Resource Development

Type: tactic

Description: The adversary is trying to establish resources they can use to support operations.

Version: 0.1.0

Created At: 2025-03-04 10:27:40 -0500

Last Modified At: 2025-03-04 10:27:40 -0500

Tactic Order: 2


External References

  • <-- Commercial License Abuse (technique): An adversary can learn about a commercially available system to craft their payloads accordingly.
  • <-- Obtain Capabilities (technique): Acquiring tools, software, or other resources to enable future attacks or machine learning-specific operations.
  • <-- LLM Prompt Crafting (technique): An adversary can craft a prompt that would circumvent the target AI system defenses.
  • <-- Publish Poisoned Datasets (technique): Releasing datasets that have been maliciously altered to disrupt machine learning processes or outcomes.
  • <-- Publish Hallucinated Entities (technique): An adversary can create rouge entities that correspond to entities hallucinated by an LLM.
  • <-- Establish Accounts (technique): Creating accounts to support malicious activities, including access to systems, data, or machine learning environments.
  • <-- Acquire Infrastructure (technique): Obtaining infrastructure such as servers, domains, or cloud environments to support future attacks or machine learning operations.
  • <-- Acquire Public ML Artifacts (technique): Obtaining publicly available machine learning artifacts to assist in planning or conducting attacks.
  • <-- Develop Capabilities (technique): Creating tools, software, or other resources to facilitate future machine learning-related attacks or operations.
  • <-- Publish Poisoned Models (technique): Releasing maliciously altered machine learning models to disrupt downstream use or compromise systems.
  • <-- Poison Training Data (technique): Introducing malicious alterations to training data to influence or degrade machine learning model performance.