APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0011 - Command and Control

The adversary is trying to communicate with compromised systems to control them. Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on t...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to communicate with compromised systems to control them.

Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.

ATT&CK ID
TA0011
STIX ID
x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813
Name
Command and Control
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

Source

Where this page information comes from.