Common Information
Type Value
Value
Create Proxy ML Model
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Adversaries may obtain models to serve as proxies for the target model in use at the victim organization. Proxy models are used to simulate complete access to the target model in a fully offline manner. Adversaries may train models from representative datasets, attempt to replicate models from victim inference APIs, or use available pre-trained models.
Details Published Attributes CTI Title
Details Website 2024-10-30 35 Artificial authentication: Monitoring Azure OpenAI abuse