Skip to content

Hide Navigation Hide TOC

Access Call Log - T1433 (79eec66a-9bd0-4a3f-ac82-19159e94bd44)

On Android, an adversary could call standard operating system APIs from a malicious application to gather call log data, or with escalated privileges could directly access files containing call log data.

On iOS, applications do not have access to the call log, so privilege escalation would be required in order to access the data.

Cluster A Galaxy A Cluster B Galaxy B Level
Access Call Log - T1433 (79eec66a-9bd0-4a3f-ac82-19159e94bd44) Attack Pattern Call Log - T1636.002 (1d1b1558-c833-482e-aabb-d07ef6eae63d) Attack Pattern 1
Protected User Data - T1636 (11c2c2b7-1fd4-408f-bc2e-fe772ef9df5e) Attack Pattern Call Log - T1636.002 (1d1b1558-c833-482e-aabb-d07ef6eae63d) Attack Pattern 2