It is an older example, but the DressCode was able to infect enterprise networks from compromised Android phones and, according to Trend Micro it did:
[https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/](https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29) allan ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Wednesday, December 12, 2018 2:51 PM, Christopher J. Wolff <cjwo...@nola.gov> wrote: > Hello NANOG, > > I’m working on a presentation and need your help. I’m looking for a case > study where a compromised iOS, Android or other mobile device was utilized as > a backdoor to compromise an enterprise network. Any help will be appreciated. > > Regards, > > Christopher