Adversaries may exfiltrate data over command and control (C2) channels in order to steal sensitive information from vehicle systems. They can use compromised data-transfer channels to manipulate traffic and inject their own content, allowing them to continuously communicate with victim systems and deliver additional payloads.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.