Mobile Threat Catalogue

Traffic Interception via Masquerading

Contribute

Threat Category: Carrier Infrastructure

ID: CEL-35

Threat Description: Intruder creates a fake network component to intercept user traffic. An example could include impersonating a base station and then authenticating a mobile device can allow for the highjacking of a communication connection.

Threat Origin

3G Security: Security Threats and Requirements (Release 4) 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

References

  1. 3G Security; Security Threats and Requirements (Release 4), 3GPP TS 21.133 V4.0.0, 3rd Generation Partnership Project, 2003; www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/Old_Vsns/21133-400.pdf [Accessed 8/23/2016]