Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.
| ID | Name | Description |
|---|---|---|
| S0405 | Exodus | |
| S0509 | FakeSpy | |
| S0408 | FlexiSpy |
FlexiSpy can collect a list of known Wi-Fi access points.[3] |
| S0407 | Monokle |
Monokle can retrieve nearby cell tower and Wi-Fi network information.[4] |
| S0399 | Pallas |
Pallas gathers and exfiltrates data about nearby Wi-Fi access points.[5] |
| S0506 | ViperRAT |
ViperRAT can collect the device’s cell tower information.[6] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.