Abuse Accessibility Features (T1453)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Abuse Accessibility Features

Associated Tactics

  • Collection
  • Credential Access
  • Impact
  • Defense Evasion

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
mitre-mobile-attack
Yair Amit. (2016, March 3). “Accessibility Clickjacking” – The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016. Skycure-Accessibility
Lukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019. android-trojan-steals-paypal-2fa
Lukáš Štefanko. (2018, October 24). Banking Trojans continue to surface on Google Play. Retrieved July 11, 2019. banking-trojans-google-play