Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Reconnaissance appears in 1 case steps.
- 2Multiple attack methods. The case connects to 6 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The researchers read publicly available information about Cylance's AI Malware detector. They gathered this information from various sources such as public talks as well as patent submissions by Cylance.
-
AI Model Access The researchers had access to Cylance's AI-enabled malware detection software.
-
Discovery The researchers enabled verbose logging, which exposes the inner workings of the ML model, specifically around reputation scoring and model ensembling.
-
Resource Development
Step 4
Adversarial AI Attacks
The researchers used the reputation scoring information to reverse engineer which attributes provided what level of positive or negative reputation. Along the way, they discovered a secondary model which was an override for the first model. Positive assessments from the second model overrode the decision of the core ML model.
-
AI Attack Staging
Step 5
Manual Modification
Using this knowledge, the researchers fused attributes of known good files with malware to manually create adversarial malware.
-
Defense Evasion
Step 6
Evade AI Model
Due to the secondary model overriding the primary, the researchers were effectively able to bypass the ML model.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.