A company has invested heavily in developing a proprietary, high-performance generative AI model. An attacker gains unauthorized access to the company's cloud environment and manages to exfiltrate the trained model's weights and architecture. This allows the attacker to replicate the model for their own use or to analyze it for vulnerabilities. This type of security breach is best described as: