Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Access Call Log

On Android, an adversary could call standard operating system APIs from a malicious application to gather call log data, or with escalated privileges could directly access files containing call log data.

On iOS, applications do not have access to the call log, so privilege escalation would be required in order to access the data.

ID: T1433
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactic: Collection
Platforms: Android, iOS
MTC ID: APP-13
Version: 1.1
Created: 25 October 2017
Last Modified: 18 September 2019

Procedure Examples

Name Description
Adups

Adups transmitted call logs.[4]

Android/Chuli.A

Android/Chuli.A stole call logs.[7]

AndroRAT

AndroRAT collects call logs.[6]

Corona Updates

Corona Updates can collect the device’s call log.[14]

DroidJack

DroidJack captures call data.[3]

Exodus

Exodus Two can exfiltrate the call log.[10]

FinFisher

FinFisher accesses and exfiltrates the call log.[9]

GolfSpy

GolfSpy can obtain the device’s call log.[13]

INSOMNIA

INSOMNIA can retrieve the call history.[15]

Monokle

Monokle can retrieve call history.[11]

Pallas

Pallas accesses and exfiltrates the call log.[9]

Pegasus for Android

Pegasus for Android accesses call logs.[5]

Pegasus for iOS

Pegasus for iOS captures call logs.[2]

SpyDealer

SpyDealer harvests phone call history from victims.[8]

Stealth Mango

Stealth Mango uploads call logs.[1]

Tangelo

Tangelo contains functionality to gather call logs.[1]

ViceLeaker

ViceLeaker can collect the device’s call log.[12]

Mitigations

Mitigation Description
Application Vetting

On Android, accessing the device call log requires that the app hold the READ_CALL_LOG permission. Apps that request this permission could be closely scrutinized to ensure that the request is appropriate.

Security Updates

Decrease likelihood of successful privilege escalation attack.

Use Recent OS Version

Decrease likelihood of successful privilege escalation attack.

Detection

On Android 6.0 and up, the user can view which applications have permission to access call log information through the device settings screen, and the user can choose to revoke the permissions.

References