Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. AI Attack Staging appears in 2 case steps.
- 2Multiple attack methods. The case connects to 8 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The team first performed reconnaissance to gather information about the target ML model.
-
Initial Access
Step 2
Valid Accounts
The team used a valid account to gain access to the network.
-
Collection
Step 3
AI Artifact Collection
The team found the model file of the target ML model and the necessary training data.
-
Exfiltration The team exfiltrated the model and data via traditional means.
-
AI Attack Staging
Step 5
White-Box Optimization
Using the target model and data, the red team crafted evasive adversarial data in an offline manor.
-
AI Model Access The team used an exposed API to access the target model.
-
AI Attack Staging
Step 7
Verify Attack
The team submitted the adversarial examples to the API to verify their efficacy on the production system.
-
Impact
Step 8
Evade AI Model
The team performed an online evasion attack by replaying the adversarial examples and accomplished their goals.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.