Description
Adversaries may modify network configurations to maintain access to telecom networks.
Sub-techniques
Specific variations of this technique
MOT3026.301Modify Routing Configuration
2G
3G
4G
5G-SA: Demonstrated
Adversaries may modify routing configurations to redirect traffic through controlled infrastructure.
MOT3026.302Modify Security Configuration
2G
3G
4G
5G-SA: Demonstrated
Adversaries may modify security configurations to weaken security controls and maintain access.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable