Data from Local System
Tactic: Collection
This technique has been observed in real-world attacks on AI systems.
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
This can include basic fingerprinting information and sensitive data such as ssh keys.