APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0009 - Collection

The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environme...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to gather data of interest to their goal.

Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.

ATT&CK ID
TA0009
STIX ID
x-mitre-tactic--d108ce10-2419-4cf9-a774-46161d6c6cfe
Name
Collection
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

AML.TA0009 - Collection

Confidence: 1.00
Kindatlas_tacticLink typesame_or_related_attack_tacticMethodexact_attack_external_id

Source

Where this page information comes from.