APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0010 - Exfiltration

The adversary is trying to steal data. Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate ch...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to steal data.

Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.

ATT&CK ID
TA0010
STIX ID
x-mitre-tactic--9a4e74ab-5008-408c-84bf-a10dfbc53462
Name
Exfiltration
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

AML.TA0010 - Exfiltration

Confidence: 1.00
Kindatlas_tacticLink typesame_or_related_attack_tacticMethodexact_attack_external_id

Source

Where this page information comes from.