MoTIF Techniques
Browse all techniques in the Mobile Threat Intelligence Framework (MoTIF). These techniques represent the methods that adversaries use to compromise mobile networks.
Reconnaissance
MOTA3001
MOT3001
Monitor Radio Interface
The adversaries may monitor radio interface traffic to passively collect information about the radio network configuration or about subscribers in close vicinity of the adversary.
2G
3G
4G
MOT1589
Gather Victim Identity Information
Adversaries may gather information about the victim's identity that can be used during targeting.
2G
3G
4G
5G-SA
MOT1597
Search Closed Sources
Adversaries may search and gather information about victims from closed sources that can be used during targeting.
2G
3G
4G
5G-SA
MOT1593
Search Open Websites/Domains
Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting.
2G
3G
4G
5G-SA
MOT3020
Network Protocol Analysis
Adversaries may analyze telecom network protocols to identify vulnerabilities, misconfigurations, or opportunities for exploitation.
2G
3G
4G
5G-SA: Demonstrated
Resource Development
MOTA3002
MOT1583
Acquire Infrastructure
Adversaries may buy, lease, or rent infrastructure that can be used during targeting.
2G
3G
4G
MOT1587
Develop Capabilities
Adversaries may build capabilities that can be used during targeting.
2G
3G
4G
5G-SA
MOT3021
Obtain Telecom Testing Equipment
Adversaries may obtain specialized telecom testing equipment to analyze and exploit telecom networks.
2G
3G
4G
5G-SA: Demonstrated
Initial Access
MOTA3003
MOT3002
Exploit Interconnection Link
The adversary may get access to the target network via the interconnection interface.
2G
3G
4G
MOT3003
Exploit via Core Signalling Interface
The adversary may access the target network by exploiting signalling (i.e. control plane) protocols.
2G
3G
4G
5G-SA: Demonstrated
MOT3006
Exploit via Radio Interface
Adversaries may use the radio access network to initiate attacks towards the UE or the mobile network.
2G
3G
4G
MOT1199
Trusted Relationship
Adversaries may breach or otherwise leverage organizations who have access to intended victims.
2G
3G
4G
MOT1195
Supply Chain Compromise
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
2G
3G
4G
MOT3022
Exploit Management Interface
Adversaries may exploit vulnerabilities in management interfaces of telecom equipment to gain initial access.
2G
3G
4G
5G-SA: Demonstrated
Execution
MOTA3004
MOT3023
Command and Scripting Interpreter
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries on telecom network elements.
2G
3G
4G
5G-SA: Demonstrated
MOT3024
Container-based Execution
Adversaries may abuse container technologies used in telecom cloud infrastructure to execute malicious code.
4G
5G-SA: Demonstrated
Persistence
MOTA3005
MOT1557
Adversary-in-the-Middle
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing.
2G
3G
4G
MOT3025
Account Manipulation
Adversaries may manipulate accounts to maintain access to telecom network elements.
2G
3G
4G
5G-SA: Demonstrated
MOT3026
Modify Network Configuration
Adversaries may modify network configurations to maintain access to telecom networks.
2G
3G
4G
5G-SA: Demonstrated
Privilege Escalation
MOTA3006
MOT3027
Exploit Telecom Element Vulnerability
Adversaries may exploit vulnerabilities in telecom network elements to gain higher privileges.
2G
3G
4G
5G-SA: Demonstrated
MOT3028
Access Token Manipulation
Adversaries may manipulate access tokens to gain higher privileges in telecom systems.
4G
5G-SA: Demonstrated
Defense Evasion
MOTA3007
MOT1036
Masquerading
Adversaries may attempt to manipulate parameters in the control signalling to make them appear legitimate or benign to mobile subscribers, end nodes and/or security tools.
2G
3G
4G
MOT3005
Disguise Signalling Messages
The adversary can disguise its signalling messages in order to avoid detection and blocking of their attacks.
2G
3G
4G
MOT3029
Traffic Obfuscation
Adversaries may obfuscate their traffic to avoid detection by telecom security systems.
2G
3G
4G
5G-SA: Demonstrated
Credential Access
MOTA3008
MOT3004
Access Subscriber Data
The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
2G
3G
4G
MOT1212
Exploitation for Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
5G-SA
MOT3030
SIM Card Attacks
Adversaries may attack SIM cards to access authentication keys and other credentials.
2G
3G
4G
5G-SA
Discovery
MOTA3009
MOT1046
Network Service Scanning
An adversary may discover operator network related information (identifiers).
2G
3G
4G
MOT5019
Identify Subscriber
An adversary may obtain a subscriber permanent or temporary identifier via various means.
2G
3G
4G
MOT5003
Network Function Service Discovery
An adversary may query the Network Repository Function (NRF) to discover restricted Network Function (NF) services to further target that NF.
5G-SA: Demonstrated
MOT3031
Network Topology Discovery
Adversaries may discover the topology of telecom networks to identify targets for further attacks.
2G
3G
4G
5G-SA: Demonstrated
Lateral Movement
MOTA3010
Collection
MOTA3011
MOT5019
Identify Subscriber
An adversary may obtain a subscriber permanent or temporary identifier via various means.
2G
3G
4G
MOT3004
Access Subscriber Data
The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
2G
3G
4G
MOT1040
Network Sniffing
Adversaries may sniff network traffic to capture information about an environment, including authentication material, base station configuration and user plane traffic passed over the network.
2G
3G
4G: Demonstrated
MOT5012
Locate Subscriber
An adversary may obtain the UE location using radio access or core network.
2G
3G
4G
MOT3034
Data from Network Repository
Adversaries may collect data from network repositories such as subscriber databases.
2G
3G
4G
5G-SA: Demonstrated
Command and Control
MOTA3012
Exfiltration
MOTA3013
Impact
MOTA3014
MOT1565
Data Manipulation
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
5G-SA
MOT3039
Service Disruption
Adversaries may disrupt telecom services to affect availability.
2G
3G
4G
5G-SA: Demonstrated
MOT3040
Network Traffic Manipulation
Adversaries may manipulate network traffic to affect service delivery or intercept communications.
2G
3G
4G
5G-SA: Theoretical