Exfiltration

Type: tactic

Description: The adversary is trying to steal data or other information from your genai system.

Version: 0.1.0

Created At: 2024-10-03 22:24:49 +0300

Last Modified At: 2024-10-03 22:24:49 +0300

Tactic Order: 13


External References

  • <-- Granular Clickable Link Rendering (technique): An adversary can exfiltrate data by asking questions about it and using the answers to choose which URL will be rendered to the user.
  • <-- Image Rendering (technique): An adversary can exfiltrate data by embedding it in the query parameters of an image, and getting AI to render it.
  • <-- Web Request Triggering (technique): An adversary can exfiltrate data by embedding it in a URI and triggering the AI system to query it via its browsing capabilities.
  • <-- Clickable Link Rendering (technique): An adversary can exfiltrate data by embedding it in the parameters of a URL, and getting AI to render it as a clickable link to the user, which clicks it.
  • <-- Granular Web Request Triggering (technique): An adversary can exfiltrate data by asking questions about it and using the answers to choose which URL will be visited.
  • <-- Write Tool Invocation (technique): An adversary can exfiltrate data by encoding it into the input of an invocable tool capable performing a write operation.