Collection
Type: tactic
Description: The adversary is trying to gather data, artifacts and other related information relevant to their goal.
Version: 0.1.0
Created At: 2025-03-04 10:27:40 -0500
Last Modified At: 2025-03-04 10:27:40 -0500
Tactic Order: 12
External References
Related Objects
- <-- User Message Harvesting (technique): An adversary can harvest sensitive data submitted to the AI system by the user.
- <-- Memory Data Hording (technique): An adversary that successfully infected one thread can get the AI system to collect information from other threads.
- <-- Data from Information Repositories (technique): Accessing information repositories to collect data that could inform or aid adversarial objectives.
- <-- ML Artifact Collection (technique): Gathering machine learning artifacts, such as datasets, models, or configurations, to analyze or exploit them.
- <-- Thread History Harvesting (technique): An adversary can harvest sensitive data from previous interactions on the same thread.
- <-- RAG Data Harvesting (technique): An adversary can harvest sensitive data from various systems through RAG queries.
- <-- Retrieval Tool Data Harvesting (technique): An adversary can harvest sensitive data from various systems through invocable retrieval tools.
- <-- Data from Local System (technique): Collecting data directly from the local system to analyze or use for adversarial purposes.