| Home > CAPEC List > CAPEC-501: Android Activity Hijack (Version 3.9) |
|
Medium
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 173 | Action Spoofing |
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 499 | Android Intent Intercept |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Engage in Deceptive Interactions, Collect and Analyze Information |
Find an android application that uses implicit intents: Since this attack only works on android applications that use implicit intents, rather than explicit intents, an adversary must first identify an app that uses implicit intents to launch an Android-based trusted activity, and what that activity is.
Create a malicious app: The adversary must create a malicious android app meant to intercept implicit intents to launch an Adroid-based trusted activity. This malicious app will mimic the trusted activiy's user interface to get the user to enter sensitive data.
| Techniques |
|---|
| Specify the type of intent wished to be intercepted in the malicious app's manifest file using an intent filter |
Get user to download malicious app: The adversary must get a user using the targeted app to download the malicious app by any means necessary
Gather sensitive data through malicious app: Once the target application sends an implicit intent to launch a trusted activity, the malicious app will be launched instead that looks identical to the interface of that activity. When the user enters sensitive information it will be captured by the malicious app.
| Techniques |
|---|
| Gather login information from a user using a malicious app |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Read Data |
| CWE-ID | Weakness Name |
|---|---|
| 923 | Improper Restriction of Communication Channel to Intended Endpoints |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | |
| Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, References, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations, Typical_Severity | |||
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Name, Description, Prerequisites | |||
| 2021年10月21日 (Version 3.6) | CAPEC Content Team | The MITRE Corporation | |
| Updated Execution_Flow | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2020年12月17日 (Version 3.4) | Activity Hijack | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||