Exfiltration Over Unencrypted Non-C2 Protocol (T1639.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Exfiltration

Exfiltration (TA0036)

The adversary is trying to steal data. Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from the targeted mobile device. In the mobile environment, mobile devices are frequently connected to networks outside enterprise control such as cellular networks or public Wi-Fi networks. Adversaries could attempt to evade detection by communicating on these networks, and potentially even by using non-Internet Protocol mechanisms such as Short Message Service (SMS). However, cellular networks often have data caps and/or extra data charges that could increase the potential for adversarial communication to be detected.

View on ATT&CK

Procedure Examples

Description Source(s)
NIST Mobile Threat Catalogue