{
	"id": "8c251dae-f4d7-4f63-8f68-c416953e091b",
	"created_at": "2026-04-06T00:21:55.083811Z",
	"updated_at": "2026-04-10T03:21:51.19765Z",
	"deleted_at": null,
	"sha1_hash": "42a17c9633ff461592c45d2109b8b12e74b56253",
	"title": "APP-24 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33252,
	"plain_text": "APP-24 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 15:56:44 UTC\r\nMobile Threat Catalogue\r\nCovertly Track Device Location\r\nContribute\r\nThreat Category: Malicious or privacy-invasive application\r\nID: APP-24\r\nThreat Description: Apps that have been granted permission to Location Services or similar OS-provided\r\nservices can abuse this permission to report device outside of what may be needed to support legitimate app\r\nfunctionality (e.g. navigation). Device location data may facilitate further attacks such as geo-physical or\r\nbehavioral tracking of the user.\r\nThreat Origin\r\nDissecting Android Malware: Characterization and Evolution 1\r\nExploit Examples\r\nAn investigation of Chrysaor Malware on Android 2\r\nCVE Examples\r\nPossible Countermeasures\r\nEnterprise\r\nDeploy MAM or MDM solutions with policies that prohibit the side-loading of apps, which may bypass security\r\nchecks on the app.\r\nDeploy MAM or MDM solutions with policies that prohibit the installation of apps from 3rd party (unofficial) app\r\nstores.\r\nUse application threat intelligence data about potential abuse of location services associated with apps installed on\r\nCOPE or BYOD devices\r\nMobile Device User\r\nUse Android Verify Apps feature to identify apps that may abuse location services.\r\nhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html\r\nPage 1 of 2\n\nWhen apps that require location services (e.g., map services) are not in use, use OS-provided settings to globally\r\ndisable access to location services\r\nWhen using untrusted apps that require locations services (e.g., map services), use OS-provided settings to revoke\r\naccess to location services once the app is no longer in use.\r\nConsider the use of devices that support iOS 14 or higher, in which users can decide whether or not applications\r\nhave access to precision location of their device.\r\nReferences\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html"
	],
	"report_names": [
		"APP-24.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434915,
	"ts_updated_at": 1775791311,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/42a17c9633ff461592c45d2109b8b12e74b56253.pdf",
		"text": "https://archive.orkl.eu/42a17c9633ff461592c45d2109b8b12e74b56253.txt",
		"img": "https://archive.orkl.eu/42a17c9633ff461592c45d2109b8b12e74b56253.jpg"
	}
}