Exfiltration techniques are used to send data out of the resource through a communication or other channel, to steal them. The two common download channels are the TM and the payload channel. Both are RF or optical channels. When RF channels are used, there is a broad diffusion on the Earth surface (due to the high distance), which cab result in an easy interception by adversaries of the exfiltrated packets.
ID | Name | Description | |
T2021 | Exfiltration Over Payload Channel | Malicious software can send data through the Payload channel (if implemented). | |
T2022 | Exfiltration Over TM Channel | Malicious software can send data through the TM channel (usually the only connection channel available). | |
T2037 | Optical link modification | An adversarial can exfiltrate data modifying the optical communication components to send data with a different timing (and location). | |
T2036 | RF modification | An adversarial can exfiltrate data modifying the RF components to send data with a different timing (and location), or with different frequencies. Antenna array can be used to send data into different beams. | |
T2035 | Side-channel exfiltration | An adversarial can exfiltrate data with a side-channel attack. |