T1465 Rogue Wi-Fi Access Points
An adversary could set up unauthorized Wi-Fi access points or compromise existing access points and, if the device connects to them, carry out network-based attacks such as eavesdropping on or modifying network communication.
Item |
Value |
ID |
T1465 |
Sub-techniques |
|
Tactics |
TA0038 |
Platforms |
Android, iOS |
Version |
1.1 |
Created |
25 October 2017 |
Last Modified |
03 February 2019 |
Mitigations
ID |
Mitigation |
Description |
M1009 |
Encrypt Network Traffic |
Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate use of untrusted Wi-Fi networks. |
M1012 |
Enterprise Policy |
Enterprise policies could be provisioned to devices to control the Wi-Fi access points that they are allowed to connect to. |
References