type stringclasses 1
value | id stringclasses 1
value | spec_version float64 2.1 2.1 | objects dict |
|---|---|---|---|
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T18:49:19.284Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Recent versions of Android modified how device administrator applications are uninstalled, making it easier for the user ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:55:56.745Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[DoubleAgent](https://attack.mitre.org/software/S0550) has accessed the list of installed apps.(Citation: Lookout Uyghur ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.740Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--6bb99599-aa51-4492-9c79-296a772233b4",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:46:17.841Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can register as an `SMSBroadcast` receiver to monitor incoming SMS m... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-09-11T15:57:37.770Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TrickMo](https://attack.mitre.org/software/S0427) can delete SMS messages.(Citation: SecurityIntelligence TrickMo)",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-12-14T16:46:06.044Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[PJApps](https://attack.mitre.org/software/S0291) has the capability to collect and leak the victim's location.(Citation:... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:45:11.580Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can download HTML overlay pages after installation.(Citation: cyble_... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-09-20T13:54:19.957Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CarbonSteal](https://attack.mitre.org/software/S0529) can silently accept an incoming phone call.(Citation: Lookout Uygh... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-04T15:38:56.562Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FlexiSpy](https://attack.mitre.org/software/S0408) can communicate with the command and control server over ports 12512 ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-14T17:47:08.826Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Dvmap](https://attack.mitre.org/software/S0420) checks the Android version to determine which system library to patch.(C... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-09-20T13:50:02.036Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) can make phone calls.(Citation: Cofense Anubis)",
"external_reference... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-06T13:22:57.754Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--09c55c29-ce4f-4d3e-a940-f3a4b6f07bca",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T13:40:37.259Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and lan... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[XLoader for Android](https://attack.mitre.org/software/S0318) loads an encrypted DEX code payload.(Citation: TrendMicro-... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-08-09T17:56:05.588Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SpyDealer](https://attack.mitre.org/software/S0324) can record video and take photos via front and rear cameras.(Citatio... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.891Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) can collect the device’s contact list.(Citation: Google Project Zero ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-28T19:41:37.162Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Security updates may contain patches for devices that were compromised at the supply chain level.",
"external_reference... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T20:36:03.177Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may use a device’s geographical location to limit certain malicious behaviors. For example, malware operators... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-21T22:18:06.516Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SharkBot](https://attack.mitre.org/software/S1055) initially poses as a benign application, then malware is downloaded a... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T19:01:13.826Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) has registered to receive 14 different broadcast intents... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T15:12:40.074Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[DEFENSOR ID](https://attack.mitre.org/software/S0479) was delivered via the Google Play Store.(Citation: ESET DEFENSOR I... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-23T22:17:13.986Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Security updates frequently contain patches to vulnerabilities. ",
"external_references": null,
"first_seen": null,
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T18:41:49.272Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AndroidOS/MalLocker.B](https://attack.mitre.org/software/S0524) is a variant of a ransomware family targeting Android de... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-10-01T14:42:49.152Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BusyGasper](https://attack.mitre.org/software/S0655) can run shell commands.(Citation: SecureList BusyGasper)",
"exter... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:46.411Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Trojan-SMS.AndroidOS.Agent.ao](https://attack.mitre.org/software/S0307) is Android malware. (Citation: Kaspersky-MobileM... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T22:04:27.920Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GoldenEagle](https://attack.mitre.org/software/S0551) has inserted trojan functionality into legitimate apps, including ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T14:50:07.291Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Device attestation could detect unauthorized operating system modifications.",
"external_references": null,
"first_se... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T13:32:21.089Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) has been spread using direct download links.(Citation: Threat Fabric Ex... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:46.107Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Trojan-SMS.AndroidOS.FakeInst.a](https://attack.mitre.org/software/S0306) is Android malware. (Citation: Kaspersky-Mobil... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-14T14:52:03.184Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Red Alert 2.0](https://attack.mitre.org/software/S0539) has used malicious overlays to collect banking credentials.(Cita... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-18T20:14:47.381Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TERRACOTTA](https://attack.mitre.org/software/S0545) has collected the device’s phone number and can check if the active... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-24T15:06:33.503Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Corona Updates](https://attack.mitre.org/software/S0425) can record MP4 files and monitor calls.(Citation: TrendMicro Co... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-23T13:36:08.445Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Rotexy](https://attack.mitre.org/software/S0411) is distributed through phishing links sent in SMS messages as `AvitoPay... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T15:32:24.921Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Cerberus](https://attack.mitre.org/software/S0480) avoids being analyzed by only activating the malware after recording ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T19:36:20.304Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Users should be trained on what device administrator permission request prompts look like, and how to avoid granting perm... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-01T13:14:43.195Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--02e4aedc-0674-4598-948b-0a32758af9ca",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:40:08.668Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BOULDSPY](https://attack.mitre.org/software/S1079) can encrypt its data before exfiltration.(Citation: lookout_bouldspy_... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:07.460Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An adversary could use access to a compromised device's credentials to attempt to manipulate app store rankings or rating... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:58:30.773Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in th... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-28T17:04:46.516Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Escobar](https://attack.mitre.org/software/S1092) is an Android banking trojan, first detected in March 2021, believed t... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-15T16:40:37.553Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile security products can potentially detect rogue Wi-Fi access points if the adversary is attempting to decrypt traff... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-11-20T16:37:28.475Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Golden Cup](https://attack.mitre.org/software/S0535) can collect the device’s contact list.(Citation: Symantec GoldenCup... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:41:40.104Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) can silently intercept and manipulate notifications. [S.O.V.A.](https... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.744Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "For applications running on Android 10 and higher devices, application developers can indicate that DEX code should alway... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:55:51.580Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device setti... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Stealth Mango](https://attack.mitre.org/software/S0328) can perform GPS location tracking as well as capturing coordinat... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-10T15:27:22.091Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tangelo](https://attack.mitre.org/software/S0329) accesses browser history, pictures, and videos.(Citation: Lookout-Stea... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-24T15:06:33.397Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Corona Updates](https://attack.mitre.org/software/S0425) can collect the device’s call log.(Citation: TrendMicro Coronav... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:41:19.421Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) can retrieve the device’s GPS location.(Citation: Cofense Anubis)",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-04-05T19:52:32.201Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--59aaa62b-a629-42c8-9bd2-8e75810135a9",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-27T17:05:58.263Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[GolfSpy](https://attack.mitre.org/software/S0421) can obtain the device’s contact list.(Citation: Trend Micro Bouncing G... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:45:56.967Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SilkBean](https://attack.mitre.org/software/S0549) can delete various piece of device data, such as contacts, call logs,... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:06:17.406Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AbstractEmu](https://attack.mitre.org/software/S1061) can disable Play Protect.(Citation: lookout_abstractemu_1021)",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T18:14:04.881Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile OSes have implemented measures to make it more difficult to trick users into installing untrusted certificates and... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:51:48.488Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Advise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debuggi... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-07-10T15:25:57.623Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FinFisher](https://attack.mitre.org/software/S0182) comes packaged with ExynosAbuse, an Android exploit that can gain ro... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:28.456Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "On Android, device type information is accessible to apps through the android.os.Build class (Citation: Android-Build). D... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-07T14:28:32.141Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exobot](https://attack.mitre.org/software/S0522) can open a SOCKS proxy connection through the compromised device.(Citat... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:51:25.149Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Ginp](https://attack.mitre.org/software/S0423) can download the device’s contact list.(Citation: ThreatFabric Ginp)",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:43:46.070Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services can detect which broadcast intents an application registers for and which permissions it req... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-02-08T16:36:20.785Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Windshift](https://attack.mitre.org/groups/G0112) has included contact list exfiltration in the malicious apps deployed ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-31T18:25:05.142Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[CHEMISTGAMES](https://attack.mitre.org/software/S0555) has collected the device’s location.(Citation: CYBERWARCON CHEMIS... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-24T17:46:31.466Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TrickMo](https://attack.mitre.org/software/S0427) can collect device information such as network operator, model, brand,... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-28T21:39:52.744Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TangleBot](https://attack.mitre.org/software/S1069) is SMS malware that was initially observed in September 2021, primar... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "The adversary is trying to get into your device.\n\nThe initial access tactic represents the vectors adversaries use to g... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.739Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Enterprises performing application vetting could search for applications that declare the RECEIVE_SMS permission and scru... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2021-01-05T20:16:19.968Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Tiktok Pro](https://attack.mitre.org/software/S0558) is spyware that has been masquerading as the TikTok application.(Ci... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:18.583Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the dev... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:32.740Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of operat... