Rogue Cellular Base Station - T1467 (a5de0540-73e7-4c67-96da-4143afedc7ed)
An adversary could set up a rogue cellular base station and then use it to eavesdrop on or manipulate cellular device communication. A compromised cellular femtocell could be used to carry out this technique(Citation: Computerworld-Femtocell).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Rogue Cellular Base Station - T1467 (a5de0540-73e7-4c67-96da-4143afedc7ed) | Attack Pattern | Adversary-in-the-Middle - T1638 (08e22979-d320-48ed-8711-e7bf94aabb13) | Attack Pattern | 1 |