ML Supply Chain Compromise

Type: technique

Description: Adversaries may gain initial access to a system by compromising the unique portions of the ML supply chain. This could include hardware, data and its annotations, parts of the ML software stack, or the model itself. In some instances the attacker will need secondary access to fully carry out an attack using compromised components of the supply chain.

Version: 0.1.0

Created At: 2025-03-04 10:27:40 -0500

Last Modified At: 2025-03-04 10:27:40 -0500


External References

  • --> Initial Access (tactic): Compromising machine learning supply chains to gain unauthorized access or introduce malicious components.