CAPEC-610: Cellular Data Injection |
Description Adversaries inject data into mobile technology traffic (data flows or signaling data) to disrupt communications or conduct additional surveillance operations. Typical Severity Prerequisites Skills Required
[Level: High] Often achieved by nation states in conjunction with commercial cellular providers to conduct cellular traffic intercept and possible traffic injection. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Availability | Resource Consumption | | Availability | Modify Data | |
Mitigations
| Commercial defensive technology to detect and alert to any attempts to modify mobile technology data flows or to inject new data into existing data flows and signaling data. |
Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2015-11-09 (Version 2.7) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Motivation-Consequences | | 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated @Abstraction |
More information is available — Please select a different filter.
|