Defense EvasionMOTA3007
The adversary is trying to avoid being detected
Phase: Impact
3 Techniques
6 Sub-techniques
Masquerading
MOT1036
Adversaries may attempt to manipulate parameters in the control signalling to make them appear legitimate or benign to mobile subscribers, end nodes and/or security tools.
2G
3G
4G
Public
2 sub-techniques
Disguise Signalling Messages
MOT3005
The adversary can disguise its signalling messages in order to avoid detection and blocking of their attacks.
2G
3G
4G
Public
2 sub-techniques
Traffic Obfuscation
MOT3029
Adversaries may obfuscate their traffic to avoid detection by telecom security systems.
2G
3G
4G
Public
2 sub-techniques