ATLAS Landscape
AML.T0073

Impersonation

Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing](/techniques/AML.T0052), or [Spearphishing via Social Engineering LLM](/techniques/AML.T0052.000)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary's ultimate goals, possibly against multiple victims. Adversaries may target resources that are part of the AI DevOps lifecycle, such as model repositories, container registries, and software registries.

Severity CVE CVSS
HIGH CVE-2025-30358 8.1
HIGH CVE-2025-64496 7.3
MEDIUM CVE-2025-7021 6.5
MEDIUM GHSA-564p-rx2q-4c8v 6.1
MEDIUM CVE-2026-28415 4.7
LOW CVE-2025-50736