An attacker can guess the Spread Spectrum or the frequency hopping sequence, to reconstruct the received signal. [1]
Standard/references: [1]