Description
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Sub-techniques
Specific variations of this technique
MOT1565.001Stored Data Manipulation
5G-SA
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
MOT1565.301Subscriber Data Manipulation
2G
3G
4G
5G-SA: Theoretical
Adversaries may manipulate subscriber data in HLR/HSS/UDM to affect service delivery or billing.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Used
5G-NSA
Not Applicable