Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. AI Attack Staging appears in 1 case steps.
- 2Multiple attack methods. The case connects to 4 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
AI Attack Staging
Step 1
Manual Modification
Several cheap, yet effective strategies for manually modifying logos were observed: | Evasive Strategy | Count | | - | - | | Company name style | 25 | | Blurry logo | 23 | | Cropping | 20 | | No company name | 16 | | No visual logo | 13 | | Different visual logo | 12 | | Logo stretching | 11 | | Multiple forms - images | 10 | | Background patterns | 8 | | Login obfuscation | 6 | | Masking | 3 |
-
Defense Evasion
Step 2
Evade AI Model
The visual similarity model used to detect brand impersonation was evaded. However, other components of the phishing detection system successfully identified the phishing websites.
-
Initial Access
Step 3
Phishing
If the adversary can successfully evade detection, they can continue to operate their phishing websites and steal the victim's credentials.
-
Impact
Step 4
User Harm
The end user may experience a variety of harms including financial and privacy harms depending on the credentials stolen by the adversary.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.