Exploit via Radio Interfaces (T1477)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Exploit via Radio Interfaces

Associated Tactics

  • Initial Access

Initial Access (TA0027)

The adversary is trying to get into your device. The initial access tactic represents the vectors adversaries use to gain an initial foothold onto a mobile device.

View on ATT&CK

Procedure Examples

Description Source(s)
Andy Greenberg. (2009, July 28). How to Hijack 'Every iPhone In The World'. Retrieved December 23, 2016. Forbes-iPhoneSMS
D. Pauli. (2015, November 12). Samsung S6 calls open to man-in-the-middle base station snooping. Retrieved December 23, 2016. Register-BaseStation
Gal Beniamini. (2017, April 4). Over The Air: Exploiting Broadcom's Wi-Fi Stack. Retrieved November 8, 2018. ProjectZero-BroadcomWiFi
R. Weinmann. (2012, August 6-7). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Retrieved December 23, 2016. Weinmann-Baseband
SRLabs. (n.d.). SIM cards are prone to remote hacking. Retrieved December 23, 2016. SRLabs-SIMCard