ID | Name |
---|---|
T1630.001 | Uninstall Malicious Application |
T1630.002 | File Deletion |
T1630.003 | Disguise Root/Jailbreak Indicators |
Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by:
ID | Name | Description |
---|---|---|
S1094 | BRATA |
BRATA can uninstall itself and remove traces of infection.[1][2] |
S0480 | Cerberus | |
S1092 | Escobar | |
S1062 | S.O.V.A. | |
S1055 | SharkBot |
SharkBot has C2 commands that can uninstall the app from the infected device.[6] |
S0427 | TrickMo |
TrickMo can uninstall itself from a device on command by abusing the accessibility service.[7] |
ID | Mitigation | Description |
---|---|---|
M1002 | Attestation |
Attestation can detect rooted devices. Mobile security software can then use this information and take appropriate mitigation action. Attestation can detect rooted devices. |
M1001 | Security Updates |
Security updates typically provide patches for vulnerabilities that enable device rooting. |
M1011 | User Guidance |
Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | API Calls |
Application vetting services could look for use of the accessibility service or features that typically require root access. |
DS0042 | User Interface | System Settings |
The user can see a list of applications that can use accessibility services in the device settings. |