Skip to content

Hide Navigation Hide TOC

Access Contact List - T1432 (4e6620ac-c30c-4f6d-918e-fa20cae7c1ce)

An adversary could call standard operating system APIs from a malicious application to gather contact list (i.e., address book) data, or with escalated privileges could directly access files containing contact list data.

Cluster A Galaxy A Cluster B Galaxy B Level
Access Contact List - T1432 (4e6620ac-c30c-4f6d-918e-fa20cae7c1ce) Attack Pattern Contact List - T1636.003 (e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86) Attack Pattern 1
Protected User Data - T1636 (11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e) Attack Pattern Contact List - T1636.003 (e0b9ecb8-a7d1-43c7-aa30-8e19c6a92c86) Attack Pattern 2