It is an older example, but the DressCode was able to infect enterprise 
networks from compromised Android phones and, according to Trend Micro it did:
[https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/](https://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29)

allan

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Wednesday, December 12, 2018 2:51 PM, Christopher J. Wolff 
<cjwo...@nola.gov> wrote:

> Hello NANOG,
>
> I’m working on a presentation and need your help.  I’m looking for a case 
> study where a compromised iOS, Android or other mobile device was utilized as 
> a backdoor to compromise an enterprise network.  Any help will be appreciated.
>
> Regards,
>
> Christopher

Reply via email to