Persistence

The adversary is trying to maintain their foothold in your AI system.

4 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the persistence phase of AI attacks.

1
AML.T0020

Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts in AI systems.

Examples:

  • Compromising AI system admin accounts
  • Abusing service accounts
  • Maintaining access through stolen credentials

Mitigations:

  • Multi-factor authentication
  • Regular credential rotation
  • Privileged access management
2
AML.T0021

Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts in AI systems.

Examples:

  • Compromising AI system admin accounts
  • Abusing service accounts
  • Maintaining access through stolen credentials

Mitigations:

  • Multi-factor authentication
  • Regular credential rotation
  • Privileged access management
3
AML.T0061

Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts in AI systems.

Examples:

  • Compromising AI system admin accounts
  • Abusing service accounts
  • Maintaining access through stolen credentials

Mitigations:

  • Multi-factor authentication
  • Regular credential rotation
  • Privileged access management
4
AML.T0070

Valid Accounts

Adversaries may obtain and abuse credentials of existing accounts in AI systems.

Examples:

  • Compromising AI system admin accounts
  • Abusing service accounts
  • Maintaining access through stolen credentials

Mitigations:

  • Multi-factor authentication
  • Regular credential rotation
  • Privileged access management