TelcoSecSecurity Research
Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

MoTIFTechniquesMOT5019
Discovery
MOT5019

Identify Subscriber

Public
2G
3G
4G
View in Matrix
Description

An adversary may obtain a subscriber permanent or temporary identifier via various means.

Sub-techniques
Specific variations of this technique
MOT5019.301Trigger Subscriber Terminated Activity
2G
3G
4G

The adversary can trigger mobile terminating activity, such as making calls to the subscriber's profile, sending silent SMS, or trigger notifications from the instant messengers, to trigger paging of the subscriber.

MOT5019.302Retrieve Subscriber Identity Information
2G
3G
4G

The adversary can retrieve subscriber information such as the IMSI, MSISDN, SUPI, SUCI etc.

MOT5019.303Retrieve Subscriber Network Information
2G
3G
4G

The adversary can retrieve subscriber network information such as the current serving network element(s).

MOT5019.304SUPI/SUCI Identification
5G-SA: Theoretical

The adversary can attempt to identify 5G subscribers through their SUPI (Subscription Permanent Identifier) or SUCI (Subscription Concealed Identifier).

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable
Quick Links
View in MoTIF MatrixView Tactic: DiscoveryAll Techniques
TelcoSec LogoTelcoSec

Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

GitHubLinkedInEmail

Mobile Networks

  • 5G Security
  • 4G Security
  • 3G Security
  • 2G Security

Signaling Protocols

  • SS7 Security
  • Diameter Security
  • SIGTRAN Security
  • SIP Security
  • VoIP Security

Resources

  • MoTIF Framework
  • Security Tools
  • Sitemap
  • About Author
  • Contact
Privacy PolicyTerms of ServiceAdvertisePartners

© 2025 TelcoSec. All rights reserved.