APromptRiskDBThreat intelligence atlas
AI Security Technique

Data from AI Services - AI Security Technique

Adversaries may use their access to a victim organization's AI-enabled services to collect proprietary or otherwise sensitive information. As organizations adopt generative AI in centralized services for accessing an organization's data, such as with chat agents which can access retrieval augmented generation (RAG) databases and other data sources via tools, they become increasingly valuable targets for adversarie...

AI Security TechniquedemonstratedCollection

Record summary

A quick snapshot of what this page covers.

Tactics1Attacker goals connected to this method.
Mitigations5Defenses that may help against this attack.
AI risks0Research-backed risks connected to this topic.

Attack context

How this AI attack works in practice.

Adversaries may use their access to a victim organization's AI-enabled services to collect proprietary or otherwise sensitive information. As organizations adopt generative AI in centralized services for accessing an organization's data, such as with chat agents which can access retrieval augmented generation (RAG) databases and other data sources via tools, they become increasingly valuable targets for adversaries.

AI agents may be configured to have access to tools and data sources that are not directly accessible by users. Adversaries may abuse this to collect data that a regular user wouldn't be able to access directly.

ATLAS ID
AML.T0085
Priority score
35
Maturity: demonstrated
Collection

Mitigations

Defenses that may help against this attack.

AML.M0024 - AI Telemetry Logging

DeploymentMonitoring and Maintenance
LifecycleDeployment + 1 moreCategoryTechnical - Cyber

Log requests to AI services to detect malicious queries for data.

AML.M0032 - Segmentation of AI Agent Components

DeploymentBusiness and Data Understanding
LifecycleDeployment + 1 moreCategoryTechnical - Cyber

Segmentation can prevent adversaries from utilizing tools in an agentic workflow to collect sensitive data from AI services.

Case studies

Examples from public reports and exercises.

No case studies found. No public example is connected to this attack in the current data.

Source

Where this page information comes from.