T1011.001

Exfiltration Over Bluetooth

Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network. Real-world examples include the Flame malware's BeetleJuice module, which transmitted encoded data over Bluetooth and acted as a Bluetooth beacon to identify nearby Bluetooth-enabled devices.

Microsoft Sentinel / Defender
kusto
let BluetoothTools = dynamic([
  "btattach", "btmgmt", "hciconfig", "hcitool", "hcidump", "bluetoothctl",
  "sdptool", "rfcomm", "obexftp", "obexd", "bluetooth-sendto",
  "fsquirt", "btvstack", "fsquirt.exe"
]);
let BluetoothCmdPatterns = dynamic([
  "bluetooth", "rfcomm", "obex", "btooth", "hci", "btspp",
  "00:00:00", "bt-adapter", "bluetoothd"
]);
let SuspiciousParents = dynamic([
  "python.exe", "python3", "perl", "ruby", "bash", "sh", "cmd.exe",
  "powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe"
]);
// Detect Bluetooth utility process launches
let BluetoothProcesses = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName has_any (BluetoothTools)
   or ProcessCommandLine has_any (BluetoothCmdPatterns)
| extend DetectionType = "Bluetooth Tool Execution"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Detect Bluetooth-related registry changes on Windows (Bluetooth adapter enable/disable or pairing)
let BluetoothRegistry = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has_any ("Bluetooth", "BTHPORT", "BTHENUM", "BthLE", "RFCOMM", "OBEX")
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| extend DetectionType = "Bluetooth Registry Modification"
| project Timestamp, DeviceName, AccountName = InitiatingProcessAccountName,
         FileName = InitiatingProcessFileName,
         ProcessCommandLine = InitiatingProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Detect file operations targeting Bluetooth stack or suspicious staging near Bluetooth access
let BluetoothFiles = DeviceFileEvents
| where Timestamp > ago(24h)
| where (FolderPath has_any ("bluetooth", "btooth", "rfcomm", "obex"))
   or (FileName has_any ("bluetooth", "rfcomm", "obex") and ActionType == "FileCreated")
| extend DetectionType = "Bluetooth-Related File Activity"
| project Timestamp, DeviceName, AccountName = InitiatingProcessAccountName,
         FileName = InitiatingProcessFileName,
         ProcessCommandLine = InitiatingProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Union all detection types
BluetoothProcesses
| union BluetoothRegistry
| union BluetoothFiles
| sort by Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation File: File Creation Windows Registry: Registry Key Modification Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents DeviceRegistryEvents DeviceFileEvents

False Positives

  • IT administrators using Bluetooth utilities for device pairing, diagnostics, or inventory on managed endpoints
  • Developers building Bluetooth applications testing functionality on their workstations
  • Windows built-in Bluetooth file transfer wizard (fsquirt.exe) used by employees for legitimate personal file transfers between devices
  • Bluetooth speakers, headsets, or peripherals being managed via system utilities on user workstations

Unlock Pro Content

Get the full detection package for T1011.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections