Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. Bluetooth can be an attractive choice for exfiltration when adversaries are in close proximity to the target vehicle and the Bluetooth connection offers a lower level of security compared to the primary Internet-connected channel.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.