Surely .... ?
There is a present viable word for such a thrifty theft-less transference and express exfiltration of sensitive data through other than known proprietary information channels, doublelayer, with the resultant targeted product for subsequent onward future delivery being subtly tweaked and more finely performance tuned in the export process to render it a novel improved and quite wholly different informative model data stream.
One describes the data as being “cloned”. And because the purged Information and parged intel is changed and improved, is the notion that any existing prior data has been stolen and presented by an attacker clearly errant nonsense and a misdirection/enfeebling distraction.