This document provides an overview of mobile remote access trojans (mRATs) and targeted mobile attacks. It discusses how mRATs can snoop on corporate emails and data, eavesdrop, extract contact lists and location information, and infiltrate internal networks. The document describes high-end government/military-grade mRATs, mid-range cybercrime toolkits, and lower-end commercial surveillance toolkits. Real-life statistics from a survey of 650,000 devices within a cellular network of 2 million subscribers in June 2013 showed an infection rate of 1 in 1,000 devices. The document concludes by stating that mobile device management solutions do not address this threat.