Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to communicate with compromised AI systems to control them.
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim's network structure and defenses.
- ATLAS ID
- AML.TA0014
- ATT&CK external ID
- TA0011
- Technique count
- 3
Technique coverage
Attack methods grouped under this attacker goal.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.