T1533 Data from Local System
Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration.
Access to local system data, which includes information stored by the operating system, often requires escalated privileges. Examples of local system data include authentication tokens, the device keyboard cache, Wi-Fi passwords, and photos. On Android, adversaries may also attempt to access files from external storage which may require additional storage-related permissions.
| Item | Value |
|---|---|
| ID | T1533 |
| Sub-techniques | |
| Tactics | TA0035 |
| Platforms | Android, iOS |
| Version | 1.1 |
| Created | 10 October 2019 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S1061 | AbstractEmu | AbstractEmu can collect files from or inspect the device’s filesystem.37 |
| S1095 | AhRat | AhRat can find and exfiltrate files with certain extensions, such as .jpg, .mp4, .html, .docx, and .pdf.9 |
| S0422 | Anubis | Anubis can exfiltrate files encrypted with the ransomware module from the device and can modify external storage.87 |
| S1215 | Binary Validator | Binary Validator has searched for and has deleted the malicious iMessage attachment used in the initial access phase in various databases.30 |
| S1079 | BOULDSPY | BOULDSPY can access browser history and bookmarks, and can list all files and folders on the device.25 |
| S1094 | BRATA | BRATA has collected account information from compromised devices.43 |
| S0655 | BusyGasper | BusyGasper can collect images stored on the device and browser history.4 |
| S1083 | Chameleon | Chameleon has gathered cookies and device logs.56 |
| S0555 | CHEMISTGAMES | CHEMISTGAMES can collect files from the filesystem and account information from Google Chrome.27 |
| S0426 | Concipit1248 | Concipit1248 can collect device photos.15 |
| S0425 | Corona Updates | Corona Updates can collect voice notes, device accounts, and gallery images.15 |
| S1243 | DCHSpy | DCHSpy has collected files of interest on the device, including WhatsApp files.47 |
| S0301 | Dendroid | Dendroid can collect the device’s photos, browser history, bookmarks, and accounts stored on the device.20 |
| S0505 | Desert Scorpion | Desert Scorpion can collect attacker-specified files, including files located on external storage.22 |
| S0550 | DoubleAgent | DoubleAgent has collected files from the infected device.17 |
| S1054 | Drinik | Drinik can request the READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STORAGE Android permissions.28 |
| S1092 | Escobar | Escobar can collect sensitive information, such as Google Authenticator codes.46 |
| S0507 | eSurv | eSurv can exfiltrate device pictures.19 |
| S0405 | Exodus | Exodus Two can extract information on pictures from the Gallery, Chrome and SBrowser bookmarks, and the connected WiFi network’s password.50 |
| S1080 | Fakecalls | Fakecalls can access and exfiltrate files, such as photos or video.3 |
| S0408 | FlexiSpy | FlexiSpy can monitor device photos and can also access browser history and bookmarks.1 |
| S0577 | FrozenCell | FrozenCell has retrieved device images for exfiltration.12 |
| S0423 | Ginp | Ginp can download device logs.51 |
| S0535 | Golden Cup | Golden Cup can collect images, videos, and attacker-specified files.24 |
| S0551 | GoldenEagle | GoldenEagle has retrieved .doc, .txt, .gif, .apk, .jpg, .png, .mp3, and .db files from external storage.17 |
| S0421 | GolfSpy | GolfSpy can collect local accounts on the device, pictures, bookmarks/histories of the default browser, and files stored on the SD card. GolfSpy can list image, audio, video, and other files stored on the device. GolfSpy can copy arbitrary files from the device.18 |
| S0290 | Gooligan | Gooligan steals authentication tokens that can be used to access data from multiple Google applications.29 |
| S0536 | GPlayed | GPlayed can collect the user’s browser cookies.44 |
| S0406 | Gustuff | Gustuff can capture files and photos from the compromised device.11 |
| S0544 | HenBox | HenBox can steal data from various sources, including chat, communication, and social media apps.26 |
| S1077 | Hornbill | Hornbill can access images stored on external storage.14 |
| S0463 | INSOMNIA | INSOMNIA can collect application database files, including Gmail, Hangouts, device photos, and container directories of third-party apps.39 |
| S1185 | LightSpy | LightSpy has collected and exfiltrated files from messaging applications, such as Telegram, QQ, WeChat, and Whatsapp, and browser history from Chrome and Safari.3335363432 |
| S0407 | Monokle | Monokle can retrieve the salt used when storing the user’s password, aiding an adversary in computing the user’s plaintext password/PIN from the stored password hash. Monokle can also capture the user’s dictionary, user-defined shortcuts, and browser history, enabling profiling of the user and their activities.16 |
| C0016 | Operation Dust Storm | During Operation Dust Storm, the threat actors used Android backdoors capable of exfiltrating specific files directly from the infected devices.54 |
| C0054 | Operation Triangulation | During Operation Triangulation, the threat actors stole data from SQLite databases.30 |
| S1126 | Phenakite | Phenakite can collect and exfiltrate WhatsApp media, photos and files with specific extensions, such as .pdf and .doc.23 |
| S1241 | RatMilad | RatMilad has listed files and pictures on the device starting from /mnt/sdcard/.10 |
| S0295 | RCSAndroid | RCSAndroid can collect passwords for Wi-Fi networks and online accounts, including Skype, Facebook, Twitter, Google, WhatsApp, Mail, and LinkedIn.31 |
| S0549 | SilkBean | SilkBean can retrieve files from external storage and can collect browser data.17 |
| S1195 | SpyC23 | SpyC23 can collect and exfiltrate files with specific extensions, such as .pdf, doc.2 |
