PersistenceMOTA3005
The adversary is trying to maintain their foothold
Phase: Impact
3 Techniques
6 Sub-techniques
Adversary-in-the-Middle
MOT1557
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing.
2G
3G
4G
Public
2 sub-techniques
Account Manipulation
MOT3025
Adversaries may manipulate accounts to maintain access to telecom network elements.
2G
3G
4G
Public
2 sub-techniques
Modify Network Configuration
MOT3026
Adversaries may modify network configurations to maintain access to telecom networks.
2G
3G
4G
Public
2 sub-techniques