Initial Access
MOT1195.002
Sub-technique

Compromise Software Supply Chain

Public
2G
3G
4G
5G-SA
Description

Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable