Description
Adversaries may gather information about the victim's identity that can be used during targeting.
Sub-techniques
Specific variations of this technique
MOT1589.301Phone and Subscription Information
2G
3G
4G
5G-SA
The adversary gathers phone or subscription related information about subscriber(s).
MOT1589.302SIM Card Information
2G
3G
4G
5G-SA
The adversary gathers SIM card related information including ICCID, IMSI, Ki, and OTA keys that can be used for cloning or authentication bypass.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable