insidejob
AML.T0064 Demonstrated

Gather RAG-Indexed Targets

Tactic: Reconnaissance

This technique has been demonstrated in research or controlled environments.

Adversaries may identify data sources used in retrieval augmented generation (RAG) systems for targeting purposes. By pinpointing these sources, attackers can focus on poisoning or otherwise manipulating the external data repositories the AI relies on.

RAG-indexed data may be identified in public documentation about the system, or by interacting with the system directly and observing any indications of or references to external data sources.