec_version_2.1.0" "objects_2083_x_mitre_domains_0_mobile-attack" "objects_2083_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2083_x_mitre_version_1.0" "objects_2083_x_mitre_deprecated_True" "objects_2084_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2084_modified_2019-10-23T14:19:37.289Z" "objects_2084_type_relationship" "objects_2084_created_2017-10-25T14:48:53.737Z" "objects_2084_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2084_id_relationship--2388ba94-8e49-40d0-a697-eea948e6cfb6" "objects_2084_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2084_relationship_type_mitigates" "objects_2084_target_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_2084_spec_version_2.1" "objects_2084_x_mitre_attack_spec_version_2.1.0" "objects_2084_x_mitre_domains_0_mobile-attack" "objects_2084_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2084_x_mitre_version_1.0" "objects_2084_x_mitre_deprecated_True" "objects_2085_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2085_description_[RedDrop](https://attack.mitre.org/software/S0326) contains malicious embedded files, which are compiled to initiate the malicious functionality." "objects_2085_type_relationship" "objects_2085_created_2018-10-17T00:14:20.652Z" "objects_2085_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2085_id_relationship--2979b822-3f0e-4cd6-b2dc-ea6da72008ed" "objects_2085_external_references_0_source_name_Wandera-RedDrop" "objects_2085_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_2085_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_2085_modified_2019-10-23T14:19:37.289Z" "objects_2085_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_2085_relationship_type_uses" "objects_2085_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_2085_spec_version_2.1" "objects_2085_x_mitre_attack_spec_version_2.1.0" "objects_2085_x_mitre_domains_0_mobile-attack" "objects_2085_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2085_x_mitre_version_1.0" "objects_2085_x_mitre_deprecated_True" "objects_2086_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2086_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_2086_type_relationship" "objects_2086_created_2017-10-25T14:48:53.740Z" "objects_2086_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2086_id_relationship--2bd272ca-8a14-42cd-9664-6cc6f7451e42" "objects_2086_modified_2019-10-23T14:19:37.289Z" "objects_2086_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2086_relationship_type_mitigates" "objects_2086_target_ref_attack-pattern--0c71033e-401e-4b97-9309-7a7c95e43a5d" "objects_2086_spec_version_2.1" "objects_2086_x_mitre_attack_spec_version_2.1.0" "objects_2086_x_mitre_domains_0_mobile-attack" "objects_2086_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2086_x_mitre_version_1.0" "objects_2086_x_mitre_deprecated_True" "objects_2087_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2087_description_[RedDrop](https://attack.mitre.org/software/S0326) downloads additional components (APKs, JAR files) from different C&C servers and stores them dynamically into the device\u2019s memory, allowing the adversary to execute additional malicious APKs without having to embed them straight into the initial sample." "objects_2087_type_relationship" "objects_2087_created_2018-10-17T00:14:20.652Z" "objects_2087_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2087_id_relationship--2c48d774-99b0-4d69-b485-1a8ef1f23808" "objects_2087_external_references_0_source_name_Wandera-RedDrop" "objects_2087_external_references_0_description_Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved September 18, 2018." "objects_2087_external_references_0_url_https://www.wandera.com/reddrop-malware/" "objects_2087_modified_2019-10-23T14:19:37.289Z" "objects_2087_source_ref_malware--9ed10b5a-ff20-467f-bf2f-d3fbf763e381" "objects_2087_relationship_type_uses" "objects_2087_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_2087_spec_version_2.1" "objects_2087_x_mitre_attack_spec_version_2.1.0" "objects_2087_x_mitre_domains_0_mobile-attack" "objects_2087_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2087_x_mitre_version_1.0" "objects_2087_x_mitre_deprecated_True" "objects_2088_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2088_modified_2019-10-23T14:19:37.289Z" "objects_2088_type_relationship" "objects_2088_id_relationship--31942635-81b1-4657-8882-50fb97fae64b" "objects_2088_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2088_created_2017-10-25T14:48:53.740Z" "objects_2088_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2088_relationship_type_mitigates" "objects_2088_target_ref_attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf" "objects_2088_spec_version_2.1" "objects_2088_x_mitre_attack_spec_version_2.1.0" "objects_2088_x_mitre_domains_0_mobile-attack" "objects_2088_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2088_x_mitre_version_1.0" "objects_2088_x_mitre_deprecated_True" "objects_2089_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2089_description_Check for potential malicious definitions of URL schemes when vetting applications. Also, when examining apps for potential vulnerabilities, encourage use of universal links as an alternative to URL schemes. When examining apps that use OAuth, encourage use of best practices." "objects_2089_type_relationship" "objects_2089_created_2017-10-25T14:48:53.739Z" "objects_2089_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2089_id_relationship--3a446bee-007b-4b1f-849e-60e9d39c2e92" "objects_2089_external_references_0_source_name_Apple-UniversalLinks" "objects_2089_external_references_0_description_Apple. (n.d.). Support Universal Links. Retrieved December 21, 2016." "objects_2089_external_references_0_url_https://developer.apple.com/library/content/documentation/General/Conceptual/AppSearch/UniversalLinks.html" "objects_2089_external_references_1_source_name_IETF-OAuthNativeApps" "objects_2089_external_references_1_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_2089_external_references_1_url_https://tools.ietf.org/html/rfc8252" "objects_2089_modified_2019-10-23T14:19:37.289Z" "objects_2089_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2089_relationship_type_mitigates" "objects_2089_target_ref_attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e" "objects_2089_spec_version_2.1" "objects_2089_x_mitre_attack_spec_version_2.1.0" "objects_2089_x_mitre_domains_0_mobile-attack" "objects_2089_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2089_x_mitre_version_1.0" "objects_2089_x_mitre_deprecated_True" "objects_2090_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2090_description_[Android Overlay Malware](https://attack.mitre.org/software/S0296) used view overlay techniques to present credential input UIs to trick users into providing their banking credentials." "objects_2090_type_relationship" "objects_2090_created_2017-12-14T16:46:06.044Z" "objects_2090_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2090_id_relationship--3faed885-6a3d-444f-8e57-fd8818abb1cc" "objects_2090_external_references_0_source_name_FireEye-AndroidOverlay" "objects_2090_external_references_0_description_Wu Zhou et al. (2016, June 28). THE LATEST ANDROID OVERLAY MALWARE SPREADING VIA SMS PHISHING IN EUROPE. Retrieved December 21, 2016." "objects_2090_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay-malware-spreading-in-europe.html" "objects_2090_modified_2019-10-23T14:19:37.289Z" "objects_2090_source_ref_malware--b6d3657a-2d6a-400f-8b7e-4d60391aa1f7" "objects_2090_relationship_type_uses" "objects_2090_target_ref_attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2" "objects_2090_spec_version_2.1" "objects_2090_x_mitre_attack_spec_version_2.1.0" "objects_2090_x_mitre_domains_0_mobile-attack" "objects_2090_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2090_x_mitre_version_1.0" "objects_2090_x_mitre_deprecated_True" "objects_2091_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2091_description_Typically, insecure or malicious configuration settings are not installed without the user's consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning)." "objects_2091_type_relationship" "objects_2091_created_2018-10-17T00:14:20.652Z" "objects_2091_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2091_id_relationship--45a48a16-66ba-444e-89d2-61c163b956da" "objects_2091_modified_2019-10-23T14:19:37.289Z" "objects_2091_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2091_relationship_type_mitigates" "objects_2091_target_ref_attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2" "objects_2091_spec_version_2.1" "objects_2091_x_mitre_attack_spec_version_2.1.0" "objects_2091_x_mitre_domains_0_mobile-attack" "objects_2091_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2091_x_mitre_version_1.0" "objects_2091_x_mitre_deprecated_True" "objects_2092_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2092_modified_2019-10-23T14:19:37.289Z" "objects_2092_type_relationship" "objects_2092_created_2017-10-25T14:48:53.746Z" "objects_2092_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2092_id_relationship--49f0f7b8-7208-4650-89c2-5d6b1f166113" "objects_2092_source_ref_course-of-action--ff4821f6-5afb-481b-8c0f-26c28c0d666c" "objects_2092_relationship_type_mitigates" "objects_2092_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_2092_spec_version_2.1" "objects_2092_x_mitre_attack_spec_version_2.1.0" "objects_2092_x_mitre_domains_0_mobile-attack" "objects_2092_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2092_x_mitre_version_1.0" "objects_2092_x_mitre_deprecated_True" "objects_2093_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2093_description_It is rare for applications to utilize Device Administrator access. App vetting can detect apps that do so, and those apps should be closely scrutinized. Maggi and Zanero describe a static analysis approach that can be used to identify ransomware apps including apps that abuse Device Administrator access." "objects_2093_type_relationship" "objects_2093_created_2017-10-25T14:48:53.745Z" "objects_2093_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2093_id_relationship--4a697724-4457-436b-97ad-9d6f445fb6b0" "objects_2093_external_references_0_source_name_Maggi-Ransomware" "objects_2093_external_references_0_description_Federico Maggi and Stefano Zanero. (2016). Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. Retrieved December 21, 2016." "objects_2093_external_references_0_url_https://www.blackhat.com/docs/eu-16/materials/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf" "objects_2093_modified_2019-10-23T14:19:37.289Z" "objects_2093_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2093_relationship_type_mitigates" "objects_2093_target_ref_attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483" "objects_2093_spec_version_2.1" "objects_2093_x_mitre_attack_spec_version_2.1.0" "objects_2093_x_mitre_domains_0_mobile-attack" "objects_2093_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2093_x_mitre_version_1.0" "objects_2093_x_mitre_deprecated_True" "objects_2094_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2094_modified_2019-10-23T14:19:37.289Z" "objects_2094_type_relationship" "objects_2094_id_relationship--4caf3ad1-6ef8-42de-851d-bdc3a22977b3" "objects_2094_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2094_created_2017-10-25T14:48:53.735Z" "objects_2094_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2094_relationship_type_mitigates" "objects_2094_target_ref_attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274" "objects_2094_spec_version_2.1" "objects_2094_x_mitre_attack_spec_version_2.1.0" "objects_2094_x_mitre_domains_0_mobile-attack" "objects_2094_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2094_x_mitre_version_1.0" "objects_2094_x_mitre_deprecated_True" "objects_2095_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2095_modified_2019-10-23T14:19:37.289Z" "objects_2095_type_relationship" "objects_2095_created_2017-10-25T14:48:53.746Z" "objects_2095_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2095_id_relationship--4cf9511e-da0e-4055-bc8c-56121ae120d2" "objects_2095_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2095_relationship_type_mitigates" "objects_2095_target_ref_attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5" "objects_2095_spec_version_2.1" "objects_2095_x_mitre_attack_spec_version_2.1.0" "objects_2095_x_mitre_domains_0_mobile-attack" "objects_2095_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2095_x_mitre_version_1.0" "objects_2095_x_mitre_deprecated_True" "objects_2096_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2096_description_On