Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Network Information Discovery

Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.

ID: T1507
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactic: Collection
Platforms: Android
Version: 1.0
Created: 10 July 2019
Last Modified: 10 July 2019

Procedure Examples

Name Description
Exodus

Exodus Two collects a list of nearby base stations.[3]

FlexiSpy

FlexiSpy can collect a list of known Wi-Fi access points.[1]

Monokle

Monokle can retrieve nearby cell tower and Wi-Fi network information.[4]

Pallas

Pallas gathers and exfiltrates data about nearby Wi-Fi access points.[2]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References