Exfiltration Over Bluetooth
Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network. Real-world examples include the Flame malware's BeetleJuice module, which transmitted encoded data over Bluetooth and acted as a Bluetooth beacon to identify nearby Bluetooth-enabled devices.
let BluetoothTools = dynamic([
"btattach", "btmgmt", "hciconfig", "hcitool", "hcidump", "bluetoothctl",
"sdptool", "rfcomm", "obexftp", "obexd", "bluetooth-sendto",
"fsquirt", "btvstack", "fsquirt.exe"
]);
let BluetoothCmdPatterns = dynamic([
"bluetooth", "rfcomm", "obex", "btooth", "hci", "btspp",
"00:00:00", "bt-adapter", "bluetoothd"
]);
let SuspiciousParents = dynamic([
"python.exe", "python3", "perl", "ruby", "bash", "sh", "cmd.exe",
"powershell.exe", "pwsh.exe", "wscript.exe", "cscript.exe"
]);
// Detect Bluetooth utility process launches
let BluetoothProcesses = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName has_any (BluetoothTools)
or ProcessCommandLine has_any (BluetoothCmdPatterns)
| extend DetectionType = "Bluetooth Tool Execution"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Detect Bluetooth-related registry changes on Windows (Bluetooth adapter enable/disable or pairing)
let BluetoothRegistry = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has_any ("Bluetooth", "BTHPORT", "BTHENUM", "BthLE", "RFCOMM", "OBEX")
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| extend DetectionType = "Bluetooth Registry Modification"
| project Timestamp, DeviceName, AccountName = InitiatingProcessAccountName,
FileName = InitiatingProcessFileName,
ProcessCommandLine = InitiatingProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Detect file operations targeting Bluetooth stack or suspicious staging near Bluetooth access
let BluetoothFiles = DeviceFileEvents
| where Timestamp > ago(24h)
| where (FolderPath has_any ("bluetooth", "btooth", "rfcomm", "obex"))
or (FileName has_any ("bluetooth", "rfcomm", "obex") and ActionType == "FileCreated")
| extend DetectionType = "Bluetooth-Related File Activity"
| project Timestamp, DeviceName, AccountName = InitiatingProcessAccountName,
FileName = InitiatingProcessFileName,
ProcessCommandLine = InitiatingProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Union all detection types
BluetoothProcesses
| union BluetoothRegistry
| union BluetoothFiles
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- IT administrators using Bluetooth utilities for device pairing, diagnostics, or inventory on managed endpoints
- Developers building Bluetooth applications testing functionality on their workstations
- Windows built-in Bluetooth file transfer wizard (fsquirt.exe) used by employees for legitimate personal file transfers between devices
- Bluetooth speakers, headsets, or peripherals being managed via system utilities on user workstations
References (10)
- https://attack.mitre.org/techniques/T1011/001/
- https://attack.mitre.org/software/S0143/
- https://securelist.com/the-flame-questions-and-answers/34344/
- https://docs.microsoft.com/en-us/windows-hardware/drivers/bluetooth/bluetooth-host-radio-support
- https://www.bluetooth.com/learn-about-bluetooth/tech-overview/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1011.001/T1011.001.md
- https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del
- https://www.stigviewer.com/stig/windows_10/2021-08-18/finding/V-220843
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-deviceregistryevents-table
- https://www.sans.org/white-papers/bluetooth-security-overview/
Unlock Pro Content
Get the full detection package for T1011.001 including response playbook, investigation guide, and atomic red team tests.