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-07-21T19:34:29.630Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[BOULDSPY](https://attack.mitre.org/software/S1079) can take and exfiltrate screenshots.(Citation: lookout_bouldspy_0423)... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-02T14:32:31.885Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[INSOMNIA](https://attack.mitre.org/software/S0463) can track the device’s location.(Citation: Google Project Zero Insomn... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-28T20:31:31.983Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[FluBot](https://attack.mitre.org/software/S1067) can intercept SMS messages and USSD messages from Telcom operators.(Cit... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-09-22T19:15:22.670Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Mobile security products can detect which applications can request device administrator permissions. Application vetting ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:38:22.312Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[S.O.V.A.](https://attack.mitre.org/software/S1062) can gather session cookies from infected devices. [S.O.V.A.](https://... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-30T13:59:50.479Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the underlying command prompts on An... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:08.613Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "**This technique has been deprecated. Please use [Input Capture](https://attack.mitre.org/techniques/T1417), [Input Injec... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-06-26T20:16:32.181Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[DEFENSOR ID](https://attack.mitre.org/software/S0479) has used Firebase Cloud Messaging for C2.(Citation: ESET DEFENSOR ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-28T14:35:37.309Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Adversaries may use Android’s Native Development Kit (NDK) to write native functions that can achieve execution of binari... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-11-21T19:16:34.820Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SimBad](https://attack.mitre.org/software/S0419) generates fraudulent advertising revenue by displaying ads in the backg... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-04-08T15:41:19.383Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Anubis](https://attack.mitre.org/software/S0422) can collect a list of installed applications to compare to a list of ta... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.274Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "When vetting applications for potential security weaknesses, the vetting process could look for insecure use of intents. ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:57:33.693Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services can detect when applications request the `SEND_SMS` permission, which should be infrequently... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-18T15:11:37.260Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting may be able to identify the presence of exploit code within applications.",
"external_references": ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-05-04T14:22:20.348Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[TrickMo](https://attack.mitre.org/software/S0427) can uninstall itself from a device on command by abusing the accessibi... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-01-21T15:29:27.041Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[ViceLeaker](https://attack.mitre.org/software/S0418) can download attacker-specified files.(Citation: SecureList - ViceL... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-02-06T19:01:08.265Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[AbstractEmu](https://attack.mitre.org/software/S1061) has encoded files, such as exploit binaries, to potentially use du... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-15T20:20:59.300Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Mandrake](https://attack.mitre.org/software/S0485) can manipulate visual components to trick the user into granting dang... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-08-16T16:40:34.787Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Chameleon](https://attack.mitre.org/software/S1083) can gather device location data.(Citation: cyble_chameleon_0423)",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-07-27T14:14:56.961Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Zen](https://attack.mitre.org/software/S0494) can dynamically load executable code from remote sources.(Citation: Google... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:44:44.257Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services can look for applications requesting the permissions granting access to accessibility servic... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Stealth Mango](https://attack.mitre.org/software/S0328) uploads call logs.(Citation: Lookout-StealthMango)",
"external... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2023-03-20T18:49:38.917Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "Application vetting services may be able to detect known privilege escalation exploits contained within applications, as ... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-09-03T19:45:48.518Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exodus](https://attack.mitre.org/software/S0405) Two can capture SMS messages.(Citation: SWB Exodus March 2019)",
"ext... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-11-18T14:47:25.327Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Triada](https://attack.mitre.org/software/S0424) injects code into the Zygote process to effectively include itself in a... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2017-10-25T14:48:53.737Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": null,
"external_references": null,
"first_seen": null,
"id": "relationship--2388ba94-8e49-40d0-a697-eea948e6cfb6",
... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-10-10T15:03:27.682Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Exodus](https://attack.mitre.org/software/S0405) One encrypts data using XOR prior to exfiltration.(Citation: SWB Exodus... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2022-03-31T19:53:01.320Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "",
"external_references": null,
"first_seen": null,
"id": "relationship--17adf4c2-e278-41fc-9183-cda5c8b74de7",
"... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-12-24T21:55:56.657Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[DoubleAgent](https://attack.mitre.org/software/S0550) has used an AES encrypted file in the assets folder with an unsusp... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2019-11-21T19:16:34.796Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[SimBad](https://attack.mitre.org/software/S0419) hides its icon from the application launcher.(Citation: CheckPoint SimB... |
bundle | bundle--c1e7cd65-d1cf-4e55-983b-ff89efee2605 | 2.1 | {
"aliases": null,
"created": "2020-10-29T19:21:23.215Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"definition": null,
"definition_type": null,
"description": "[Android/AdDisplay.Ashas](https://attack.mitre.org/software/S0525) has communicated with the C2 server using HTTP.(Citati... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.