Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control (C2) channels in order to steal sensitive information from vehicle systems. They can use compromised data-transfer channels to manipulate traffic and inject their own content, allowing them to continuously communicate with victim systems and deliver additional payloads.

ID: T2074
Sub-techniques:  No sub-techniques
Tactic: Exfiltration
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1041

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.