Currently viewing ATT&CK v8.2 which was live between October 27, 2020 and April 28, 2021. Learn more about the versioning system or see the live site.

Network Information Discovery

Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.

ID: T1507
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactic: Collection
Platforms: Android
Version: 1.0
Created: 10 July 2019
Last Modified: 10 July 2019

Procedure Examples

Name Description
Exodus

Exodus Two collects a list of nearby base stations.[1]

FakeSpy

FakeSpy can collect the device’s network information.[2]

FlexiSpy

FlexiSpy can collect a list of known Wi-Fi access points.[3]

Monokle

Monokle can retrieve nearby cell tower and Wi-Fi network information.[4]

Pallas

Pallas gathers and exfiltrates data about nearby Wi-Fi access points.[5]

ViperRAT

ViperRAT can collect the device’s cell tower information.[6]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References