Impact
MOT1565.001
Sub-technique

Stored Data Manipulation

Public
5G-SA
Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Not Applicable
5G-SA
Used
5G-NSA
Not Applicable