Software Tools (ATLAS) (d18afb87-0de2-43dc-ab6a-eb914a7dbae7)
Adversaries may search for and obtain software tools to support their operations. Software designed for legitimate use may be repurposed by an adversary for malicious intent. An adversary may modify or customize software tools to achieve their purpose. Software tools used to support attacks on ML systems are not necessarily ML-based themselves.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Obtain Capabilities (ATLAS) (db2b3112-a99b-45a0-be10-c69157b616f0) | MITRE ATLAS Attack Pattern | Software Tools (ATLAS) (d18afb87-0de2-43dc-ab6a-eb914a7dbae7) | MITRE ATLAS Attack Pattern | 1 |