{
	"id": "20cfddac-d96f-4cba-8b0a-ebce2666027b",
	"created_at": "2026-04-06T00:21:15.494275Z",
	"updated_at": "2026-04-10T13:11:22.065494Z",
	"deleted_at": null,
	"sha1_hash": "485f679b5c76eee187c08434c30f87e6221ddaea",
	"title": "ECO-21 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33606,
	"plain_text": "ECO-21 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 13:24:56 UTC\r\nMobile Threat Catalogue\r\nDistributing URLs Pointing to Malicious Applications\r\nContribute\r\nThreat Category: Mobile Application Store\r\nID: ECO-21\r\nThreat Description: A popular method of distributing links to malicious applications is direct links to the\r\napplication files. These links can be distributed over several channels, including QR codes, NFC tags, and SMS\r\nmessages.\r\nThreat Origin\r\nHow to Protect Yourself From Malicious QR Codes 1\r\nExploit Examples\r\nFind and Call app becomes first trojan to appear on iOS App Store 2\r\nAn investigation of Chrysaor Malware on Android [^AndroidWebBlog-1]\r\nCVE Examples\r\nPossible Countermeasures\r\nEnterprise\r\nTo prevent the installation of malicious applications, prohibit sideloading of apps and the use of unauthorized app\r\nstores\r\nTo decrease the time to detection, use app threat intelligence data to identify malicious applications installed on\r\ndevices.\r\nUse features such as Apple iOS Managed Apps, Android for Work, or Samsung KNOX Workspace that provide\r\nadditional separation between personal apps and enterprise apps to mitigate the impact of malicious behaviors.\r\nEducate users about the risks of activating links in emails or SMS messages, and instead encourage users to\r\nidentify the app where hosted by an official app store.\r\nReferences\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html\r\nPage 1 of 2\n\nSource: https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html"
	],
	"report_names": [
		"ECO-21.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434875,
	"ts_updated_at": 1775826682,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/485f679b5c76eee187c08434c30f87e6221ddaea.pdf",
		"text": "https://archive.orkl.eu/485f679b5c76eee187c08434c30f87e6221ddaea.txt",
		"img": "https://archive.orkl.eu/485f679b5c76eee187c08434c30f87e6221ddaea.jpg"
	}
}