data = vf triple karte d 128k mit welc. suci, www betterthisworld com, ontpeconomy, nutrition information theweeklyhealthiness, money advice disfinancified, offer lwmfhotels, sffaresports results 2023, undergrowthgameline hosted event, what is doayods, tech.rsiasrikandi.co.id, xsmtrt5, results sffarehockey, savings tips aggr8taxes, trending food fhthopefood, photoacompcuritiba, betterthistechs news betterthisworld, tgarchirvetech news by thegamingarchives, help guides jalbitehealth, gipi_38, movizwap org, technology news tgarchivegaming, ezy2482, 9uhdmaxv17, why genboostermark software is so popular, pormhhub, shpobet, lhfdbj, 1.700.600.000 won berapa rupiah, diet hacks twspoondietary, gaming tips tgarchirvetech, netflixyorktimes, igay68, voucher codes lwmfhotels, wutawhelp advice, infoguide map lwmfmaps, besttarahi.com, proper way of using 5ah9.6max0 python software, knestfs.com, jeetbajj, 56a2734063db51fb1f17e7385582d67a, højbedeløsninger, movizwap.com 2023, 561836844, new software rcsdassk, vitamin advice twspoonfitness, commerce guide onpresscapital, why should i visit jaroconca mountain, trasfecar, photoacompanhant3s, ftasiamanagement crypto finance, why are endbugflow software called bugs, discount codes ttweakhotel, roninperito, advice life impocoolmom, photoacophante, ftasiaeconomy crypto trends, 775bet, video games togamesticky, report apple applemiller9to5mac, bronwin aurora onlyfans, wutawhacks home hacks, ttweakhotel discount, instructions manual hssgamestick, luckysides247, applemiller9to5mac, fintechasia .net telekom, update guide etsiosapp, betterthisworld betterthistechs news, financial strategies cwbiancamarket, fotoscompanhante, instructions for lcfgamestick, news business aggr8finance, (90)na11201200083(91)230123, cric7hd, tea recipes jalbitedrinks, javeltv, useful tips whatutalkingboutfamily, nutrition advice theweeklyhealthiness, useful advice jalbitehealth, l59a3d07, educational guide llblogkids, 111.90.150.294, when doorsun1524 released, gaming hacks scookiegeek, af247loc.con, gaming tips pblinuxtech, 20.0.121.215, atendepiloto.dasa.com.br, 3850er3115r, ftasiamanagement economy, new software versions lcftechmods, fhfcpwl, uhoebeans software, tech news feedcryptobuzz, gozvil.store, htts://betproexch. com/index, civiliden ll5540, nutrition guide fparentips, instasuoersave, www.micronavadisha.com login, chatbot technology aggr8tech, new software 418dsg7, toisbet, hebtaitk, 1sotem1, 3534525141, xsmtrcn, (90)md266610015254(91)260326, avaceinet, packs lwmftravel 2023, hdporax, кинобайс, lenard vanderaa (2018-2020) daniel arenas (2021-presente), baseball terms sffarebaseball, instanonimos, etsjavaapp release date, parenting tips fpmomhacks, iorpdla, parental tips fpmomtips, whatutalkingboutwillis contact, ftasiamanagement tech, https //epccbopn.apeasternpower.com, download grandiamod1.2 pc, latest online tool guide zardgadjets, can too much gaming overdertoza cause anxiety, management tips ftasiatrading, 6173554500, aggr8taxes savings tips, advantages of meetshaxs software, civiliden ll5540 pc, add 16gb extra ram & bgmi lag fix 2gb ram article #143 technomindujjwal.net, new software oxzep7 python, qkfzzu1lbnvinhp4dlhz, valan slap845 old version, wutawhacks 2021, parent relationship fpmomtips, release date etsjavaapp, uggworldtech gaming trends by undergrowthgames, photoacampamente, vloweves game information and facts, lwmfcrafts, controller made by undergrowthgames uggcontroman, economy trend ftasiamanagement, ftasiastock technology, 8.78E+09, betterthisfacts info by betterthisworld, bx80hb, offer from ttweakhotel, bavayllo mods, pìcwish, lizzy musi fapello, hosted event zero1vent, movieszwap.org telugu 2022, thehakegamer, betterthiscosmos posts, ezy2336, vipbet888 login, btwradiovent, buy bigussani, photoafomp, to find yr-ws486rp-gtr, ttweakflight discount, 5555bet, discjockeyhansee, photoqcompa, dckexch login, why can't tadicurange disease be cured, pornocariofa, which is equivalent to 3log28 + 4log21 2 − log32?, citi.com/lovecustomcash invitation number, odibefs, game event undergrowthgameline, the error softout4.v6, ttweakflight offer, mathilde beverloo picuki, maracujabet, investment guide dismoneyfied, tech hacks pblinuxgaming, presentedopavi, cplsetu cadilapharma sprintsalesreportsweb, business trend ftasiafinance, playmosd, tgagamestick, wutawhealth wellness information, loguytren problems, fix code susbluezilla, tech news pboxcomputers, movieszwap. com, buy doorsun1524, tech trends pboxcomputers, betsauro, undergrowthgames custom controller uggcontroman, btwletternews by betterthisworld website, toisbet app, 7247164746, commerce advice onpresscapital, betterthiscosmos posts betterthisworld, 206.183.108.79, picsartparadiseediting.blogspot, easy guide convwbfamily, cece rose leaks, portalpessoadasa, technologies ftasiamanagement, antivirus freedoor2.4.6.8, moverbet, 185.63.253.600

