APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0003 - Persistence

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or add...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to maintain their foothold.

Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

ATT&CK ID
TA0003
STIX ID
x-mitre-tactic--5bc1d813-693e-4823-9961-abf9af4b0e92
Name
Persistence
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

AML.TA0006 - Persistence

Confidence: 1.00
Kindatlas_tacticLink typesame_or_related_attack_tacticMethodexact_attack_external_id

Source

Where this page information comes from.