• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

The Dark Side of Deep Learning – When Malware Attacks

Today’s cyberattacks in deep learning comes in two major forms: targeting and obfuscation.

December 11, 2018 TechDecisions Staff Leave a Comment

Proofpoint CISO, CISOs cyberattack
Gorodenkoff/stock.adobe.com

According to Factor Daily, nearly 1 billion people were affected by cyberattacks, costing around $172 billion in 2017. One of the main culprits behind these attacks was malware, “one of modern day’s biggest threats,” which becomes more ominous as it takes shape in deep learning in machines.

To show the ferocity of what future cyberattacks might look like within deep learning, Factor Daily focused on Deeplocker, an AI-powered malware that might one day become real. Deeplocker’s dangerousness to deep learning lies in its “obfuscation” and “targeting” capabilities:`

Obfuscation: can occur when malware writers go to great lengths to muddy code within deep learning systems so that the threat looks like a “harmless piece of functioning software.” While companies may invest in detection software and other antivirus methods, obfuscated code can sometimes be difficult to detect.

As a result, AI-based malware in deep learning could be “seeing the commercial emergence of virus and malware that spreads undetected across millions of computers around the world for long periods of time.”

This gets even more dangerous for companies when combined with targeting.

Targeting: when malware is programmed to wait for the right target to “unleash havoc,” according to Factor Daily. Targeting options increase the more technology advances, including visual recognition systems, voice identification solutions, and more. In the case of deep learning, a targeted attack might occur at a carefully selected time, or when a specific person utilizes a certain device, or even when a device is brought into a specific area – all pre-programmed by malware writers.

Autonomous vehicles, drones, and other technologies of the future will only increase cybercriminals’ target, too, Factor Daily says.

On the bright side:

While the risks for a cyberattack increase with the growing number of technologies and other machine learning advancements, the amount of machine learning aid goes up, too. In fact, Factor Daily says that “we have to rely on machine learning to make our defense powerful.” For example, deep learning can help systems detect what’s “normal” in a network in order to identify potential threats. Or, machine learning can harvest out a “malicious event” from a slew of security violation events seen by security analysts, ultimately making those jobs easier.

The key to keeping up with cyberattacks in deep learning is to keep checking on coding patterns, trends, and studying previous instances of obfuscation and targeting. And, “with time and more pervasive use,” end users might see a day where cyberattacks can be predicted before they strike, and cybersecurity measures might become automated and able to respond to a larger scale of threats, keeping sacred data safe.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.