Resource Development
MOT1583.302
Sub-technique

Radio Interface Access

Public
2G
3G
4G
Description

Adversaries may buy, lease, or obtain physical access to a mobile operator network base station or use their own rogue cellular base station for launching an attack.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable