Looking for an compromise of an enterprise network from a mobile device

Allan Liska allan at allan.vin
Wed Dec 12 20:01:31 UTC 2018


It is an older example, but the DressCode was able to infect enterprise networks from compromised Android phones and, according to Trend Micro it did:

[https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/](https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29)

allan

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Wednesday, December 12, 2018 2:51 PM, Christopher J. Wolff <cjwolff at nola.gov> wrote:

> Hello NANOG,
>
> I’m working on a presentation and need your help.  I’m looking for a case study where a compromised iOS, Android or other mobile device was utilized as a backdoor to compromise an enterprise network.  Any help will be appreciated.
>
> Regards,
>
> Christopher
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20181212/28cfabd4/attachment.html>


More information about the NANOG mailing list