Geolocation Spoofing
| ID: | TAC-32 |
| Phase: | Defence Bypass |
The adversary seeks to obfuscate the origin of their activity, access geo-fenced resources or bypass geo-blocking by spoofing their geolocation
| ID: | TAC-32 |
| Phase: | Defence Bypass |
The adversary seeks to obfuscate the origin of their activity, access geo-fenced resources or bypass geo-blocking by spoofing their geolocation