Adversaries may communicate using cellular networks in vehicle telematics systems to establish command and control channels. By leveraging the communication capabilities of the telematics box, adversaries can maintain persistent communication with compromised systems.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.