2026-03-21 | OSINT and Intelligence | Oracle-42 Intelligence Research
```html

MITRE ATT&CK Navigator: A Practical Threat Modeling Workflow for LLMjacking and AI Security

Executive Summary: As large language models (LLMs) become central to enterprise and government operations, they also emerge as high-value targets for adversaries. "LLMjacking"—the unauthorized hijacking of LLM resources via credential theft, API abuse, or cloud misconfigurations—poses a rapidly growing threat, as highlighted in recent intelligence reports. To counter this, organizations must adopt a structured threat modeling approach grounded in real-world adversary behavior. The MITRE ATT&CK Navigator provides a flexible, visualization-driven framework to map, analyze, and prioritize threats against AI systems. This article outlines a practical workflow for using the MITRE ATT&CK Navigator to model LLMjacking threats, integrate OSINT intelligence, and inform detection and response strategies within the broader context of evolving AI security threats.

Key Findings

Understanding LLMjacking in the Threat Landscape

LLMjacking refers to the unauthorized takeover or exploitation of large language models (LLMs), their APIs, or the underlying compute infrastructure. Attackers may gain access via compromised credentials, exposed API keys, or misconfigured cloud environments. Once inside, adversaries can misuse LLMs for malicious inference, data extraction, prompt injection, or even turn them into covert command-and-control (C2) channels. This threat has been flagged in recent intelligence reports as a fast-growing vector, particularly in enterprise and government sectors where LLMs are integrated into critical workflows.

In parallel, Germany’s 2024 cybersecurity report highlights the proliferation of ransomware groups, botnets, new malware variants, and advanced persistent threats (APTs)—many of which now target cloud and AI infrastructure. These threats often overlap with LLMjacking, as access brokers sell stolen cloud credentials that can be used to compromise AI services. Thus, modeling LLMjacking requires situating it within the broader matrix of cyber threats affecting modern IT environments.

The MITRE ATT&CK Framework as a Foundation for AI Security

The MITRE ATT&CK Framework is a globally recognized knowledge base of adversary tactics, techniques, and procedures (TTPs). Originally designed for enterprise IT environments, it has been extended to cover cloud services, containers, and increasingly, AI and machine learning systems. The MITRE ATT&CK Navigator is a web-based tool that allows organizations to visualize and customize ATT&CK matrices, enabling interactive threat modeling, prioritization, and collaboration.

For AI security, ATT&CK provides a structured way to:

By leveraging ATT&CK, security teams can move from reactive to proactive defense—anticipating how attackers might abuse or subvert LLMs before an incident occurs.

Practical Workflow: Threat Modeling LLMjacking Using ATT&CK Navigator

Step 1: Define the AI System Scope

Begin by clearly defining the boundaries of the AI system under analysis. For LLMjacking, this includes:

This scope reflects the attack surface targeted in LLMjacking campaigns, where credentials to any of these components can lead to full system compromise.

Step 2: Select and Customize the ATT&CK Matrix

Use the MITRE ATT&CK Navigator to load the appropriate matrix—likely the Enterprise ATT&CK framework with cloud and container extensions. Customize the matrix by:

Step 3: Enrich the Model with OSINT Intelligence

OSINT provides critical context on active adversaries and campaigns. Integrate intelligence from sources such as:

Map these intelligence feeds to ATT&CK techniques. For example, if a recent report shows an APT group using stolen OAuth tokens to access Azure-hosted LLMs, tag the relevant ATT&CK techniques (T1078, T1528) with a high severity and link to the intelligence source.

Step 4: Conduct Collaborative Threat Modeling Sessions

Use the ATT&CK Navigator in workshop-style sessions with red teams, cloud security, and AI engineers. The tool’s collaborative features allow teams to:

This collaborative approach ensures both technical depth and cross-functional alignment.

Step 5: Translate Model into Detection and Response Strategies

The completed ATT&CK-based threat model becomes the blueprint for security operations: