Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Exploit OS Vulnerability

A malicious app can exploit unpatched vulnerabilities in the operating system to obtain escalated privileges.

ID: T1404
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactic: Privilege Escalation
Platforms: Android, iOS
MTC ID: APP-26
Version: 1.0
Created: 25 October 2017
Last Modified: 17 October 2018

Procedure Examples

Name Description
Agent Smith

Agent Smith exploits known OS vulnerabilities, including Janus, to replace legitimate applications with malicious versions.[12]

BrainTest

Some original variants of BrainTest had the capability to automatically root some devices, but that behavior was not observed in later samples.[5]

Dvmap

Dvmap attempts to gain root access by using local exploits.[11]

Exodus

Exodus Two attempts to elevate privileges by using a modified version of the DirtyCow exploit.[10]

FinFisher

FinFisher comes packaged with ExynosAbuse, an Android exploit that can gain root privileges.[9]

Gooligan

Gooligan executes Android root exploits.[3]

HummingBad

HummingBad can exploit unfixed vulnerabilities in older Android versions to root victim phones.[8]

INSOMNIA

INSOMNIA exploits a WebKit vulnerability to achieve root access on the device.[13]

Pegasus for Android

Pegasus for Android attempts to exploit well-known Android OS vulnerabilities to escalate privileges.[4]

Pegasus for iOS

Pegasus for iOS exploits iOS vulnerabilities to escalate privileges.[7]

ShiftyBug

ShiftyBug is packed with at least eight publicly available exploits that can perform rooting.[1]

Skygofree

Skygofree has the capability to exploit several known vulnerabilities and escalate privileges.[2]

SpyDealer

SpyDealer uses the commercial rooting app Baidu Easy Root to gain root privilege and maintain persistence on the victim.[6]

Mitigations

Mitigation Description
Application Vetting

Application vetting may be able to identify the presence of exploit code within applications.

Security Updates
Use Recent OS Version

References