Adversaries may attempt to exfiltrate data over a cellular network. This technique allows them to transfer sensitive data from the vehicle to an external location using the cellular network.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.