Impersonate SS7 Nodes (T1430.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Collection
  • Discovery

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016. 3GPP-Security
Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017. CSRIC5-WG10-FinalReport
CSRIC-WG1-FinalReport CSRIC-WG1-FinalReport
Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016. Positive-SS7
Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016. Engel-SS7-2008
Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016. Engel-SS7
NIST Mobile Threat Catalogue