{
	"id": "797ca367-b81e-4a41-b2ed-86e46624f9a2",
	"created_at": "2026-04-06T02:11:34.760082Z",
	"updated_at": "2026-04-10T13:12:51.814731Z",
	"deleted_at": null,
	"sha1_hash": "06ee26b90320f265348772d8c6b0cf5514290419",
	"title": "ECO-12 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 40489,
	"plain_text": "ECO-12 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:54:29 UTC\r\nMobile Threat Catalogue\r\nMan in the Middle Attack on Application Download\r\nContribute\r\nThreat Category: Mobile Application Store\r\nID: ECO-12\r\nThreat Description: An attacker able to successfully execute a man in the middle attack on a connection could\r\nintercept legitimate application requests, and return back malicious or illegitimate applications to the user.\r\nThreat Origin\r\nNot Applicable, See Exploit or CVE Examples\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nEnterprise\r\nTo decrease the time to detection, use app threat intelligence data to identify malicious applications installed on\r\ndevices\r\nUse features such as Apple iOS Managed Apps, Android for Work, or Samsung KNOX Workspace that provide\r\nadditional separation between personal apps and enterprise apps to mitigate the impact of malicious behaviors.\r\nTo reduce the probability that an attacker will have established a MiTM on a session during which a user attempts\r\nto intall apps from a trusted source (e.g., official app store), recommend or require users to download apps when\r\nconnected to a trusted and secured Wi-Fi network.\r\nTo reduce the probability that malicious apps will be installed on managed devices, use app-vetting tools or\r\nservices in combination with MAM solutions to push vetted apps directly onto enrolled devices over trusted and\r\nsecured Wi-Fi networks.\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-12.html\r\nPage 1 of 2\n\nReferences\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-12.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-12.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-12.html"
	],
	"report_names": [
		"ECO-12.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775441494,
	"ts_updated_at": 1775826771,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/06ee26b90320f265348772d8c6b0cf5514290419.pdf",
		"text": "https://archive.orkl.eu/06ee26b90320f265348772d8c6b0cf5514290419.txt",
		"img": "https://archive.orkl.eu/06ee26b90320f265348772d8c6b0cf5514290419.jpg"
	}
}