Virtualization Solution

Adversaries may carry out malicious operations using virtualization solutions to escape from Android sandboxes and to avoid detection. Android uses sandboxes to separate resources and code execution between applications and the operating system.[1] There are a few virtualization solutions available on Android, such as the Android Virtualization Framework (AVF).[2]

Through virtualization solutions, adversaries may execute malicious operations without user knowledge. For example, adversaries may mimic a legitimate banking application’s functionalities in a virtual environment, thanks to the virtualization solution, while malicious code captures credentials.

ID: T1670
Sub-techniques:  No sub-techniques
Tactic: Defense Evasion
Platforms: Android
Contributors: Liran Ravich, CardinalOps
Version: 1.0
Created: 14 March 2025
Last Modified: 14 March 2025

Procedure Examples

ID Name Description
S1208 FjordPhantom

FjordPhantom uses a virtualization solution to steal credentials.[3]

Mitigations

ID Mitigation Description
M1011 User Guidance

Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious applications.

Detection

ID Data Source Data Component Detects
DS0041 Application Vetting Permissions Requests

Application vetting services can look for applications that request permissions to Accessibility services or application overlay.

DS0009 Process OS API Execution

Monitor for API calls that are related to GooglePlayServices.

DS0042 User Interface Permissions Request

The user can view a list of device administrators and applications that have registered Accessibility services in device settings. Applications that register an Accessibility service or request device administrator permissions should be scrutinized further for malicious behavior.

References