RF modification

An adversarial can exfiltrate data modifying the RF components to send data with a different timing (and location), or with different frequencies. Antenna array can be used to send data into different beams. [1]

ID: T2036
Sub-techniques:  No sub-techniques
Tactic: Exfiltration
Platforms: Space-link communication
Version: 2.0
Created: 23 September 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References