Threat Vectors
Attackers exploit both the software supply chain and edge trust boundaries. The notes below mirror the investigative threads followed by Knox Ramsey.
Supply Chain Compromise
Malicious model weights inserted before deployment. Configuration packages transit legitimate logistics, masking tampering.
- Poisoned training data targeting spectral optimization
- Signed firmware updated via trusted vendor portal
- Orchestrated to appear as a calibration patch
Credential & Certificate Spoofing
Attackers forge trust anchors to bypass advisory-only safeguards.
- Compromised certificate authority issues fraudulent edge certs
- Shadow PKI mimics FarmLytics policy updates
- Gateway accepts poisoned recipes as authentic
Closed-Loop Blind Spots
Safety Kernel v1 runs single-channel verification, allowing doctored telemetry to pass.
- Shadow test relies on spoofed sensor replay
- Logging occurs, but alerts are suppressed downstream
- Upgraded Kernel v2 introduces dual-channel physics checks
Incident Lessons
Stuxnet, the Ukraine power grid attacks, TRITON/TRISIS, Colonial Pipeline, and the JBS intrusion demonstrate that cyber-physical exploits escalate quickly. The Dark Recipe plot aligns with documented tactics but compresses the timeline for dramatic effect.