Exfiltration Over Other Network Medium - T1438 (b3c2e5de-0941-4b57-ba61-af029eb5517a)
Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a standard Internet connection, the exfiltration may occur, for example, via Bluetooth, or another radio frequency (RF) channel.
Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Out of Band Data - T1644 (ec4c4baa-026f-43e8-8f56-58c36f3162dd) | Attack Pattern | Exfiltration Over Other Network Medium - T1438 (b3c2e5de-0941-4b57-ba61-af029eb5517a) | Attack Pattern | 1 |