Description
Adversaries may breach or otherwise leverage organizations who have access to intended victims.
Sub-techniques
Specific variations of this technique
MOT1199.301Exploit Interconnection Agreements
2G
3G
4G
The technique can be conducted by malicious partner or adversaries with access to interconnection networks or roaming partner's mobile network.
MOT1199.302Exploit MVNO Relationship
2G
3G
4G
5G-SA: Theoretical
Adversaries may exploit the relationship between Mobile Virtual Network Operators (MVNOs) and Mobile Network Operators (MNOs) to gain access to the core network.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable