These attacks, also knows as wifi Evil Twin Attacks, involve setting up malicious wifi access points that mimic legitimate ones to deceive ITS into connecting to them. Once connected, attackers can intercept, manipulate, or redirect the systems traffic, potentially leading to data theft or injection of malicious payloads.

In 4G networks, RBSs or International Mobile Subscriber Identity (IMSI) catchers targeting the IMSIs of User Equipment (UE) during the initial attachment process. Once an IMSI is stolen, subscriber privacy can be severely compromised. Man-in-the-Middle (MitM) attacks are common, where a malicious third party's RBS masquerades as a genuine network's BS. In 5G Cellular Vehicle to Everything (C-V2X) autonomous platooning scenarios, attackers deploy RBS near roads. By overpowering legitimate signals, the RBS hijacks platoon communications.

Tactic_ID
ATA-014
Tactic_ID
ATA-013
Tactic_ID
ATA-011
Tactic_ID
ATA-010
Tactic_ID
ATA-009
Tactic_ID
ATA-008
Tactic_ID
ATA-007