Protected User Data: Call Log

Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log.

If the device has been jailbroken or rooted, an adversary may be able to access the Call Log without the user’s knowledge or approval.

ID: T1636.002
Sub-technique of:  T1636
Tactic Type: Post-Adversary Device Access
Tactic: Collection
Platforms: Android, iOS
Version: 1.0
Created: 01 April 2022
Last Modified: 29 April 2022

Procedure Examples

ID Name Description
S0309 Adups

Adups transmitted call logs.[1]

S0304 Android/Chuli.A

Android/Chuli.A stole call logs.[2]

S0292 AndroRAT

AndroRAT collects call logs.[3]

S0425 Corona Updates

Corona Updates can collect the device’s call log.[4]

S0550 DoubleAgent

DoubleAgent has accessed the call logs.[5]

S0320 DroidJack

DroidJack captures call data.[6]

S0405 Exodus

Exodus Two can exfiltrate the call log.[7]

S0182 FinFisher

FinFisher accesses and exfiltrates the call log.[8]

S0551 GoldenEagle

GoldenEagle has collected call logs.[5]

S0421 GolfSpy

GolfSpy can obtain the device’s call log.[9]

S0544 HenBox

HenBox has collected all outgoing phone numbers that start with "86".[10]


INSOMNIA can retrieve the call history.[11]

S0407 Monokle

Monokle can retrieve call history.[12]

S0399 Pallas

Pallas accesses and exfiltrates the call log.[8]

S0316 Pegasus for Android

Pegasus for Android accesses call logs.[13]

S0289 Pegasus for iOS

Pegasus for iOS captures call logs.[14]

S0539 Red Alert 2.0

Red Alert 2.0 can collect the device’s call log.[15]

S0549 SilkBean

SilkBean can access call logs.[5]

S0324 SpyDealer

SpyDealer harvests phone call history from victims.[16]

S0328 Stealth Mango

Stealth Mango uploads call logs.[17]

S0329 Tangelo

Tangelo contains functionality to gather call logs.[17]

S0558 Tiktok Pro

Tiktok Pro can collect the device’s call logs.[18]

S0418 ViceLeaker

ViceLeaker can collect the device’s call log.[19]

S0506 ViperRAT

ViperRAT can collect the device’s call log.[20]

S0489 WolfRAT

WolfRAT can collect the device’s call log.[21]


ID Mitigation Description
M1011 User Guidance

Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs.


On Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary. Application vetting services could look for android.permission.READ_CALL_LOG in an Android application’s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it.