Command and Control (3 techniques)
MITRE ATLAS tactic
The adversary is trying to communicate with compromised AI systems to control them. Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim's network structure and defenses.
Techniques
- AML.T0072 — Reverse Shell Maturity: realized
- AML.T0096 — AI Service API Maturity: realized
- AML.T0108 — AI Agent Maturity: demonstrated
AI red teaming training, taught by practitioners.
Hands-on courses on adversarial AI, prompt injection, and AI security operations.
View AI Security Courses