Model (452b8fdf-8679-4013-bb38-4d16f65430bc)
Machine learning systems often rely on open sourced models in various ways. Most commonly, the victim organization may be using these models for fine tuning. These models will be downloaded from an external source and then used as the base for the model as it is tuned on a smaller, private dataset. Loading models often requires executing some saved code in the form of a saved model file. These can be compromised with traditional malware, or through some adversarial machine learning techniques.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Model (452b8fdf-8679-4013-bb38-4d16f65430bc) | MITRE ATLAS Attack Pattern | ML Supply Chain Compromise (d2cf31e0-a550-4fe0-8fdb-8941b3ac00d9) | MITRE ATLAS Attack Pattern | 1 |