T1011

Exfiltration Over Other Network Medium

Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network monitoring infrastructure. This technique is commonly associated with insider threat scenarios and advanced adversaries who have achieved a foothold and seek to bypass perimeter DLP controls that monitor only the primary wired egress channel.

Microsoft Sentinel / Defender
kusto
let WirelessHotspotPatterns = dynamic([
  "hostednetwork", "start hostednetwork", "mode=allow", "mode=disallow",
  "mobile hotspot", "set hostednetwork"
]);
let WirelessDiscoveryPatterns = dynamic([
  "show interface", "show networks", "show profiles",
  "show wlanreport", "show hostednetwork", "show drivers"
]);
let BluetoothTransferBinaries = dynamic([
  "fsquirt.exe", "bttray.exe"
]);
let SuspiciousParents = dynamic([
  "cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe",
  "mshta.exe", "rundll32.exe", "regsvr32.exe", "schtasks.exe"
]);
// Branch 1: netsh wlan commands for hotspot creation or wireless interface manipulation
let NetshWlanBranch = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "netsh.exe"
| where ProcessCommandLine has "wlan" or ProcessCommandLine has_any (WirelessHotspotPatterns)
| extend DetectionBranch = "NetshWlanConfig"
| extend IsHotspotCreation = ProcessCommandLine has_any (["hostednetwork", "mode=allow", "start hostednetwork"])
| extend IsWirelessDiscovery = ProcessCommandLine has_any (WirelessDiscoveryPatterns);
// Branch 2: Bluetooth file transfer wizard and tray utilities
let BluetoothTransferBranch = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName has_any (BluetoothTransferBinaries)
| extend DetectionBranch = "BluetoothFileTransfer"
| extend IsHotspotCreation = false
| extend IsWirelessDiscovery = false;
// Branch 3: PowerShell manipulating wireless or Bluetooth adapters — higher-fidelity if spawned from suspicious parent
let PSWirelessBranch = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("powershell.exe", "pwsh.exe")
| where ProcessCommandLine has_any ([
    "Bluetooth", "WiFi", "WLAN", "MobileBroadband",
    "NetAdapter", "New-WiFiProfile", "Get-NetAdapter",
    "Set-NetConnectionProfile", "Add-VpnConnection",
    "SoftAP", "HostedNetwork"
  ])
| where InitiatingProcessFileName has_any (SuspiciousParents)
    or ProcessCommandLine has_any (["-enc", "-EncodedCommand", "Compress-Archive", "DownloadFile", "exfil"])
| extend DetectionBranch = "PSWirelessManipulation"
| extend IsHotspotCreation = ProcessCommandLine has_any (["HostedNetwork", "SoftAP", "hotspot"])
| extend IsWirelessDiscovery = ProcessCommandLine has_any (["Get-NetAdapter", "Get-WiFiProfile", "show"]);
union NetshWlanBranch, BluetoothTransferBranch, PSWirelessBranch
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         DetectionBranch, IsHotspotCreation, IsWirelessDiscovery
| sort by Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • IT administrators running netsh wlan commands to diagnose wireless connectivity issues or manage corporate wireless profiles
  • Help desk staff using netsh wlan show commands for network troubleshooting on user endpoints
  • MDM/EMM agents (Microsoft Intune, SCCM/MECM) deploying or updating wireless configuration profiles via PowerShell
  • End users legitimately transferring personal files to Bluetooth peripherals (headphones, phones) via fsquirt.exe
  • Network assessment or inventory tools querying wireless adapter status and available SSIDs

Unlock Pro Content

Get the full detection package for T1011 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections