Artificial intelligence-powered malware is coming

Artificial intelligence-powered malware is coming, and it’s going to be terrifying

Artificial intelligence-powered malware is coming, and it’s going to be terrifying

Imagine you've got a meeting with a client, and shortly before you leave, they send you over a confirmation and a map with directions to where you're planning to meet.

It all looks normal — but the entire message was actually written by a piece of smart malware mimicking the client's email mannerisms, with a virus attached to the map.

It sounds pretty far out — and it is, for now. But that's the direction that Dave Palmer, director of technology at cybersecurity firm Darktrace, thinks the arms race between hackers and security firms is heading.

As artificial intelligence becomes more and more sophisticated, Palmer told Business Insider in an interview at the FT Cybersecurity Summit in London in September, it will inevitably find its way into malware — with potentially disastrous results for the businesses and individuals that hackers target.

It's important to remember that Palmer is in the security business: It's his job to hype up the threats out there (present and future), and convince customers that Darktrace is the only one that can save them. It's a $500 million (£401 million) British firm, with an AI-driven approach to defend networks. It creates an "immune system" for customers that learns how businesses operate then monitors for potential irregularities.

Read Also:
Can AI Predict Legal Outcomes?

But with that in mind, Palmer provides an fascinating insight into how one of the buzziest young companies in the industry thinks cybersecurity is going to evolve.

Ransomware is endemic right now. It's a type of malware that encrypts everything on the victim's computer or network, then demands a bitcoin ransom to decrypt it. If they don't pay up in a set timeframe, the data is lost for good.

AI-infused Ransomware could turbo-charge the risks these attacks make — self-organising to inflict maximum damage, and going after new, even more lucrative targets.

"[We'll] see coordinated action. So imagine ransomware waiting until it's spread across a number of areas of the network before it suddenly takes action," Palmer said.

"I'm convinced we'll see the extortion of assets as well as data. So factory equipment, MRI scanners in hospitals, retail equipment — stuff that you'd pay to have back online because you can't actually function as a business without it. Data's one thing and you can back that up, but if your machine stops working then you're not going to be making any more money."

Read Also:
Teva, IBM to tackle new drugs, chronic diseases with AI

Using recurring neural networks, it's already possible to teach AI software to mimic writing styles — whether that's clickbait viral news articles or editorial columns from The Guardian. Palmer suggests that in the future, malware will be able to look through your correspondence, learn how you communicate, and then mimic you in order to infect other targets.

 



Data Science Congress 2017

5
Jun
2017
Data Science Congress 2017

20% off with code 7wdata_DSC2017

Read Also:
Expanding the Data Stream with GIS

AI Paris

6
Jun
2017
AI Paris

20% off with code AIP17-7WDATA-20

Read Also:
How Pharma Data Needs To Be Gathered From Outside Healthcare

Chief Data Officer Summit San Francisco

7
Jun
2017
Chief Data Officer Summit San Francisco

$200 off with code DATA200

Read Also:
Seven ways predictive analytics can improve healthcare

Customer Analytics Innovation Summit Chicago

7
Jun
2017
Customer Analytics Innovation Summit Chicago

$200 off with code DATA200

Read Also:
Executives still mistrust insights from data and analytics
Read Also:
Operationalizing security data science for the cloud: Challenges, solutions, and trade-offs

HR & Workforce Analytics Innovation Summit 2017 London

12
Jun
2017
HR & Workforce Analytics Innovation Summit 2017 London

$200 off with code DATA200

Read Also:
Can AI Predict Legal Outcomes?

Leave a Reply

Your email address will not be published. Required fields are marked *