Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to steal AI artifacts or other information about the AI system.
Exfiltration consists of techniques that adversaries may use to steal data from your network. Data may be stolen for its valuable intellectual property, or for use in staging future operations.
Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.
- ATLAS ID
- AML.TA0010
- ATT&CK external ID
- TA0010
- Technique count
- 6
Technique coverage
Attack methods grouped under this attacker goal.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.