Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as "spearphishing". Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.
Mobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms.
Mobile devices are a particularly attractive target for adversaries executing phishing campaigns. Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as:
ID | Name | Description |
---|---|---|
G1028 | APT-C-23 |
APT-C-23 sends malicious links to victims to download the masqueraded application.[1][2] |
G1002 | BITTER |
BITTER has delivered malicious applications to victims via shortened URLs distributed through SMS, WhatsApp, and various social media platforms.[3] |
S1094 | BRATA |
BRATA has been distributed using phishing techniques, such as push notifications from compromised websites.[4] |
S0289 | Pegasus for iOS |
Pegasus for iOS has been distributed via malicious links in SMS messages.[5] |
G0034 | Sandworm Team |
Sandworm Team used SMS-based phishing to target victims with malicious links.[6] |
G1015 | Scattered Spider |
Scattered Spider has sent SMS phishing messages to employee phone numbers with a link to a site configured with a fake credential harvesting login portal.[7] |
G1029 | UNC788 |
UNC788 has used phishing and social engineering to distribute malware.[8] |
ID | Mitigation | Description |
---|---|---|
M1058 | Antivirus/Antimalware |
Some mobile security products offer a loopback VPN used for inspecting traffic. This could proactively block traffic to websites that are known for phishing or appear to be conducting a phishing attack. |
M1011 | User Guidance |
Users can be trained to identify social engineering techniques and phishing emails. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0029 | Network Traffic | Network Traffic Content |
Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. |
Network Traffic Flow |
Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise. |