Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.
ID | Name | Description |
---|---|---|
S0405 | Exodus | |
S0509 | FakeSpy | |
S0408 | FlexiSpy |
FlexiSpy can collect a list of known Wi-Fi access points.[3] |
S0407 | Monokle |
Monokle can retrieve nearby cell tower and Wi-Fi network information.[4] |
S0399 | Pallas |
Pallas gathers and exfiltrates data about nearby Wi-Fi access points.[5] |
S0506 | ViperRAT |
ViperRAT can collect the device’s cell tower information.[6] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.