Android, applications must request the RECORD_AUDIO permission to access the microphone and the CAMERA permission to access the camera. Extra scrutiny could be given to applications that request these permissions. On iOS, calls to the relevant APIs could be detected during the vetting process." "objects_2096_type_relationship" "objects_2096_created_2017-10-25T14:48:53.737Z" "objects_2096_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2096_id_relationship--50986206-ad56-4dea-baed-846545fb2f5a" "objects_2096_modified_2019-10-23T14:19:37.289Z" "objects_2096_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2096_relationship_type_mitigates" "objects_2096_target_ref_attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760" "objects_2096_spec_version_2.1" "objects_2096_x_mitre_attack_spec_version_2.1.0" "objects_2096_x_mitre_domains_0_mobile-attack" "objects_2096_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2096_x_mitre_version_1.0" "objects_2096_x_mitre_deprecated_True" "objects_2097_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2097_description_Application vetting could be used to analyze applications to determine whether they access this information, including determining whether the application requests the Android ACCESS_NETWORK_STATE permission (required in order to access NetworkInterface information) or the READ_PHONE_STATE permission (required in order to access TelephonyManager information)." "objects_2097_type_relationship" "objects_2097_created_2017-10-25T14:48:53.747Z" "objects_2097_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2097_id_relationship--513c05e2-afc6-4d1b-8a8e-6d6935a8626f" "objects_2097_modified_2019-10-23T14:19:37.289Z" "objects_2097_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2097_relationship_type_mitigates" "objects_2097_target_ref_attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd" "objects_2097_spec_version_2.1" "objects_2097_x_mitre_attack_spec_version_2.1.0" "objects_2097_x_mitre_domains_0_mobile-attack" "objects_2097_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2097_x_mitre_version_1.0" "objects_2097_x_mitre_deprecated_True" "objects_2098_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2098_description_[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) gathers the device build version, manufacturer, and model." "objects_2098_type_relationship" "objects_2098_created_2019-02-01T17:42:22.412Z" "objects_2098_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2098_id_relationship--566555df-fe3c-4d8b-94b7-6bf3bbd69973" "objects_2098_external_references_0_source_name_TrendMicro-Anserver2" "objects_2098_external_references_0_description_Karl Dominguez. (2011, September 27). ANDROIDOS_ANSERVER.A. Retrieved November 30, 2018." "objects_2098_external_references_0_url_https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ANDROIDOS_ANSERVER.A" "objects_2098_modified_2019-10-23T14:19:37.289Z" "objects_2098_source_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_2098_relationship_type_uses" "objects_2098_target_ref_attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05" "objects_2098_spec_version_2.1" "objects_2098_x_mitre_attack_spec_version_2.1.0" "objects_2098_x_mitre_domains_0_mobile-attack" "objects_2098_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2098_x_mitre_version_1.0" "objects_2098_x_mitre_deprecated_True" "objects_2099_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2099_description_iOS 9 and above requires explicit user consent before allowing installation of applications signed with enterprise distribution keys rather than installed from Apple's App Store. Users should be encouraged to not agree to installation of applications signed with enterprise distribution keys unless absolutely certain of the source of the application. On Android, the \"Unknown Sources\" setting must be enabled for users to install apps from sources other than an authorized app store (such as the Google Play Store), so users should be encouraged not to enable that setting." "objects_2099_type_relationship" "objects_2099_created_2018-10-17T00:14:20.652Z" "objects_2099_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2099_id_relationship--57474dcb-329d-4135-8f1a-87490bffdaef" "objects_2099_modified_2019-10-23T14:19:37.289Z" "objects_2099_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2099_relationship_type_mitigates" "objects_2099_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2099_spec_version_2.1" "objects_2099_x_mitre_attack_spec_version_2.1.0" "objects_2099_x_mitre_domains_0_mobile-attack" "objects_2099_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2099_x_mitre_version_1.0" "objects_2099_x_mitre_deprecated_True" "objects_2100_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2100_description_Application vetting techniques could search for use of the Android PackageManager class to enumerate other apps, and such applications could have extra scrutiny applied to them. However, this technique may not be practical if many apps invoke these methods as part of their legitimate behavior. On iOS, application vetting techniques could similarly search for use of the private API call necessary to obtain a list of apps installed on the device. Additionally, on iOS, use of the private API call is likely to result in the app not being accepted into Apple's App Store." "objects_2100_type_relationship" "objects_2100_created_2017-10-25T14:48:53.744Z" "objects_2100_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2100_id_relationship--5b14149e-09f1-4d38-82bc-0ff3cff8b650" "objects_2100_modified_2019-10-23T14:19:37.289Z" "objects_2100_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2100_relationship_type_mitigates" "objects_2100_target_ref_attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2" "objects_2100_spec_version_2.1" "objects_2100_x_mitre_attack_spec_version_2.1.0" "objects_2100_x_mitre_domains_0_mobile-attack" "objects_2100_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2100_x_mitre_version_1.0" "objects_2100_x_mitre_deprecated_True" "objects_2101_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2101_description_When vetting applications for potential security weaknesses, the vetting process could look for insecure use of intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or the App Links feature added in Android 6.0). For mobile applications using OAuth, encourage use of best practice." "objects_2101_type_relationship" "objects_2101_created_2017-10-25T14:48:53.746Z" "objects_2101_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2101_id_relationship--5b9a54cd-4925-4a2b-ad61-27d70e673093" "objects_2101_external_references_0_source_name_Android-AppLinks" "objects_2101_external_references_0_description_Android. (n.d.). Handling App Links. Retrieved December 21, 2016." "objects_2101_external_references_0_url_https://developer.android.com/training/app-links/index.html" "objects_2101_external_references_1_source_name_IETF-OAuthNativeApps" "objects_2101_external_references_1_description_W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018." "objects_2101_external_references_1_url_https://tools.ietf.org/html/rfc8252" "objects_2101_modified_2019-10-23T14:19:37.289Z" "objects_2101_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2101_relationship_type_mitigates" "objects_2101_target_ref_attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58" "objects_2101_spec_version_2.1" "objects_2101_x_mitre_attack_spec_version_2.1.0" "objects_2101_x_mitre_domains_0_mobile-attack" "objects_2101_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2101_x_mitre_version_1.0" "objects_2101_x_mitre_deprecated_True" "objects_2102_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2102_description_Application vetting may be able to identify the presence of exploit code within applications." "objects_2102_type_relationship" "objects_2102_created_2017-10-25T14:48:53.745Z" "objects_2102_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2102_id_relationship--5f6f5913-cade-4b14-aa96-5a921b0927a7" "objects_2102_modified_2019-10-23T14:19:37.289Z" "objects_2102_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2102_relationship_type_mitigates" "objects_2102_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_2102_spec_version_2.1" "objects_2102_x_mitre_attack_spec_version_2.1.0" "objects_2102_x_mitre_domains_0_mobile-attack" "objects_2102_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2102_x_mitre_version_1.0" "objects_2102_x_mitre_deprecated_True" "objects_2103_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2103_id_relationship--6186ed87-69a1-43e7-bb60-76527d287e31" "objects_2103_created_2019-04-29T19:35:31.074Z" "objects_2103_modified_2019-10-23T14:19:37.289Z" "objects_2103_type_relationship" "objects_2103_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2103_source_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_2103_relationship_type_revoked-by" "objects_2103_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_2103_spec_version_2.1" "objects_2103_x_mitre_attack_spec_version_2.1.0" "objects_2103_x_mitre_domains_0_mobile-attack" "objects_2103_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2103_x_mitre_version_1.0" "objects_2103_x_mitre_deprecated_True" "objects_2104_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2104_modified_2019-10-23T14:19:37.289Z" "objects_2104_type_relationship" "objects_2104_created_2017-10-25T14:48:53.740Z" "objects_2104_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2104_id_relationship--62480750-2218-4ea0-b168-b9035b9ee998" "objects_2104_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2104_relationship_type_mitigates" "objects_2104_target_ref_attack-pattern--f1c3d071-0c24-483d-aca0-e8b8496ce468" "objects_2104_spec_version_2.1" "objects_2104_x_mitre_attack_spec_version_2.1.0" "objects_2104_x_mitre_domains_0_mobile-attack" "objects_2104_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2104_x_mitre_version_1.0" "objects_2104_x_mitre_deprecated_True" "objects_2105_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2105_description_Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps." "objects_2105_type_relationship" "objects_2105_created_2017-10-25T14:48:53.747Z" "objects_2105_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2105_id_relationship--634e2691-341f-4e5b-83e7-e28369d88c64" "objects_2105_modified_2019-10-23T14:19:37.289Z" "objects_2105_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2105_relationship_type_mitigates" "objects_2105_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2105_spec_version_2.1" "objects_2105_x_mitre_attack_spec_version_2.1.0" "objects_2105_x_mitre_domains_0_mobile-attack" "objects_2105_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2105_x_mitre_version_1.0" "objects_2105_x_mitre_deprecated_True" "objects_2106_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2106_description_Closely scrutinize applications that request VPN access before allowing their use." "objects_2106_type_relationship" "objects_2106_created_2017-10-25T14:48:53.738Z" "objects_2106_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2106_id_relationship--6407562a-d297-43cd-95df-aec9cf501ce2" "objects_2106_modified_2019-10-23T14:19:37.289Z" "objects_2106_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2106_relationship_type_mitigates" "objects_2106_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_2106_spec_version_2.1" "objects_2106_x_mitre_attack_spec_version_2.1.0" "objects_2106_x_mitre_domains_0_mobile-attack" "objects_2106_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2106_x_mitre_version_1.0" "objects_2106_x_mitre_deprecated_True" "objects_2107_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2107_description_On Android, accessing the device call log requires that the app hold the READ_CALL_LOG permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate." "objects_2107_type_relationship" "objects_2107_created_2017-10-25T14:48:53.736Z" "objects_2107_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2107_id_relationship--69d6f3fc-17ea-4a32-b4dd-a006c75362d6" "objects_2107_modified_2019-10-23T14:19:37.289Z" "objects_2107_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2107_relationship_type_mitigates" "objects_2107_target_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_2107_spec_version_2.1" "objects_2107_x_mitre_attack_spec_version_2.1.0" "objects_2107_x_mitre_domains_0_mobile-attack" "objects_2107_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2107_x_mitre_version_1.0" "objects_2107_x_mitre_deprecated_True" "objects_2108_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2108_description_Encourage