Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 2007-11-01 10 Ron Paul spam and Online Support
Details Website 2007-11-01 21 Virus Bulletin :: Spam from the kernel
Details Website 2007-10-23 0 Reliable staging without a stager receive loop | Rapid7 Blog
Details Website 2007-10-14 5 Cracking the iPhone (part 2) | Rapid7 Blog
Details Website 2007-10-10 1 [我所知道的BIOS]->[PCI SCAN] 9
Details Website 2007-10-08 0 [我所知道的BIOS]->[DRAM Sizing] (1) 7
Details Website 2007-10-05 0 Official release of SQL Power Injector 1.2 - Download Now! - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-10-01 3 aircrack-ng - WEP and WPA-PSK Key Cracking Program - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-09-28 0 TJX (T.J. Maxx and Marshall’s) Largest Breach of Customer Data in U.S. History - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-09-27 0 [我所知道的BIOS]->[Jumpless] 4
Details Website 2007-09-26 0 [我所知道的BIOS]->[PowerOn Sequence & BIOS Entry] 3
Details Website 2007-09-22 3 Oracle 0xDEADF00D · The Recurity Lablog
Details Website 2007-09-15 3 Registry Analysis
Details Website 2007-09-14 55 How to restore a Windows 2003 DC using ASR and VMWare | Corelan Cybersecurity Research
Details Website 2007-08-22 2 AES Encrypted Phishing Site
Details Website 2007-08-22 8 Bypassing Anti-Analysis Technique In Office Documents
Details Website 2007-08-22 3 Metasploit - Some Assembly Required
Details Website 2007-08-22 10 TrickBot Banking Trojan - DOC00039217.doc
Details Website 2007-08-22 15 Large Victim Credential Server Uncovered
Details Website 2007-08-21 15 Vista IR
Details Website 2007-08-14 0 Russian Elcomsoft Finds Backdoor in Quicken Passwords - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-07-19 2 FTester - Firewall Tester and IDS Testing tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-07-13 0 FG-Injector - SQL Injection & Proxy Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-07-12 2 Tool Testing Methodology, Memory
Details Website 2007-07-11 4 ACPO Guidelines