← Back to ATLAS MatrixTactic 1 of 15
Reconnaissance
The adversary is trying to gather information they can use to plan future operations.
5 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the reconnaissance phase of AI attacks.
1
AML.T0000
Search Open Technical Databases
Adversaries may search technical databases for information about AI systems and their configurations.
Examples:
- •Searching public model registries
- •Analyzing published research papers
- •Reviewing open-source AI projects
- •Examining AI system documentation
Mitigations:
- ✓Limit public exposure of AI system details
- ✓Implement proper access controls
- ✓Monitor for unusual access patterns
- ✓Regular security assessments
References:
2
AML.T0001
Search Open Websites/Domains
Adversaries may search websites and domains for information about AI systems.
Examples:
- •Searching company websites for AI information
- •Analyzing social media for AI system details
- •Reviewing public AI deployment information
Mitigations:
- ✓Control public information disclosure
- ✓Regular information security reviews
- ✓Employee training on information sharing
References:
3
AML.T0003
Search Open Websites/Domains
Adversaries may search websites and domains for information about AI systems.
Examples:
- •Searching company websites for AI information
- •Analyzing social media for AI system details
- •Reviewing public AI deployment information
Mitigations:
- ✓Control public information disclosure
- ✓Regular information security reviews
- ✓Employee training on information sharing
References:
4
AML.T0004
Search Open Websites/Domains
Adversaries may search websites and domains for information about AI systems.
Examples:
- •Searching company websites for AI information
- •Analyzing social media for AI system details
- •Reviewing public AI deployment information
Mitigations:
- ✓Control public information disclosure
- ✓Regular information security reviews
- ✓Employee training on information sharing
References:
5
AML.T0006
Search Open Websites/Domains
Adversaries may search websites and domains for information about AI systems.
Examples:
- •Searching company websites for AI information
- •Analyzing social media for AI system details
- •Reviewing public AI deployment information
Mitigations:
- ✓Control public information disclosure
- ✓Regular information security reviews
- ✓Employee training on information sharing