Skip to content

M1011 User Guidance

Describes any guidance or training given to users to set particular configuration settings or avoid specific potentially risky behaviors.

Item Value
ID M1011
Version 1.0
Created 18 October 2019
Last Modified 18 October 2019
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
mobile T1626 Abuse Elevation Control Mechanism -
mobile T1626.001 Device Administrator Permissions Users should scrutinize every device administration permission request. If the request is not expected or the user does not recognize the application, the application should be uninstalled immediately.
mobile T1517 Access Notifications Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to notifications.
mobile T1640 Account Access Removal Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it.
mobile T1429 Audio Capture Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to microphone or audio output.
mobile T1616 Call Control Users should be encouraged to be very careful with what applications they grant phone call-based permissions to. Further, users should not change their default call handler to applications they do not recognize.
mobile T1642 Endpoint Denial of Service Users should be cautioned against granting administrative access to applications.
mobile T1627 Execution Guardrails Users should be advised to be extra scrutinous of applications that request location or sensitive phone information permissions, and to deny any permissions requests for applications they do not recognize.
mobile T1627.001 Geofencing Users should be advised to be extra scrutinous of applications that request location, and to deny any permissions requests for applications they do not recognize.
mobile T1541 Foreground Persistence If a user sees a persistent notification they do not recognize, they should uninstall the source application and look for other unwanted applications or anomalies.
mobile T1643 Generate Traffic from Victim Users should be advised that applications generally do not require permission to send SMS messages.
mobile T1628 Hide Artifacts -
mobile T1628.001 Suppress Application Icon Users should be shown what a synthetic activity looks like so they can scrutinize them in the future.
mobile T1629 Impair Defenses Providing user guidance around commonly abused features, such as the modal that requests for administrator permissions, should aid in preventing impairing defenses.
mobile T1629.001 Prevent Application Removal Users should be warned against granting access to accessibility features and device administration services, and to carefully scrutinize applications that request these dangerous permissions. Users should be taught how to boot into safe mode to uninstall malicious applications that may be interfering with the uninstallation process.
mobile T1629.003 Disable or Modify Tools Users should be taught the dangers of rooting or jailbreaking their device.
mobile T1630 Indicator Removal on Host Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge.
mobile T1630.001 Uninstall Malicious Application Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge.
mobile T1630.002 File Deletion Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups.
mobile T1417 Input Capture Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as keyboard registration or accessibility service access.
mobile T1417.001 Keylogging Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as keyboard registration or accessibility service access.
mobile T1516 Input Injection Users should be warned against granting access to accessibility features, and to carefully scrutinize applications that request this dangerous permission.
mobile T1430 Location Tracking Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to location information. Users should also protect their account credentials and enable multi-factor authentication options when available.
mobile T1430.001 Remote Device Management Services Users should protect their account credentials and enable multi-factor authentication options when available.
mobile T1644 Out of Band Data Users should be instructed to not grant applications unexpected or unnecessary permissions.
mobile T1636 Protected User Data Users should be taught the danger behind granting unnecessary permissions to an application and should be advised to use extra scrutiny when an application requests them.
mobile T1636.001 Calendar Entries Calendar access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their device calendar.
mobile T1636.002 Call Log Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs.
mobile T1636.003 Contact List Contact list access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their contact list.
mobile T1636.004 SMS Messages Access to SMS messages is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their SMS messages.
mobile T1458 Replication Through Removable Media Users should be advised not to use public charging stations or computers to charge their devices. Instead, users should be issued a charger acquired from a trustworthy source. Users should be advised not to click on device prompts to trust attached computers unless absolutely necessary.
mobile T1513 Screen Capture Users should be advised not to grant consent for screen captures to occur unless expected. Users should avoid enabling USB debugging (Android Debug Bridge) unless explicitly required.
mobile T1582 SMS Control Users should be encouraged to be very careful with what applications they grant SMS access to. Further, users should not change their default SMS handler to applications they do not recognize.1
mobile T1418 Software Discovery iOS users should be instructed to not download applications from unofficial sources, as applications distributed via the Apple App Store cannot list installed applications on a device.
mobile T1418.001 Security Software Discovery iOS users should be instructed to not download applications from unofficial sources, as applications distributed via the Apple App Store cannot list installed applications on a device.
mobile T1635 Steal Application Access Token Users should be instructed to not open links in applications they don’t recognize.
mobile T1635.001 URI Hijacking Users should be instructed to not open links in applications they don’t recognize.
mobile T1632 Subvert Trust Controls Typically, insecure or malicious configuration settings are not installed without the user’s consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning).
mobile T1632.001 Code Signing Policy Modification Typically, insecure or malicious configuration settings are not installed without the user’s consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning).

References