{"id":21648,"date":"2022-12-07T14:19:45","date_gmt":"2022-12-07T14:19:45","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/"},"modified":"2022-12-07T14:19:45","modified_gmt":"2022-12-07T14:19:45","slug":"researchers-weaponize-machine-learning-models-with-ransomware","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/","title":{"rendered":"Researchers Weaponize Machine Learning Models With Ransomware"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>As if defenders of software supply chains didn\u2019t have enough attack vectors to worry about, they now have a new one: machine learning models.<\/p>\n<p>ML models are at the heart of technologies such as facial recognition and chatbots. Like open-source software repositories, the models are often downloaded and shared by developers and data scientists, so a compromised model could have a crushing impact on many organizations simultaneously.<\/p>\n<p>Researchers at HiddenLayer, a machine language security company, revealed in a <a href=\"https:\/\/hiddenlayer.com\/research\/ai-a-new-potential-launchpad-for-ransomware\" target=\"_blank\" rel=\"noopener\">blog<\/a> on Tuesday how an attacker could use a popular ML model to deploy ransomware.<\/p>\n<p>The method described by the researchers is similar to how hackers use steganography to hide malicious payloads in images. In the case of the ML model, the malicious code is hidden in the model\u2019s data.<\/p>\n<p>According to the researchers, the steganography process is fairly generic and can be applied to most ML libraries. They added that the process need not be limited to embedding malicious code in the model and could also be used to exfiltrate data from an organization.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-177490\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.technewsworld.com\/wp-content\/uploads\/sites\/3\/2022\/12\/ML-Model-Hijacking.jpg\" alt=\"Machine learning model hijacking\" width=\"1000\" height=\"370\" data-srcset=\"https:\/\/www.technewsworld.com\/wp-content\/uploads\/sites\/3\/2022\/12\/ML-Model-Hijacking.jpg 1000w, https:\/\/www.technewsworld.com\/wp-content\/uploads\/sites\/3\/2022\/12\/ML-Model-Hijacking-300x111.jpg 300w, https:\/\/www.technewsworld.com\/wp-content\/uploads\/sites\/3\/2022\/12\/ML-Model-Hijacking-768x284.jpg 768w\" data-sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"\/><\/p>\n<p style=\"color: #222; font-weight: 600; font-size: 13px; line-height: 18px;\">Image courtesy of HiddenLayer<\/p>\n<hr\/>\n<p>Attacks can be operating system agnostic, too. The researchers explained that the OS and architecture-specific payloads could be embedded in the model, where they can be loaded dynamically at runtime, depending on the platform.<\/p>\n<h3>Flying Under Radar<\/h3>\n<p>Embedding malware in an ML model offers some benefits to an adversary, observed Tom Bonner, senior director of adversarial threat research at the Austin, Texas-based HiddenLayer.<\/p>\n<p>\u201cIt allows them to fly under the radar,\u201d Bonner told TechNewsWorld. \u201cIt\u2019s not a technique that\u2019s detected by current antivirus or EDR software.\u201d<\/p>\n<p>\u201cIt also opens new targets for them,\u201d he said. \u201cIt\u2019s a direct route into data scientist systems. It\u2019s possible to subvert a machine learning model hosted on a public repository. Data scientists will pull it down and load it up, then become compromised.\u201d<\/p>\n<p>\u201cThese models are also downloaded to various machine-learning ops platforms, which can be pretty scary because they can have access to Amazon S3 buckets and steal training data,\u201d he continued.<\/p>\n<p>\u201cMost of [the] machines running machine-learning models have big, fat GPUs in them, so bitcoin miners could be very effective on those systems, as well,\u201d he added.<\/p>\n<p><iframe loading=\"lazy\" title=\"Ransomware Hidden in &amp; Executed from a Machine Learning Model\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/nq9V8mZvRSg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p style=\"color: #222; font-weight: 600; font-size: 13px; line-height: 18px;\">HiddenLayer demonstrates how its hijacked pre-trained ResNet model executed a ransomware sample the moment it was loaded into memory by PyTorch on its test machine.<\/p>\n<hr\/>\n<h3>First Mover Advantage<\/h3>\n<p>Threat actors often like to exploit unanticipated vulnerabilities in new technologies, noted Chris Clements, vice president of solutions architecture at <a title=\"\" class=\"aalmanual\" target=\"_blank\" href=\"https:\/\/www.cerberussentinel.com\/\" rel=\"noopener\">Cerberus Sentinel<\/a>, a cybersecurity consulting and penetration testing company in Scottsdale, Ariz.