A malicious application can read notifications sent by the operating system or other applications, which may contain sensitive data such as one-time authentication codes sent over SMS, email, or other mediums. A malicious application can also dismiss notifications to prevent the user from noticing that the notifications arrived and can trigger action buttons contained within notifications.[1]
| ID | Name | Description |
|---|---|---|
| S0432 | Bread | |
| S0425 | Corona Updates |
Corona Updates can collect messages from GSM, WhatsApp, Telegram, Facebook, and Threema by reading the application’s notification content.[3] |
| S0485 | Mandrake |
Mandrake can capture all device notifications and hide notifications from the user.[4] |
| S0489 | WolfRAT |
| ID | Mitigation | Description |
|---|---|---|
| M1013 | Application Developer Guidance |
Application developers could be encouraged to avoid placing sensitive data in notification text. |
| M1012 | Enterprise Policy |
On Android devices with a managed work profile (enterprise managed portion of the device), the |
The user can inspect (and modify) the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access).