Remotely Track Device Without Authorization

An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM) / mobile device management (MDM) server console could use that access to track mobile devices.[1]

ID: T1468
Sub-techniques:  No sub-techniques
Tactic Type: Without Adversary Device Access
Platforms: Android, iOS
MTC ID: ECO-5, EMM-7
Version: 1.1
Created: 25 October 2017
Last Modified: 03 February 2019
Provided by LAYER 8

Mitigations

ID Mitigation Description
M1011 User Guidance

Encourage users to protect their account credentials and to enable available multi-factor authentication options.

Detection

Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity.

References