Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to run malicious code embedded in AI artifacts or software.
Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
- ATLAS ID
- AML.TA0005
- ATT&CK external ID
- TA0002
- Technique count
- 6
Technique coverage
Attack methods grouped under this attacker goal.
AML.T0100 - AI Agent Clickbait
AML.T0053 - AI Agent Tool Invocation
AML.T0050 - Command and Scripting Interpreter
AML.T0103 - Deploy AI Agent
AML.T0051 - LLM Prompt Injection
AML.T0011 - User Execution
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.