Common Information
Type Value
Value
Data
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service.
Details Published Attributes CTI Title
Details Website 0 Industry 100: a project in data driven security
Details Website 49 UNKNOWN
Details Website 6 UNKNOWN
Details Website 1 Man in the Middle (MITM) Attacks | Types, Techniques, and Prevention
Details Website 4 502 - No server or forwarder data received (Privoxy@375f698c0d9e)
Details Website 1905 UNKNOWN
Details Website 0 RFC 826: An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware
Details Website 0 Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems | Nmap Network Scanning
Details Website 1 split | GTFOBins
Details Website 2 UNKNOWN
Details Website 2 The Linux Kernel API — The Linux Kernel documentation
Details Website 0 Mitiga | Cloud Incident Response
Details Website 0 Attention Required! | Cloudflare
Details Website 8 UNKNOWN
Details Website 1 UNKNOWN
Details Website 5 UNKNOWN
Details Website 57 UNKNOWN
Details Website 19 UNKNOWN
Details Website 8 UNKNOWN