T1429 Audio Capture
Adversaries may capture audio to collect information by leveraging standard operating system APIs of a mobile device. Examples of audio information adversaries may target include user conversations, surroundings, phone calls, or other sensitive information.
Android and iOS, by default, require that applications request device microphone access from the user.
On Android devices, applications must hold the RECORD_AUDIO permission to access the microphone or the CAPTURE_AUDIO_OUTPUT permission to access audio output. Because Android does not allow third-party applications to hold the CAPTURE_AUDIO_OUTPUT permission by default, only privileged applications, such as those distributed by Google or the device vendor, can access audio output.3 However, adversaries may be able to gain this access after successfully elevating their privileges. With the CAPTURE_AUDIO_OUTPUT permission, adversaries may pass the MediaRecorder.AudioSource.VOICE_CALL constant to MediaRecorder.setAudioOutput, allowing capture of both voice call uplink and downlink.1
On iOS devices, applications must include the NSMicrophoneUsageDescription key in their Info.plist file to access the microphone.2
| Item | Value |
|---|---|
| ID | T1429 |
| Sub-techniques | |
| Tactics | TA0035 |
| Platforms | Android, iOS |
| Version | 3.1 |
| Created | 25 October 2017 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S1061 | AbstractEmu | AbstractEmu can grant itself microphone permissions.23 |
| S1095 | AhRat | AhRat can record audio using a device’s microphone.47 |
| S0292 | AndroRAT | AndroRAT gathers audio from the microphone.4544 |
| S0422 | Anubis | Anubis can record phone calls and audio.54 |
| S1079 | BOULDSPY | BOULDSPY can access a device’s microphone to record audio, as well as cell and VoIP application calls.12 |
| S0655 | BusyGasper | BusyGasper can record audio.20 |
| C0033 | C0033 | During C0033, PROMETHIUM used StrongPity to record phone calls.62 |
| S0529 | CarbonSteal | CarbonSteal can remotely capture device audio.18 |
| S0425 | Corona Updates | Corona Updates can record MP4 files and monitor calls.42 |
| S1243 | DCHSpy | DCHSpy has captured audio from the device by taking control of the microphone.33 |
| S0301 | Dendroid | Dendroid can record audio and outgoing calls.53 |
| S0505 | Desert Scorpion | Desert Scorpion can record audio from phone calls and the device microphone.24 |
| S0550 | DoubleAgent | DoubleAgent has captured audio and can record phone calls.18 |
| S0320 | DroidJack | DroidJack is capable of recording device phone calls.26 |
| S1092 | Escobar | Escobar can record audio from the device’s microphone.56 |
| S0507 | eSurv | eSurv can record audio.11 |
| S0405 | Exodus | Exodus Two can record audio from the compromised device’s microphone and can record call audio in 3GP format.43 |
| S1080 | Fakecalls | Fakecalls can turn on a device’s microphone to capture audio.22 |
| S0182 | FinFisher | FinFisher uses the device microphone to record phone conversations.34 |
| S0408 | FlexiSpy | FlexiSpy can record both incoming and outgoing phone calls, as well as microphone audio.7 |
| S0577 | FrozenCell | FrozenCell has recorded calls.52 |
| S1231 | GodFather | GodFather has requested for the RECORD_AUDIO permission to record audio with the microphone.21 |
| S0535 | Golden Cup | Golden Cup can record audio from the microphone and phone calls.17 |
| S0551 | GoldenEagle | GoldenEagle has recorded calls and environment audio in .amr format.18 |
| S0421 | GolfSpy | GolfSpy can record audio and phone calls.49 |
| S0544 | HenBox | HenBox can access the device’s microphone.40 |
| S1128 | HilalRAT | HilalRAT can activate a device’s microphone.32 |
| S1077 | Hornbill | Hornbill can record environmental and call audio.14 |
| S1185 | LightSpy | LightSpy has captured environment audio, phone calls and Voice over IP (VoIP) calls.3637383935 |
| S0407 | Monokle | Monokle can record audio from the device’s microphone and can record phone calls, specifying the output audio quality.50 |
| C0054 | Operation Triangulation | During Operation Triangulation, the threat actors used a microphone-recording module.63 |
| S0399 | Pallas | Pallas captures audio from the device microphone.34 |
| S0316 | Pegasus for Android | Pegasus for Android has the ability to record device audio.9 |
| S0289 | Pegasus for iOS | Pegasus for iOS has the ability to record audio.46 |
| S1126 | Phenakite | Phenakite can record phone calls.41 |
| S1241 | RatMilad | RatMilad has captured audio from the device.55 |
| S0295 | RCSAndroid | RCSAndroid can record audio using the device microphone.10 |
| S0326 | RedDrop | RedDrop captures live recordings of the device’s surroundings.60 |
| S0327 | Skygofree | Skygofree can record audio via the microphone when an infected device is in a specified location.8 |
| S1195 | SpyC23 | SpyC23 can record phone calls and audio.3129282730 |
| S0324 | SpyDealer | SpyDealer can record phone calls and surrounding audio.59 |
| S0305 | SpyNote RAT | SpyNote RAT can activate the victim’s microphone.48 |
| S0328 | Stealth Mango | Stealth Mango can record audio using the device microphone.16 |
| S1082 | Sunbird | Sunbird can record environmental and call audio.14 |
| S0329 | Tangelo | Tangelo contains functionality to record calls as well as the victim device’s environment.16 |
| S1069 | TangleBot | TangleBot can record audio using the device microphone.25 |
| S0558 | Tiktok Pro | Tiktok Pro can capture audio from the device’s microphone and can record phone calls.19 |
| S0418 | ViceLeaker | ViceLeaker can record audio from the device’s microphone and can record phone calls together with the caller ID.5758 |
