← Back to ATLAS MatrixTactic 14 of 15
Exfiltration
The adversary is trying to steal data from your AI system.
5 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the exfiltration phase of AI attacks.
1
AML.T0024
Exfiltration Over C2 Channel
Adversaries may exfiltrate data over command and control channels from AI systems.
Examples:
- •Exfiltrating model data via C2
- •Stealing training data
- •Extracting sensitive information
Mitigations:
- ✓Data loss prevention
- ✓Network monitoring
- ✓Encryption
References:
2
AML.T0025
Exfiltration Over C2 Channel
Adversaries may exfiltrate data over command and control channels from AI systems.
Examples:
- •Exfiltrating model data via C2
- •Stealing training data
- •Extracting sensitive information
Mitigations:
- ✓Data loss prevention
- ✓Network monitoring
- ✓Encryption
References:
3
AML.T0056
Exfiltration Over C2 Channel
Adversaries may exfiltrate data over command and control channels from AI systems.
Examples:
- •Exfiltrating model data via C2
- •Stealing training data
- •Extracting sensitive information
Mitigations:
- ✓Data loss prevention
- ✓Network monitoring
- ✓Encryption
References:
4
AML.T0057
Exfiltration Over C2 Channel
Adversaries may exfiltrate data over command and control channels from AI systems.
Examples:
- •Exfiltrating model data via C2
- •Stealing training data
- •Extracting sensitive information
Mitigations:
- ✓Data loss prevention
- ✓Network monitoring
- ✓Encryption
References:
5
AML.T0077
Exfiltration Over C2 Channel
Adversaries may exfiltrate data over command and control channels from AI systems.
Examples:
- •Exfiltrating model data via C2
- •Stealing training data
- •Extracting sensitive information
Mitigations:
- ✓Data loss prevention
- ✓Network monitoring
- ✓Encryption