T1011.001 Exfiltration Over Bluetooth Mappings

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel.

Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CM-06 Configuration Settings mitigates T1011.001 Exfiltration Over Bluetooth
CM-08 System Component Inventory mitigates T1011.001 Exfiltration Over Bluetooth
RA-05 Vulnerability Monitoring and Scanning mitigates T1011.001 Exfiltration Over Bluetooth
SI-03 Malicious Code Protection mitigates T1011.001 Exfiltration Over Bluetooth
AC-18 Wireless Access mitigates T1011.001 Exfiltration Over Bluetooth
CM-02 Baseline Configuration mitigates T1011.001 Exfiltration Over Bluetooth
CM-07 Least Functionality mitigates T1011.001 Exfiltration Over Bluetooth
SI-04 System Monitoring mitigates T1011.001 Exfiltration Over Bluetooth

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.hacking.variety.Use of stolen creds Use of stolen or default authentication credentials (including credential stuffing) related-to T1011.001 Exfiltration Over Bluetooth
attribute.confidentiality.data_disclosure None related-to T1011.001 Exfiltration Over Bluetooth