insidejob
AML.T0016.001 Realized ATT&CK T1588.002 ↗

Software Tools

This technique has been observed in real-world attacks on AI systems.

Adversaries may search for and obtain software tools to support their operations. Software designed for legitimate use may be repurposed by an adversary for malicious intent. An adversary may modify or customize software tools to achieve their purpose. Software tools used to support attacks on AI systems are not necessarily AI-based themselves.