Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.[1]
Due to mobile OS sandboxing, this technique is only possible in three scenarios:
ID | Name | Description |
---|---|---|
S1079 | BOULDSPY |
BOULDSPY can retrieve account information for third party services, such as Google, Telegram, WeChat, or WhatsApp.[2] |
S0655 | BusyGasper |
BusyGasper can collect data from messaging applications, including WhatsApp, Viber, and Facebook.[3] |
S0529 | CarbonSteal |
CarbonSteal can collect notes and data from the MiCode app.[4] |
S0505 | Desert Scorpion |
Desert Scorpion can collect account information stored on the device.[5] |
S0550 | DoubleAgent |
DoubleAgent has accessed browser history, as well as the files for 15 other apps.[4] |
S1092 | Escobar |
Escobar can request the |
S0405 | Exodus |
Exodus Two extracts information from Facebook, Facebook Messenger, Gmail, IMO, Skype, Telegram, Viber, WhatsApp, and WeChat.[1] |
S0509 | FakeSpy |
FakeSpy can collect account information stored on the device, as well as data in external storage.[7] |
S0408 | FlexiSpy |
FlexiSpy uses a |
S1103 | FlixOnline |
FlixOnline can steal data from a user’s WhatsApp account(s).[9] |
S1093 | FlyTrap |
FlyTrap can collect Facebook account information, such as Facebook ID, email address, cookies, and login tokens.[10][11] |
S0577 | FrozenCell |
FrozenCell has retrieved account information for other applications.[12] |
S0551 | GoldenEagle |
GoldenEagle has extracted messages from chat programs, such as WeChat.[4] |
S1128 | HilalRAT | |
S1077 | Hornbill |
Hornbill can collect voice notes and messages from WhatsApp, if installed.[14] |
S0485 | Mandrake | |
S0399 | Pallas |
Pallas retrieves messages and decryption keys for popular messaging applications and other accounts stored on the device.[16] |
S0316 | Pegasus for Android |
Pegasus for Android accesses sensitive data in files, such as messages stored by the WhatsApp, Facebook, and Twitter applications. It also has the ability to access arbitrary filenames and retrieve directory listings.[17] |
S0289 | Pegasus for iOS |
Pegasus for iOS accesses sensitive data in files, such as saving Skype calls by reading them out of the Skype database files.[18] |
S0295 | RCSAndroid |
RCSAndroid can collect contacts and messages from popular applications, including Facebook Messenger, WhatsApp, Skype, Viber, Line, WeChat, Hangouts, Telegram, and BlackBerry Messenger.[19] |
S1062 | S.O.V.A. |
S.O.V.A. can gather session cookies from infected devices. S.O.V.A. can also abuse Accessibility Services to steal Google Authenticator tokens.[20][21] |
G0034 | Sandworm Team |
Sandworm Team can collect encrypted Telegram and Signal communications.[22] |
S0327 | Skygofree |
Skygofree has a capability to obtain files from other installed applications.[23] |
S0324 | SpyDealer |
SpyDealer exfiltrates data from over 40 apps such as WeChat, Facebook, WhatsApp, Skype, and others.[24] |
S1082 | Sunbird |
Sunbird can exfiltrate browser history, BlackBerry Messenger files, IMO instant messaging content, and WhatsApp voice notes.[14] |
S0329 | Tangelo |
Tangelo accesses databases from WhatsApp, Viber, Skype, and Line.[25] |
S0311 | YiSpecter |
YiSpecter has modified Safari’s default search engine, bookmarked websites, opened pages, and accessed contacts and authorization tokens of the IM program "QQ" on infected devices.[26] |
ID | Mitigation | Description |
---|---|---|
M1006 | Use Recent OS Version |
Android 9 introduced a new security policy that prevents applications from reading or writing data to other applications’ internal storage directories, regardless of permissions. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | API Calls |
Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage. |