insidejob
AML.T0060 Demonstrated

Publish Hallucinated Entities

This technique has been demonstrated in research or controlled environments.

Adversaries may create an entity they control, such as a software package, website, or email address to a source hallucinated by an LLM. The hallucinations may take the form of package names commands, URLs, company names, or email addresses that point the victim to the entity controlled by the adversary. When the victim interacts with the adversary-controlled entity, the attack can proceed.