attack 2026

MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning

Yizhe Zeng 1,2, Wei Zhang 3, Yunpeng Li 1,2, Juxin Xiao 1,2, Xiao Wang 1,2, Yuling Liu 1,2

0 citations

α

Published on arXiv

2604.06840

Model Poisoning

OWASP ML Top 10 — ML10

Training Data Poisoning

OWASP LLM Top 10 — LLM03

Key Finding

Achieves over 90% attack success rate across four reasoning datasets and five LLMs with 5% poison ratio while evading CoT-based detection methods

MirageBackdoor

Novel technique introduced


While Chain-of-Thought (CoT) prompting has become a standard paradigm for eliciting complex reasoning capabilities in Large Language Models, it inadvertently exposes a new attack surface for backdoor attacks. Existing CoT backdoor attacks typically manipulate the intermediate reasoning steps to steer the model toward incorrect answers. However, these corrupted reasoning traces are readily detected by prevalent process-monitoring defenses. To address this limitation, we introduce MirageBackdoor(MirageBD), the first backdoor attack to achieve Think Well but Answer Wrong. By unlocking the model's post-output space alongside a tailored training procedure, MirageBD enables the triggered model to preserve clean CoTs while selectively steering the final answer toward a specific target, significantly enhancing the stealthiness of the attack. Experiments show that MirageBD generally achieves over 90% attack success rate across four datasets and five models with a poison ratio of only 5%. Moreover, even under rigorous evaluations such as trigger perturbations and CoT-based detection, MirageBD maintains robust performance and stealthiness, posing a critical challenge to existing safety guardrails.


Key Contributions

  • First backdoor attack achieving 'Think Well, Answer Wrong' - preserves clean reasoning traces while corrupting final answers
  • Novel post-output space manipulation technique that bypasses CoT-based process-monitoring defenses
  • Achieves >90% attack success rate across 4 datasets and 5 models with only 5% poison ratio while maintaining stealth against detection

🛡️ Threat Analysis

Model Poisoning

Core contribution is a backdoor attack that embeds trigger-activated malicious behavior (wrong answers) in LLMs while maintaining normal behavior otherwise. The attack uses poisoned training data (5% poison ratio) to insert a hidden, targeted behavior that activates only with specific triggers.


Details

Domains
nlp
Model Types
llmtransformer
Threat Tags
training_timetargeted
Datasets
GSM8KMATHMathQAAQUA
Applications
chain-of-thought reasoningquestion answeringmathematical reasoning