Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 1 case steps.
- 2Multiple attack methods. The case connects to 4 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development The actor obtained metame, a simple metamorphic code engine for arbitrary executables.
-
AI Attack Staging
Step 2
Craft Adversarial Data
The actor used a malware sample from a prevalent ransomware family as a start to create "mutant" variants.
-
Initial Access
Step 3
Data
The actor uploaded "mutant" samples to the platform.
-
Persistence
Step 4
Poison Training Data
Several vendors started to classify the files as the ransomware family even though most of them won't run. The "mutant" samples poisoned the dataset the ML model(s) use to identify and classify this ransomware family.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.