An adversary could call standard operating system APIs from a malicious application to gather contact list (i.e., address book) data, or with escalated privileges could directly access files containing contact list data.
ID | Name | Description |
---|---|---|
S0309 | Adups | |
S0304 | Android/Chuli.A |
Android/Chuli.A stole contact list data stored both on the the phone and the SIM card.[2] |
S0292 | AndroRAT | |
S0422 | Anubis | |
S0540 | Asacub | |
S0480 | Cerberus | |
S0323 | Charger | |
S0425 | Corona Updates |
Corona Updates can collect device contacts.[8] |
S0505 | Desert Scorpion |
Desert Scorpion can collect the device’s contact list.[9] |
S0550 | DoubleAgent |
DoubleAgent has accessed the contact list.[10] |
S0507 | eSurv | |
S0522 | Exobot | |
S0405 | Exodus | |
S0509 | FakeSpy | |
S0408 | FlexiSpy | |
S0423 | Ginp | |
S0535 | Golden Cup |
Golden Cup can collect the device’s contact list.[17] |
S0551 | GoldenEagle |
GoldenEagle has collected a list of contacts.[10] |
S0421 | GolfSpy | |
S0536 | GPlayed | |
S0406 | Gustuff | |
S0544 | HenBox | |
S0463 | INSOMNIA | |
S0485 | Mandrake | |
S0407 | Monokle | |
S0399 | Pallas | |
S0316 | Pegasus for Android |
Pegasus for Android accesses contact list information.[26] |
S0289 | Pegasus for iOS |
Pegasus for iOS gathers contacts from the system by dumping the victim's address book.[27] |
S0539 | Red Alert 2.0 |
Red Alert 2.0 can collect the device’s contact list.[28] |
S0403 | Riltok |
Riltok can access and upload the device's contact list to the command and control server.[29] |
S0411 | Rotexy |
Rotexy can access and upload the contacts list to the command and control server.[30] |
S0549 | SilkBean | |
S0324 | SpyDealer | |
S0305 | SpyNote RAT |
SpyNote RAT can view contacts.[32] |
S0328 | Stealth Mango |
Stealth Mango uploads contact lists for various third-party applications such as Yahoo, AIM, GoogleTalk, Skype, QQ, and others.[33] |
S0558 | Tiktok Pro |
Tiktok Pro can access the device's contact list.[34] |
S0506 | ViperRAT | |
G0112 | Windshift |
Windshift has included contact list exfiltration in the malicious apps deployed as part of Operation BULL.[36] |
S0489 | WolfRAT |
ID | Mitigation | Description |
---|---|---|
M1005 | Application Vetting |
On Android, accessing the device contact list requires that the app hold the READ_CONTACTS permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate. On iOS, the app vetting process can determine whether apps access the device contact list, with extra scrutiny applied to any that do so. |
On both Android (6.0 and up) and iOS, the user can view which applications have permission to access contact list information through the device settings screen, and the user can choose to revoke the permissions.