| ID | Name | 
|---|---|
| T1422.001 | Internet Connection Discovery | 
| T1422.002 | Wi-Fi Discovery | 
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems. Adversaries may use Wi-Fi information as part of Discovery or Credential Access activity to support both ongoing and future campaigns.
| ID | Name | Description | 
|---|---|---|
| S1079 | BOULDSPY | BOULDSPY can collect network information, such as IP address, SIM card information, and Wi-Fi information.[1] | 
| S0425 | Corona Updates | Corona Updates can collect device network configuration information, such as Wi-Fi SSID and IMSI.[2] | 
| S1077 | Hornbill | Hornbill can collect a device's phone number and IMEI, and can check to see if Wi-Fi is enabled.[3] | 
| S0463 | INSOMNIA | INSOMNIA can collect the device’s phone number, ICCID, IMEI, and the currently active network interface (Wi-Fi or cellular).[4] | 
| S1185 | LightSpy | LightSpy uses the WifiList (or  | 
| S0407 | Monokle | Monokle checks if the device is connected via Wi-Fi or mobile data.[9] | 
| S0316 | Pegasus for Android | Pegasus for Android checks if the device is on Wi-Fi, a cellular network, and is roaming.[10] | 
| S0326 | RedDrop | RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[11] | 
| S1056 | TianySpy | |
| S0427 | TrickMo | TrickMo can collect device network configuration information such as IMSI, IMEI, and Wi-Fi connection state.[13] | 
| ID | Mitigation | Description | 
|---|---|---|
| M1006 | Use Recent OS Version | Android 10 introduced changes that prevent normal applications from accessing sensitive device identifiers.[14] | 
| ID | Name | Analytic ID | Analytic Description | 
|---|---|---|---|
| DET0709 | Detection of Wi-Fi Discovery | AN1833 | Application vetting services could look for usage of the  | 
| AN1834 | Application vetting services could look for usage of the  |