- Tactics
- Discovery
- Maturity
- demonstrated
- Reference
- atlas.mitre.org/techniques/AML.T0007
Description
Adversaries may search private sources to identify AI learning artifacts that exist on the system and gather information about them. These artifacts can include the software stack used to train and deploy models, training and testing data management systems, container registries, software repositories, and model zoos.
This information can be used to identify targets for further collection, exfiltration, or disruption, and to tailor and improve attacks.
How GTK Cyber trains on this
GTK Cyber's hands-on AI security courses cover adversarial-AI techniques across the MITRE ATLAS framework, including the Discovery tactic this technique falls under. Our practitioner-led training is taught by Charles Givre and other field-tested SMEs and focuses on real adversarial scenarios, not slide decks.
Related techniques
- AML.T0013 — Discover AI Model Ontology
- AML.T0014 — Discover AI Model Family
- AML.T0062 — Discover LLM Hallucinations
- AML.T0063 — Discover AI Model Outputs
- AML.T0069 — Discover LLM System Information
- AML.T0075 — Cloud Service Discovery
- AML.T0084 — Discover AI Agent Configuration
- AML.T0089 — Process Discovery