Record summary
A quick snapshot of what this page covers.
Attack context
How this AI attack works in practice.
Adversaries may compromise a machine by exploiting or manipulating AI-enabled components on the system. Compromising a victim system allows the adversary to execute arbitrary code, steal credentials, exfiltrate data, and continue to persist on the system.
Adversaries may target a Local AI Agent which if compromised grants them the capabilities and permissions of the agent, or AI Artifacts which can contain embedded malware.
- ATLAS ID
- AML.T0112
- Priority score
- 45
Mitigations
Defenses that may help against this attack.
Case studies
Examples from public reports and exercises.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.