Attack PC via USB Connection

With escalated privileges, an adversary could program the mobile device to impersonate USB devices such as input devices (keyboard and mouse), storage devices, and/or networking devices in order to attack a physically connected PC[1][2] This technique has been demonstrated on Android. We are unaware of any demonstrations on iOS.

ID: T1427

Tactic Type:  Post-Adversary Device Access

Tactic: Lateral Movement

Platform:  Android

MTC ID:  PHY-2

Version: 1.1

Mitigations

MitigationDescription
Security Updates
Use Recent OS Version
User GuidanceAdvise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debugging).

References