On Android, details of onboard network interfaces are accessible to apps through the java.net.NetworkInterface
class.[1] The Android TelephonyManager
class can be used to gather related information such as the IMSI, IMEI, and phone number.[2]
On iOS, gathering network configuration information is not possible without root access.
ID | Name | Description |
---|---|---|
S0310 | ANDROIDOS_ANSERVER.A |
ANDROIDOS_ANSERVER.A gathers the device IMEI and IMSI.[3] |
S0540 | Asacub |
Asacub can collect various pieces of device network configuration information, such as mobile network operator.[4] |
S0432 | Bread |
Bread collects the device’s IMEI, carrier, mobile country code, and mobile network code.[5] |
S0529 | CarbonSteal |
CarbonSteal has collected device network information, including 16-bit GSM Cell Identity, 16-bit Location Area Code, Mobile Country Code (MCC), and Mobile Network Code (MNC). CarbonSteal has also called |
S0425 | Corona Updates |
Corona Updates can collect device network configuration information, such as Wi-Fi SSID and IMSI.[7] |
S0315 | DualToy |
DualToy collects the connected iOS device’s information including IMEI, IMSI, ICCID, serial number and phone number.[8] |
S0478 | EventBot | |
S0522 | Exobot |
Exobot can obtain the device’s IMEI, phone number, and IP address.[10] |
S0405 | Exodus |
Exodus One queries the device for its IMEI code and the phone number in order to validate the target of a new infection.[11] |
S0509 | FakeSpy |
FakeSpy can collect device networking information, including phone number, IMEI, and IMSI.[12] |
S0577 | FrozenCell |
FrozenCell has collected phone metadata such as cell location, mobile country code (MCC), and mobile network code (MNC).[13] |
S0535 | Golden Cup |
Golden Cup can collect the device’s phone number and IMSI.[14] |
S0536 | GPlayed |
GPlayed can collect the device’s IMEI, phone number, and country.[15] |
S0406 | Gustuff |
Gustuff gathers the device IMEI to send to the command and control server.[16] |
S0463 | INSOMNIA |
INSOMNIA can collect the device’s phone number, ICCID, IMEI, and the currently active network interface (Wi-Fi or cellular).[17] |
S0407 | Monokle |
Monokle checks if the device is connected via Wi-Fi or mobile data.[18] |
S0316 | Pegasus for Android |
Pegasus for Android checks if the device is on Wi-Fi, a cellular network, and is roaming.[19] |
S0289 | Pegasus for iOS |
Pegasus for iOS monitors the connection state and tracks which types of networks the phone is connected to, potentially to determine the bandwidth and ability to send full data across the network.[20] |
S0291 | PJApps |
PJApps has the capability to collect and leak the victim's phone number, mobile device unique identifier (IMEI).[21] |
S0326 | RedDrop |
RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[22] |
S0403 | Riltok | |
S0411 | Rotexy |
Rotexy collects the device's IMEI and sends it to the command and control server.[24] |
S0313 | RuMMS |
RuMMS gathers the device phone number and IMEI and transmits them to a command and control server.[25] |
S0324 | SpyDealer |
SpyDealer harvests the device phone number, IMEI, and IMSI.[26] |
S0328 | Stealth Mango |
Stealth Mango collects and uploads information about changes in SIM card or phone numbers on the device.[27] |
S0329 | Tangelo | |
S0545 | TERRACOTTA |
TERRACOTTA has collected the device’s phone number and can check if the active network connection is metered.[28] |
S0427 | TrickMo |
TrickMo can collect device network configuration information such as IMSI, IMEI, and Wi-Fi connection state.[29] |
S0506 | ViperRAT |
ViperRAT can collect network configuration data from the device, including phone number, SIM operator, and network operator.[30] |
S0489 | WolfRAT |
WolfRAT sends the device’s IMEI with each exfiltration request.[31] |
S0318 | XLoader for Android |
XLoader for Android collects the device’s IMSI and ICCID.[32] |
S0490 | XLoader for iOS |
XLoader for iOS can obtain the device’s IMEM, ICCID, and MEID.[32] |
ID | Mitigation | Description |
---|---|---|
M1005 | Application Vetting |
Application vetting could be used to analyze applications to determine whether they access this information, including determining whether the application requests the Android ACCESS_NETWORK_STATE permission (required in order to access NetworkInterface information) or the READ_PHONE_STATE permission (required in order to access TelephonyManager information). |
M1006 | Use Recent OS Version |
Starting in Android 6.0, applications can no longer access MAC addresses of network interfaces.[33] |