Record summary
A quick snapshot of what this page covers.
Attack context
How this AI attack works in practice.
Adversaries may search for and obtain software capabilities for use in their operations. Capabilities may be specific to AI-based attacks Adversarial AI Attack Implementations or generic software tools repurposed for malicious intent (Software Tools). In both instances, an adversary may modify or customize the capability to aid in targeting a particular AI-enabled system.
- ATLAS ID
- AML.T0016
- ATT&CK external ID
- T1588
- Priority score
- 40
Mitigations
Defenses that may help against this attack.
Case studies
Examples from public reports and exercises.
Live Deepfake Image Injection to Evade Mobile KYC Verification
Facial biometric authentication services are commonly used by mobile applications for user onboarding, authentication, and identity verification for KYC requirements. The iProov Red Team demonstrated a face-swapped imagery injection attack that can successfully evade live facial recognition authentication models along with both passive and active liveness verification on mobile devices. By executing this kind of attack, adversaries could gain access to privileged systems of a victim or create fake personas to create fake accounts on banking or cryptocurrency apps.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.