<\/p>\n<p>\u201cAttackers looking for a first mover advantage in these frontiers can enjoy both less preparedness and proactive protection from exploiting new technologies, Clements told TechNewsWorld.<\/p>\n<p>\u201cThis attack on machine-language models seems like it may be the next step in the cat-and-mouse game between attackers and defenders,\u201d he said.<\/p>\n<p>Mike Parkin, senior technical engineer at <a title=\"\" class=\"aalmanual\" target=\"_blank\" href=\"https:\/\/vulcan.io\/\" rel=\"noopener\">Vulcan Cyber<\/a>, a provider of SaaS for enterprise cyber risk remediation in Tel Aviv, Israel, pointed out that threat actors will leverage whatever vectors they can to execute their attacks.<\/p>\n<p>\u201cThis is an unusual vector that could sneak past quite a few common tools if done carefully,\u201d Parkin told TechNewsWorld.<\/p>\n<p><center><\/p>\n<p>                    <!--ps: 55 crid: 10799:a-nice_q422_970-1s cc: s_c:10810,10799,10742,10726 px:0--><\/p>\n<div class=\"cls-1670422784\">\n<div class=\"wa-ad-display-wrap wa-ads-55\" style=\"display: inline-block;\" data-adposition=\"55\" data-adname=\"TNW-STORY-1\">\n<p>ADVERTISEMENT<\/p>\n<p><a href=\"\" onclick=\"ENN_ad_wo(10799,'16704227843359','274823c841'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2022\/11\/nice-cxone-q422-970x250-1.jpg\" width=\"970\" height=\"250\" border=\"0\" alt=\"Enhance your omnichannel service strategies with data-driven insights.\"\/><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 55 crid: 10799:a-nice_q422_970-1s cc: --><\/center><\/p>\n<p>Traditional anti-malware and endpoint detection and response solutions are designed to detect ransomware based on pattern-based behaviors, including virus signatures and monitoring key API, file, and registry requests on Windows for potential malicious activity, explained Morey Haber, chief security officer at <a title=\"\" class=\"aalmanual\" target=\"_blank\" href=\"https:\/\/www.beyondtrust.com\/\" rel=\"noopener\">BeyondTrust<\/a>, a maker of privileged account management and vulnerability management solutions in Carlsbad, Calif.<\/p>\n<p>\u201cIf machine learning is applied to the delivery of malware like ransomware, then the traditional attack vectors and even detection methods can be altered to appear non-malicious,\u201d Haber told TechNewsWorld.<\/p>\n<h3>Potential for Widespread Damage<\/h3>\n<p>Attacks on machine-language models are on the rise, noted Karen Crowley, director of product solutions at <a title=\"\" class=\"aalmanual\" target=\"_blank\" href=\"https:\/\/www.deepinstinct.com\/\" rel=\"noopener\">Deep Instinct<\/a>, a deep-learning cybersecurity company in New York City.<\/p>\n<p>\u201cIt isn\u2019t significant yet, but the potential for widespread damage is there,\u201d Crowley told TechNewsWorld.<\/p>\n<p>\u201cIn the supply chain, if the data is poisoned so that when the models are trained, the system is poisoned as well, that model could be making decisions that reduce security instead of strengthening it,\u201d she explained.<\/p>\n<p>\u201cIn the cases of <a href=\"https:\/\/www.technewsworld.com\/story\/deadly-log4j-hole-expands-victim-vulnerability-87373.html\" target=\"_blank\" rel=\"noopener\">Log4j<\/a> and <a href=\"https:\/\/www.technewsworld.com\/story\/lessons-learned-from-the-solarwinds-supply-chain-hack-87029.html\" target=\"_blank\" rel=\"noopener\">SolarWinds,<\/a> we saw the impact to not just the organization who owns the software, but all of its users in that chain,\u201d she said. \u201cOnce ML is introduced, that damage could multiply quickly.\u201d<\/p>\n<p>Casey Ellis, CTO and founder of <a title=\"\" class=\"aalmanual\" target=\"_blank\" href=\"https:\/\/www.bugcrowd.com\/\" rel=\"noopener\">Bugcrowd<\/a>, which operates a crowdsourced bug bounty platform, noted that attacks on ML models could be part of a larger trend of attacks on software supply chains.<\/p>\n<p>\u201cIn the same way that adversaries may attempt to compromise the supply chain of software applications to insert malicious code or vulnerabilities, they may also target the supply chain of machine learning models to insert malicious or biased data or algorithms,\u201d Ellis told TechNewsWorld.<\/p>\n<p>\u201cThis can have significant impacts on the reliability and integrity of AI systems and can be used to undermine trust in the technology,\u201d he said.<\/p>\n<h3>Pablum for Script Kiddies<\/h3>\n<p>Threat actors may be showing an increased interest in machine models because they\u2019re more vulnerable than people thought they were.<\/p>\n<p>\u201cPeople have been aware that this was possible for some time, but they didn\u2019t realize how easy it is,\u201d Bonner said. \u201cIt\u2019s quite trivial to string an attack together with a few simple scripts.