Description
Adversaries may buy, lease, or rent infrastructure that can be used during targeting.
Sub-techniques
Specific variations of this technique
MOT1583.301Core Signalling Infrastructure Access
2G
3G
4G
5G-SA: Theoretical
Adversaries may buy, lease, or rent SS7, Diameter, GTP-C signalling infrastructure access or services that can be used during targeting.
MOT1583.302Radio Interface Access
2G
3G
4G
Adversaries may buy, lease, or obtain physical access to a mobile operator network base station or use their own rogue cellular base station for launching an attack.
MOT1583.303Cloud Infrastructure Access
4G
5G-SA: Demonstrated
Adversaries may acquire cloud infrastructure access to target virtualized network functions (VNFs) in 5G networks.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable