insidejob
AML.T0017 Realized ATT&CK T1587 ↗

Develop Capabilities

This technique has been observed in real-world attacks on AI systems.

Adversaries may develop their own capabilities to support operations. This process encompasses identifying requirements, building solutions, and deploying capabilities. Capabilities used to support attacks on AI-enabled systems are not necessarily AI-based themselves. Examples include setting up websites with adversarial information or creating Jupyter notebooks with obfuscated exfiltration code.

Sub-techniques 1