{
	"id": "9ceb1e68-1494-4cb3-baa2-dccae5ccccee",
	"created_at": "2026-04-06T00:19:37.579252Z",
	"updated_at": "2026-04-10T03:20:02.113668Z",
	"deleted_at": null,
	"sha1_hash": "cd27bd308a4ea99690b5c6788b15829cbd6200d4",
	"title": "ECO-5 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 45680,
	"plain_text": "ECO-5 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 22:46:49 UTC\r\nMobile Threat Catalogue\r\nExploit Remote Management Services\r\nContribute\r\nThreat Category: Mobile OS \u0026 Vendor Infrastructure\r\nID: ECO-5\r\nThreat Description: If adversaries are able to exploit cloud services that can control devices remotely, they can\r\ntake advantage of this to track, locate, or wipe devices (e.g. Apple’s Find My iPhone).\r\nThreat Origin\r\nNot Applicable, See Exploit or CVE Examples\r\nExploit Examples\r\nHow Apple and Amazon Security Flaws Led To My Epic Hacking 1\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nMobile Device User\r\nTo prevent an attacker from gaining unauthorized access to sensitive functionality (e.g., locating or wiping a\r\ndevice associated with the account), enable two-factor or other strong authentication methods for user accounts on\r\nGoogle, Apple, or other device management and tracking services.\r\nTo detect unauthorized access to user accounts, use features from Google or others to periodically analyze account\r\nactivity for suspicious logins.\r\nEnterprise\r\nTo prevent an attacker from gaining unauthorized access to sensitive functionality (e.g., locating or wiping a\r\ndevice associated with the account), enable two-factor or other strong authentication methods for user accounts on\r\nGoogle, Apple, or other device management and tracking services.\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html\r\nPage 1 of 2\n\nTo detect unauthorized access to user accounts, use features from Google or others to periodically analyze account\r\nactivity for suspicious logins.\r\nReferences\r\n1. M. Honan, “How Apple Aan Amazon Security Flaws Led To My Epic Hacking”, Wired, 6 Aug. 2012;\r\nhttp://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ [accessed 8/24/2016] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html"
	],
	"report_names": [
		"ECO-5.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434777,
	"ts_updated_at": 1775791202,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cd27bd308a4ea99690b5c6788b15829cbd6200d4.pdf",
		"text": "https://archive.orkl.eu/cd27bd308a4ea99690b5c6788b15829cbd6200d4.txt",
		"img": "https://archive.orkl.eu/cd27bd308a4ea99690b5c6788b15829cbd6200d4.jpg"
	}
}