Reconnaissance
MOT1589.302
Sub-technique

SIM Card Information

Public
2G
3G
4G
5G-SA
Description

The adversary gathers SIM card related information including ICCID, IMSI, Ki, and OTA keys that can be used for cloning or authentication bypass.

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Used
5G-NSA
Not Applicable