From 85b7a503b7c2ab1765e2c47ceee4c2ed28f8cded Mon Sep 17 00:00:00 2001 From: ramtherunner <34756719+ramtherunner@users.noreply.github.com> Date: Fri, 16 Oct 2020 00:12:22 -0700 Subject: [PATCH] Update adversarial-ml-threat-matrix.md --- pages/adversarial-ml-threat-matrix.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pages/adversarial-ml-threat-matrix.md b/pages/adversarial-ml-threat-matrix.md index ef049c1..acaaa47 100644 --- a/pages/adversarial-ml-threat-matrix.md +++ b/pages/adversarial-ml-threat-matrix.md @@ -185,3 +185,5 @@ One example of this type of attack is Sponge attack. To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002).(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) +# Next Recommended Reading +See how the matrix is in action using [Case Studies Page](/pages/case-studies-page.md)