Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. AI Attack Staging appears in 1 case steps.
- 2Multiple attack methods. The case connects to 6 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
AI Attack Staging
Step 1
Embed Malware
The adversary embedded malware into an AI model stored in a pickle file. The malware was designed to execute when the model is loaded by a user. ReversingLabs found two instances of this on Hugging Face during their research.
-
Resource Development
Step 2
Publish Poisoned Models
The adversary uploaded the model to Hugging Face. In both instances observed by the ReversingLab, the malicious models did not make any attempt to mimic a popular legitimate model.
-
Defense Evasion
Step 3
Corrupt AI Model
The adversary evaded detection by Picklescan, which Hugging Face uses to flag malicious models. This occurred because the model could not be fully deserialized. In their analysis, the ReversingLabs researchers found that the malicious payload was still executed.
-
Initial Access Because the models were successfully uploaded to Hugging Face, a user relying on this model repository would have their supply chain compromised.
-
Execution
Step 5
Unsafe AI Artifacts
If a user loaded the malicious model, the adversary's malicious payload is executed.
-
Command and Control
Step 6
Reverse Shell
The malicious payload was a reverse shell set to connect to a hardcoded IP address.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.