Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
The adversary is trying to steal data.
Exfiltration consists of techniques that adversaries may use to steal data from your network. Once they’ve collected data, adversaries often package it to avoid detection while removing it. This can include compression and encryption. Techniques for getting data out of a target network typically include transferring it over their command and control channel or an alternate channel and may also include putting size limits on the transmission.
- ATT&CK ID
- TA0010
- STIX ID
- x-mitre-tactic--9a4e74ab-5008-408c-84bf-a10dfbc53462
- Name
- Exfiltration
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.TA0010 - Exfiltration
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.