Exfiltration

The adversary is trying to steal data from your AI system.

5 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the exfiltration phase of AI attacks.

1
AML.T0024

Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control channels from AI systems.

Examples:

  • Exfiltrating model data via C2
  • Stealing training data
  • Extracting sensitive information

Mitigations:

  • Data loss prevention
  • Network monitoring
  • Encryption
2
AML.T0025

Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control channels from AI systems.

Examples:

  • Exfiltrating model data via C2
  • Stealing training data
  • Extracting sensitive information

Mitigations:

  • Data loss prevention
  • Network monitoring
  • Encryption
3
AML.T0056

Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control channels from AI systems.

Examples:

  • Exfiltrating model data via C2
  • Stealing training data
  • Extracting sensitive information

Mitigations:

  • Data loss prevention
  • Network monitoring
  • Encryption
4
AML.T0057

Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control channels from AI systems.

Examples:

  • Exfiltrating model data via C2
  • Stealing training data
  • Extracting sensitive information

Mitigations:

  • Data loss prevention
  • Network monitoring
  • Encryption
5
AML.T0077

Exfiltration Over C2 Channel

Adversaries may exfiltrate data over command and control channels from AI systems.

Examples:

  • Exfiltrating model data via C2
  • Stealing training data
  • Extracting sensitive information

Mitigations:

  • Data loss prevention
  • Network monitoring
  • Encryption