TY - JOUR AB - Mobile advanced persistent threat (APT) campaigns are simply the natural evolution of an attack type. It was just a matter of time before attackers would focus on exploiting a device that is so critical to our digital life. Threat actors always try to be ahead of the game, and advancements in tactics, techniques and procedures (TTPs) used shouldn't come as a surprise. While we notice massive changes in the way malware is written, developed and new techniques pioneered that help leave infiltration unnoticed (hardware embedded malware or fileless malware, etc.), little attention has been paid to the mobile front, although it certainly is the one electronic device no one can function without. Over the past year, we have been observing how attackers use a device that is so ubiquitous in everyone’s daily life, together with the sophistication of serious malware authors that aren’t just trying to siphon off a few bucks. This has given rise to what some security research classify as a new category of advanced attacks that some even call "Mobile APTs" with a clear nation-state component. APT actors have traditionally operated on PC platforms, but are now rediscovering the mobile segment through evolving tactics. This article will explore these "mobile APTs" and place them in the context of recent changes in the general threat landscape. AU - Braganca, Maschenka DO - 10.7396/IE_2019_D ET - 8/2019 KW - Espionage Advanced persistent threat LA - eng M1 - International Edition PY - 2019 SN - 1813-3495 SP - 35-46 ST - Pocket Spies. Advanced Persistent Espionage Campaigns Go Mobile T2 - SIAK-Journal − Journal for Police Science and Practice TI - Pocket Spies. Advanced Persistent Espionage Campaigns Go Mobile UR - http://www.bmi.gv.at/104/Wissenschaft_und_Forschung/SIAK-Journal/internationalEdition/files/Braganca_IE_2019.pdf VL - 9 ID - 666 ER -