Execution
MOT3024.302
Sub-technique

Malicious Container Image

Public
4G
5G-SA: Demonstrated
Description

Adversaries may use malicious container images to execute unauthorized code in telecom cloud infrastructure.

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable