Skip to content

T1011 Exfiltration Over Other Network Medium

Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel.

Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.

Item Value
ID T1011
Sub-techniques T1011.001
Tactics TA0010
Platforms Linux, Windows, macOS
Version 1.1
Created 31 May 2017
Last Modified 08 March 2022


ID Mitigation Description
M1028 Operating System Configuration Prevent the creation of new network adapters where possible.12


ID Data Source Data Component
DS0017 Command Command Execution
DS0022 File File Access
DS0029 Network Traffic Network Connection Creation