Adversaries may attempt to exfiltrate data over WiFi connection or another radio frequency (RF) channel. This technique allows adversaries to wirelessly transmit stolen data from a compromised vehicle to a nearby receiver without the need for physical access.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.