Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
5 Days |
Required Data |
|
Detection Modules |
AIDR |
Detector Tags |
Cloud AI Infrastructure Analytics |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
High |
Description
A cloud identity invoked an AI model from a Tor exit node.
Attacker's Goals
Conceal information about malicious activities, such as location and network usage.
Investigative actions
Block all web traffic to and from public Tor entry and exit nodes.