| S0305 | SpyNote RAT | SpyNote RAT can copy files from the device to the C2 server.40 |
| S0328 | Stealth Mango | Stealth Mango collected and exfiltrated data from the device, including sensitive letters/documents, stored photos, and stored audio files.41 |
| S1082 | Sunbird | Sunbird can access images stored on external storage.14 |
| S0329 | Tangelo | Tangelo accesses browser history, pictures, and videos.41 |
| S1069 | TangleBot | TangleBot can request permission to view files and media.13 |
| S0558 | Tiktok Pro | Tiktok Pro can collect device photos and credentials from other applications.38 |
| S1216 | TriangleDB | TriangleDB has collected and exfiltrated files.52 |
| S0427 | TrickMo | TrickMo can steal pictures from the device.45 |
| S0418 | ViceLeaker | ViceLeaker can copy arbitrary files from the device to the C2 server, can exfiltrate browsing history, can exfiltrate the SD card structure, and can exfiltrate pictures as the user takes them.4849 |
| S0506 | ViperRAT | ViperRAT can collect device photos, PDF documents, Office documents, browser history, and browser bookmarks.42 |
| G0112 | Windshift | Windshift has exfiltrated local account data and calendar information as part of Operation ROCK.53 |
| S0489 | WolfRAT | WolfRAT can collect user account, photos, browser history, and arbitrary files.21 |
References
-
FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019. ↩
-
Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024. ↩
-
Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023. ↩
-
Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021. ↩
-
Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023. ↩
-
ThreatFabric. (2023, December 21). Android Banking Trojan Chameleon can now bypass any Biometric Authentication. Retrieved July 7, 2025. ↩
-
K. Sun. (2019, January 17). Google Play Apps Drop Anubis, Use Motion-based Evasion. Retrieved January 20, 2021. ↩
-
M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved September 25, 2024. ↩
-
Lukas Stefanko. (2023, May 23). Android app breaking bad: From legitimate screen recording to file exfiltration within a year. Retrieved December 18, 2023. ↩
-
Gupta, N. (2022, October 5). We Smell A RatMilad Android Spyware. Retrieved August 27, 2025. ↩
-
Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019. ↩
-
Michael Flossman. (2017, October 5). FrozenCell: Multi-platform surveillance campaign against Palestinians. Retrieved November 11, 2020. ↩
-
Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023. ↩
-
Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023. ↩↩
-
Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019. ↩
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩↩↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020. ↩
-
Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016. ↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020. ↩
-
Flossman, M., Scott, M. (2021, April). Technical Paper // Taking Action Against Arid Viper. Retrieved November 17, 2024. ↩
-
R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020. ↩
-
Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
B. Leonard, N. Mehta. (2019, November 21). The Secret Life of Sandworms. Retrieved December 31, 2020. ↩
-
Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved November 17, 2024. ↩
-
Check Point Research Team. (2016, November 30). More Than 1 Million Google Accounts Breached by Gooligan. Retrieved December 12, 2016. ↩
-
Kucherin, G., et al. (2023, October 23). The outstanding stealth of Operation Triangulation. Retrieved April 18, 2024. ↩↩
-
Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016. ↩
-
Dmitry Bestuzhev. (2025, April 7). The Coordinated Kill Switch: LightSpy’s iOS Destructive Plugin Architecture Manages Device Disablement. Retrieved April 14, 2025. ↩
-
Melikov, D. (2024, April 11). LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India. Retrieved January 14, 2025. ↩
-
Shoshin, P. (2020, March 27). LightSpy spyware targets iPhone users in Hong Kong. Retrieved February 12, 2025. ↩
-
ThreatFabric. (2023, October 2). LightSpy mAPT Mobile Payment System Attack. Retrieved January 17, 2025. ↩
-
ThreatFabric. (2024, October 29). LightSpy: Implant for iOS. Retrieved January 30, 2025. ↩
-
P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023. ↩
-
S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021. ↩
-
I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020. ↩
-
Shivang Desai. (2017, January 23). SpyNote RAT posing as Netflix app. Retrieved January 26, 2017. ↩
-
Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018. ↩↩
-
M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020. ↩
-
Securelist. (2019, August 29). Fully equipped Spying Android RAT from Brazil: BRATA. Retrieved December 18, 2023. ↩
-
V. Ventura. (2018, October 11). GPlayed Trojan - .Net playing with Google Market . Retrieved November 24, 2020. ↩
-
P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020. ↩
-
B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023. ↩
-
Albrecht, J., Islamoglu, A. (2025, July 21). Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict . Retrieved September 19, 2025. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
L. Arsene, C. Ochinca. (2018, August 20). Triout – Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020. ↩
-
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved November 17, 2024. ↩
-
ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020. ↩
-
Kucherin, G., et al. (2023, June 21). Dissecting TriangleDB, a Triangulation spyware implant. Retrieved April 18, 2024. ↩
-
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021. ↩
-
Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. ↩