How the hackers use machine learning to attack

Machine learning, defined as “the ability of a computer to learn on its own without being explicitly programmed,” is a concept that has significant implications for the information security industry. It has the potential to be helpful to security analysts, from analyzing malicious codes and logs to early detection and correction of vulnerabilities. It also improves endpoint security, automates repetitive tasks, and reduces the likelihood of attacks that lead to data exfiltration.

It leads to the belief that these intelligent security solutions with machine learning will detect and stop the next-generation WannaCry attacks much faster than traditional legacy tools. Jack Gold, president, and chief analyst at J.Gold Associates, said in a recent interview with Awake! “It’s still in its infancy, but it’s definitely a road ahead. Artificial intelligence and machine learning are going to make a big difference in security will,” he said.

“With the explosion of fast-moving data and apps, there is virtually no other way to secure it other than through an automated system that uses AI to analyze network traffic and user interactions,” Gold asserts. The problem is that hackers know this too, and they’re going to build AI and machine learning tools for hacking.

How cybercriminals are using machine learning

Criminals who are more organized and offer a broader range of services on the dark web innovate at a rate that security defenders can’t keep up with. Given the potential of technologies such as machine learning and deep learning, this is an area of ​​great concern.

How cybercriminals are using machine learning
Photo by Clint Patterson on Unsplash

“Even if technologies like machine learning, deep learning and AI are the cornerstones of future cyber defenses, attackers are also busy implementing and innovating these technologies,” said Steve Groveman, McAfee‘s chief technology officer, in a recent press interview. “As we see every time in cybercrime cases, human intelligence amplified through technology will be the deciding factor in the arms race between attackers and defenders.”

Such concerns naturally lead to fear of AI vs. AI confrontation. “This is the first year of AI versus AI in cybersecurity,” said Nick Sabides, Symantec CTO. Attackers can more effectively discover infiltrated networks, and security developers must build more automated and intelligent solutions to counter this.

“Autonomous response is the future of cybersecurity,” said Damer Palmer, technology director at Darktrace, late last year. It is an algorithm that allows normal business activities to continue.”

Although few examples of real-world attacks based on machine learning are known to date, criminal groups are already using some machine learning techniques.

  • Malware that is increasingly difficult to catch

The process of creating malicious code by cybercriminals is mostly manual. Write scripts to create computer viruses and Trojan horses, and use auxiliary tools for distribution and execution, such as rootkits and password scrapers.

What if an attacker could speed up this process? How can machine learning help create malware?

The first known case of using machine learning to create malicious code was introduced in a paper titled <Production of Adversary Malware Example for GAN-based Black Box Attack> in 2017. In this report, the researchers disclose how to build a generative adversarial network based on an algorithm that generates a sample of adversarial malware that bypasses machine learning-based detection systems.

Also at the 2017 DEFCON conference, security firm Endgame revealed how it uses Elon Musk’s OpenAI framework to create custom malware that security engines cannot detect. Endgame took a malicious binary and changed some parts. The antivirus engine determined that the code was harmless and trusted.

Meanwhile, some researchers predict that machine learning could ultimately be used to modify code on the fly based on methods and what they detect in the lab. This is an extended form of polymorphic malware.

