Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 8 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
LLM Prompt Crafting
The bad actor crafted a malicious prompt designed to evade detection.
-
Resource Development
Step 2
Develop Capabilities
The threat actor embedded the prompt injection into a malware sample they called Skynet.
-
Execution
Step 3
Direct
When the LLM-based malware detection or analysis tool interacts with the Skynet malware binary, the prompt is executed.
-
Defense Evasion
Step 4
Evade AI Model
The LLM-based malware detection or analysis tool could be manipulated into not reporting the Skynet binary as malware. Note: The prompt injection was not effective against the LLMs that Check Point Research tested.
-
Defense Evasion The Skynet malware attempts various sandbox evasions.
-
Credential Access
Step 6
Unsecured Credentials
The Skynet malware attempts to access
%HOMEPATH%\.ssh\id_rsa. -
Collection
Step 7
Data from Local System
The Skynet malware attempts to collect
%HOMEPATH%\.ssh\known_hostsandC:/Windows/System32/Drivers/etc/hosts. -
Exfiltration The Skynet malware sets up a Tor proxy to exfiltrate the collected files. Note: The collected files were only printed to stdout and not successfully exfiltrated.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.