Answer:
D. False base station attacks
Explanation:
Cellular base towers periodically transmits the cellular network information, which phone of 2G, 3G, 4G and even 5G receives and connect to. An attacker could mimic this transmission, using technologies like the false base station, rogue base station or the international mobile subscriber identifier to transmit its own connection, for malicious purposes.