Files
cti/mobile-attack/attack-pattern/attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067.json
T
2022-11-08 09:51:21 -05:00

64 lines
2.9 KiB
JSON

{
"type": "bundle",
"id": "bundle--05ba9318-bde6-4c90-8d0d-cdb40fbaa922",
"spec_version": "2.0",
"objects": [
{
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_domains": [
"mobile-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "attack-pattern",
"id": "attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067",
"created": "2017-10-25T14:48:07.827Z",
"x_mitre_version": "1.0",
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "T1469",
"url": "https://attack.mitre.org/techniques/T1469"
},
{
"source_name": "Honan-Hacking",
"url": "https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/",
"description": "Mat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016."
},
{
"url": "https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html",
"source_name": "NIST Mobile Threat Catalogue",
"external_id": "ECO-5"
},
{
"url": "https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html",
"source_name": "NIST Mobile Threat Catalogue",
"external_id": "EMM-7"
}
],
"x_mitre_deprecated": true,
"revoked": false,
"description": "An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an EMM console could use that access to wipe enrolled devices (Citation: Honan-Hacking).",
"modified": "2022-04-06T15:54:28.187Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "Remotely Wipe Data Without Authorization",
"x_mitre_detection": "Google provides the ability for users to view their general account activity. Apple iCloud also provides notifications to users of account activity.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "remote-service-effects"
}
],
"x_mitre_is_subtechnique": false,
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}