| S0506 | ViperRAT | ViperRAT can collect and record audio content.51 |
| G0112 | Windshift | Windshift has included phone call and audio recording capabilities in the malicious apps deployed as part of Operation BULL and Operation ROCK.61 |
| S0489 | WolfRAT | WolfRAT can record call audio.15 |
| S0318 | XLoader for Android | XLoader for Android covertly records phone calls.13 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1006 | Use Recent OS Version | Android 9 and above restricts access to microphone, camera, and other sensors from background applications.6 |
| M1011 | User Guidance | Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to microphone or audio output. |
References
-
Android Developers. (2022, March 17). Voice Call. Retrieved April 1, 2022. ↩
-
Apple Developers. (n.d.). Requesting Authorization for Media Capture on iOS. Retrieved April 1, 2022. ↩
-
Google. (2021, August 11). Manifest.permission. Retrieved September 22, 2021. ↩
-
Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022. ↩
-
ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022. ↩
-
Android Developers. (, January). Android 9+ Privacy Changes . Retrieved August 27, 2019. ↩
-
Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019. ↩
-
Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018. ↩
-
Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017. ↩
-
Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016. ↩
-
A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020. ↩
-
Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023. ↩
-
Lorin Wu. (2018, April 19). XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing. Retrieved July 6, 2018. ↩
-
Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023. ↩↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018. ↩↩
-
R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020. ↩
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩↩↩
-
S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021. ↩
-
Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021. ↩
-
Merkle Science. (2023, April 25). The Godfather Android Malware: Threat under the lens. Retrieved July 16, 2025. ↩
-
Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023. ↩
-
P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023. ↩
-
A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020. ↩
-
Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023. ↩
-
Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017. ↩
-
Cyware. (2020, October 2). APT‑C‑23 is Still Active and Enhancing its Mobile Spying Capabilities. Retrieved December 2, 2024. ↩
-
Delamotte, A. (2023, November 6). Arid Viper | APT’s Nest of SpyC23 Malware Continues to Target Android Devices. Retrieved December 2, 2024. ↩
-
Kohli, P. (2021, November 23). Android APT spyware, targeting Middle East victims, enhances evasiveness. Retrieved November 17, 2024. ↩
-
O’Donnell, L. (2020, September 30). Android Spyware Variant Snoops on WhatsApp, Telegram Messages. Retrieved January 10, 2025. ↩
-
Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024. ↩
-
Agranovich, D., et al. (2022, April). Adversarial Threat Report. Retrieved April 2, 2024. ↩
-
Albrecht, J., Islamoglu, A. (2025, July 21). Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict . Retrieved September 19, 2025. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩↩
-
Dmitry Bestuzhev. (2025, April 7). The Coordinated Kill Switch: LightSpy’s iOS Destructive Plugin Architecture Manages Device Disablement. Retrieved April 14, 2025. ↩
-
Firsh, A., et al. (2020, March 26). iOS exploit chain deploys LightSpy feature-rich malware. Retrieved January 13, 2025. ↩
-
Melikov, D. (2024, April 11). LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India. Retrieved January 14, 2025. ↩
-
ThreatFabric. (2023, October 2). LightSpy mAPT Mobile Payment System Attack. Retrieved January 17, 2025. ↩
-
ThreatFabric. (2024, October 29). LightSpy: Implant for iOS. Retrieved January 30, 2025. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
Flossman, M., Scott, M. (2021, April). Technical Paper // Taking Action Against Arid Viper. Retrieved November 17, 2024. ↩
-
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved November 17, 2024. ↩
-
Dela Paz, R. (2016, October 21). BITTER: a targeted attack against Pakistan. Retrieved March 1, 2024. ↩
-
Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016. ↩
-
Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016. ↩
-
Lukas Stefanko. (2023, May 23). Android app breaking bad: From legitimate screen recording to file exfiltration within a year. Retrieved December 18, 2023. ↩
-
Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017. ↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019. ↩
-
M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020. ↩
-
Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020. ↩
-
Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016. ↩
-
M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved September 25, 2024. ↩
-
Gupta, N. (2022, October 5). We Smell A RatMilad Android Spyware. Retrieved August 27, 2025. ↩
-
B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
L. Arsene, C. Ochinca. (2018, August 20). Triout – Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020. ↩
-
Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018. ↩
-
Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved November 17, 2024. ↩
-
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021. ↩
-
Stefanko, L. (2023, January 10). StrongPity espionage campaign targeting Android users. Retrieved January 31, 2023. ↩
-
Kucherin, G., et al. (2023, October 23). The outstanding stealth of Operation Triangulation. Retrieved April 18, 2024. ↩