Exfiltration
The adversary is trying to steal data.
Domain
Automotive
Rail
Technique-ID | Title | Description |
---|---|---|
ATE-078 | Exfiltration via Memory mapped Registers |
Attackers extracting data directly from memory-mapped registers, accessing critical vehicle information at the hardware level. |
ATE-080 | Exfiltration via SMS |
Attackers leveraging the SMS service to transmit vehicle data covertly to an external recipient. |
ATE-081 | Exfiltration via C-V2X |
Attackers utilize C-V2X communication channels to siphon off vehicle data, exploiting the broader connectivity features of modern vehicles. |
ATE-082 | Exfiltration via DSRC |
Attackers use DSRC to extract data, leveraging the wireless communication standard designed for vehicular communication. |