GolfSpy is Android spyware deployed by the group Bouncing Golf.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1433 | Access Call Log | ||
Mobile | T1432 | Access Contact List | ||
Mobile | T1418 | Application Discovery | ||
Mobile | T1402 | Broadcast Receivers |
GolfSpy registers for the |
|
Mobile | T1429 | Capture Audio | ||
Mobile | T1512 | Capture Camera | ||
Mobile | T1414 | Capture Clipboard Data | ||
Mobile | T1412 | Capture SMS Messages | ||
Mobile | T1532 | Data Encrypted |
GolfSpy encrypts data using a simple XOR operation with a pre-configured key prior to exfiltration.[1] |
|
Mobile | T1533 | Data from Local System |
GolfSpy can collect local accounts on the device, pictures, bookmarks/histories of the default browser, and files stored on the SD card. GolfSpy can list image, audio, video, and other files stored on the device. GolfSpy can copy arbitrary files from the device.[1] |
|
Mobile | T1447 | Delete Device Data | ||
Mobile | T1476 | Deliver Malicious App via Other Means | ||
Mobile | T1430 | Location Tracking | ||
Mobile | T1406 | Obfuscated Files or Information |
GolfSpy encodes its configurations using a customized algorithm.[1] |
|
Mobile | T1424 | Process Discovery | ||
Mobile | T1513 | Screen Capture | ||
Mobile | T1437 | Standard Application Layer Protocol | ||
Mobile | T1426 | System Information Discovery |
GolfSpy can obtain the device’s battery level, network operator, connection information, sensor information, and information about the device’s storage and memory.[1] |
ID | Name | References |
---|---|---|
G0097 | Bouncing Golf |