Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2009-03-12 1 Malware for Incident Responders - Examples
Details Website 2009-03-10 3 Behold the Glory of Mattland
Details Website 2009-03-09 8 Supplemental Data for Calculating Mozilla Patching Speed - Microsoft Security Blog
Details Website 2009-03-06 5 Generating Virus Signatures - The Automated Way
Details Website 2009-03-06 0 fzem - MUA (Mail User Agent) / Mail Client Fuzzer - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-02-26 27 Another Password Stealer hides as Bank of America video malware
Details Website 2009-02-25 6 Astaro Command Center 2.0 BETA Begins
Details Website 2009-02-24 3 Detecting Silly Javascript Obfuscation Techniques
Details Website 2009-02-24 0 Configuring Wireless settings via Group Policy
Details Website 2009-02-22 1 Homebrew patch for Adobe AcroReader 9
Details Website 2009-02-21 2 Looking for "Bad Stuff", part I
Details Website 2009-02-20 0 one malloc to rule them all
Details Website 2009-02-20 0 DShield Web Honeypot Project - Alpha Version Released - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-02-19 35 Leetness Not Actually Required For Pwnage
Details Website 2009-02-19 1 Making Conficker Cough Up the Goods
Details Website 2009-02-18 7 MS09-002 in the wild
Details Website 2009-02-11 0 Webtunnel 0.0.2 - HTTP Encapsulation and Tunnel Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-02-10 0 Disabling Bluetooth and Infrared Beaming
Details Website 2009-01-30 0 IDA v5.4 supports Windbg as a debugger backend
Details Website 2009-01-30 0 Dial up security woes from East Africa
Details Website 2009-01-29 39 [Emerging-Sigs] Gozi/Ordergun/Orderjack sig mod + new
Details Website 2009-01-22 6 Windows 7 Beta
Details Website 2009-01-15 0 Next-Gen Botnets Taking The Place of Storm and Srizbi - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-01-13 0 Fake CNN Site From Phishing E-mail Serves Trojan - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-01-12 0 OWASP (Open Web Application Security Project) Testing Guide v3 Released - Darknet - Hacking Tools, Hacker News & Cyber Security