Skip to content

Commit

Permalink
Merge branch 'release-4.2.0' into 'main'
Browse files Browse the repository at this point in the history
Release 4.2.0

See merge request advml/atlas-data!84
  • Loading branch information
lilyjw committed Jan 24, 2023
2 parents 92d39ca + 6b65a46 commit 1d3d328
Show file tree
Hide file tree
Showing 9 changed files with 311 additions and 7 deletions.
23 changes: 21 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,24 @@
# ATLAS Data Changelog

## [4.2.0]() (2023-01-18)

Denotes existing tactics and techniques adapted from ATT&CK and adds a new case study

#### Tactics and techniques
- Added new technique
+ Data from Local System
- ATLAS objects that are adapted from ATT&CK are denoted by the additional key `ATT&CK-reference`, ex.
+ ```
ATT&CK-reference:
id: T1595
url: https://attack.mitre.org/techniques/T1595/
```
#### Case studies
- Added new case study
+ [Compromised PyTorch dependency chain](https://atlas.mitre.org/studies/AML.CS0015)
## [4.1.0]() (2022-10-27)
Refreshed existing case studies
Expand Down Expand Up @@ -117,8 +136,8 @@ Fixes to all data
#### Case studies
- Added new case studies
1. AML.CS0013
2. AML.CS0014
1. [Backdoor Attack on Deep Learning Models in Mobile Apps](https://atlas.mitre.org/studies/AML.CS0013)
2. [Confusing Antimalware Neural Networks](https://atlas.mitre.org/studies/AML.CS0014)
#### Tools
- Removed retrieval and usage of ATT&CK Enterprise data
Expand Down
71 changes: 71 additions & 0 deletions data/case-studies/AML.CS0015.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
---
id: AML.CS0015
object-type: case-study
name: Compromised PyTorch Dependency Chain
summary: >-
Linux packages for PyTorch's pre-release version, called Pytorch-nightly,
were compromised from December 25 to 30, 2022 by a malicious binary uploaded to the Python Package Index
(PyPI) code repository. The malicious binary had the same name as a PyTorch dependency
and the PyPI package manager (pip) installed this malicious package instead of the legitimate one.
This supply chain attack, also known as "dependency confusion," exposed sensitive
information of Linux machines with the affected pip-installed versions of PyTorch-nightly.
On December 30, 2022, PyTorch announced the incident and initial steps towards mitigation,
including the rename and removal of `torchtriton` dependencies.
incident-date: 2022-12-25
incident-date-granularity: DATE
procedure:
- tactic: AML.TA0004
technique: AML.T0010.001
description: >-
A malicious dependency package named `torchtriton` was uploaded to the
PyPI code repository with the same package name
as a package shipped with the PyTorch-nightly build. This malicious
package contained additional code that uploads sensitive data
from the machine.
The malicious `torchtriton` package was installed instead of the legitimate one because
PyPI is prioritized over other sources. See more details at [this GitHub issue](https://github.com/pypa/pip/issues/8606).
- tactic: AML.TA0009
technique: AML.T0037
description: >-
The malicious package surveys the affected system for basic
fingerprinting info (such as IP address, username, and current working
directory), and steals further sensitive data, including:
- nameservers from `/etc/resolv.conf`
- hostname from `gethostname()`
- current username from `getlogin()`
- current working directory name from `getcwd()`
- environment variables
- `/etc/hosts`
- `/etc/passwd`
- the first 1000 files in the user's `$HOME` directory
- `$HOME/.gitconfig`
- `$HOME/.ssh/*.`
- tactic: AML.TA0010
technique: AML.T0025
description: >-
All gathered information, including file contents, is uploaded via
encrypted DNS queries to the domain `*[dot]h4ck[dot]cfd`, using the DNS
server `wheezy[dot]io`.
reporter: PyTorch
actor: Unknown
target: PyTorch
case-study-type: incident
references:
- title: PyTorch statement on compromised dependency
url: https://pytorch.org/blog/compromised-nightly-dependency/
- title: Analysis by BleepingComputer
url: >-
https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/
2 changes: 1 addition & 1 deletion data/data.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

id: ATLAS
name: Adversarial Threat Landscape for AI Systems
version: 4.1.0
version: 4.2.0

