Exfiltration Over Bluetooth

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. Bluetooth can be an attractive choice for exfiltration when adversaries are in close proximity to the target vehicle and the Bluetooth connection offers a lower level of security compared to the primary Internet-connected channel.

ID: T2078
Sub-techniques:  No sub-techniques
Tactic: Exfiltration
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1011.001

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.