An adversary with physical access to a mobile device may seek to bypass the device’s lockscreen. Several methods exist to accomplish this, including:
| ID | Name | Description |
|---|---|---|
| S1094 | BRATA |
BRATA can request the user unlock the device, or remotely unlock the device.[5] |
| S1083 | Chameleon |
Chameleon has the ability to bypass the biometric prompt for unlocking an infected device, forcing the victim to use PIN authentication. To do so, Chameleon will first check specified conditions, then will use the AccessibilityEvent action to transition from biometric authentication to PIN authentication.[6] |
| S1092 | Escobar |
Escobar can request the |
| ID | Mitigation | Description |
|---|---|---|
| M1012 | Enterprise Policy |
Enterprises can provision policies to mobile devices that require a minimum complexity (length, character requirements, etc.) for the device passcode, and cause the device to wipe all data if an incorrect passcode is entered too many times. Both policies would mitigate brute-force, guessing, or shoulder surfing of the device passcode. Enterprises can also provision policies to disable biometric authentication, however, biometric authentication can help make using a longer, more complex passcode more practical because it does not need to be entered as frequently. |
| M1001 | Security Updates |
OS security updates typically contain exploit patches when disclosed. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0645 | Detection of Lockscreen Bypass | AN1723 |
Mobile security products can often alert the user if their device is vulnerable to known exploits. |
| AN1724 |
Mobile security products can often alert the user if their device is vulnerable to known exploits. |