APromptRiskDBThreat intelligence atlas
ATLAS Tactic

Execution - ATLAS Tactic

The adversary is trying to run malicious code embedded in AI artifacts or software. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to ru...

ATLAS Tactic

Record summary

A quick snapshot of what this page covers.

Techniques6Attack methods in this attacker goal.
ATT&CKTA0002Related cybersecurity reference, if available.
DatasetATLASMain public source for this page.

Tactic overview

What attackers may be trying to achieve.

The adversary is trying to run malicious code embedded in AI artifacts or software.

Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

ATLAS ID
AML.TA0005
ATT&CK external ID
TA0002
Technique count
6

Technique coverage

Attack methods grouped under this attacker goal.

Source

Where this page information comes from.