Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Initial Access appears in 1 case steps.
- 2Multiple attack methods. The case connects to 3 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Initial Access
Step 1
AI Software
A malicious dependency package named
torchtritonwas uploaded to the PyPI code repository with the same package name as a package shipped with the PyTorch-nightly build. This malicious package contained additional code that uploads sensitive data from the machine. The malicioustorchtritonpackage was installed instead of the legitimate one because PyPI is prioritized over other sources. See more details at this GitHub issue. -
Collection
Step 2
Data from Local System
The malicious package surveys the affected system for basic fingerprinting info (such as IP address, username, and current working directory), and steals further sensitive data, including: - nameservers from
/etc/resolv.conf- hostname fromgethostname()- current username fromgetlogin()- current working directory name fromgetcwd()- environment variables -/etc/hosts-/etc/passwd- the first 1000 files in the user's$HOMEdirectory -$HOME/.gitconfig-$HOME/.ssh/*. -
Exfiltration All gathered information, including file contents, is uploaded via encrypted DNS queries to the domain
*[dot]h4ck[dot]cfd, using the DNS serverwheezy[dot]io.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.