insidejob
AML.T0037 Realized ATT&CK T1005 ↗

Data from Local System

Tactic: Collection

This technique has been observed in real-world attacks on AI systems.

Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.

This can include basic fingerprinting information and sensitive data such as ssh keys.