Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 4 case steps.
- 2Multiple attack methods. The case connects to 8 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The attackers collected user identity information and high-definition face photos from an online black market.
-
Resource Development
Step 2
Establish Accounts
The attackers used the victim identity information to register new accounts in the tax system.
-
Resource Development
Step 3
Consumer Hardware
The attackers bought customized low-end mobile phones.
-
Resource Development
Step 4
Software Tools
The attackers obtained customized Android ROMs and a virtual camera application.
-
Resource Development The attackers obtained software that turns static photos into videos, adding realistic effects such as blinking eyes.
-
AI Model Access The attackers used the virtual camera app to present the generated video to the ML-based facial recognition service used for user verification.
-
Initial Access
Step 7
Evade AI Model
The attackers successfully evaded the face recognition system. This allowed the attackers to impersonate the victim and verify their identity in the tax system.
-
Impact
Step 8
Financial Harm
The attackers used their privileged access to the tax system to send invoices to supposed clients and further their fraud scheme.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.