EXPLORE
← Back to Explore
T1011.001

Exfiltration Over Bluetooth

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.

LinuxmacOSWindows
1
Detections
1
Sources
0
Threat Actors

BY SOURCE

1elastic

PROCEDURES (1)

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

DETECTIONS (1)