\u201d<\/p>\n<p>\u201cNow that people realize how easy it is, it\u2019s in the realm of script kiddies to pull it off,\u201d he added.<\/p>\n<p><center><\/p>\n<p>                    <!--ps: 55 crid: 10799:a-nice_q422_970-1s cc: s_c:10810,10799,10742,10726 px:0--><\/p>\n<div class=\"cls-1670422784\">\n<div class=\"wa-ad-display-wrap wa-ads-55\" style=\"display: inline-block;\" data-adposition=\"55\" data-adname=\"TNW-STORY-1\">\n<p>ADVERTISEMENT<\/p>\n<p><a href=\"\" onclick=\"ENN_ad_wo(10799,'16704227848895','274823c841'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2022\/11\/nice-cxone-q422-970x250-1.jpg\" width=\"970\" height=\"250\" border=\"0\" alt=\"Enhance your omnichannel service strategies with data-driven insights.\"\/><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 55 crid: 10799:a-nice_q422_970-1s cc: --><\/center><\/p>\n<p>Clements agreed that the researchers have shown that it doesn\u2019t require hardcore ML\/AI data science expertise to insert malicious commands into training data that can be then triggered by ML models at runtime.<\/p>\n<p>However, he continued, it does require more sophistication than run-of-the-mill ransomware attacks that mainly rely on simple credential stuffing or phishing to launch.<\/p>\n<p>\u201cRight now, I think the specific attack vector\u2019s popularity is likely to be low for the foreseeable future,\u201d he said.<\/p>\n<p>\u201cExploiting this requires an attacker compromising an upstream ML model project used by downstream developers, tricking the victim into downloading a pre-trained ML model with the malicious commands embedded from an unofficial source, or compromising the private dataset used by ML developers to insert the exploits,\u201d he explained.<\/p>\n<p>\u201cIn each of these scenarios,\u201d he continued, \u201cit seems like there would be much easier and straightforward ways to compromise the target aside from inserting obfuscated exploits into training data.\u201d<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.technewsworld.com\/story\/researchers-weaponize-machine-learning-models-with-ransomware-177489.html?rss=1\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As if defenders of software supply chains didn\u2019t have enough attack vectors to worry about, they now have a new one: machine learning models. ML&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21649,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-21648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-07T14:19:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Researchers Weaponize Machine Learning Models With Ransomware\",\"datePublished\":\"2022-12-07T14:19:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/\"},\"wordCount\":1107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/hacked-computer-hardware.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/\",\"name\":\"Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/hacked-computer-hardware.jpg\",\"datePublished\":\"2022-12-07T14:19:45+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/hacked-computer-hardware.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/hacked-computer-hardware.jpg\",\"width\":1000,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/07\\\/researchers-weaponize-machine-learning-models-with-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers Weaponize Machine Learning Models With Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-12-07T14:19:45+00:00","og_image":[{"width":1000,"height":520,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Researchers Weaponize Machine Learning Models With Ransomware","datePublished":"2022-12-07T14:19:45+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/"},"wordCount":1107,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/","name":"Researchers Weaponize Machine Learning Models With Ransomware - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg","datePublished":"2022-12-07T14:19:45+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/hacked-computer-hardware.jpg","width":1000,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/07\/researchers-weaponize-machine-learning-models-with-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Researchers Weaponize Machine Learning Models With Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/21648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=21648"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/21648\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/21649"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=21648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=21648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=21648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}