Version 15.1 16.0
Techniques : Mobile ATT&CK Changelog
Modified Techniques
| Description |
|---|
Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.[1] On Android, applications can use the On iOS, this can be accomplished by accessing the References: |
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-16 18:33:20.042000+00:00 | 2024-09-12 15:17:00.569000+00:00 |
| external_references[3]['description'] | Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved August 27, 2019. | Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved September 12, 2024. |
| external_references[3]['url'] | http://saschafahl.de/static/paper/pwmanagers2013.pdf | https://saschafahl.de/static/paper/pwmanagers2013.pdf |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| Description |
|---|
Adversaries may mimic common operating system GUI components to prompt users for sensitive information with a seemingly legitimate prompt. The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique’s use.[1] There are several approaches adversaries may use to mimic this functionality. Adversaries may impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and, when installed on the device, may prompt the user for sensitive information.[2] Adversaries may also send fake device notifications to the user that may trigger the display of an input prompt when clicked.[3] Additionally, adversaries may display a prompt on top of a running, legitimate application to trick users into entering sensitive information into a malicious application rather than the legitimate application. Typically, adversaries need to know when the targeted application and the individual activity within the targeted application is running in the foreground to display the prompt at the proper time. Adversaries can abuse Android’s accessibility features to determine which application is currently in the foreground.[4] Two known approaches to displaying a prompt include:
References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 18:55:51.676000+00:00 | 2024-09-12 15:20:41.834000+00:00 |
| external_references[3]['description'] | Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 18, 2019. | Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 12, 2024. |
| external_references[3]['url'] | http://cloak-and-dagger.org/ | https://cloak-and-dagger.org/ |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
| Description |
|---|
A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions. This behavior has been seen in the BankBot/Spy Banker family of malware.[1][2][3] Beginning in Android 10, changes were introduced to inhibit malicious applications’ ability to hide their icon. If an app is a system app, requests no permissions, or does not have a launcher activity, the application’s icon will be fully hidden. Further, if the device is fully managed or the application is in a work profile, the icon will be fully hidden. Otherwise, a synthesized activity is shown, which is a launcher icon that represents the app’s details page in the system settings. If the user clicks the synthesized activity in the launcher, they are taken to the application’s details page in the system settings.[4][5] References:
|
Details
Values Changed
| FIELD | OLD VALUE | NEW VALUE |
|---|---|---|
| modified | 2023-03-20 18:51:29.931000+00:00 | 2024-09-12 19:47:06.884000+00:00 |
| external_references[5]['description'] | NJCCIC. (2017, March 2). BankBot/Spy Banker. Retrieved July 11, 2019. | NJCCIC. (2017, March 2). BankBot/Spy Banker. Retrieved September 12, 2024. |
| external_references[5]['url'] | https://www.cyber.nj.gov/threat-profiles/android-malware-variants/bankbot-spybanker | https://www.cyber.nj.gov/threat-landscape/malware/trojans/bankbot-spy-banker |
| x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |