Skip to content

Hide Navigation Hide TOC

Software Tools (3b1eeb78-bf3e-4d30-a376-d3f6ba67bd7c)

Adversaries may search for and obtain software tools to support their operations. Software designed for legitimate use may be repurposed by an adversary for malicious intent. An adversary may modify or customize software tools to achieve their purpose. Software tools used to support attacks on ML systems are not necessarily ML-based themselves.

Cluster A Galaxy A Cluster B Galaxy B Level
Software Tools (3b1eeb78-bf3e-4d30-a376-d3f6ba67bd7c) MITRE ATLAS Attack Pattern Obtain Capabilities (41dba0ab-b7bf-40b6-ac47-61dbfa16a53d) MITRE ATLAS Attack Pattern 1