Masquerade as Legitimate Application (T1444)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Masquerade as Legitimate Application

Associated Tactics

  • Initial Access
  • Defense Evasion

Initial Access (TA0027)

The adversary is trying to get into your device. The initial access tactic represents the vectors adversaries use to gain an initial foothold onto a mobile device.

View on ATT&CK

Procedure Examples

Description Source(s)
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. Palo Alto HenBox
Yajin Zhou and Xuxian Jiang. (2012, May). Dissecting Android Malware: Characterization and Evolution. Retrieved December 9, 2016. Zhou
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue