Microphone or Camera Recordings

An adversary could use a malicious or exploited application to surreptitiously record activities using the device microphone and/or camera through use of standard operating system APIs.

ID: T1429

Tactic Type:  Post-Adversary Device Access

Tactic: Collection

Platform:  Android, iOS

MTC ID:  APP-19

Version: 1.0

Mitigations

MitigationDescription
Application VettingOn Android, applications must request the RECORD_AUDIO permission to access the microphone and the CAMERA permission to access the camera. Extra scrutiny could be given to applications that request these permissions. On iOS, calls to the relevant APIs could be detected during the vetting process.

Examples

NameDescription
AndroRAT

AndroRAT gathers audio from the microphone.[1]

Dendroid

Dendroid can take pictures using the phone’s camera as well as record audio and video.[2]

DroidJack

DroidJack performs call recording and video capturing.[3]

Pegasus for Android

Pegasus for Android has the ability to record audio and take pictures using the device camera.[4]

Pegasus for iOS

Pegasus for iOS has the ability to record audio.[5]

RCSAndroid

RCSAndroid can record using the microphone as well as capture photos using the front and back cameras.[6]

RedDrop

RedDrop exfiltrates locally saved files (including photos) as well as live recordings of the device's surroundings.[7]

Skygofree

Skygofree can record audio via the microphone when an infected device is in a specified location as well as record a video or capture a photo.[8]

SpyDealer

SpyDealer can record phone calls and surrounding audio and video, as well as take photos via front and rear cameras.[9]

SpyNote RAT

SpyNote RAT can activate the victim's microphone.[10]

Stealth Mango

Stealth Mango can record from the camera or microphone as well as take photos from the front and back cameras.[11]

Tangelo

Tangelo contains functionality to record calls as well as the victim device's environment.[11]

XLoader

XLoader covertly records phone calls.[12]

Detection

On both Android (6.0 and up) and iOS, the user can view which applications have permission to use the microphone or the camera through the device settings screen, and the user can choose to revoke the permissions.

References