Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as "spearphishing." Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.
Mobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. Adversaries may also impersonate executives of organizations to persuade victims into performing some action on their behalf. For example, adversaries will often use social engineering techniques in text messages to trick the victims into acting quickly, which leads to adversaries obtaining credentials and other information.
Mobile devices are a particularly attractive target for adversaries executing phishing campaigns. Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as:
| ID | Name | Description |
|---|---|---|
| G1028 | APT-C-23 |
APT-C-23 sends malicious links to victims to download the masqueraded application.[1][2] |
| G1002 | BITTER |
BITTER has delivered malicious applications to victims via shortened URLs distributed through SMS, WhatsApp, and various social media platforms.[3] |
| S1094 | BRATA |
BRATA has been distributed using phishing techniques, such as push notifications from compromised websites.[4] |
| S1083 | Chameleon |
Chameleon has been distributed using phishing links and a Content Distribution Network (CDN) for file distribution.[5] |
| S1225 | CherryBlos |
CherryBlos has been distributed through the threat actors’ Telegram group, fake TikTok and Twitter accounts, and YouTube videos.[6] |
| S1208 | FjordPhantom |
FjordPhantom has been distributed via email, SMS and other messaging applications.[7] |
| S1067 | FluBot |
FluBot has been distributed via malicious links in SMS messages.[8] |
| S1231 | GodFather |
GodFather has generated fake notifications to lure the victim to phishing pages.[9] |
| S1185 | LightSpy |
LightSpy has delivered malicious links through Telegram channels and Instagram posts.[10][11] |
| S0289 | Pegasus for iOS |
Pegasus for iOS has been distributed via malicious links in SMS messages.[12] |
| S1241 | RatMilad |
RatMilad has concealed itself behind variants of a phone number spoofing application, which was distributed through links on social media and communication platforms.[13] |
| G0034 | Sandworm Team |
Sandworm Team used SMS-based phishing to target victims with malicious links.[14] |
| G1015 | Scattered Spider |
Scattered Spider has sent SMS phishing messages to employee phone numbers with a link to a site configured with a fake credential harvesting login portal.[15][16] |
| G1029 | UNC788 |
UNC788 has used phishing and social engineering to distribute malware.[17] |
| ID | Mitigation | Description |
|---|---|---|
| M1058 | Antivirus/Antimalware |
Some mobile security products offer a loopback VPN used for inspecting traffic. This could proactively block traffic to websites that are known for phishing or appear to be conducting a phishing attack. |
| M1011 | User Guidance |
Users can be trained to identify social engineering techniques and phishing emails. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0684 | Detection of Phishing | AN1791 |
Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. |
| AN1792 |
Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. |