Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to gather AI artifacts and other related information relevant to their goal.
Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to steal (exfiltrate) the AI artifacts, or use the collected information to stage future operations. Common target sources include software repositories, container registries, model repositories, and object stores.
- ATLAS ID
- AML.TA0009
- ATT&CK external ID
- TA0009
- Technique count
- 4
Technique coverage
Attack methods grouped under this attacker goal.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.