Common Information
Type | Value |
---|---|
Value |
Call Log - T1636.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log. If the device has been jailbroken or rooted, an adversary may be able to access the [Call Log](https://attack.mitre.org/techniques/T1636/002) without the user’s knowledge or approval. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-11-05 | 12 | Android Malware Analysis II: Russian RAT & Its Anti-Analysis Techniques | ||
Details | Website | 2024-10-30 | 27 | Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware | ||
Details | Website | 2024-10-30 | 154 | Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T. | ||
Details | Website | 2024-10-29 | 27 | Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium | ||
Details | Website | 2024-10-29 | 8 | Migrating billions of records: moving our active DNS database while it’s in use | ||
Details | Website | 2024-10-17 | 24 | RambleOn Android Spyware (December 2022) | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium | ||
Details | Website | 2024-09-24 | 0 | MOBILE APPS: Stealing Your Information | ||
Details | Website | 2024-09-12 | 1 | Timelines in Velociraptor :: Velociraptor - Digging deeper! | ||
Details | Website | 2024-08-05 | 65 | LianSpy: Android spyware leveraging Yandex Disk as C2 | ||
Details | Website | 2024-04-30 | 64 | Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2) | ||
Details | Website | 2024-01-22 | 93 | Lookout Discovers Surveillance Campaigns Targeting Uyghurs | Threat Intel | ||
Details | Website | 2023-11-16 | 21 | Avast Q3/2023 Threat Report - Avast Threat Labs | ||
Details | Website | 2023-11-15 | 44 | GPT vs Malware Analysis: Challenges and Mitigations - Check Point Research | ||
Details | Website | 2023-11-01 | 42 | DoNot APT expands its arsenal to spy on victim's VoIP calls | ||
Details | Website | 2023-10-23 | 36 | Letscall – new sophisticated Vishing toolset | ||
Details | Website | 2023-08-05 | 1 | JavaScript – How To Execute a Function with Variables when Button is Clicked | Incredigeek | ||
Details | Website | 2023-08-01 | 0 | Fraudulent Android chat app leveraged in new Bahamut attack | ||
Details | Website | 2023-07-17 | 0 | Healthcare Data, Zero Day Exploit, and ATM & POS Malware Sales | ||
Details | Website | 2023-06-15 | 53 | Android GravityRAT goes after WhatsApp backups | ||
Details | Website | 2023-06-12 | 0 | Help! I Think My Phone’s Been Hacked | McAfee Blog | ||
Details | Website | 2023-05-10 | 129 | US-CERT Vulnerability Summary for the Week of May 1, 2023 - RedPacket Security | ||
Details | Website | 2023-05-01 | 3 | NVD - CVE-2023-27108 |