Description
The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
Sub-techniques
Specific variations of this technique
MOT3004.301Subscriber Authentication Data
2G
3G
4G
The adversary may acquire subscriber authentication information from mobile network registers, such as HLR/HSS/AuC or MSC/VLR, SGSN, MME.
MOT3004.302UDM/AUSF Data Access
5G-SA: Theoretical
The adversary may acquire subscriber authentication information from 5G core network functions such as UDM (Unified Data Management) or AUSF (Authentication Server Function).
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable