Manipulate Device Communication - T1463 (d731c21e-f27d-4756-b418-0e2aaabd6d63)
If network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on the network may be able to manipulate network communication without being detected. For example, FireEye researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport Layer Security (TLS) implementation vulnerability potentially opening the applications' network traffic to adversary-in-the-middle attacks (Citation: FireEye-SSL).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Manipulate Device Communication - T1463 (d731c21e-f27d-4756-b418-0e2aaabd6d63) | Attack Pattern | Adversary-in-the-Middle - T1638 (08e22979-d320-48ed-8711-e7bf94aabb13) | Attack Pattern | 1 |