Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1429 | Audio Capture | ||
Mobile | T1533 | Data from Local System |
Phenakite can collect and exfiltrate WhatsApp media, photos and files with specific extensions, such as .pdf and .doc.[2] |
|
Mobile | T1404 | Exploitation for Privilege Escalation |
Phenakite has included exploits for jailbreaking infected devices.[2] |
|
Mobile | T1544 | Ingress Tool Transfer |
Phenakite can download additional malware to the victim device.[2] |
|
Mobile | T1417 | Input Capture |
Phenakite has used phishing sites for iCloud and Facebook if either of those were used for authentication during the chat sign up process.[2] |
|
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
Phenakite can masquerade as the chat application "Magic Smile."[2] |
Mobile | T1636 | .003 | Protected User Data: Contact List |
Phenakite can exfiltrate the victim device’s contact list.[2] |
.004 | Protected User Data: SMS Messages | |||
Mobile | T1426 | System Information Discovery | ||
Mobile | T1512 | Video Capture |