Description
Adversaries may attempt to manipulate parameters in the control signalling to make them appear legitimate or benign to mobile subscribers, end nodes and/or security tools.
Sub-techniques
Specific variations of this technique
MOT1036.301Originating Entity Spoofing
2G
3G
4G
The adversary may attempt to manipulate the originating address information, such as Global Title Address, Diameter Host or Realm information for the sake of evading defences.
MOT1036.302Network Function Spoofing
5G-SA: Theoretical
The adversary may spoof the identity of legitimate network functions to evade detection in 5G networks.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable