Audio Capture (T1429)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Audio Capture

Associated Tactics

  • Collection

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
Android Developers. (2022, March 17). Voice Call. Retrieved April 1, 2022. Manifest.permission
Apple Developers. (n.d.). Requesting Authorization for Media Capture on iOS. Retrieved April 1, 2022. Requesting Auth-Media Capture
Google. (2021, August 11). Manifest.permission. Retrieved September 22, 2021. Android Permissions
Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022. Android Privacy Indicators
ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022. iOS Mic Spyware
NIST Mobile Threat Catalogue