users to protect their account credentials and to enable available multi-factor authentication options." "objects_2108_type_relationship" "objects_2108_created_2017-10-25T14:48:53.734Z" "objects_2108_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2108_id_relationship--69efe716-affe-419e-ac06-924d2e416695" "objects_2108_modified_2019-10-23T14:19:37.289Z" "objects_2108_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2108_relationship_type_mitigates" "objects_2108_target_ref_attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067" "objects_2108_spec_version_2.1" "objects_2108_x_mitre_attack_spec_version_2.1.0" "objects_2108_x_mitre_domains_0_mobile-attack" "objects_2108_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2108_x_mitre_version_1.0" "objects_2108_x_mitre_deprecated_True" "objects_2109_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2109_description_Application vetting techniques could be used to attempt to identify applications with this behavior." "objects_2109_type_relationship" "objects_2109_created_2017-10-25T14:48:53.747Z" "objects_2109_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2109_id_relationship--6c0491ee-53e0-44ae-bcd0-253fc47de61e" "objects_2109_modified_2019-10-23T14:19:37.289Z" "objects_2109_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2109_relationship_type_mitigates" "objects_2109_target_ref_attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19" "objects_2109_spec_version_2.1" "objects_2109_x_mitre_attack_spec_version_2.1.0" "objects_2109_x_mitre_domains_0_mobile-attack" "objects_2109_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2109_x_mitre_version_1.0" "objects_2109_x_mitre_deprecated_True" "objects_2110_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2110_modified_2019-10-23T14:19:37.289Z" "objects_2110_type_relationship" "objects_2110_created_2017-10-25T14:48:53.741Z" "objects_2110_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2110_id_relationship--6d8ea31a-da35-442a-8e0d-1d0c0dcdf14b" "objects_2110_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2110_relationship_type_mitigates" "objects_2110_target_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_2110_spec_version_2.1" "objects_2110_x_mitre_attack_spec_version_2.1.0" "objects_2110_x_mitre_domains_0_mobile-attack" "objects_2110_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2110_x_mitre_version_1.0" "objects_2110_x_mitre_deprecated_True" "objects_2111_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2111_modified_2019-10-23T14:19:37.289Z" "objects_2111_type_relationship" "objects_2111_created_2017-10-25T14:48:53.743Z" "objects_2111_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2111_id_relationship--6eca2456-fdcf-42e9-bcbb-a4c51ce54139" "objects_2111_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2111_relationship_type_mitigates" "objects_2111_target_ref_attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd" "objects_2111_spec_version_2.1" "objects_2111_x_mitre_attack_spec_version_2.1.0" "objects_2111_x_mitre_domains_0_mobile-attack" "objects_2111_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2111_x_mitre_version_1.0" "objects_2111_x_mitre_deprecated_True" "objects_2112_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2112_description_Application vetting techniques can scan for use of cleartext communication, insecure TrustManager implementations, and other potential network communication weaknesses. The Google Play Store now automatically assesses submitted applications for insecure TrustManager implementations." "objects_2112_type_relationship" "objects_2112_created_2017-10-25T14:48:53.743Z" "objects_2112_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2112_id_relationship--6f1cadef-283b-466b-bfa2-0cb51edf88f7" "objects_2112_external_references_0_source_name_Google-TrustManager" "objects_2112_external_references_0_description_Google. (n.d.). How to fix apps containing an unsafe implementation of TrustManager. Retrieved December 24, 2016." "objects_2112_external_references_0_url_https://support.google.com/faqs/answer/6346016?hl=en" "objects_2112_modified_2019-10-23T14:19:37.289Z" "objects_2112_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2112_relationship_type_mitigates" "objects_2112_target_ref_attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63" "objects_2112_spec_version_2.1" "objects_2112_x_mitre_attack_spec_version_2.1.0" "objects_2112_x_mitre_domains_0_mobile-attack" "objects_2112_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2112_x_mitre_version_1.0" "objects_2112_x_mitre_deprecated_True" "objects_2113_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2113_modified_2019-10-23T14:19:37.289Z" "objects_2113_type_relationship" "objects_2113_created_2017-10-25T14:48:53.744Z" "objects_2113_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2113_id_relationship--72d7fa07-e559-4e35-b791-64b7bf8a0aef" "objects_2113_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2113_relationship_type_mitigates" "objects_2113_target_ref_attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6" "objects_2113_spec_version_2.1" "objects_2113_x_mitre_attack_spec_version_2.1.0" "objects_2113_x_mitre_domains_0_mobile-attack" "objects_2113_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2113_x_mitre_version_1.0" "objects_2113_x_mitre_deprecated_True" "objects_2114_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2114_description_Both iOS and Android require the user to explicitly authorize use of third party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested." "objects_2114_type_relationship" "objects_2114_created_2017-10-25T14:48:53.744Z" "objects_2114_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2114_id_relationship--7b899be0-4a9c-4e52-aeab-d8acedfe26d0" "objects_2114_modified_2019-10-23T14:19:37.289Z" "objects_2114_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2114_relationship_type_mitigates" "objects_2114_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_2114_spec_version_2.1" "objects_2114_x_mitre_attack_spec_version_2.1.0" "objects_2114_x_mitre_domains_0_mobile-attack" "objects_2114_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2114_x_mitre_version_1.0" "objects_2114_x_mitre_deprecated_True" "objects_2115_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2115_description_Ensure that applications do not store sensitive data or credentials insecurely (e.g., with insecure file permissions or in an insecure location such as external data storage)." "objects_2115_type_relationship" "objects_2115_created_2017-10-25T14:48:53.738Z" "objects_2115_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2115_id_relationship--7ec08d5c-73a1-4444-bd27-892090d6b2e3" "objects_2115_modified_2019-10-23T14:19:37.289Z" "objects_2115_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2115_relationship_type_mitigates" "objects_2115_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_2115_spec_version_2.1" "objects_2115_x_mitre_attack_spec_version_2.1.0" "objects_2115_x_mitre_domains_0_mobile-attack" "objects_2115_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2115_x_mitre_version_1.0" "objects_2115_x_mitre_deprecated_True" "objects_2116_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2116_description_On Android, accessing device calendar data requires that the app hold the READ_CALENDAR permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access device calendar data, with extra scrutiny applied to any that do so." "objects_2116_type_relationship" "objects_2116_created_2017-10-25T14:48:53.741Z" "objects_2116_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2116_id_relationship--85328449-c231-444d-905a-2988c14d3e82" "objects_2116_modified_2019-10-23T14:19:37.289Z" "objects_2116_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2116_relationship_type_mitigates" "objects_2116_target_ref_attack-pattern--62adb627-f647-498e-b4cc-41499361bacb" "objects_2116_spec_version_2.1" "objects_2116_x_mitre_attack_spec_version_2.1.0" "objects_2116_x_mitre_domains_0_mobile-attack" "objects_2116_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2116_x_mitre_version_1.0" "objects_2116_x_mitre_deprecated_True" "objects_2117_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2117_description_Advise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debugging)." "objects_2117_type_relationship" "objects_2117_created_2017-10-25T14:48:53.737Z" "objects_2117_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2117_id_relationship--86696d32-0af7-4308-b1fe-52306b9f839a" "objects_2117_modified_2019-10-23T14:19:37.289Z" "objects_2117_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2117_relationship_type_mitigates" "objects_2117_target_ref_attack-pattern--a0464539-e1b7-4455-a355-12495987c300" "objects_2117_spec_version_2.1" "objects_2117_x_mitre_attack_spec_version_2.1.0" "objects_2117_x_mitre_domains_0_mobile-attack" "objects_2117_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2117_x_mitre_version_1.0" "objects_2117_x_mitre_deprecated_True" "objects_2118_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2118_modified_2019-10-23T14:19:37.289Z" "objects_2118_type_relationship" "objects_2118_created_2017-10-25T14:48:53.737Z" "objects_2118_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2118_id_relationship--8aa790cc-0d42-4114-8cbe-783abc595b8b" "objects_2118_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2118_relationship_type_mitigates" "objects_2118_target_ref_attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9" "objects_2118_spec_version_2.1" "objects_2118_x_mitre_attack_spec_version_2.1.0" "objects_2118_x_mitre_domains_0_mobile-attack" "objects_2118_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2118_x_mitre_version_1.0" "objects_2118_x_mitre_deprecated_True" "objects_2119_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2119_description_[Android Overlay Malware](https://attack.mitre.org/software/S0296) was distributed by sending SMS messages with an embedded link to the malware." "objects_2119_type_relationship" "objects_2119_created_2018-10-17T00:14:20.652Z" "objects_2119_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2119_id_relationship--8d435703-05c0-4320-945c-05ebe1b06399" "objects_2119_external_references_0_source_name_FireEye-AndroidOverlay" "objects_2119_external_references_0_description_Wu Zhou et al. (2016, June 28). THE LATEST ANDROID OVERLAY MALWARE SPREADING VIA SMS PHISHING IN EUROPE. Retrieved December 21, 2016." "objects_2119_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay-malware-spreading-in-europe.html" "objects_2119_modified_2019-10-23T14:19:37.289Z" "objects_2119_source_ref_malware--b6d3657a-2d6a-400f-8b7e-4d60391aa1f7" "objects_2119_relationship_type_uses" "objects_2119_target_ref_attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7" "objects_2119_spec_version_2.1" "objects_2119_x_mitre_attack_spec_version_2.1.0" "objects_2119_x_mitre_domains_0_mobile-attack" "objects_2119_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2119_x_mitre_version_1.0" "objects_2119_x_mitre_deprecated_True" "objects_2120_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2120_description_Enterprises could potentially vet apps before allowing their use on devices, and carefully scrutinize apps that declare a BroadcastReceiver containing an intent-filter for BOOT_COMPLETED. Unfortunately this is likely not practical due to the vast number of apps with this behavior." "objects_2120_type_relationship" "objects_2120_id_relationship--8e94da58-86b7-4a45-886e-6da58828eacd" "objects_2120_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2120_created_2017-10-25T14:48:53.745Z" "objects_2120_modified_2019-10-23T14:19:37.289Z" "objects_2120_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2120_relationship_type_mitigates" "objects_2120_target_ref_attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69" "objects_2120_spec_version_2.1" "objects_2120_x_mitre_attack_spec_version_2.1.0" "objects_2120_x_mitre_domains_0_mobile-attack" "objects_2120_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2120_x_mitre_version_1.0" "objects_2120_x_mitre_deprecated_True" "objects_2121_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2121_description_It is rare for apps to register themselves as a device keyboard. Apps that do so should be closely scrutinized during the vetting