Files
cti/mobile-attack/attack-pattern/attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34.json
T
Isabel Tuson a33e30b57d ATT&CK v7.1
2020-07-13 09:47:00 -04:00

51 lines
2.3 KiB
JSON

{
"type": "bundle",
"id": "bundle--bf01b0a0-148f-4ebb-9a05-23997ad8fda1",
"spec_version": "2.0",
"objects": [
{
"id": "attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "Downgrade to Insecure Protocols",
"description": "An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by newer protocols such as LTE and only allowing older protocols such as GSM to communicate(Citation: NIST-SP800187). Use of less secure protocols may make communication easier to eavesdrop upon or manipulate.",
"external_references": [
{
"source_name": "mitre-mobile-attack",
"url": "https://attack.mitre.org/techniques/T1466",
"external_id": "T1466"
},
{
"url": "https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html",
"source_name": "NIST Mobile Threat Catalogue",
"external_id": "CEL-3"
},
{
"source_name": "NIST-SP800187",
"description": "Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.",
"url": "http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "attack-pattern",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-mobile-attack",
"phase_name": "network-effects"
}
],
"modified": "2019-02-03T15:16:13.386Z",
"created": "2017-10-25T14:48:21.667Z",
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_tactic_type": [
"Without Adversary Device Access"
],
"x_mitre_version": "1.1",
"x_mitre_old_attack_id": "MOB-T1069"
}
]
}