Thursday, December 19, 2024
HomeAnti VirusEvilModel - New Method to Secretly Deliver Malware Via Neural Networks To...

EvilModel – New Method to Secretly Deliver Malware Via Neural Networks To Evading Antivirus Engines

Published on

SIEM as a Service

Recently, three well-known security analysts, Zhi Wang, Chaoge Liu, and Xiang Cui have published a research report known as EvilModel, a model through which attacker will send a malware covertly and evade the detection.

In this security report, these three cybersecurity researchers have demonstrated a new method for hiding malware into AI models and evading the automated detection of security tools or Antivirus engines.

The researchers claimed that in order to bypass detection, the threat actors are hiding messages and accounts from malicious programs in authorized services like Twitter, GitHub, and even blockchain.

- Advertisement - SIEM as a Service

However, the team of researchers composed of Zhi Wang, Chaoge Liu, and Xiang Cui, has distinguished a technique that enables circumventing these problems.

According to the report, the researchers have chosen the container that is a neural network model. Apart from this, they have clearly explained, the solution that enables both to “disassemble” the malware code by making it improbable to recognize and another one is to minimize the probable signs of infection.

In this research, malware has been successfully delivered covertly and evade antivirus detection through neural network models.

Unlike another way through which attackers using steganography to hide the malware, hides malware inside a neural network model is more effective when embedding large-sized malware.

Basically, a neural network model usually consists of an input layer, one or more hidden layer(s), and an output layer as follows.

Researchers have been embedded malware into the neurons and delivered it to the victim’s device neural network without impacting the neural network performance.

Since the Neural network performance remains unchanged, Antivirus engines are unable to detect the malware.

This case has experimented and determined that 36.9MB of malware can be embedded into a 178MB-AlexNet model within 1% accuracy loss, as a result, there was no detection found in the Antivirus engines listed in the Virustotal.

According to the research paper, Researchers explained the referenceable scenario for the defense on neural network-assisted attacks.

Countermeasures

The analysts asserted that the malware that has been utilized by the threat actors is the malware-embedded models that are specifically are used in end devices. 

And that’s why they have suggested that whenever the application gets launch in the model, users must apply the verifications on the models as soon as possible.

However, the malware can be detected and analyzed that is being compiled and implemented in the targeted device, with the help of traditional methods like dynamic analysis, heuristic ways, static, etc.

Apart from this, the experts also affirmed that there are possibilities where the threat actors can launch initiatives such as supply chain pollution, well in this case the original providers of the models must take some security measures to bypass this kind of attack.

Conclusion

The method that has been pronounced by the researchers, does not need to rely on other system vulnerabilities. However, the models that are carrying malicious programs can be addressed with the help of model updates that are present in the supply chain.

Apart from this, the characteristics of the malware are no longer available, and therefore it can evade detection by applying some common antivirus engines. 

While in the case of neural network models, they are quite strong enough to change, and that’s why there will be no apparent losses on the performances.

However, neural networks have become quite popular, and the researchers consider that this method will convert more and more popular in the near future.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify...

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the...

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email...

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes

BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify...

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the...

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email...