<div>It is an older example, but the DressCode was able to infect enterprise networks from compromised Android phones and, according to Trend Micro it did:<br></div><div><br></div><div><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29">https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/</a><br></div><div><br></div><div><br></div><div>allan</div><div class="protonmail_signature_block protonmail_signature_block-empty"><div class="protonmail_signature_block-user protonmail_signature_block-empty"><br></div><div class="protonmail_signature_block-proton protonmail_signature_block-empty"><br></div></div><div><br></div><div>‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐<br></div><div> On Wednesday, December 12, 2018 2:51 PM, Christopher J. Wolff <cjwolff@nola.gov> wrote:<br></div><div> <br></div><blockquote type="cite" class="protonmail_quote"><div><p>Hello NANOG,<br></p><p> <br></p><p>I’m working on a presentation and need your help.  I’m looking for a case study where a compromised iOS, Android or other mobile device was utilized as a backdoor to compromise an enterprise network.  Any help will be appreciated.<br></p><p> <br></p><p>Regards,<br></p><p>Christopher<br></p></div></blockquote><div><br></div>