[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Looking for an compromise of an enterprise network from a mobile device



It is an older example, but the DressCode was able to infect enterprise networks from compromised Android phones and, according to Trend Micro it did:

[https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/](https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29)

allan

â??â??â??â??â??â??â?? Original Message â??â??â??â??â??â??â??
On Wednesday, December 12, 2018 2:51 PM, Christopher J. Wolff <cjwolff at nola.gov> wrote:

> Hello NANOG,
>
> Iâ??m working on a presentation and need your help.  Iâ??m looking for a case study where a compromised iOS, Android or other mobile device was utilized as a backdoor to compromise an enterprise network.  Any help will be appreciated.
>
> Regards,
>
> Christopher
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20181212/28cfabd4/attachment.html>