An adversary could use a malicious or exploited application to surreptitiously track the device's physical location through use of standard operating system APIs.
ID | Name | Description |
---|---|---|
S0309 | Adups | |
S0304 | Android/Chuli.A |
Android/Chuli.A stole geo-location data.[2] |
S0292 | AndroRAT | |
S0422 | Anubis | |
S0655 | BusyGasper |
BusyGasper can collect the device’s location information based on cellular network or GPS coordinates.[5] |
S0529 | CarbonSteal |
CarbonSteal can access the device’s location and track the device over time.[6] |
S0480 | Cerberus | |
S0323 | Charger |
Charger checks the local settings of the device and does not run its malicious logic if the device is located in Ukraine, Russia, or Belarus.[8] |
S0555 | CHEMISTGAMES |
CHEMISTGAMES has collected the device’s location.[9] |
S0425 | Corona Updates |
Corona Updates can track the device’s location.[10] |
S0505 | Desert Scorpion |
Desert Scorpion can track the device’s location.[11] |
S0507 | eSurv | |
S0405 | Exodus |
Exodus Two can extract the GPS coordinates of the device.[13] |
S0182 | FinFisher |
FinFisher tracks the latitude and longitude coordinates of the infected device.[14] |
S0408 | FlexiSpy | |
S0577 | FrozenCell |
FrozenCell has used an online cell tower geolocation service to track targets.[16] |
S0535 | Golden Cup |
Golden Cup can track the device’s location.[17] |
S0551 | GoldenEagle |
GoldenEagle has tracked location.[6] |
S0421 | GolfSpy | |
S0536 | GPlayed | |
S0544 | HenBox | |
S0463 | INSOMNIA | |
S0485 | Mandrake | |
S0407 | Monokle | |
S0399 | Pallas |
Pallas tracks the latitude and longitude coordinates of the infected device.[14] |
S0289 | Pegasus for iOS |
Pegasus for iOS update and sends the location of the phone.[24] |
S0291 | PJApps |
PJApps has the capability to collect and leak the victim's location.[3] |
S0295 | RCSAndroid |
RCSAndroid can record location.[25] |
S0549 | SilkBean | |
S0327 | Skygofree | |
S0324 | SpyDealer | |
S0305 | SpyNote RAT |
SpyNote RAT collects the device's location.[28] |
S0328 | Stealth Mango |
Stealth Mango can perform GPS location tracking as well as capturing coordinates as when an SMS message or call is received.[29] |
S0329 | Tangelo |
Tangelo contains functionality to gather GPS coordinates.[29] |
S0558 | Tiktok Pro |
Tiktok Pro can track the device’s location.[30] |
S0418 | ViceLeaker |
ViceLeaker can collect location information, including GPS coordinates.[31][32] |
S0506 | ViperRAT | |
G0112 | Windshift |
Windshift has included location tracking capabilities in the malicious apps deployed as part of Operation BULL and Operation ROCK.[34] |
S0314 | X-Agent for Android |
X-Agent for Android was believed to have been used to obtain locational data of Ukrainian artillery forces.[35] |
ID | Mitigation | Description |
---|---|---|
M1005 | Application Vetting |
On Android, applications must request the ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION permission to access the device's physical location. Extra scrutiny could be given to applications that request these permissions. On iOS, calls to the relevant APIs could be detected during the vetting process. |
On both Android (6.0 and up) and iOS, the user can view which applications have permission to access device location through the device settings screen, and the user can choose to revoke the permissions.