Describes any guidance or training given to users to set particular configuration settings or avoid specific potentially risky behaviors.
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1427 | Attack PC via USB Connection |
Advise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debugging). |
|
Mobile | T1616 | Call Control |
Users should be encouraged to be very careful with what applications they grant phone call-based permissions to. Further, users should not change their default call handler to applications they do not recognize. |
|
Mobile | T1447 | Delete Device Data |
Users should be trained on what device administrator permission request prompts look like, and how to avoid granting permissions on phishing popups. |
|
Mobile | T1475 | Deliver Malicious App via Authorized App Store |
Encourage developers to protect their account credentials and enable multi-factor authentication if available. Encourage developers to protect their signing keys. |
|
Mobile | T1476 | Deliver Malicious App via Other Means |
iOS 9 and above requires explicit user consent before allowing installation of applications signed with enterprise distribution keys rather than installed from Apple's App Store. Users should be encouraged to not agree to installation of applications signed with enterprise distribution keys unless absolutely certain of the source of the application. On Android, the "Unknown Sources" setting must be enabled for users to install apps from sources other than an authorized app store (such as the Google Play Store), so users should be encouraged not to enable that setting. |
|
Mobile | T1401 | Device Administrator Permissions |
Users should be told that it is very rare for an app to request device administrator permissions, and that any requests for the permissions should be scrutinized. |
|
Mobile | T1458 | Exploit via Charging Station or PC |
Users should be advised not to use public charging stations or computers to charge their devices. Instead, users should be issued a charger acquired from a trustworthy source. Users should be advised not to click on device prompts to trust attached computers unless absolutely necessary. |
|
Mobile | T1541 | Foreground Persistence |
If a user sees a persistent notification they do not recognize, they should uninstall the source application and look for other unwanted applications or anomalies. |
|
Mobile | T1581 | Geofencing |
Users should be advised to be extra scrutinous of applications that request location permissions, and to deny any permissions requests for applications they do not recognize. |
|
Mobile | T1417 | Input Capture |
Users should be weary of granting applications dangerous or privacy-intrusive permissions, such as keyboard registration and accessibility permissions requests. |
|
Mobile | T1516 | Input Injection |
Users should be warned against granting access to accessibility features, and to carefully scrutinize applications that request this dangerous permission. |
|
Mobile | T1478 | Install Insecure or Malicious Configuration |
Typically, insecure or malicious configuration settings are not installed without the user's consent. Users should be advised not to install unexpected configuration settings (CA certificates, iOS Configuration Profiles, Mobile Device Management server provisioning). |
|
Mobile | T1444 | Masquerade as Legitimate Application |
Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps. |
|
Mobile | T1470 | Obtain Device Cloud Backups |
Encourage users to protect their account credentials and to enable available multi-factor authentication options. |
|
Mobile | T1468 | Remotely Track Device Without Authorization |
Encourage users to protect their account credentials and to enable available multi-factor authentication options. |
|
Mobile | T1469 | Remotely Wipe Data Without Authorization |
Encourage users to protect their account credentials and to enable available multi-factor authentication options. |
|
Mobile | T1513 | Screen Capture |
Users should be advised not to grant consent for screen captures to occur unless expected. Users should avoid enabling USB debugging (Android Debug Bridge) unless explicitly required. |
|
Mobile | T1451 | SIM Card Swap |
Users should be instructed to use forms of multifactor authentication not subject to being intercepted by a SIM card swap, where possible. More secure methods include application-based one-time passcodes (such as Google Authenticator), hardware tokens, and biometrics. |
|
Mobile | T1582 | SMS Control |
Users should be encouraged to be very careful with what applications they grant SMS access to. Further, users should not change their default SMS handler to applications they do not recognize.[1] |
|
Mobile | T1576 | Uninstall Malicious Application |
Inform users that device rooting or granting unnecessary access to the accessibility service presents security risks that could be taken advantage of without their knowledge. |