process." "objects_2121_type_relationship" "objects_2121_created_2017-10-25T14:48:53.744Z" "objects_2121_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2121_id_relationship--903660e1-3996-4ed2-9e7a-4f8c397a71eb" "objects_2121_modified_2019-10-23T14:19:37.289Z" "objects_2121_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2121_relationship_type_mitigates" "objects_2121_target_ref_attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad" "objects_2121_spec_version_2.1" "objects_2121_x_mitre_attack_spec_version_2.1.0" "objects_2121_x_mitre_domains_0_mobile-attack" "objects_2121_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2121_x_mitre_version_1.0" "objects_2121_x_mitre_deprecated_True" "objects_2122_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2122_modified_2019-10-23T14:19:37.289Z" "objects_2122_type_relationship" "objects_2122_created_2017-10-25T14:48:53.738Z" "objects_2122_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2122_id_relationship--92333055-88ce-4db2-a589-e0e1e617d8e0" "objects_2122_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2122_relationship_type_mitigates" "objects_2122_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_2122_spec_version_2.1" "objects_2122_x_mitre_attack_spec_version_2.1.0" "objects_2122_x_mitre_domains_0_mobile-attack" "objects_2122_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2122_x_mitre_version_1.0" "objects_2122_x_mitre_deprecated_True" "objects_2123_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2123_description_Decrease likelihood of successful privilege escalation attack." "objects_2123_type_relationship" "objects_2123_created_2017-10-25T14:48:53.736Z" "objects_2123_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2123_id_relationship--93a524e2-cb17-4b40-8640-a03949e89775" "objects_2123_modified_2019-10-23T14:19:37.289Z" "objects_2123_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2123_relationship_type_mitigates" "objects_2123_target_ref_attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44" "objects_2123_spec_version_2.1" "objects_2123_x_mitre_attack_spec_version_2.1.0" "objects_2123_x_mitre_domains_0_mobile-attack" "objects_2123_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2123_x_mitre_version_1.0" "objects_2123_x_mitre_deprecated_True" "objects_2124_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2124_description_Application vetting techniques could (either statically or dynamically) look for indications that the application downloads and executes new code at runtime (e.g., on Android use of DexClassLoader, System.load, or the WebView JavaScriptInterface capability, or on iOS use of JSPatch or similar capabilities). Unfortunately, this is only a partial mitigation, as additional scrutiny would still need to be applied to applications that use these techniques, as the techniques are often used without malicious intent, and because applications may employ other techniques such as to hide their use of these techniques." "objects_2124_type_relationship" "objects_2124_created_2017-10-25T14:48:53.737Z" "objects_2124_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2124_id_relationship--94a737af-9a72-48f6-a85e-d9d7fa93bfdd" "objects_2124_modified_2019-10-23T14:19:37.289Z" "objects_2124_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2124_relationship_type_mitigates" "objects_2124_target_ref_attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6" "objects_2124_spec_version_2.1" "objects_2124_x_mitre_attack_spec_version_2.1.0" "objects_2124_x_mitre_domains_0_mobile-attack" "objects_2124_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2124_x_mitre_version_1.0" "objects_2124_x_mitre_deprecated_True" "objects_2125_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2125_description_Users should be advised not to use public charging stations or computers to charge their devices. Instead, users should be issued a charger acquired from a trustworthy source. Users should be advised not to click on device prompts to trust attached computers unless absolutely necessary." "objects_2125_type_relationship" "objects_2125_created_2017-10-25T14:48:53.742Z" "objects_2125_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2125_id_relationship--95f4db59-e0b4-4c1b-b888-1fc76b21e8c0" "objects_2125_modified_2019-10-23T14:19:37.289Z" "objects_2125_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2125_relationship_type_mitigates" "objects_2125_target_ref_attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d" "objects_2125_spec_version_2.1" "objects_2125_x_mitre_attack_spec_version_2.1.0" "objects_2125_x_mitre_domains_0_mobile-attack" "objects_2125_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2125_x_mitre_version_1.0" "objects_2125_x_mitre_deprecated_True" "objects_2126_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2126_modified_2019-10-23T14:19:37.289Z" "objects_2126_type_relationship" "objects_2126_created_2017-10-25T14:48:53.744Z" "objects_2126_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2126_id_relationship--96027d55-0bdb-4f5f-a559-66c93eab3a17" "objects_2126_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2126_relationship_type_mitigates" "objects_2126_target_ref_attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172" "objects_2126_spec_version_2.1" "objects_2126_x_mitre_attack_spec_version_2.1.0" "objects_2126_x_mitre_domains_0_mobile-attack" "objects_2126_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2126_x_mitre_version_1.0" "objects_2126_x_mitre_deprecated_True" "objects_2127_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2127_modified_2019-10-23T14:19:37.289Z" "objects_2127_type_relationship" "objects_2127_created_2017-10-25T14:48:53.739Z" "objects_2127_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2127_id_relationship--9e83607e-2936-4f25-b6d2-c357846840f3" "objects_2127_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2127_relationship_type_mitigates" "objects_2127_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2127_spec_version_2.1" "objects_2127_x_mitre_attack_spec_version_2.1.0" "objects_2127_x_mitre_domains_0_mobile-attack" "objects_2127_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2127_x_mitre_version_1.0" "objects_2127_x_mitre_deprecated_True" "objects_2128_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2128_modified_2019-10-23T14:19:37.289Z" "objects_2128_type_relationship" "objects_2128_created_2017-10-25T14:48:53.742Z" "objects_2128_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2128_id_relationship--a01af4da-0910-4a20-805f-86b3ae1dc046" "objects_2128_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2128_relationship_type_mitigates" "objects_2128_target_ref_attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884" "objects_2128_spec_version_2.1" "objects_2128_x_mitre_attack_spec_version_2.1.0" "objects_2128_x_mitre_domains_0_mobile-attack" "objects_2128_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2128_x_mitre_version_1.0" "objects_2128_x_mitre_deprecated_True" "objects_2129_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2129_description_Encourage developers to protect their account credentials and enable multi-factor authentication if available. Encourage developers to protect their signing keys." "objects_2129_type_relationship" "objects_2129_created_2018-10-17T00:14:20.652Z" "objects_2129_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2129_id_relationship--a3dab73a-0af2-44c3-ba33-9b20133ae5cf" "objects_2129_modified_2019-10-23T14:19:37.289Z" "objects_2129_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2129_relationship_type_mitigates" "objects_2129_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2129_spec_version_2.1" "objects_2129_x_mitre_attack_spec_version_2.1.0" "objects_2129_x_mitre_domains_0_mobile-attack" "objects_2129_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2129_x_mitre_version_1.0" "objects_2129_x_mitre_deprecated_True" "objects_2130_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2130_modified_2019-10-23T14:19:37.289Z" "objects_2130_type_relationship" "objects_2130_created_2017-10-25T14:48:53.746Z" "objects_2130_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2130_id_relationship--aa39b402-7ecc-4057-a989-663887e540e7" "objects_2130_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2130_relationship_type_mitigates" "objects_2130_target_ref_attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0" "objects_2130_spec_version_2.1" "objects_2130_x_mitre_attack_spec_version_2.1.0" "objects_2130_x_mitre_domains_0_mobile-attack" "objects_2130_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2130_x_mitre_version_1.0" "objects_2130_x_mitre_deprecated_True" "objects_2131_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2131_modified_2019-10-23T14:19:37.289Z" "objects_2131_type_relationship" "objects_2131_created_2018-10-17T00:14:20.652Z" "objects_2131_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2131_id_relationship--b18aa181-b1b7-43dd-9389-16a13ef2a6ed" "objects_2131_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2131_relationship_type_mitigates" "objects_2131_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_2131_spec_version_2.1" "objects_2131_x_mitre_attack_spec_version_2.1.0" "objects_2131_x_mitre_domains_0_mobile-attack" "objects_2131_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2131_x_mitre_version_1.0" "objects_2131_x_mitre_deprecated_True" "objects_2132_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2132_modified_2019-10-23T14:19:37.289Z" "objects_2132_type_relationship" "objects_2132_id_relationship--b1f2770e-11f0-429c-9bac-9fa5bc5859b0" "objects_2132_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2132_created_2017-10-25T14:48:53.746Z" "objects_2132_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2132_relationship_type_mitigates" "objects_2132_target_ref_attack-pattern--8e27551a-5080-4148-a584-c64348212e4f" "objects_2132_spec_version_2.1" "objects_2132_x_mitre_attack_spec_version_2.1.0" "objects_2132_x_mitre_domains_0_mobile-attack" "objects_2132_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2132_x_mitre_version_1.0" "objects_2132_x_mitre_deprecated_True" "objects_2133_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2133_modified_2019-10-23T14:19:37.289Z" "objects_2133_type_relationship" "objects_2133_created_2017-10-25T14:48:53.739Z" "objects_2133_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2133_id_relationship--b23ec81b-8610-4bb0-a837-2c316c67fa79" "objects_2133_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2133_relationship_type_mitigates" "objects_2133_target_ref_attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3" "objects_2133_spec_version_2.1" "objects_2133_x_mitre_attack_spec_version_2.1.0" "objects_2133_x_mitre_domains_0_mobile-attack" "objects_2133_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2133_x_mitre_version_1.0" "objects_2133_x_mitre_deprecated_True" "objects_2134_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2134_description_Application vetting techniques may be able to alert to the presence of obfuscated or encrypted code in applications, and such applications could have extra scrutiny applied. Unfortunately, this mitigation is likely impractical, as many legitimate applications apply code obfuscation or encryption to resist adversary techniques such as Repackaged Application. Dynamic analysis when used in application vetting may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code." "objects_2134_type_relationship" "objects_2134_created_2017-10-25T14:48:53.746Z" "objects_2134_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2134_id_relationship--b4e055cf-f77e-4888-9610-6cd328e035c8" "objects_2134_modified_2019-10-23T14:19:37.289Z" "objects_2134_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2134_relationship_type_mitigates" "objects_2134_target_ref_attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a" "objects_2134_spec_version_2.1" "objects_2134_x_mitre_attack_spec_version_2.1.0" "objects_2134_x_mitre_domains_0_mobile-attack" "objects_2134_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2134_x_mitre_version_1.0" "objects_2134_x_mitre_deprecated_True" "objects_2135_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2135_modified_2019-10-23T14:19:37.289Z" "objects_2135_type_relationship" "objects_2135_created_2017-10-25T14:48:53.741Z" "objects_2135_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2135_id_relationship--ba556d98-4ff2-43a4-bb93-52f99265ff99" "objects_2135_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2135_relationship_type_mitigates" "objects_2135_target_ref_attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692" "objects_2135_spec_version_2.1" "objects_2135_x_mitre_attack_spec_version_2.1.0" "objects_2135_x_mitre_domains_0_mobile-attack" "objects_2135_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2135_x_mitre_version_1.0" "objects_2135_x_mitre_deprecated_True" "objects_2136_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2136_description_Android