T1636.002 Call Log
Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log.
If the device has been jailbroken or rooted, an adversary may be able to access the Call Log without the user’s knowledge or approval.
Item | Value |
---|---|
ID | T1636.002 |
Sub-techniques | T1636.001, T1636.002, T1636.003, T1636.004 |
Tactics | TA0035 |
Platforms | Android, iOS |
Version | 1.1 |
Created | 01 April 2022 |
Last Modified | 16 March 2023 |
Procedure Examples
ID | Name | Description |
---|---|---|
S1061 | AbstractEmu | AbstractEmu can access device call logs.19 |
S0309 | Adups | Adups transmitted call logs.9 |
S0304 | Android/Chuli.A | Android/Chuli.A stole call logs.14 |
S0292 | AndroRAT | AndroRAT collects call logs.24 |
S0425 | Corona Updates | Corona Updates can collect the device’s call log.15 |
S0550 | DoubleAgent | DoubleAgent has accessed the call logs.11 |
S1054 | Drinik | Drinik can request the READ_CALL_LOG permission.6 |
S0320 | DroidJack | DroidJack captures call data.10 |
S0405 | Exodus | Exodus Two can exfiltrate the call log.20 |
S0182 | FinFisher | FinFisher accesses and exfiltrates the call log.8 |
S0551 | GoldenEagle | GoldenEagle has collected call logs.11 |
S0421 | GolfSpy | GolfSpy can obtain the device’s call log.1 |
S0544 | HenBox | HenBox has collected all outgoing phone numbers that start with “86”.3 |
S0463 | INSOMNIA | INSOMNIA can retrieve the call history.13 |
S0407 | Monokle | Monokle can retrieve call history.18 |
S0399 | Pallas | Pallas accesses and exfiltrates the call log.8 |
S0316 | Pegasus for Android | Pegasus for Android accesses call logs.5 |
S0289 | Pegasus for iOS | Pegasus for iOS captures call logs.4 |
S0539 | Red Alert 2.0 | Red Alert 2.0 can collect the device’s call log.21 |
S0549 | SilkBean | SilkBean can access call logs.11 |
S0324 | SpyDealer | SpyDealer harvests phone call history from victims.2 |
S0328 | Stealth Mango | Stealth Mango uploads call logs.23 |
S0329 | Tangelo | Tangelo contains functionality to gather call logs.23 |
S1069 | TangleBot | TangleBot can request permission to view call logs.17 |
S0558 | Tiktok Pro | Tiktok Pro can collect the device’s call logs.22 |
S0418 | ViceLeaker | ViceLeaker can collect the device’s call log.7 |
S0506 | ViperRAT | ViperRAT can collect the device’s call log.12 |
S0489 | WolfRAT | WolfRAT can collect the device’s call log.16 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1011 | User Guidance | Call Log access an uncommonly needed permission, so users should be instructedto use extra scrutiny when granting access to their call logs. |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0041 | Application Vetting | Permissions Requests |
DS0042 | User Interface | System Settings |
References
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
Lookout. (2016). Technical Analysis of Pegasus Spyware. Retrieved December 12, 2016. ↩
-
Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017. ↩
-
Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved January 18, 2023. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩↩
-
Matt Apuzzo and Michael S. Schmidt. (2016, November 15). Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say. Retrieved February 6, 2017. ↩
-
Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017. ↩
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩↩↩
-
M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020. ↩
-
I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020. ↩
-
Costin Raiu, Denis Maslennikov, Kurt Baumgartner. (2013, March 26). Android Trojan Found in Targeted Attack. Retrieved December 23, 2016. ↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023. ↩
-
Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019. ↩
-
P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023. ↩
-
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019. ↩
-
J. Chandraiah. (2018, July 23). Red Alert 2.0: Android Trojan targets security-seekers. Retrieved December 14, 2020. ↩
-
S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021. ↩
-
Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018. ↩↩
-
Lookout. (2016, May 25). 5 active mobile threats spoofing enterprise apps. Retrieved December 19, 2016. ↩