MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning
Yizhe Zeng 1,2, Wei Zhang 3, Yunpeng Li 1,2, Juxin Xiao 1,2, Xiao Wang 1,2, Yuling Liu 1,2
Published on arXiv
2604.06840
Model Poisoning
OWASP ML Top 10 — ML10
Training Data Poisoning
OWASP LLM Top 10 — LLM03
Key Finding
Achieves over 90% attack success rate across four reasoning datasets and five LLMs with 5% poison ratio while evading CoT-based detection methods
MirageBackdoor
Novel technique introduced
While Chain-of-Thought (CoT) prompting has become a standard paradigm for eliciting complex reasoning capabilities in Large Language Models, it inadvertently exposes a new attack surface for backdoor attacks. Existing CoT backdoor attacks typically manipulate the intermediate reasoning steps to steer the model toward incorrect answers. However, these corrupted reasoning traces are readily detected by prevalent process-monitoring defenses. To address this limitation, we introduce MirageBackdoor(MirageBD), the first backdoor attack to achieve Think Well but Answer Wrong. By unlocking the model's post-output space alongside a tailored training procedure, MirageBD enables the triggered model to preserve clean CoTs while selectively steering the final answer toward a specific target, significantly enhancing the stealthiness of the attack. Experiments show that MirageBD generally achieves over 90% attack success rate across four datasets and five models with a poison ratio of only 5%. Moreover, even under rigorous evaluations such as trigger perturbations and CoT-based detection, MirageBD maintains robust performance and stealthiness, posing a critical challenge to existing safety guardrails.
Key Contributions
- First backdoor attack achieving 'Think Well, Answer Wrong' - preserves clean reasoning traces while corrupting final answers
- Novel post-output space manipulation technique that bypasses CoT-based process-monitoring defenses
- Achieves >90% attack success rate across 4 datasets and 5 models with only 5% poison ratio while maintaining stealth against detection
🛡️ Threat Analysis
Core contribution is a backdoor attack that embeds trigger-activated malicious behavior (wrong answers) in LLMs while maintaining normal behavior otherwise. The attack uses poisoned training data (5% poison ratio) to insert a hidden, targeted behavior that activates only with specific triggers.