Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2009-05-22 8 Gumblar and More On Javascript Obfuscation
Details Website 2009-05-22 15 Fixing Exchange 2007 Offline Address Book generation (oalgen) and distribution issues | Corelan Cybersecurity Research
Details Website 2009-05-21 0 Thunder Tables™ Explained
Details Website 2009-05-17 0 The Debian PGP disaster that almost was
Details Website 2009-05-17 6 Backdoor:Win32/Lamin.A threat description - Microsoft Security Intelligence
Details Website 2009-05-13 0 Not all shellcode locations are made equal
Details Website 2009-05-13 6 IP Blacklisting in Snort
Details Website 2009-05-13 6 FET Firmware from MSP430.DLL
Details Website 2009-05-10 0 Excellent Sunday Linkage
Details Website 2009-05-05 0 Torpig Botnet Hijacking Reveals 70GB Of Stolen Data - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-04-30 3 Improving the MSP430 FET
Details Website 2009-04-30 0 Some days you just can't walk away.....
Details Website 2009-04-16 0 On Biometrics and Passwords - Not A Number
Details Website 2009-04-07 0 Webtunnel 0.0.5 Released - HTTP Encapsulation and Tunnel Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-04-01 3 Tamper Data: CSRF examined
Details Website 2009-04-01 122 An Analysis of Conficker C
Details Website 2009-03-27 9 BEA WebLogic plug-in for Apache JSESSION Cookie overflow
Details Website 2009-03-23 4 Keylogger Recorder Meterpreter Script
Details Website 2009-03-20 14 Memory Analysis, for real!
Details Website 2009-03-19 7 Creating new detection coverage : Using SCADA OMRON-FINS as an example
Details Website 2009-03-18 166 Carders do battle through spam - carder.su
Details Website 2009-03-15 31 Breaking 802.15.4 AES128 by Syringe
Details Website 2009-03-12 1 Malware for Incident Responders - Examples
Details Website 2009-03-10 3 Behold the Glory of Mattland
Details Website 2009-03-09 8 Supplemental Data for Calculating Mozilla Patching Speed - Microsoft Security Blog