Exfiltration

The adversary is trying to steal data.


 

Domain
Automotive
Rail
Technique-ID Title Description
ATE-078 Exfiltration via Memory mapped Registers

Attackers extracting data directly from memory-mapped registers, accessing critical vehicle information at the hardware level.

ATE-080 Exfiltration via SMS

Attackers leveraging the SMS service to transmit vehicle data covertly to an external recipient.

ATE-081 Exfiltration via C-V2X

Attackers utilize C-V2X communication channels to siphon off vehicle data, exploiting the broader connectivity features of modern vehicles.

ATE-082 Exfiltration via DSRC

Attackers use DSRC to extract data, leveraging the wireless communication standard designed for vehicular communication.