Lateral MovementMOTA3010
The adversary is trying to move through your environment
Phase: Execution
2 Techniques
4 Sub-techniques
Exploit Trust Relationship
MOT3032
Adversaries may exploit trust relationships between telecom network elements to move laterally.
2G
3G
4G
Public
2 sub-techniques
Remote Service Exploitation
MOT3033
Adversaries may exploit remote services to move laterally within telecom networks.
2G
3G
4G
Public
2 sub-techniques