{
	"id": "552a8317-d794-41b5-9d4f-6b1bd8c41c31",
	"created_at": "2026-04-06T01:30:34.211541Z",
	"updated_at": "2026-04-10T03:22:02.714336Z",
	"deleted_at": null,
	"sha1_hash": "1b467d2d6fa7bca00eaea63fc90c8fadd7e63c4b",
	"title": "PHY-2 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 46916,
	"plain_text": "PHY-2 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 00:23:40 UTC\r\nMobile Threat Catalogue\r\nDevice Attack via PC Connection\r\nContribute\r\nThreat Category: Physical Access\r\nID: PHY-2\r\nThreat Description: Compromised PCs may try to exploit a trusted USB connection between a mobile device\r\nand the PC, and infect the mobile device.\r\nThreat Origin\r\nExploiting Smart-Phone USB Connectivity for Fun and Profit 1\r\nExploit Examples\r\nNew Malware Tries to Infect Android Devices Via USB Cable 2\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nMobile Device User\r\nWhen charging a device, avoid connecting mobile devices directly to computers, and prefer the use of simple\r\ncorded chargers obtained directly from the device vendor.\r\nTo prevent some attacks over USB connectivity, disable USB debugging on Android devices when that feature is\r\nnot in use.\r\nTo reduce the opportunity for an attacker to directly connect a device to a malicious computer, use strong physical\r\nsecurity when a device is being left directly unattended (e.g., lock it in a secure container).\r\nTo prevent some attacks over USB connectivity, ensure the device has an unlock code set and is explicitly locked\r\nwhen being left directly unattended.\r\nReferences\r\nhttps://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html\r\nPage 1 of 2\n\n1. Z. Wang and A. Stavrou, “Exploiting Smart-Phone USB Connectivity for Fun and Profit”, in Proceedings\r\nof 26th Annual Computer Security Applications Conference, 2010, pp. 357-365;\r\nhttps://dl.acm.org/doi/pdf/10.1145/1920261.1920314?\r\ncasa_token=5XmsJ5lz06EAAAAA:HavUpmf81lNQ74ooinjWS1BZkQMkfhsbWJwFwa3UEieHGYKTCmv-TSwwaHRQhz-I4XFzdzkDHEOA [accessed 8/1/2022] ↩\r\n2. G. Sims, “New Malware Tries to Infect Android Devices Via USB Cable”, 27 Jan. 2014;\r\nwww.androidauthority.com/new-malware-tries-infect-android-devices-via-usb-cable-339356/ [accessed\r\n8/31/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html"
	],
	"report_names": [
		"PHY-2.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775439034,
	"ts_updated_at": 1775791322,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1b467d2d6fa7bca00eaea63fc90c8fadd7e63c4b.pdf",
		"text": "https://archive.orkl.eu/1b467d2d6fa7bca00eaea63fc90c8fadd7e63c4b.txt",
		"img": "https://archive.orkl.eu/1b467d2d6fa7bca00eaea63fc90c8fadd7e63c4b.jpg"
	}
}