Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 6 unique AI attack methods.
- 3Vulnerability mentions. The record connects 1 vulnerability identifiers to this case.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Initial Access The adversaries exploited a vulnerable version of Laravel (CVE-2021-3129) to gain initial access to the victims' systems.
-
Credential Access
Step 2
Unsecured Credentials
The adversaries found unsecured credentials to cloud environments on the victims' systems
-
Privilege Escalation
Step 3
Valid Accounts
The compromised credentials gave the adversaries access to cloud environments where large language model (LLM) services were hosted.
-
Resource Development
Step 4
Software Tools
The adversaries obtained keychecker, a bulk key checker for various AI services which is capable of testing if the key is valid and retrieving some attributes of the account (e.g. account balance and available models).
-
Discovery
Step 5
Cloud Service Discovery
The adversaries used keychecker to discover which LLM services were enabled in the cloud environment and if the resources had any resource quotas for the services. Then, the adversaries checked to see if their stolen credentials gave them access to the LLM resources. They used legitimate
invokeModelqueries with an invalid value of -1 for themax_tokens_to_sampleparameter, which would raise anAccessDeniederror if the credentials did not have the proper access to invoke the model. This test revealed that the stolen credentials did provide them with access to LLM resources. The adversaries also usedGetModelInvocationLoggingConfigurationto understand how the model was configured. This allowed them to see if prompt logging was enabled to help them avoid detection when executing prompts. -
Resource Development
Step 6
Software Tools
The adversaries then used OAI Reverse Proxy to create a reverse proxy service in front of the stolen LLM resources. The reverse proxy service could be used to sell access to cybercriminals who could exploit the LLMs for malicious purposes.
-
Impact
Step 7
Financial Harm
In addition to providing cybercriminals with covert access to LLM resources, the unauthorized use of these LLM models could cost victims thousands of dollars per day.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.