Malicious or Vulnerable Built-in Device Functionality - T1473 (f9e4f526-ac9d-4df5-8949-833a82a1d2df)
The mobile device could contain built-in functionality with malicious behavior or exploitable vulnerabilities. An adversary could deliberately insert and take advantage of the malicious behavior or could exploit inadvertent vulnerabilities. In many cases, it is difficult to be certain whether exploitable functionality is due to malicious intent or simply an inadvertent mistake.
Platforms: Android, iOS