and iOS provide hardware-backed capabilities to store credentials in an isolated location where they are less likely to be compromised even in the case of a successful privilege escalation attack against the operating system." "objects_2136_type_relationship" "objects_2136_created_2017-10-25T14:48:53.738Z" "objects_2136_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2136_id_relationship--be2895e2-7e1d-4467-8b6a-ac06b17ce0bb" "objects_2136_modified_2019-10-23T14:19:37.289Z" "objects_2136_source_ref_course-of-action--d2a199d2-dfea-4d0c-987d-6195ed17be9c" "objects_2136_relationship_type_mitigates" "objects_2136_target_ref_attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160" "objects_2136_spec_version_2.1" "objects_2136_x_mitre_attack_spec_version_2.1.0" "objects_2136_x_mitre_domains_0_mobile-attack" "objects_2136_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2136_x_mitre_version_1.0" "objects_2136_x_mitre_deprecated_True" "objects_2137_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2137_description_It is rare for applications to utilize Device Administrator access. App vetting can detect apps that do so, and those apps should be closely scrutinized. Maggi and Zanero4 describe a static analysis approach that can be used to identify ransomware apps including apps that abuse Device Administrator access." "objects_2137_type_relationship" "objects_2137_id_relationship--bebf345c-21d5-410f-9015-90c144161e5d" "objects_2137_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2137_created_2017-10-25T14:48:53.739Z" "objects_2137_external_references_0_source_name_Maggi-Ransomware" "objects_2137_external_references_0_description_Federico Maggi and Stefano Zanero. (2016). Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. Retrieved December 21, 2016." "objects_2137_external_references_0_url_https://www.blackhat.com/docs/eu-16/materials/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf" "objects_2137_modified_2019-10-23T14:19:37.289Z" "objects_2137_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2137_relationship_type_mitigates" "objects_2137_target_ref_attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1" "objects_2137_spec_version_2.1" "objects_2137_x_mitre_attack_spec_version_2.1.0" "objects_2137_x_mitre_domains_0_mobile-attack" "objects_2137_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2137_x_mitre_version_1.0" "objects_2137_x_mitre_deprecated_True" "objects_2138_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2138_description_App store operators and enterprises could assess reputational characteristics of the app, including the popularity of the app or other apps from the same developer and whether or not security issues have been found in other apps from the same developer." "objects_2138_type_relationship" "objects_2138_created_2018-10-17T00:14:20.652Z" "objects_2138_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2138_id_relationship--bedb2088-2f26-4380-84df-f238f514dd4c" "objects_2138_modified_2019-10-23T14:19:37.289Z" "objects_2138_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2138_relationship_type_mitigates" "objects_2138_target_ref_attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a" "objects_2138_spec_version_2.1" "objects_2138_x_mitre_attack_spec_version_2.1.0" "objects_2138_x_mitre_domains_0_mobile-attack" "objects_2138_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2138_x_mitre_version_1.0" "objects_2138_x_mitre_deprecated_True" "objects_2139_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2139_description_Maggi and Zanero describe a static analysis approach that may be able to identify ransomware apps that encrypt user files on the device." "objects_2139_type_relationship" "objects_2139_id_relationship--c5b80ca7-eceb-43ea-991e-10af5d9ca4bc" "objects_2139_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2139_created_2017-10-25T14:48:53.735Z" "objects_2139_external_references_0_source_name_Maggi-Ransomware" "objects_2139_external_references_0_description_Federico Maggi and Stefano Zanero. (2016). Pocket-Sized Badness - Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. Retrieved December 21, 2016." "objects_2139_external_references_0_url_https://www.blackhat.com/docs/eu-16/materials/eu-16-Maggi-Pocket-Sized-Badness-Why-Ransomware-Comes-As-A-Plot-Twist-In-The-Cat-Mouse-Game.pdf" "objects_2139_modified_2019-10-23T14:19:37.289Z" "objects_2139_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2139_relationship_type_mitigates" "objects_2139_target_ref_attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4" "objects_2139_spec_version_2.1" "objects_2139_x_mitre_attack_spec_version_2.1.0" "objects_2139_x_mitre_domains_0_mobile-attack" "objects_2139_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2139_x_mitre_version_1.0" "objects_2139_x_mitre_deprecated_True" "objects_2140_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2140_description_On Android, applications must request the ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission to access the device's physical location. Extra scrutiny could be given to applications that request these permissions. On iOS, calls to the relevant APIs could be detected during the vetting process." "objects_2140_type_relationship" "objects_2140_created_2017-10-25T14:48:53.737Z" "objects_2140_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2140_id_relationship--d22dc053-24a7-4a5b-ae51-8a626569ec9b" "objects_2140_modified_2019-10-23T14:19:37.289Z" "objects_2140_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2140_relationship_type_mitigates" "objects_2140_target_ref_attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4" "objects_2140_spec_version_2.1" "objects_2140_x_mitre_attack_spec_version_2.1.0" "objects_2140_x_mitre_domains_0_mobile-attack" "objects_2140_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2140_x_mitre_version_1.0" "objects_2140_x_mitre_deprecated_True" "objects_2141_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2141_modified_2019-10-23T14:19:37.289Z" "objects_2141_type_relationship" "objects_2141_created_2017-10-25T14:48:53.733Z" "objects_2141_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2141_id_relationship--d98a030f-c551-4fd0-9948-32e1ea01f79c" "objects_2141_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2141_relationship_type_mitigates" "objects_2141_target_ref_attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57" "objects_2141_spec_version_2.1" "objects_2141_x_mitre_attack_spec_version_2.1.0" "objects_2141_x_mitre_domains_0_mobile-attack" "objects_2141_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2141_x_mitre_version_1.0" "objects_2141_x_mitre_deprecated_True" "objects_2142_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2142_description_During application vetting, applications could be examined to see if they have this behavior, and extra scrutiny could potentially be given to applications that do." "objects_2142_type_relationship" "objects_2142_created_2017-10-25T14:48:53.747Z" "objects_2142_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2142_id_relationship--de1b1f92-c060-4d8c-81bf-465b7fb21be4" "objects_2142_modified_2019-10-23T14:19:37.289Z" "objects_2142_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2142_relationship_type_mitigates" "objects_2142_target_ref_attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb" "objects_2142_spec_version_2.1" "objects_2142_x_mitre_attack_spec_version_2.1.0" "objects_2142_x_mitre_domains_0_mobile-attack" "objects_2142_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2142_x_mitre_version_1.0" "objects_2142_x_mitre_deprecated_True" "objects_2143_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2143_description_On Android, accessing the device contact list requires that the app hold the READ_CONTACTS permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access the device contact list, with extra scrutiny applied to any that do so." "objects_2143_type_relationship" "objects_2143_created_2017-10-25T14:48:53.736Z" "objects_2143_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2143_id_relationship--e183af70-44d5-4d56-9aad-753eb4c1c964" "objects_2143_modified_2019-10-23T14:19:37.289Z" "objects_2143_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2143_relationship_type_mitigates" "objects_2143_target_ref_attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce" "objects_2143_spec_version_2.1" "objects_2143_x_mitre_attack_spec_version_2.1.0" "objects_2143_x_mitre_domains_0_mobile-attack" "objects_2143_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2143_x_mitre_version_1.0" "objects_2143_x_mitre_deprecated_True" "objects_2144_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2144_modified_2019-10-23T14:19:37.289Z" "objects_2144_type_relationship" "objects_2144_created_2017-10-25T14:48:53.738Z" "objects_2144_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2144_id_relationship--f6fa0801-418e-43e5-bfae-332e909624fc" "objects_2144_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2144_relationship_type_mitigates" "objects_2144_target_ref_attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060" "objects_2144_spec_version_2.1" "objects_2144_x_mitre_attack_spec_version_2.1.0" "objects_2144_x_mitre_domains_0_mobile-attack" "objects_2144_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2144_x_mitre_version_1.0" "objects_2144_x_mitre_deprecated_True" "objects_2145_id_relationship--9d7ac1b2-3fa9-4236-b72d-5565f0c66eab" "objects_2145_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2145_description_[Twitoor](https://attack.mitre.org/software/S0302) uses Twitter for command and control.(Citation: ESET-Twitoor)" "objects_2145_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2145_external_references_0_url_http://www.welivesecurity.com/2016/08/24/first-twitter-controlled-android-botnet-discovered/" "objects_2145_external_references_0_description_ESET. (2016, August 24). First Twitter-controlled Android botnet discovered. Retrieved December 22, 2016." "objects_2145_external_references_0_source_name_ESET-Twitoor" "objects_2145_source_ref_malware--41e3fd01-7b83-471f-835d-d2b1dc9a770c" "objects_2145_relationship_type_uses" "objects_2145_target_ref_attack-pattern--be055942-6e63-49d7-9fa1-9cb7d8a8f3f4" "objects_2145_type_relationship" "objects_2145_modified_2020-10-27T14:49:39.188Z" "objects_2145_created_2017-12-14T16:46:06.044Z" "objects_2145_spec_version_2.1" "objects_2145_x_mitre_attack_spec_version_2.1.0" "objects_2145_x_mitre_domains_0_enterprise-attack" "objects_2145_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2145_x_mitre_version_1.0" "objects_2145_x_mitre_deprecated_True" "objects_2146_id_relationship--f2e23cb7-7bac-4938-91ea-7dd42b41ba29" "objects_2146_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2146_description_[ANDROIDOS_ANSERVER.A](https://attack.mitre.org/software/S0310) uses encrypted content within a blog site for part of its command and control. Specifically, the encrypted content contains URLs for other servers to be used for other aspects of command and control." "objects_2146_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2146_external_references_0_url_http://blog.trendmicro.com/trendlabs-security-intelligence/android-malware-uses-blog-posts-as-cc/" "objects_2146_external_references_0_description_Karl Dominguez. (2011, October 2). Android Malware Uses Blog Posts as C&C. Retrieved February 6, 