GolfSpy is Android spyware deployed by the group Bouncing Golf.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1532 | Archive Collected Data |
GolfSpy encrypts data using a simple XOR operation with a pre-configured key prior to exfiltration.[1] |
|
Mobile | T1429 | Audio Capture | ||
Mobile | T1414 | Clipboard Data | ||
Mobile | T1533 | Data from Local System |
GolfSpy can collect local accounts on the device, pictures, bookmarks/histories of the default browser, and files stored on the SD card. GolfSpy can list image, audio, video, and other files stored on the device. GolfSpy can copy arbitrary files from the device.[1] |
|
Mobile | T1624 | .001 | Event Triggered Execution: Broadcast Receivers |
GolfSpy registers for the |
Mobile | T1646 | Exfiltration Over C2 Channel | ||
Mobile | T1630 | .002 | Indicator Removal on Host: File Deletion | |
Mobile | T1430 | Location Tracking | ||
Mobile | T1406 | Obfuscated Files or Information |
GolfSpy encodes its configurations using a customized algorithm.[1] |
|
Mobile | T1424 | Process Discovery | ||
Mobile | T1636 | .002 | Protected User Data: Call Log | |
.003 | Protected User Data: Contact List | |||
.004 | Protected User Data: SMS Messages | |||
Mobile | T1513 | Screen Capture | ||
Mobile | T1418 | Software Discovery | ||
Mobile | T1426 | System Information Discovery |
GolfSpy can obtain the device’s battery level, network operator, connection information, sensor information, and information about the device’s storage and memory.[1] |
|
Mobile | T1512 | Video Capture |
ID | Name | References |
---|---|---|
G0097 | Bouncing Golf |