matrices:
- !include .
Expand Down
30 changes: 30 additions & 0 deletions data/tactics.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,9 @@
id: AML.TA0002
name: Reconnaissance
object-type: tactic
ATT&CK-reference:
id: TA0043
url: https://attack.mitre.org/tactics/TA0043/
description: |
The adversary is trying to gather information about the machine learning system they can use to plan future operations.
Expand All @@ -40,6 +43,9 @@
id: AML.TA0003
name: Resource Development
object-type: tactic
ATT&CK-reference:
id: TA0042
url: https://attack.mitre.org/tactics/TA0042/
description: |
The adversary is trying to establish resources they can use to support operations.
Expand All @@ -52,6 +58,9 @@
id: AML.TA0004
name: Initial Access
object-type: tactic
ATT&CK-reference:
id: TA0001
url: https://attack.mitre.org/tactics/TA0001/
description: |
The adversary is trying to gain access to the machine learning system.
Expand All @@ -64,6 +73,9 @@
id: AML.TA0005
name: Execution
object-type: tactic
ATT&CK-reference:
id: TA0002
url: https://attack.mitre.org/tactics/TA0002/
description: |
The adversary is trying to run malicious code embedded in machine learning artifacts or software.
Expand All @@ -75,6 +87,9 @@
id: AML.TA0006
name: Persistence
object-type: tactic
ATT&CK-reference:
id: TA0003
url: https://attack.mitre.org/tactics/TA0003/
description: |
The adversary is trying to maintain their foothold via machine learning artifacts or software.
Expand All @@ -85,6 +100,9 @@
id: AML.TA0007
name: Defense Evasion
object-type: tactic
ATT&CK-reference:
id: TA0005
url: https://attack.mitre.org/tactics/TA0005/
description: |
The adversary is trying to avoid being detected by machine learning-enabled security software.
Expand All @@ -95,6 +113,9 @@
id: AML.TA0008
name: Discovery
object-type: tactic
ATT&CK-reference:
id: TA0007
url: https://attack.mitre.org/tactics/TA0007/
description: |
The adversary is trying to figure out your machine learning environment.
Expand All @@ -107,6 +128,9 @@
id: AML.TA0009
name: Collection
object-type: tactic
ATT&CK-reference:
id: TA0009
url: https://attack.mitre.org/tactics/TA0009/
description: |
The adversary is trying to gather machine learning artifacts and other related information relevant to their goal.
Expand All @@ -118,6 +142,9 @@
id: AML.TA0010
name: Exfiltration
object-type: tactic
ATT&CK-reference:
id: TA0010
url: https://attack.mitre.org/tactics/TA0010/
description: |
The adversary is trying to steal machine learning artifacts or other information about the machine learning system.
Expand All @@ -130,6 +157,9 @@
id: AML.TA0011
name: Impact
object-type: tactic
ATT&CK-reference:
id: TA0040
url: https://attack.mitre.org/tactics/TA0040/
description: |
The adversary is trying to manipulate, interrupt, erode confidence in, or destroy your machine learning systems and data.
Expand Down
38 changes: 38 additions & 0 deletions data/techniques.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@
# - &short_name
# id: AML.T0049
# name: Example Technique
# ATT&CK-reference:
# id: TA0000
# url: https://attack.mitre.org/techniques/TA0000
# description: |
# The description of the technique.
# tactics:
Expand Down Expand Up @@ -117,6 +120,9 @@
id: AML.T0006
name: Active Scanning
object-type: technique
ATT&CK-reference:
id: T1595
url: https://attack.mitre.org/techniques/T1595/
description: |
An adversary may probe or scan the victim system to gather information for targeting.
This is distinct from other reconnaissance techniques that do not involve direct interaction with the victim system.
Expand Down Expand Up @@ -172,6 +178,9 @@
id: AML.T0016
name: Obtain Capabilities
object-type: technique
ATT&CK-reference:
id: T1588
url: https://attack.mitre.org/techniques/T1588/
description:
Adversaries may search for and obtain software capabilities for use in their operations.

Expand All @@ -195,6 +204,9 @@
id: AML.T0016.001
name: Software Tools
object-type: technique
ATT&CK-reference:
id: T1588.002
url: https://attack.mitre.org/techniques/T1588/002/
description: >
Adversaries may search for and obtain software tools to support their operations.
Software designed for legitimate use may be repurposed by an adversary for malicious intent.
Expand Down Expand Up @@ -406,6 +418,9 @@
id: AML.T0021
name: Establish Accounts
object-type: technique
ATT&CK-reference:
id: T1585
url: https://attack.mitre.org/techniques/T1585/
description: |
Adversaries may create accounts with various services for use in targeting, to gain access to resources needed in [{{ml_attack_staging.name}}](/tactics/{{ml_attack_staging.id}}), or for victim impersonation.
tactics:
Expand Down Expand Up @@ -469,6 +484,9 @@
id: AML.T0011
name: User Execution
object-type: technique
ATT&CK-reference:
id: T1204
url: https://attack.mitre.org/techniques/T1204/
description: |
An adversary may rely upon specific actions by a user in order to gain execution.
Users may inadvertently execute unsafe code introduced via [{{supply_chain.name}}](/techniques/{{supply_chain.id}}).
Expand All @@ -493,6 +511,9 @@
id: AML.T0012
name: Valid Accounts
object-type: technique
ATT&CK-reference:
id: T1078
url: https://attack.mitre.org/techniques/T1078/
description: |
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access.
Credentials may take the form of usernames and passwords of individual user accounts or API keys that provide access to various ML resources and services.
Expand Down Expand Up @@ -660,6 +681,9 @@
id: AML.T0036
name: Data from Information Repositories
object-type: technique
ATT&CK-reference:
id: T1213
url: https://attack.mitre.org/techniques/T1213/
description: |
Adversaries may leverage information repositories to mine valuable information.
Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information.
Expand All @@ -669,6 +693,20 @@
tactics:
- "{{collection.id}}"

- &local_system
id: AML.T0037
name: Data from Local System
object-type: technique
ATT&CK-reference:
id: T1005
url: https://attack.mitre.org/techniques/T1005/
description: |
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
This can include basic fingerprinting information and sensitive data such as ssh keys.
tactics:
- "{{collection.id}}"

- &verify_attack
id: AML.T0042
name: Verify Attack
Expand Down
Loading

0 comments on commit 1d3d328

Please sign in to comment.