Adversaries may collect data within notifications sent by the operating system or other applications. Notifications may contain sensitive data such as one-time authentication codes sent over SMS, email, or other mediums. In the case of Credential Access, adversaries may attempt to intercept one-time code sent to the device. Adversaries can also dismiss notifications to prevent the user from noticing that the notification has arrived and can trigger action buttons contained within notifications.[1]
ID | Name | Description |
---|---|---|
S1061 | AbstractEmu |
AbstractEmu can monitor notifications.[2] |
S0432 | Bread | |
C0033 | C0033 |
During C0033, PROMETHIUM used StrongPity to collect message notifications from 17 applications.[4] |
S1083 | Chameleon |
Chameleon can register as an |
S0425 | Corona Updates |
Corona Updates can collect messages from GSM, WhatsApp, Telegram, Facebook, and Threema by reading the application’s notification content.[6] |
S1092 | Escobar | |
S1103 | FlixOnline |
FlixOnline requests access to the |
S1067 | FluBot | |
S1077 | Hornbill |
Hornbill has monitored for SMS and WhatsApp notifications.[10] |
S0485 | Mandrake |
Mandrake can capture all device notifications and hide notifications from the user.[11] |
S1062 | S.O.V.A. |
S.O.V.A. can silently intercept and manipulate notifications. S.O.V.A. can also inject cookies via push notifications.[12] |
S1055 | SharkBot |
SharkBot can intercept notifications to send to the C2 server and take advantage of the Direct Reply feature.[13] |
S0489 | WolfRAT |
ID | Mitigation | Description |
---|---|---|
M1013 | Application Developer Guidance |
Application developers could be encouraged to avoid placing sensitive data in notification text. |
M1012 | Enterprise Policy |
On Android devices with a work profile, the |
M1011 | User Guidance |
Users should be wary of granting applications dangerous or privacy-intrusive permissions, such as access to notifications. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | Permissions Requests |
Application vetting services can look for applications requesting the |
DS0042 | User Interface | System Settings |
The user can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). |