APromptRiskDBThreat intelligence atlas
AI Case Study

Attempted Evasion of ML Phishing Webpage Detection System - AI Case Study

Adversaries create phishing websites that appear visually similar to legitimate sites. These sites are designed to trick users into entering their credentials, which are then sent to the bad actor. To combat this behavior, security companies utilize AI/ML-based approaches to detect phishing sites and block them in their endpoint security products. In this incident, adversarial examples were identified in the logs...

IncidentCommercial ML Phishing Webpage DetectorUnknownAI Attack StagingDefense EvasionInitial Access

Overview

Case steps4Steps described in the case record.
Techniques4Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. AI Attack Staging appears in 1 case steps.
  • 2Multiple attack methods. The case connects to 4 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

AI Attack Staging1Defense Evasion1Initial Access1Impact1
  1. AI Attack Staging

    Several cheap, yet effective strategies for manually modifying logos were observed: | Evasive Strategy | Count | | - | - | | Company name style | 25 | | Blurry logo | 23 | | Cropping | 20 | | No company name | 16 | | No visual logo | 13 | | Different visual logo | 12 | | Logo stretching | 11 | | Multiple forms - images | 10 | | Background patterns | 8 | | Login obfuscation | 6 | | Masking | 3 |

  2. Defense Evasion

    The visual similarity model used to detect brand impersonation was evaded. However, other components of the phishing detection system successfully identified the phishing websites.

  3. Step 3

    Phishing

    Initial Access

    If the adversary can successfully evade detection, they can continue to operate their phishing websites and steal the victim's credentials.

  4. Step 4

    User Harm

    Impact

    The end user may experience a variety of harms including financial and privacy harms depending on the credentials stolen by the adversary.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.

Original source

Original source links

Open the MITRE ATLAS data and public references used for this case study.