TelcoSecSecurity Research
Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

  • Home
  • MoTIF
  • Tactics
  • Collection
  • Collection
    MOTA3011

    The adversary is trying to gather data of interest

    Phase: Impact
    5 Techniques
    9 Sub-techniques
    Previous: Lateral Movement
    Next: Command and Control
    Identify Subscriber
    MOT5019
    An adversary may obtain a subscriber permanent or temporary identifier via various means.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Access Subscriber Data
    MOT3004
    The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
    2G
    3G
    4G
    Public
    1 sub-techniques
    Network Sniffing
    MOT1040
    Adversaries may sniff network traffic to capture information about an environment, including authentication material, base station configuration and user plane traffic passed over the network.
    2G
    3G
    Public
    2 sub-techniques
    Locate Subscriber
    MOT5012
    An adversary may obtain the UE location using radio access or core network.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Data from Network Repository
    MOT3034
    Adversaries may collect data from network repositories such as subscriber databases.
    2G
    3G
    4G
    Public
    2 sub-techniques
    TelcoSec LogoTelcoSec

    Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

    GitHubLinkedInEmail

    Mobile Networks

    • 5G Security
    • 4G Security
    • 3G Security
    • 2G Security

    Signaling Protocols

    • SS7 Security
    • Diameter Security
    • SIGTRAN Security
    • SIP Security
    • VoIP Security

    Resources

    • MoTIF Framework
    • Security Tools
    • Sitemap
    • About Author
    • Contact
    Privacy PolicyTerms of ServiceAdvertisePartners

    © 2025 TelcoSec. All rights reserved.