T1512 Capture Camera
Adversaries may utilize the camera to capture information about the user, their surroundings, or other physical identifiers. Adversaries may use the physical camera devices on a mobile device to capture images or video. By default, in Android and iOS, an application must request permission to access a camera device which is granted by the user through a request prompt. In Android, applications must hold the android.permission.CAMERA
permission to access the camera. In iOS, applications must include the NSCameraUsageDescription
key in the Info.plist
file, and must request access to the camera at runtime.
Item | Value |
---|---|
ID | T1512 |
Sub-techniques | |
Tactics | TA0035 |
Platforms | Android, iOS |
Version | 1.0 |
Created | 09 August 2019 |
Last Modified | 12 September 2019 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0655 | BusyGasper | BusyGasper can record from the device’s camera.23 |
S0426 | Concipit1248 | Concipit1248 requests permissions to use the device camera.14 |
S0425 | Corona Updates | Corona Updates can take pictures using the camera and can record MP4 files.14 |
S0301 | Dendroid | Dendroid can take photos and record videos.18 |
S0505 | Desert Scorpion | Desert Scorpion can record videos.16 |
S0320 | DroidJack | DroidJack can capture video using device cameras.7 |
S0405 | Exodus | Exodus Two can take pictures with the device cameras.10 |
S0408 | FlexiSpy | FlexiSpy can record video.2 |
S0535 | Golden Cup | Golden Cup can take pictures with the camera.19 |
S0551 | GoldenEagle | GoldenEagle has taken photos with the device camera.21 |
S0421 | GolfSpy | GolfSpy can record video.13 |
S0544 | HenBox | HenBox can access the device’s camera.20 |
S0407 | Monokle | Monokle can take photos and videos.11 |
S0399 | Pallas | Pallas can take pictures with both the front and rear-facing cameras.8 |
S0316 | Pegasus for Android | Pegasus for Android has the ability to take pictures using the device camera.3 |
S0295 | RCSAndroid | RCSAndroid can capture photos using the front and back cameras.4 |
S0549 | SilkBean | SilkBean can access the camera on the device.21 |
S0327 | Skygofree | Skygofree can record video or capture photos when an infected device is in a specified location.9 |
S0324 | SpyDealer | SpyDealer can record video and take photos via front and rear cameras.5 |
S0328 | Stealth Mango | Stealth Mango can record and take pictures using the front and back cameras.6 |
S0558 | Tiktok Pro | Tiktok Pro can capture photos and videos from the device’s camera.22 |
S0418 | ViceLeaker | ViceLeaker can take photos from both the front and back cameras.12 |
S0506 | ViperRAT | ViperRAT can take photos with the device camera.17 |
G0112 | Windshift | Windshift has included video recording in the malicious apps deployed as part of Operation BULL.24 |
S0489 | WolfRAT | WolfRAT can take photos and videos.15 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1005 | Application Vetting | During the vetting process applications using the android permission android.permission.CAMERA , or the iOS NSCameraUsageDescription plist entry could be analyzed more closely. |
M1006 | Use Recent OS Version | Android 9 and above restricts access to mic, camera, and other sensors from background applications.1 |
References
-
Android Developers. (, January). Android 9+ Privacy Changes . Retrieved August 27, 2019. ↩
-
Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019. ↩
-
Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017. ↩
-
Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016. ↩
-
Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018. ↩
-
Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018. ↩
-
Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩
-
Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018. ↩
-
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019. ↩
-
Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020. ↩
-
M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020. ↩
-
Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016. ↩
-
R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩↩
-
S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021. ↩
-
Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021. ↩
-
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021. ↩