ID | Name |
---|---|
T1636.001 | Calendar Entries |
T1636.002 | Call Log |
T1636.003 | Contact List |
T1636.004 | SMS Messages |
Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log.
If the device has been jailbroken or rooted, an adversary may be able to access the Call Log without the user’s knowledge or approval.
ID | Mitigation | Description |
---|---|---|
M1011 | User Guidance |
Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | Permissions Requests |
Application vetting services could look for |
DS0042 | User Interface | System Settings |
On Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary. |