Attackers can take screen captures to gather information about the target device. This can include information such as applications running in the foreground, user data, login credentials, or other sensitive information.

Attackers exploit vulnerabilities to move between segregated networks within a vehicle, potentially gaining access to more sensitive or critical systems. For instance, bridging from an infotainment system to a car's braking system or accessing a train's control network from a passenger WiFi system.

Refers to the exploitation of an ECU to navigate or spread malicious activities across interconnected systems within a vehicle, potentially compromising multiple functionalities or subsystems. Leveraging vulnerabilities in one ECU can provide attackers with pathways to move laterally, targeting other ECU and escalating their influence over the vehicle's operations.