CollectionMOTA3011
The adversary is trying to gather data of interest
Phase: Impact
5 Techniques
9 Sub-techniques
Identify Subscriber
MOT5019
An adversary may obtain a subscriber permanent or temporary identifier via various means.
2G
3G
4G
Public
2 sub-techniques
Access Subscriber Data
MOT3004
The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
2G
3G
4G
Public
1 sub-techniques
Network Sniffing
MOT1040
Adversaries may sniff network traffic to capture information about an environment, including authentication material, base station configuration and user plane traffic passed over the network.
2G
3G
Public
2 sub-techniques
Locate Subscriber
MOT5012
An adversary may obtain the UE location using radio access or core network.
2G
3G
4G
Public
2 sub-techniques
Data from Network Repository
MOT3034
Adversaries may collect data from network repositories such as subscriber databases.
2G
3G
4G
Public
2 sub-techniques