CYFIRMA - Brand Intelligence - Malicious Mobile App High Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytic rule detects instances where malicious or unauthorized mobile applications are discovered mimicking legitimate brand assets. Such impersonations may be distributed through unofficial app stores or third-party websites, potentially deceiving customers, harvesting sensitive data, or damaging brand reputation. This alert is triggered when CYFIRMA threat intelligence identifies a suspicious mobile app associated with the organization's brand or product names.

Attribute Value
Type Analytic Rule
Solution Cyfirma Brand Intelligence
ID 3176ac89-b195-48b7-a01e-740a6b26fb2f
Severity High
Status Available
Kind Scheduled
Tactics ResourceDevelopment, Execution, DefenseEvasion, CredentialAccess, CommandAndControl
Techniques T1406, T1414, T1437, T1583.001, T1204.002
Required Connectors CyfirmaBrandIntelligenceAlertsDC
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaBIMaliciousMobileAppsAlerts_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Brand Intelligence