Description
Adversaries may exfiltrate data over telecom channels.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Theoretical
5G-NSA
Not Applicable