Adversaries install Wi-Fi equipment that acts as a legitimate Wi-Fi network access point. When a device connects to this access point, Wi-Fi data traffic is intercepted, captured, and analyzed. This also allows the adversary to use "adversary-in-the-middle" (CAPEC-94) for all communications.
Intercept and control Wi-Fi data communications to/from mobile device.
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: Intercept and control Wi-Fi data communications to/from mobile device.
▼Mitigations
Commercial defensive technology that monitors for rogue Wi-Fi access points, adversary-in-the-middle attacks, and anomalous activity with the mobile device baseband radios.