T1663 Remote Access Software
Adversaries may use legitimate remote access software, such as VNC, TeamViewer, AirDroid, AirMirror, etc., to establish an interactive command and control channel to target mobile devices.
Remote access applications may be installed and used post-compromise as an alternate communication channel for redundant access or as a way to establish an interactive remote session with the target device. They may also be used as a component of malware to establish a reverse connection to an adversary-controlled system or service. Installation of remote access tools may also include persistence.
| Item |
Value |
| ID |
T1663 |
| Sub-techniques |
|
| Tactics |
TA0037 |
| Platforms |
Android, iOS |
| Version |
1.0 |
| Created |
25 September 2023 |
| Last Modified |
16 April 2025 |
Procedure Examples
Mitigations
| ID |
Mitigation |
Description |
| M1012 |
Enterprise Policy |
When devices are enrolled in an EMM/MDM using device owner (iOS) or fully managed (Android) mode, the EMM/MDM can collect a list of installed applications on the device. An administrator can then act on, for example blocking, specific remote access applications from being installed on managed devices. |
| M1011 |
User Guidance |
Users should be encouraged to be very careful with granting dangerous permissions, such as device administrator or access to device accessibility. |
References