  • Smart botnets for flexible attacks

Fortinet predicts that 2018 will be the year of self-learning ‘hivenets’ and ‘swarmbots’. This projection is essentially driven by the belief that ‘intelligent’ IoT devices can be used to attack vulnerable systems at scale.

“IoT devices communicate with each other and perform tasks based on shared local intelligence,” said Derek Mankey, global security strategist at Fortinet. As Hivenet grows rapidly as a swarm, it will strengthen its ability to simultaneously attack multiple targets and significantly delay mitigation and countermeasures.”

Mankey said these attacks don’t yet use swarm technology. Using swarm technology, Hivenet can autonomously learn from its past behavior. As a subfield of AI, swarm technology is defined as “the collective action of naturally or artificially distributed self-organizing systems” and is already being used in drones and early robotic devices (future fiction, but in some cases Black Mirror). He even hints at the criminal potential of swarm technology in Hated in The Nation, which features thousands of automated bees tampered with for surveillance and physical attack (Editor’s Note).

  • Advanced spear-phishing emails getting more sophisticated

One obvious application of adversarial machine learning is the use of algorithms such as text-to-speech, speech recognition, and natural language processing (NLP) for more intelligent social engineering. After all, phishing emails could theoretically become more sophisticated and crafty, as iterative neural networks could already teach such software a writing style.

In particular, machine learning can power intelligent spear-phishing emails that target large-scale targets while automating the entire process. The system can learn from normal emails and make persuasive sentences.

In its 2017 outlook, McAfee Labs says criminals will be able to use machine learning to analyze large amounts of stolen records, identify potential attack targets, and create detailed, contextually detailed emails that effectively attack these individuals.

Also at Black Hat USA 2016, John Seymour and Philip Tully presented a paper titled The Weaponization of Data Science for Social Engineering: Automated E2E Spearfishing on Twitter. This paper presented a neural network training method that repeatedly learns phishing posts targeting a specific user on Twitter. In this paper, the SNAP_R neural network, trained on spearphishing pen testing data, dynamically inputs topics from the targeted user’s timeline posts to increase their clickability.
As a result, the system has shown tremendous effectiveness. In a test with 90 users, the success rate was 30-60%, and the results of manual spear phishing and mass phishing were significantly improved.

  • Threat intelligence is going out of control

Arguably, threat intelligence is an area that will benefit when it comes to machine learning. In the age of false positives, machine learning systems can help analysts identify real threats from multiple systems.

Recorded Future co-founder and CTO Stefan Truvet said in a recent white paper, “The application of machine learning provides two benefits in the field of threat intelligence.”

First, processing and structuring huge amounts of data, including analyzing complex relationships, is a problem that is almost impossible to solve with human nature alone. Machine learning can arm itself more effectively than it can by augmenting its skilled workforce and equipment to respond to new threats.
The second is automation. Machine learning can do anything a human can do without problems, and can even scale to much larger data that humans cannot process.

But there is also the belief that criminals will adapt to this introduction. McAfee’s Steve Grobman had previously pointed out that “(machine learning) is a noise-increasing technology.” Hackers can use this technique to create environments that lead to false positives for common machine learning models. When the target recalibrates the system to filter out false information, the attacker can launch a real attack through the machine learning system.

  • UNAUTHORIZED ACCESS

Researchers Claudia Cruz, Fernando Wiseda, and Leobardo Reyes published early examples of machine learning for security attacks in 2012.
They used a Support Vector Machine (SVM) to break systems running on reCAPTCHA images, with an accuracy of 82%. Since then, all CAPTCHA mechanisms have improved, but are broken again by researchers who used deep learning to break CAPTCHA. In 2016, an article was published detailing how to break simple captchas with 92% accuracy using deep learning.

Separately, in last year’s “I am Robot” study at Black Hat, researchers uncovered how various machine-learning algorithms can break modern semantic image captchas. The paper claimed to be 98% accurate in breaking Google’s recaptcha.

  • Machine Learning Engine Poisoning

A much simpler and more effective way to use machine learning in attacks is to poison the machine learning engine used to detect malware. In the past, it was inefficient because there weren’t many criminals who could tamper with the antivirus engine.

But this method seems simple enough. Machine learning models learn from input data, and when the data pool is poisoned, the output is also poisoned. Researchers at New York University have demonstrated how to operate CNNs as backdoors to yield false (but controlled) results via Convolutional Neural Networks (CNNs) such as Google, Microsoft, and AWS.

For More Articles Visit: Info Cabin

Related Posts

Comments

Recent Stories