Common Information
Type Value
Value
User Evasion - T1618
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. While there are many ways this can be accomplished, one method is by using the device’s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent.
Details Published Attributes CTI Title
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2023-08-29 0 MMRat Carries Out Bank Fraud Via Fake App Stores
Details Website 2022-10-25 27 ERMAC 2.0 Evades MFA to Steal Banking Credentials of Over 400 Android Apps
Details Website 2022-03-16 92 Avira Labs Research Reveals Hydra Banking Trojan 2.0 targeting a wider network of German and Austrian banks