| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1429 | Audio Capture | Fakecalls can turn on a device’s microphone to capture audio.[1] | |
| Mobile | T1616 | Call Control | Fakecalls can intercept and imitate phone conversations by breaking the connection and displaying a fake call screen. It can also make outgoing calls and spoof incoming calls.[1] | |
| Mobile | T1533 | Data from Local System | Fakecalls can access and exfiltrate files, such as photos or video.[1] | |
| Mobile | T1646 | Exfiltration Over C2 Channel | Fakecalls can send exfiltrated data back to the C2 server.[1] | |
| Mobile | T1630 | .002 | Indicator Removal on Host: File Deletion | Fakecalls can manipulate a device’s call log, including deleting incoming calls.[1] | 
| Mobile | T1430 | Location Tracking | ||
| Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location | Fakecalls has masqueraded as popular Korean banking apps.[1] | 
| Mobile | T1636 | .002 | Protected User Data: Call Log | |
| .003 | Protected User Data: Contact List | Fakecalls can copy and exfiltrate a device’s contact list.[1] | ||
| .004 | Protected User Data: SMS Messages | |||
| Mobile | T1512 | Video Capture | ||