Persistence
MOT3026.302
Sub-technique

Modify Security Configuration

Public
2G
3G
4G
5G-SA: Demonstrated
Description

Adversaries may modify security configurations to weaken security controls and maintain access.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable