Dark Mode
Capec-609 Detail
Cellular Traffic Intercept
Detailed Communications Typical Severity: Low
Parents: 157
Threats: T60 T65
Cellular traffic for voice and data from mobile devices and retransmission devices can be intercepted via numerous methods. Malicious actors can deploy their own cellular tower equipment and intercept cellular traffic surreptitiously. Additionally, government agencies of adversaries and malicious actors can intercept cellular traffic via the telecommunications backbone over which mobile traffic is transmitted.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-609 | capec | https://capec.mitre.org/data/definitions/609.html | |
| CWE-311 | cwe | http://cwe.mitre.org/data/definitions/311.html | |
| T1111 | ATTACK | https://attack.mitre.org/wiki/Technique/T1111 | Multi-Factor Authentication Interception |
Not present
- None
Not present
| Medium |
|---|
| Adversaries can purchase hardware and software solutions, or create their own solutions, to capture/intercept cellular radio traffic. The cost of a basic Base Transceiver Station (BTS) to broadcast to local mobile cellular radios in mobile devices has dropped to very affordable costs. The ability of commercial cellular providers to monitor for "rogue" BTS stations is poor in many areas and it is assumed that "rogue" BTS stations exist in urban areas. |
| Confidentiality |
|---|
| Read Data (Capture all cellular and RF traffic from mobile and retransmission devices. Move bulk traffic capture to storage area for cryptanalysis of encrypted traffic, and telemetry analysis of non-encrypted data. (packet headers, cellular power data, signal strength, etc.)) |
Not present