Collection

Type: tactic

Description: The adversary is trying to gather data, artifacts and other related information relevant to their goal.

Version: 0.1.0

Created At: 2025-03-04 10:27:40 -0500

Last Modified At: 2025-03-04 10:27:40 -0500

Tactic Order: 12


External References

  • <-- User Message Harvesting (technique): An adversary can harvest sensitive data submitted to the AI system by the user.
  • <-- Memory Data Hording (technique): An adversary that successfully infected one thread can get the AI system to collect information from other threads.
  • <-- Data from Information Repositories (technique): Accessing information repositories to collect data that could inform or aid adversarial objectives.
  • <-- ML Artifact Collection (technique): Gathering machine learning artifacts, such as datasets, models, or configurations, to analyze or exploit them.
  • <-- Thread History Harvesting (technique): An adversary can harvest sensitive data from previous interactions on the same thread.
  • <-- RAG Data Harvesting (technique): An adversary can harvest sensitive data from various systems through RAG queries.
  • <-- Retrieval Tool Data Harvesting (technique): An adversary can harvest sensitive data from various systems through invocable retrieval tools.
  • <-- Data from Local System (technique): Collecting data directly from the local system to analyze or use for adversarial purposes.