2017." "objects_2146_external_references_0_source_name_TrendMicro-Anserver" "objects_2146_source_ref_malware--4bf6ba32-4165-42c1-b911-9c36165891c8" "objects_2146_relationship_type_uses" "objects_2146_target_ref_attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673" "objects_2146_type_relationship" "objects_2146_modified_2018-04-30T13:45:13.024Z" "objects_2146_created_2017-12-14T16:46:06.044Z" "objects_2146_spec_version_2.1" "objects_2146_x_mitre_attack_spec_version_2.1.0" "objects_2146_x_mitre_domains_0_mobile-attack" "objects_2146_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2146_x_mitre_version_1.0" "objects_2146_x_mitre_deprecated_True" "objects_2147_id_relationship--f825f5ea-3815-431f-b005-4c01b8b2fed9" "objects_2147_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2147_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2147_source_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_2147_relationship_type_revoked-by" "objects_2147_target_ref_attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5" "objects_2147_type_relationship" "objects_2147_modified_2018-04-30T13:45:13.024Z" "objects_2147_created_2018-10-17T00:14:20.652Z" "objects_2147_spec_version_2.1" "objects_2147_x_mitre_attack_spec_version_2.1.0" "objects_2147_x_mitre_domains_0_mobile-attack" "objects_2147_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2147_x_mitre_version_1.0" "objects_2147_x_mitre_deprecated_True" "objects_2148_created_2017-10-25T14:48:53.734Z" "objects_2148_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2148_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2148_id_relationship--047ab474-c4ec-4675-a817-1e0a9f8dd92f" "objects_2148_modified_2018-10-23T00:14:20.652Z" "objects_2148_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2148_relationship_type_mitigates" "objects_2148_target_ref_attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f" "objects_2148_type_relationship" "objects_2148_spec_version_2.1" "objects_2148_x_mitre_attack_spec_version_2.1.0" "objects_2148_x_mitre_domains_0_mobile-attack" "objects_2148_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2148_x_mitre_version_1.0" "objects_2148_x_mitre_deprecated_True" "objects_2149_created_2017-10-25T14:48:53.736Z" "objects_2149_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2149_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2149_id_relationship--0673ca70-d403-4e49-8e18-de4bf8ab700c" "objects_2149_modified_2018-10-23T00:14:20.652Z" "objects_2149_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2149_relationship_type_mitigates" "objects_2149_target_ref_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_2149_type_relationship" "objects_2149_spec_version_2.1" "objects_2149_x_mitre_attack_spec_version_2.1.0" "objects_2149_x_mitre_domains_0_mobile-attack" "objects_2149_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2149_x_mitre_version_1.0" "objects_2149_x_mitre_deprecated_True" "objects_2150_created_2017-12-14T16:46:06.044Z" "objects_2150_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2150_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2150_description_Pegasus for Android attempts to detect whether it is running in an emulator rather than a real device." "objects_2150_external_references_0_description_Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017." "objects_2150_external_references_0_source_name_Lookout-PegasusAndroid" "objects_2150_external_references_0_url_https://blog.lookout.com/blog/2017/04/03/pegasus-android/" "objects_2150_id_relationship--0e81eb1d-cd1e-43e1-8c09-03927681ce76" "objects_2150_modified_2018-10-23T00:14:20.652Z" "objects_2150_source_ref_malware--93799a9d-3537-43d8-b6f4-17215de1657c" "objects_2150_relationship_type_uses" "objects_2150_target_ref_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_2150_type_relationship" "objects_2150_spec_version_2.1" "objects_2150_x_mitre_attack_spec_version_2.1.0" "objects_2150_x_mitre_domains_0_mobile-attack" "objects_2150_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2150_x_mitre_version_1.0" "objects_2150_x_mitre_deprecated_True" "objects_2151_created_2017-10-25T14:48:53.740Z" "objects_2151_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2151_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2151_id_relationship--176ba064-0657-4850-baa3-626bc845efd3" "objects_2151_modified_2018-10-23T00:14:20.652Z" "objects_2151_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2151_relationship_type_mitigates" "objects_2151_target_ref_attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431" "objects_2151_type_relationship" "objects_2151_spec_version_2.1" "objects_2151_x_mitre_attack_spec_version_2.1.0" "objects_2151_x_mitre_domains_0_mobile-attack" "objects_2151_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2151_x_mitre_version_1.0" "objects_2151_x_mitre_deprecated_True" "objects_2152_created_2017-10-25T14:48:53.735Z" "objects_2152_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2152_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2152_id_relationship--1a493cb6-452f-46ce-a7b4-267eacd5d2ff" "objects_2152_modified_2018-10-23T00:14:20.652Z" "objects_2152_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2152_relationship_type_mitigates" "objects_2152_target_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_2152_type_relationship" "objects_2152_spec_version_2.1" "objects_2152_x_mitre_attack_spec_version_2.1.0" "objects_2152_x_mitre_domains_0_mobile-attack" "objects_2152_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2152_x_mitre_version_1.0" "objects_2152_x_mitre_deprecated_True" "objects_2153_created_2017-10-25T14:48:53.743Z" "objects_2153_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2153_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2153_id_relationship--1a62c9c7-2d3b-4ee7-87d1-d8774050c566" "objects_2153_modified_2018-10-23T00:14:20.652Z" "objects_2153_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2153_relationship_type_mitigates" "objects_2153_target_ref_attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09" "objects_2153_type_relationship" "objects_2153_spec_version_2.1" "objects_2153_x_mitre_attack_spec_version_2.1.0" "objects_2153_x_mitre_domains_0_mobile-attack" "objects_2153_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2153_x_mitre_version_1.0" "objects_2153_x_mitre_deprecated_True" "objects_2154_created_2017-10-25T14:48:53.743Z" "objects_2154_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2154_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2154_id_relationship--2f5da3a1-19da-421f-be48-cfdcd3c79be1" "objects_2154_modified_2018-10-23T00:14:20.652Z" "objects_2154_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2154_relationship_type_mitigates" "objects_2154_target_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_2154_type_relationship" "objects_2154_spec_version_2.1" "objects_2154_x_mitre_attack_spec_version_2.1.0" "objects_2154_x_mitre_domains_0_mobile-attack" "objects_2154_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2154_x_mitre_version_1.0" "objects_2154_x_mitre_deprecated_True" "objects_2155_created_2017-10-25T14:48:53.740Z" "objects_2155_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2155_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2155_id_relationship--3a9467d4-09df-4266-ba5a-d40309949e70" "objects_2155_modified_2018-10-23T00:14:20.652Z" "objects_2155_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2155_relationship_type_mitigates" "objects_2155_target_ref_attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431" "objects_2155_type_relationship" "objects_2155_spec_version_2.1" "objects_2155_x_mitre_attack_spec_version_2.1.0" "objects_2155_x_mitre_domains_0_mobile-attack" "objects_2155_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2155_x_mitre_version_1.0" "objects_2155_x_mitre_deprecated_True" "objects_2156_created_2017-10-25T14:48:53.735Z" "objects_2156_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2156_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2156_id_relationship--3baf01c5-591b-43a0-8963-506531313e68" "objects_2156_modified_2018-10-23T00:14:20.652Z" "objects_2156_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2156_relationship_type_mitigates" "objects_2156_target_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_2156_type_relationship" "objects_2156_spec_version_2.1" "objects_2156_x_mitre_attack_spec_version_2.1.0" "objects_2156_x_mitre_domains_0_mobile-attack" "objects_2156_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2156_x_mitre_version_1.0" "objects_2156_x_mitre_deprecated_True" "objects_2157_created_2017-12-14T16:46:06.044Z" "objects_2157_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2157_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2157_description_ZergHelper \"abuses enterprises certificate and personal certificates to sign and distribute apps, which may include code that hasn\u2019t been reviewed, or abuse private APIs.\"" "objects_2157_external_references_0_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_2157_external_references_0_source_name_ZergHelper" "objects_2157_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_2157_id_relationship--40581c90-e948-4e91-8530-a9bc59cce9d7" "objects_2157_modified_2018-10-23T00:14:20.652Z" "objects_2157_source_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_2157_relationship_type_uses" "objects_2157_target_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_2157_type_relationship" "objects_2157_spec_version_2.1" "objects_2157_x_mitre_attack_spec_version_2.1.0" "objects_2157_x_mitre_domains_0_mobile-attack" "objects_2157_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2157_x_mitre_version_1.0" "objects_2157_x_mitre_deprecated_True" "objects_2158_created_2017-10-25T14:48:53.739Z" "objects_2158_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2158_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2158_id_relationship--49fe6eac-73a7-4147-9121-85fb71fca4ed" "objects_2158_modified_2018-10-23T00:14:20.652Z" "objects_2158_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2158_relationship_type_mitigates" "objects_2158_target_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_2158_type_relationship" "objects_2158_spec_version_2.1" "objects_2158_x_mitre_attack_spec_version_2.1.0" "objects_2158_x_mitre_domains_0_mobile-attack" "objects_2158_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2158_x_mitre_version_1.0" "objects_2158_x_mitre_deprecated_True" "objects_2159_created_2017-10-25T14:48:53.743Z" "objects_2159_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2159_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2159_id_relationship--64a6fb42-65ce-4160-a5c8-ac176f60a2ae" "objects_2159_modified_2018-10-23T00:14:20.652Z" "objects_2159_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2159_relationship_type_mitigates" "objects_2159_target_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_2159_type_relationship" "objects_2159_spec_version_2.1" "objects_2159_x_mitre_attack_spec_version_2.1.0" "objects_2159_x_mitre_domains_0_mobile-attack" "objects_2159_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2159_x_mitre_version_1.0" "objects_2159_x_mitre_deprecated_True" "objects_2160_created_2017-10-25T14:48:53.734Z" "objects_2160_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2160_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2160_id_relationship--69bdeed3-d6a8-4d10-8bf5-44c6cb4392e5" "objects_2160_modified_2018-10-23T00:14:20.652Z" "objects_2160_source_ref_course-of-action--bcecd036-f40e-4916-9f8e-fd0ccf0ece8d" "objects_2160_relationship_type_mitigates" "objects_2160_target_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_2160_type_relationship" "objects_2160_spec_version_2.1" "objects_2160_x_mitre_attack_spec_version_2.1.0" "objects_2160_x_mitre_domains_0_mobile-attack" "objects_2160_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2160_x_mitre_version_1.0" "objects_2160_x_mitre_deprecated_True" "objects_2161_created_2017-12-14T16:46:06.044Z" "objects_2161_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2161_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2161_description_MazarBOT is delivered via an unsolicited text message containing a link to a web download URI." "objects_2161_external_references_0_description_Graham Cluley. (2016, February 16). Android users warned of malware attack spreading via SMS. Retrieved December 23, 2016." "objects_2161_external_references_0_source_name_Tripwire-MazarBOT" "objects_2161_external_references_0_url_https://www.tripwire.com/state-of-security/security-data-protection/android-malware-sms/" "objects_2161_id_relationship--6fce6a21-ab9b-44a5-be20-9b631109487b" "objects_2161_modified_2018-10-23T00:14:20.652Z" "objects_2161_source_ref_malware--5ddf81ea-2c06-497b-8c30-5f1ab89a40f9" "objects_2161_relationship_type_uses" "objects_2161_target_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_2161_type_relationship" "objects_2161_spec_version_2.1" "objects_2161_x_mitre_attack_spec_version_2.1.0" "objects_2161_x_mitre_domains_0_mobile-attack" "objects_2161_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2161_x_mitre_version_1.0" "objects_2161_x_mitre_deprecated_True" "objects_2162_created_2017-10-25T14:48:53.742Z" "objects_2162_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2162_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2162_id_relationship--718949aa-6841-48d2-9343-f01be0aa32c1" "objects_2162_modified_2018-10-23T00:14:20.652Z" "objects_2162_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2162_relationship_type_mitigates" "objects_2162_target_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_2162_type_relationship" "objects_2162_spec_version_2.1" "objects_2162_x_mitre_attack_spec_version_2.1.0" "objects_2162_x_mitre_domains_0_mobile-attack" "objects_2162_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2162_x_mitre_version_1.0" "objects_2162_x_mitre_deprecated_True" "objects_2163_created_2017-12-14T16:46:06.044Z" "objects_2163_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2163_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2163_description_The