Exfiltration

Exfiltration techniques are used to send data out of the resource through a communication or other channel, to steal them. The two common download channels are the TM and the payload channel. Both are RF or optical channels. When RF channels are used, there is a broad diffusion on the Earth surface (due to the high distance), which cab result in an easy interception by adversaries of the exfiltrated packets.

ID: TA0010
Created: 25 August 2022
Last Modified: 14 April 2023

Techniques

Techniques: 5
ID Name Description
T2021 Exfiltration Over Payload Channel Malicious software can send data through the Payload channel (if implemented).
T2022 Exfiltration Over TM Channel Malicious software can send data through the TM channel (usually the only connection channel available).
T2037 Optical link modification An adversarial can exfiltrate data modifying the optical communication components to send data with a different timing (and location).
T2036 RF modification An adversarial can exfiltrate data modifying the RF components to send data with a different timing (and location), or with different frequencies. Antenna array can be used to send data into different beams.
T2035 Side-channel exfiltration An adversarial can exfiltrate data with a side-channel attack.