| ID | Name |
|---|---|
| T1636.001 | Calendar Entries |
| T1636.002 | Call Log |
| T1636.003 | Contact List |
| T1636.004 | SMS Messages |
| T1636.005 | Accounts |
Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log.
If the device has been jailbroken or rooted, an adversary may be able to access the Call Log without the user’s knowledge or approval.
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0602 | Detection of Call Log | AN1650 |
Application vetting services could look for |
| AN1651 |
Application vetting services could look for |