Dark Mode

Settings

Capec-609 Detail

Cellular Traffic Intercept

Detailed Communications Typical Severity: Low

Parents: 157

Threats: T60 T65

Description

Cellular traffic for voice and data from mobile devices and retransmission devices can be intercepted via numerous methods. Malicious actors can deploy their own cellular tower equipment and intercept cellular traffic surreptitiously. Additionally, government agencies of adversaries and malicious actors can intercept cellular traffic via the telecommunications backbone over which mobile traffic is transmitted.

Not present

External ID Source Link Description
CAPEC-609 capec https://capec.mitre.org/data/definitions/609.html
CWE-311 cwe http://cwe.mitre.org/data/definitions/311.html
T1111 ATTACK https://attack.mitre.org/wiki/Technique/T1111 Multi-Factor Authentication Interception

Not present

  1. None

Not present

Medium
Adversaries can purchase hardware and software solutions, or create their own solutions, to capture/intercept cellular radio traffic. The cost of a basic Base Transceiver Station (BTS) to broadcast to local mobile cellular radios in mobile devices has dropped to very affordable costs. The ability of commercial cellular providers to monitor for "rogue" BTS stations is poor in many areas and it is assumed that "rogue" BTS stations exist in urban areas.
Confidentiality
Read Data (Capture all cellular and RF traffic from mobile and retransmission devices. Move bulk traffic capture to storage area for cryptanalysis of encrypted traffic, and telemetry analysis of non-encrypted data. (packet headers, cellular power data, signal strength, etc.))

Not present