Android/Chuli.A malicious application sent to activist groups used uploads to an http URL as a command and control mechanism." "objects_2163_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_2163_external_references_0_source_name_Kaspersky-WUC" "objects_2163_external_references_0_url_https://securelist.com/blog/incidents/35552/android-trojan-found-in-targeted-attack-58/" "objects_2163_id_relationship--7c966cde-22fd-4eb2-b518-3e37a8fad88b" "objects_2163_modified_2018-10-23T00:14:20.652Z" "objects_2163_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_2163_relationship_type_uses" "objects_2163_target_ref_attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad" "objects_2163_type_relationship" "objects_2163_spec_version_2.1" "objects_2163_x_mitre_attack_spec_version_2.1.0" "objects_2163_x_mitre_domains_0_mobile-attack" "objects_2163_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2163_x_mitre_version_1.0" "objects_2163_x_mitre_deprecated_True" "objects_2164_created_2017-12-14T16:46:06.044Z" "objects_2164_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2164_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2164_description_Charger \"checks whether it is being run in an emulator before it starts its malicious activity\"." "objects_2164_external_references_0_description_Oren Koriat and Andrey Polkovnichenko. (2017, January 24). Charger Malware Calls and Raises the Risk on Google Play. Retrieved January 24, 2017." "objects_2164_external_references_0_source_name_CheckPoint-Charger" "objects_2164_external_references_0_url_http://blog.checkpoint.com/2017/01/24/charger-malware/" "objects_2164_id_relationship--7e4be913-d916-4a79-ac00-262a49afe070" "objects_2164_modified_2018-10-23T00:14:20.652Z" "objects_2164_source_ref_malware--d1c600f8-0fb6-4367-921b-85b71947d950" "objects_2164_relationship_type_uses" "objects_2164_target_ref_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_2164_type_relationship" "objects_2164_spec_version_2.1" "objects_2164_x_mitre_attack_spec_version_2.1.0" "objects_2164_x_mitre_domains_0_mobile-attack" "objects_2164_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2164_x_mitre_version_1.0" "objects_2164_x_mitre_deprecated_True" "objects_2165_created_2017-10-25T14:48:53.739Z" "objects_2165_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2165_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2165_id_relationship--8e49feb1-e401-4e63-acfa-7f8b9a8ca026" "objects_2165_modified_2018-10-23T00:14:20.652Z" "objects_2165_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2165_relationship_type_mitigates" "objects_2165_target_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_2165_type_relationship" "objects_2165_spec_version_2.1" "objects_2165_x_mitre_attack_spec_version_2.1.0" "objects_2165_x_mitre_domains_0_mobile-attack" "objects_2165_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2165_x_mitre_version_1.0" "objects_2165_x_mitre_deprecated_True" "objects_2166_created_2017-12-14T16:46:06.044Z" "objects_2166_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2166_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2166_description_XcodeGhost was injected into apps by a modified version of Xcode (Apple's software development tool)." "objects_2166_external_references_0_description_Claud Xiao. (2015, September 17). Novel Malware XcodeGhost Modifies Xcode, Infects Apple iOS Apps and Hits App Store. Retrieved December 21, 2016." "objects_2166_external_references_0_source_name_PaloAlto-XcodeGhost1" "objects_2166_external_references_0_url_http://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/" "objects_2166_external_references_1_description_Claud Xiao. (2015, September 18). Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps. Retrieved December 21, 2016." "objects_2166_external_references_1_source_name_PaloAlto-XcodeGhost" "objects_2166_external_references_1_url_http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/" "objects_2166_id_relationship--8e4b2305-1280-4456-8ec7-93c66da5c674" "objects_2166_modified_2018-10-23T00:14:20.652Z" "objects_2166_source_ref_malware--d9e07aea-baad-4b68-bdca-90c77647d7f9" "objects_2166_relationship_type_uses" "objects_2166_target_ref_attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc" "objects_2166_type_relationship" "objects_2166_spec_version_2.1" "objects_2166_x_mitre_attack_spec_version_2.1.0" "objects_2166_x_mitre_domains_0_mobile-attack" "objects_2166_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2166_x_mitre_version_1.0" "objects_2166_x_mitre_deprecated_True" "objects_2167_created_2017-10-25T14:48:53.747Z" "objects_2167_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2167_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2167_id_relationship--8f7c14bf-4c0f-4e54-99c2-41b511220b33" "objects_2167_modified_2018-10-23T00:14:20.652Z" "objects_2167_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2167_relationship_type_mitigates" "objects_2167_target_ref_attack-pattern--831e3269-da49-48ac-94dc-948008e8fd16" "objects_2167_type_relationship" "objects_2167_spec_version_2.1" "objects_2167_x_mitre_attack_spec_version_2.1.0" "objects_2167_x_mitre_domains_0_mobile-attack" "objects_2167_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2167_x_mitre_version_1.0" "objects_2167_x_mitre_deprecated_True" "objects_2168_created_2017-10-25T14:48:53.743Z" "objects_2168_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2168_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2168_id_relationship--9adde9d7-4ba0-4e35-93ba-1e85e9eb16bc" "objects_2168_modified_2018-10-23T00:14:20.652Z" "objects_2168_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2168_relationship_type_mitigates" "objects_2168_target_ref_attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc" "objects_2168_type_relationship" "objects_2168_spec_version_2.1" "objects_2168_x_mitre_attack_spec_version_2.1.0" "objects_2168_x_mitre_domains_0_mobile-attack" "objects_2168_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2168_x_mitre_version_1.0" "objects_2168_x_mitre_deprecated_True" "objects_2169_created_2017-12-14T16:46:06.044Z" "objects_2169_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2169_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2169_description_Pegasus was delivered via an SMS message containing a link to a web site with malicious code." "objects_2169_external_references_0_description_Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group\u2019s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016." "objects_2169_external_references_0_source_name_PegasusCitizenLab" "objects_2169_external_references_0_url_https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/" "objects_2169_id_relationship--9e77b80d-4981-4908-9203-c4e7cea5b5d8" "objects_2169_modified_2018-10-23T00:14:20.652Z" "objects_2169_source_ref_malware--33d9d91d-aad9-49d5-a516-220ce101ac8a" "objects_2169_relationship_type_uses" "objects_2169_target_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_2169_type_relationship" "objects_2169_spec_version_2.1" "objects_2169_x_mitre_attack_spec_version_2.1.0" "objects_2169_x_mitre_domains_0_mobile-attack" "objects_2169_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2169_x_mitre_version_1.0" "objects_2169_x_mitre_deprecated_True" "objects_2170_created_2017-10-25T14:48:53.744Z" "objects_2170_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2170_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2170_id_relationship--a834341f-d909-41e3-adaf-5f3450e4090e" "objects_2170_modified_2018-10-23T00:14:20.652Z" "objects_2170_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2170_relationship_type_mitigates" "objects_2170_target_ref_attack-pattern--e30cc912-7ea1-4683-9219-543b86cbdec9" "objects_2170_type_relationship" "objects_2170_spec_version_2.1" "objects_2170_x_mitre_attack_spec_version_2.1.0" "objects_2170_x_mitre_domains_0_mobile-attack" "objects_2170_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2170_x_mitre_version_1.0" "objects_2170_x_mitre_deprecated_True" "objects_2171_created_2017-10-25T14:48:53.734Z" "objects_2171_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2171_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2171_id_relationship--a912f528-5218-4e0b-a350-7e9012cccdf3" "objects_2171_modified_2018-10-23T00:14:20.652Z" "objects_2171_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2171_relationship_type_mitigates" "objects_2171_target_ref_attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d" "objects_2171_type_relationship" "objects_2171_spec_version_2.1" "objects_2171_x_mitre_attack_spec_version_2.1.0" "objects_2171_x_mitre_domains_0_mobile-attack" "objects_2171_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2171_x_mitre_version_1.0" "objects_2171_x_mitre_deprecated_True" "objects_2172_created_2017-10-25T14:48:53.735Z" "objects_2172_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2172_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2172_id_relationship--aa23a2c6-ed8a-4453-95d1-f9a47e14b0f9" "objects_2172_modified_2018-10-23T00:14:20.652Z" "objects_2172_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2172_relationship_type_mitigates" "objects_2172_target_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_2172_type_relationship" "objects_2172_spec_version_2.1" "objects_2172_x_mitre_attack_spec_version_2.1.0" "objects_2172_x_mitre_domains_0_mobile-attack" "objects_2172_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2172_x_mitre_version_1.0" "objects_2172_x_mitre_deprecated_True" "objects_2173_created_2017-10-25T14:48:53.733Z" "objects_2173_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2173_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2173_id_relationship--aaf0ae2f-07ea-479e-8419-e524e23dbaef" "objects_2173_modified_2018-10-23T00:14:20.652Z" "objects_2173_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2173_relationship_type_mitigates" "objects_2173_target_ref_attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881" "objects_2173_type_relationship" "objects_2173_spec_version_2.1" "objects_2173_x_mitre_attack_spec_version_2.1.0" "objects_2173_x_mitre_domains_0_mobile-attack" "objects_2173_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2173_x_mitre_version_1.0" "objects_2173_x_mitre_deprecated_True" "objects_2174_created_2017-10-25T14:48:53.736Z" "objects_2174_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2174_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2174_id_relationship--b104c62f-771c-46c5-afc4-a964a94cea50" "objects_2174_modified_2018-10-23T00:14:20.652Z" "objects_2174_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2174_relationship_type_mitigates" "objects_2174_target_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_2174_type_relationship" "objects_2174_spec_version_2.1" "objects_2174_x_mitre_attack_spec_version_2.1.0" "objects_2174_x_mitre_domains_0_mobile-attack" "objects_2174_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2174_x_mitre_version_1.0" "objects_2174_x_mitre_deprecated_True" "objects_2175_created_2017-10-25T14:48:53.736Z" "objects_2175_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2175_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2175_id_relationship--bf859944-d097-45ba-ae01-2f85a00cad1f" "objects_2175_modified_2018-10-23T00:14:20.652Z" "objects_2175_source_ref_course-of-action--653492e3-27be-4a0e-b08c-938dd2b7e0e1" "objects_2175_relationship_type_mitigates" "objects_2175_target_ref_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_2175_type_relationship" "objects_2175_spec_version_2.1" "objects_2175_x_mitre_attack_spec_version_2.1.0" "objects_2175_x_mitre_domains_0_mobile-attack" "objects_2175_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2175_x_mitre_version_1.0" "objects_2175_x_mitre_deprecated_True" "objects_2176_created_2017-10-25T14:48:53.745Z" "objects_2176_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2176_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2176_id_relationship--c2437c8b-709f-47e8-ae65-21ae48410a9e" "objects_2176_modified_2018-10-23T00:14:20.652Z" "objects_2176_source_ref_course-of-action--1553b156-6767-47f7-9eb4-2a692505666d" "objects_2176_relationship_type_mitigates" "objects_2176_target_ref_attack-pattern--11bd699b-f2c2-4e48-bf46-fb3f8acd9799" "objects_2176_type_relationship" "objects_2176_spec_version_2.1" "objects_2176_x_mitre_attack_spec_version_2.1.0" "objects_2176_x_mitre_domains_0_mobile-attack" "objects_2176_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2176_x_mitre_version_1.0" "objects_2176_x_mitre_deprecated_True" "objects_2177_created_2017-12-14T16:46:06.044Z" "objects_2177_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2177_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2177_description_\"YiSpecter's malicious apps were signed with three iOS enterprise certificates issued by Apple so that they can be installed as enterprise apps on non-jailbroken iOS devices.