Initial AccessMOTA3003
The adversary is trying to get into your network
Phase: Initial Access
6 Techniques
18 Sub-techniques
Exploit Interconnection Link
MOT3002
The adversary may get access to the target network via the interconnection interface.
2G
3G
4G
Public
3 sub-techniques
Exploit via Core Signalling Interface
MOT3003
The adversary may access the target network by exploiting signalling (i.e. control plane) protocols.
2G
3G
4G
Public
4 sub-techniques
Exploit via Radio Interface
MOT3006
Adversaries may use the radio access network to initiate attacks towards the UE or the mobile network.
2G
3G
4G
Public
4 sub-techniques
Trusted Relationship
MOT1199
Adversaries may breach or otherwise leverage organizations who have access to intended victims.
2G
3G
4G
Public
2 sub-techniques
Supply Chain Compromise
MOT1195
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
2G
3G
4G
Public
2 sub-techniques
Exploit Management Interface
MOT3022
Adversaries may exploit vulnerabilities in management interfaces of telecom equipment to gain initial access.
2G
3G
4G
Public
3 sub-techniques