ID | Name |
---|---|
T1636.001 | Calendar Entries |
T1636.002 | Call Log |
T1636.003 | Contact List |
T1636.004 | SMS Messages |
Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the Contacts
framework.
If the device has been jailbroken or rooted, an adversary may be able to access the Contact List without the user’s knowledge or approval.
ID | Name | Description |
---|---|---|
S1061 | AbstractEmu |
AbstractEmu can grant itself contact list access.[1] |
S0309 | Adups | |
S1095 | AhRat | |
S0304 | Android/Chuli.A |
Android/Chuli.A stole contact list data stored both on the the phone and the SIM card.[4] |
S0292 | AndroRAT | |
S0422 | Anubis | |
S0540 | Asacub | |
S1079 | BOULDSPY | |
C0033 | C0033 |
During C0033, PROMETHIUM used StrongPity to collect the device’s contact list.[10] |
S0480 | Cerberus | |
S0323 | Charger | |
S0425 | Corona Updates |
Corona Updates can collect device contacts.[13] |
S0505 | Desert Scorpion |
Desert Scorpion can collect the device’s contact list.[14] |
S0550 | DoubleAgent |
DoubleAgent has accessed the contact list.[15] |
S0507 | eSurv | |
S0522 | Exobot | |
S0405 | Exodus | |
S1080 | Fakecalls |
Fakecalls can copy and exfiltrate a device’s contact list.[19] |
S0509 | FakeSpy | |
S0408 | FlexiSpy | |
S1067 | FluBot |
FluBot can retrieve the contacts list from an infected device.[22] |
S0423 | Ginp | |
S0535 | Golden Cup |
Golden Cup can collect the device’s contact list.[24] |
S0551 | GoldenEagle |
GoldenEagle has collected a list of contacts.[15] |
S0421 | GolfSpy | |
S0536 | GPlayed | |
S0406 | Gustuff | |
S0544 | HenBox | |
S1128 | HilalRAT | |
S1077 | Hornbill | |
S0463 | INSOMNIA | |
S0485 | Mandrake | |
S0407 | Monokle | |
S0399 | Pallas | |
S0316 | Pegasus for Android |
Pegasus for Android accesses contact list information.[35] |
S0289 | Pegasus for iOS |
Pegasus for iOS gathers contacts from the system by dumping the victim's address book.[36] |
S1126 | Phenakite |
Phenakite can exfiltrate the victim device’s contact list.[37] |
S0539 | Red Alert 2.0 |
Red Alert 2.0 can collect the device’s contact list.[38] |
S0403 | Riltok |
Riltok can access and upload the device's contact list to the command and control server.[39] |
S0411 | Rotexy |
Rotexy can access and upload the contacts list to the command and control server.[40] |
S0549 | SilkBean | |
S0324 | SpyDealer | |
S0305 | SpyNote RAT |
SpyNote RAT can view contacts.[42] |
S0328 | Stealth Mango |
Stealth Mango uploads contact lists for various third-party applications such as Yahoo, AIM, GoogleTalk, Skype, QQ, and others.[43] |
S1082 | Sunbird | |
S1069 | TangleBot |
TangleBot can request permission to view device contacts.[44] |
S0558 | Tiktok Pro |
Tiktok Pro can access the device's contact list.[45] |
S0506 | ViperRAT | |
G0112 | Windshift |
Windshift has included contact list exfiltration in the malicious apps deployed as part of Operation BULL.[47] |
S0489 | WolfRAT |
ID | Mitigation | Description |
---|---|---|
M1011 | User Guidance |
Contact list access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their contact list. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | Permissions Requests |
Application vetting services could look for |
DS0042 | User Interface | System Settings |
On both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. |