Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
The adversary is trying to gather data of interest to their goal.
Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.
- ATT&CK ID
- TA0009
- STIX ID
- x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfe
- Name
- Collection
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.TA0009 - Collection
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.