\"" "objects_2177_external_references_0_description_[ Claud Xiao. (2015, October 4). YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs. Retrieved January 20, 2017." "objects_2177_external_references_0_source_name_PaloAlto-YiSpecter" "objects_2177_id_relationship--c5d6fb25-1782-44c4-b3ae-0cd72e8a6d37" "objects_2177_modified_2018-10-23T00:14:20.652Z" "objects_2177_source_ref_malware--a15c9357-2be0-4836-beec-594f28b9b4a9" "objects_2177_relationship_type_uses" "objects_2177_target_ref_attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac" "objects_2177_type_relationship" "objects_2177_spec_version_2.1" "objects_2177_x_mitre_attack_spec_version_2.1.0" "objects_2177_x_mitre_domains_0_mobile-attack" "objects_2177_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2177_x_mitre_version_1.0" "objects_2177_x_mitre_deprecated_True" "objects_2178_created_2017-10-25T14:48:53.734Z" "objects_2178_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2178_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2178_id_relationship--ca7c3278-1d12-4e55-b320-39efa5a285db" "objects_2178_modified_2018-10-23T00:14:20.652Z" "objects_2178_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2178_relationship_type_mitigates" "objects_2178_target_ref_attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f" "objects_2178_type_relationship" "objects_2178_spec_version_2.1" "objects_2178_x_mitre_attack_spec_version_2.1.0" "objects_2178_x_mitre_domains_0_mobile-attack" "objects_2178_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2178_x_mitre_version_1.0" "objects_2178_x_mitre_deprecated_True" "objects_2179_created_2017-10-25T14:48:53.736Z" "objects_2179_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2179_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2179_id_relationship--cdb1ed75-d8a5-4088-b282-0b85588bbc8c" "objects_2179_modified_2018-10-23T00:14:20.652Z" "objects_2179_source_ref_course-of-action--649f7268-4c12-483b-ac84-4b7bca9fe2ee" "objects_2179_relationship_type_mitigates" "objects_2179_target_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_2179_type_relationship" "objects_2179_spec_version_2.1" "objects_2179_x_mitre_attack_spec_version_2.1.0" "objects_2179_x_mitre_domains_0_mobile-attack" "objects_2179_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2179_x_mitre_version_1.0" "objects_2179_x_mitre_deprecated_True" "objects_2180_created_2017-12-14T16:46:06.044Z" "objects_2180_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2180_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2180_description_Adups is pre-installed on Android devices from some vendors." "objects_2180_external_references_0_description_Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017." "objects_2180_external_references_0_source_name_NYTimes-BackDoor" "objects_2180_external_references_0_url_https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html" "objects_2180_external_references_1_description_Jeremy Kirk. (2016, November 16). Why Did Chinese Spyware Linger in U.S. Phones?. Retrieved February 6, 2017." "objects_2180_external_references_1_source_name_BankInfoSecurity-BackDoor" "objects_2180_external_references_1_url_http://www.bankinfosecurity.com/did-chinese-spyware-linger-in-us-phones-a-9534" "objects_2180_id_relationship--d792bffd-6745-4da6-a70f-2d5843ef05ca" "objects_2180_modified_2018-10-23T00:14:20.652Z" "objects_2180_source_ref_malware--f6ac21b6-2592-400c-8472-10d0e2f1bfaf" "objects_2180_relationship_type_uses" "objects_2180_target_ref_attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df" "objects_2180_type_relationship" "objects_2180_spec_version_2.1" "objects_2180_x_mitre_attack_spec_version_2.1.0" "objects_2180_x_mitre_domains_0_mobile-attack" "objects_2180_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2180_x_mitre_version_1.0" "objects_2180_x_mitre_deprecated_True" "objects_2181_created_2017-12-14T16:46:06.044Z" "objects_2181_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2181_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2181_description_RuMMS is delivered via a web link to an APK (Android application package). The link is sent via SMS." "objects_2181_external_references_0_description_Wu Zhou, Deyu Hu, Jimmy Su, Yong Kang. (2016, April 26). RUMMS: THE LATEST FAMILY OF ANDROID MALWARE ATTACKING USERS IN RUSSIA VIA SMS PHISHING. Retrieved February 6, 2017." "objects_2181_external_references_0_source_name_FireEye-RuMMS" "objects_2181_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/04/rumms-android-malware.html" "objects_2181_id_relationship--e3a03a80-0e31-43ef-b802-d6f65c44896d" "objects_2181_modified_2018-10-23T00:14:20.652Z" "objects_2181_source_ref_malware--936be60d-90eb-4c36-9247-4b31128432c4" "objects_2181_relationship_type_uses" "objects_2181_target_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_2181_type_relationship" "objects_2181_spec_version_2.1" "objects_2181_x_mitre_attack_spec_version_2.1.0" "objects_2181_x_mitre_domains_0_mobile-attack" "objects_2181_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2181_x_mitre_version_1.0" "objects_2181_x_mitre_deprecated_True" "objects_2182_created_2017-12-14T16:46:06.044Z" "objects_2182_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2182_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2182_description_ZergHelper \"appears to have gotten by Apple\u2019s app review process by performing different behaviors for users from different physical locations...For users outside of China, it would act as what it claimed: an English studying app. However, when accessing the app from China, its real features would appear.\" Presumably, Apple's app review occurred outside of China and the \"real features\" were not visible during the review." "objects_2182_external_references_0_description_Claud Xiao. (2016, February 21). Pirated iOS App Store\u2019s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016." "objects_2182_external_references_0_source_name_ZergHelper" "objects_2182_external_references_0_url_http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/" "objects_2182_id_relationship--eb686f55-85de-42d8-a5a1-69a78af0f1f3" "objects_2182_modified_2018-10-23T00:14:20.652Z" "objects_2182_source_ref_malware--3c3b55a6-c3e9-4043-8aae-283fe96220c0" "objects_2182_relationship_type_uses" "objects_2182_target_ref_attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b" "objects_2182_type_relationship" "objects_2182_spec_version_2.1" "objects_2182_x_mitre_attack_spec_version_2.1.0" "objects_2182_x_mitre_domains_0_mobile-attack" "objects_2182_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2182_x_mitre_version_1.0" "objects_2182_x_mitre_deprecated_True" "objects_2183_created_2017-12-14T16:46:06.044Z" "objects_2183_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2183_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2183_description_\"Malicious actors behind\" Shedun \"repackage and inject malicious code into thousands of popular applications found in Google Play, and then later publish them to third-party app stores. Indeed, we believe many of these apps are actually fully-functional, providing their usual services, in addition to the malicious code that roots the device.\"" "objects_2183_external_references_0_description_Michael Bentley. (2015, November 4). Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire. Retrieved December 21, 2016." "objects_2183_external_references_0_source_name_Lookout-Adware" "objects_2183_external_references_0_url_https://blog.lookout.com/blog/2015/11/04/trojanized-adware/" "objects_2183_id_relationship--ebc0aa93-93ac-4b7e-ad87-9d5743a09c8e" "objects_2183_modified_2018-10-23T00:14:20.652Z" "objects_2183_source_ref_malware--c80a6bef-b3ce-44d0-b113-946e93124898" "objects_2183_relationship_type_uses" "objects_2183_target_ref_attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f" "objects_2183_type_relationship" "objects_2183_spec_version_2.1" "objects_2183_x_mitre_attack_spec_version_2.1.0" "objects_2183_x_mitre_domains_0_mobile-attack" "objects_2183_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2183_x_mitre_version_1.0" "objects_2183_x_mitre_deprecated_True" "objects_2184_created_2017-12-14T16:46:06.044Z" "objects_2184_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2184_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2184_description_AndroidOverlayMalware was distributed by sending \"SMS messages with an embedded link that leads to the malware app.\"" "objects_2184_external_references_0_description_Wu Zhou et al. (2016, June 28). THE LATEST ANDROID OVERLAY MALWARE SPREADING VIA SMS PHISHING IN EUROPE. Retrieved December 21, 2016." "objects_2184_external_references_0_source_name_FireEye-AndroidOverlay" "objects_2184_external_references_0_url_https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay-malware-spreading-in-europe.html" "objects_2184_id_relationship--f14af74f-fb6b-480f-91de-d755c89960ce" "objects_2184_modified_2018-10-23T00:14:20.652Z" "objects_2184_source_ref_malware--b6d3657a-2d6a-400f-8b7e-4d60391aa1f7" "objects_2184_relationship_type_uses" "objects_2184_target_ref_attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2" "objects_2184_type_relationship" "objects_2184_spec_version_2.1" "objects_2184_x_mitre_attack_spec_version_2.1.0" "objects_2184_x_mitre_domains_0_mobile-attack" "objects_2184_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2184_x_mitre_version_1.0" "objects_2184_x_mitre_deprecated_True" "objects_2185_created_2017-10-25T14:48:53.743Z" "objects_2185_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2185_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2185_id_relationship--fa7b38df-eedc-469b-bcec-facdd8365231" "objects_2185_modified_2018-10-23T00:14:20.652Z" "objects_2185_source_ref_course-of-action--0beabf44-e8d8-4ae4-9122-ef56369a2564" "objects_2185_relationship_type_mitigates" "objects_2185_target_ref_attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a" "objects_2185_type_relationship" "objects_2185_spec_version_2.1" "objects_2185_x_mitre_attack_spec_version_2.1.0" "objects_2185_x_mitre_domains_0_mobile-attack" "objects_2185_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2185_x_mitre_version_1.0" "objects_2185_x_mitre_deprecated_True" "objects_2186_created_2017-12-14T16:46:06.044Z" "objects_2186_created_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2186_object_marking_refs_0_marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" "objects_2186_description_The Android/Chuli.A malware was delivered via a spear phishing message sent to activist groups containing a malicious Android application as an attachment." "objects_2186_external_references_0_description_Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016." "objects_2186_external_references_0_source_name_Kaspersky-WUC" "objects_2186_external_references_0_url_https://securelist.com/blog/incidents/35552/android-trojan-found-in-targeted-attack-58/" "objects_2186_id_relationship--fb371daf-2771-488f-90ca-5e08b9a36c5c" "objects_2186_modified_2018-10-23T00:14:20.652Z" "objects_2186_source_ref_malware--d05f7357-4cbe-47ea-bf83-b8604226d533" "objects_2186_relationship_type_uses" "objects_2186_target_ref_attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2" "objects_2186_type_relationship" "objects_2186_spec_version_2.1" "objects_2186_x_mitre_attack_spec_version_2.1.0" "objects_2186_x_mitre_domains_0_mobile-attack" "objects_2186_x_mitre_modified_by_ref_identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" "objects_2186_x_mitre_version_1.0" "objects_2186_x_mitre_deprecated_True"