Suspicious ML Model Download

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2026-03-10
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires one of the following data sources:
    • AWS Audit Log
      OR
    • Azure Audit Log
      OR
    • Gcp Audit Log

Detection Modules

AIDR

Detector Tags

Cloud AI Infrastructure Analytics

ATT&CK Tactic

Collection (TA0009)

ATT&CK Technique

Data from Cloud Storage (T1530)

Severity

Informational

Description

A model artifact was accessed from cloud storage by an identity that typically doesn't interact with model files.
MITRE ATLAS Technique: AML.T0035 - ML Artifact Collection.

Attacker's Goals

Adversaries may collect ML artifacts for exfiltration or for use in ML Attack Staging.

Investigative actions

  • Examine the bucket to determine which model was accessed.
  • Verify that this command was executed by a trusted source.

Variations

Suspicious First-Time AI Model Download by Identity

Synopsis

ATT&CK Tactic

Collection (TA0009)

ATT&CK Technique

Data from Cloud Storage (T1530)

Severity

Medium

Description

A model artifact was accessed from cloud storage by an identity that did not interact with model files recently.

Attacker's Goals

Adversaries may collect ML artifacts for exfiltration or for use in ML Attack Staging.

Investigative actions

  • Examine the bucket to determine which model was accessed.
  • Verify that this command was executed by a trusted source.