ImpactMOTA3014
The adversary is trying to manipulate, interrupt, or destroy your systems and data
Phase: Impact
3 Techniques
8 Sub-techniques
Data Manipulation
MOT1565
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
5G-SA
Public
2 sub-techniques
Service Disruption
MOT3039
Adversaries may disrupt telecom services to affect availability.
2G
3G
4G
Public
3 sub-techniques
Network Traffic Manipulation
MOT3040
Adversaries may manipulate network traffic to affect service delivery or intercept communications.
2G
3G
4G
Public
3 sub-techniques