| ID | Name |
|---|---|
| T1422.001 | Internet Connection Discovery |
| T1422.002 | Wi-Fi Discovery |
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems. Adversaries may use Wi-Fi information as part of Discovery or Credential Access activity to support both ongoing and future campaigns.
| ID | Name | Description |
|---|---|---|
| S1079 | BOULDSPY |
BOULDSPY can collect network information, such as IP address, SIM card information, and Wi-Fi information.[1] |
| S0425 | Corona Updates |
Corona Updates can collect device network configuration information, such as Wi-Fi SSID and IMSI.[2] |
| S1077 | Hornbill |
Hornbill can collect a device's phone number and IMEI, and can check to see if Wi-Fi is enabled.[3] |
| S0463 | INSOMNIA |
INSOMNIA can collect the device’s phone number, ICCID, IMEI, and the currently active network interface (Wi-Fi or cellular).[4] |
| S1185 | LightSpy |
LightSpy uses the WifiList (or |
| S0407 | Monokle |
Monokle checks if the device is connected via Wi-Fi or mobile data.[9] |
| S0316 | Pegasus for Android |
Pegasus for Android checks if the device is on Wi-Fi, a cellular network, and is roaming.[10] |
| S0326 | RedDrop |
RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[11] |
| S1056 | TianySpy | |
| S0427 | TrickMo |
TrickMo can collect device network configuration information such as IMSI, IMEI, and Wi-Fi connection state.[13] |
| ID | Mitigation | Description |
|---|---|---|
| M1006 | Use Recent OS Version |
Android 10 introduced changes that prevent normal applications from accessing sensitive device identifiers.[14] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0709 | Detection of Wi-Fi Discovery | AN1833 |
Application vetting services could look for usage of the |
| AN1834 |
Application vetting services could look for usage of the |