Description
Adversaries may buy, lease, or obtain physical access to a mobile operator network base station or use their own rogue cellular base station for launching an attack.
Parent Technique
This sub-technique is part of a broader technique
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable