Article Details
Scrape Timestamp (UTC): 2024-12-23 13:52:39.866
Source: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
Original Article Text
Click to Toggle View
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case. Cybersecurity researchers have found that it's possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection. "Although LLMs struggle to create malware from scratch, criminals can easily use them to rewrite or obfuscate existing malware, making it harder to detect," Palo Alto Networks Unit 42 researchers said in a new analysis. "Criminals can prompt LLMs to perform transformations that are much more natural-looking, which makes detecting this malware more challenging." With enough transformations over time, the approach could have the advantage of degrading the performance of malware classification systems, tricking them into believing that a piece of nefarious code is actually benign. While LLM providers have increasingly enforced security guardrails to prevent them from going off the rails and producing unintended output, bad actors have advertised tools like WormGPT as a way to automate the process of crafting convincing phishing emails that are tailed to prospective targets and even create novel malware. Back in October 2024, OpenAI disclosed it blocked over 20 operations and deceptive networks that attempt to use its platform for reconnaissance, vulnerability research, scripting support, and debugging. Unit 42 said it harnessed the power of LLMs to iteratively rewrite existing malware samples with an aim to sidestep detection by machine learning (ML) models like Innocent Until Proven Guilty (IUPG) or PhishingJS, effectively paving the way for the creation of 10,000 novel JavaScript variants without altering the functionality. The adversarial machine learning technique is designed to transform the malware using various methods -- namely, variable renaming, string splitting, junk code insertion, removal of unnecessary whitespaces, and a complete reimplementation of the code -- every time it's fed into the system as input. "The final output is a new variant of the malicious JavaScript that maintains the same behavior of the original script, while almost always having a much lower malicious score," the company said, adding the greedy algorithm flipped its own malware classifier model's verdict from malicious to benign 88% of the time. To make matters worse, such rewritten JavaScript artifacts also evade detection by other malware analyzers when uploaded to the VirusTotal platform. Another crucial advantage that LLM-based obfuscation offers is that its lot of rewrites look a lot more natural than those achieved by libraries like obfuscator.io, the latter of which are easier to reliably detect and fingerprint owing to the manner they introduce changes to the source code. "The scale of new malicious code variants could increase with the help of generative AI," Unit 42 said. "However, we can use the same tactics to rewrite malicious code to help generate training data that can improve the robustness of ML models." The disclosure comes as a group of academics from North Carolina State University devised a side-channel attack dubbed TPUXtract to conduct model stealing attacks on Google Edge Tensor Processing Units (TPUs) with 99.91% accuracy. This could then be exploited to facilitate intellectual property theft or follow-on cyber attacks. "Specifically, we show a hyperparameter stealing attack that can extract all layer configurations including the layer type, number of nodes, kernel/filter sizes, number of filters, strides, padding, and activation function," the researchers said. "Most notably, our attack is the first comprehensive attack that can extract previously unseen models." The black box attack, at its core, captures electromagnetic signals emanated by the TPU when neural network inferences are underway – a consequence of the computational intensity associated with running offline ML models – and exploits them to infer model hyperparameters. However, it hinges on the adversary having physical access to a target device, not to mention possessing expensive equipment to probe and obtain the traces. "Because we stole the architecture and layer details, we were able to recreate the high-level features of the AI," Aydin Aysu, one of the authors of the study, said. "We then used that information to recreate the functional AI model, or a very close surrogate of that model."
Daily Brief Summary
Large language models (LLMs) are now being utilized to generate thousands of new JavaScript malware variants that can evade modern detection methods.
Researchers from Palo Alto Networks’ Unit 42 discovered the ability of LLMs to significantly alter malware without changing its functionality, deceiving machine learning (ML) based security systems.
The novel JavaScript variants generated display a substantial reduction in detected malicious intent, tricking models such as Innocent Until Proven Guilty (IUPG) or PhishingJS up to 88% of the time.
This technique employs multiple obfuscation strategies like variable renaming, junk insertion, and whole code reimplementation.
Rewritten codes by LLMs appear more natural and are tougher to detect compared to those altered by traditional obfuscators like obfuscator.io.
The adversaries are leveraging LLMs not only for JavaScript rewriting but also for crafting sophisticated phishing emails and potentially even more advanced cyber threats.
Amid rising AI misuse, LLM providers like OpenAI have started to implement security measures to counteract unauthorized manipulation of their technologies.
Efficiency of AI-driven obfuscation highlights the need for equally advanced detection capabilities and the potential use of similar AI innovations for defensive cybersecurity mechanisms.