MaxPatrol SIEM

Detects cyberincidents that undermine cyber resilience of a company

T1011.001: Exfiltration Over Bluetooth

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel.

Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

Monitoring of events related to processes allowing data exfiltration over Bluetooth, such as BlueDispatcher.exe.

Expert Required. The technique is detected only with the combination of «PT Product + Expert»

Detection

IDDS0029Data source and componentNetwork Traffic: Network Traffic FlowDescription

Monitor network data for uncommon data flows., such as the usage of abnormal/unexpected protocols.

IDDS0017Data source and componentCommand: Command ExecutionDescription

Monitor executed commands and arguments that may attempt to exfiltrate data over Bluetooth rather than the command and control channel.

IDDS0022Data source and componentFile: File AccessDescription

Monitor for files being accessed that could be related to exfiltration, such as file reads by a process that also has an active network connection. Also monitor for and investigate changes to host adapter settings, such as addition and/or replication of communication interfaces.

IDDS0029Data source and componentNetwork Traffic: Network Traffic ContentDescription

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)).

IDDS0029Data source and componentNetwork Traffic: Network Connection CreationDescription

Monitor for newly constructed network connections that may attempt to exfiltrate data over Bluetooth rather than the command and control channel. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.

Mitigation

IDM1042NameDisable or Remove Feature or ProgramDescription

Disable Bluetooth in local computer security settings or by group policy if it is not needed within an environment.

IDM1028NameOperating System ConfigurationDescription

Prevent the creation of new network adapters where possible.