Skip to content

T1466 Downgrade to Insecure Protocols

An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by newer protocols such as LTE and only allowing older protocols such as GSM to communicate1. Use of less secure protocols may make communication easier to eavesdrop upon or manipulate.

Item Value
ID T1466
Tactics TA0038
Platforms Android, iOS
Version 1.1
Created 25 October 2017
Last Modified 03 February 2019


ID Mitigation Description
M1009 Encrypt Network Traffic Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate weaknesses in the cellular network encryption.


Back to top