Your face could trigger a DeepLocker AI-powered malware attack or be used by Social Mapper to track you across social media sites. Credit: Thinkstock Meet Social Mapper, a facial recognition tool that searches for targets across numerous social networks, and the highly evasive and highly targeted AI-powered malware DeepLocker.Open-source Social Mapper face recognition tool The open-source intelligence-gathering tool Social Mapper uses facial recognition to automatically search for targets across eight social media sites: Facebook, Twitter, LinkedIn, Instagram, Google+, the Russian social networking service VKontakte, and the Chinese social networking sites Weibo and Douban.Social Mapper was developed by Trustwave’s Jacob Wilkins to help pen testers and red teamers with social engineering attacks. Instead of manually searching social media sites for name and pictures, Social Mapper makes it possible to automate such scans “on a mass scale with hundreds or thousands of individuals.”There are three stages to Social Mapper; the second stage is automatically searching social media sites for the targets online. Wilkins suggested letting that search run overnight as for “target lists of 1,000 people, it can take more than 15 hours and use a large amount of bandwidth.” After searching, it spits out a report such as a spreadsheet with links to targets’ profile pages or an HTML report that also includes photos.From there, your attacks are limited “only by your imagination,” but Wilkins suggested several, such as creating fake social media profiles to “Friend” targets or tricking targets into disclosing phone numbers and email addresses with vouchers in order to “pivot into phishing, vishing or smishing.” You can get Social Mapper on GitHub.AI-powered DeepLocker malware attacksIf everyday malware is not considered evasive enough, then think about weaponized artificial intelligence (AI) and then meet the new attack tool DeepLocker, which is powered by AI for “highly targeted and evasive attacks.”AI is being used to automatically detect and fight malware, but IBM Research decided to flip that and came up with a game changer – a “highly evasive new breed of malware, which conceals its malicious intent until it reached a specific victim.” The researchers explained that DeepLocker “unleashes its malicious action as soon as the AI model identifies the target through indicators like facial recognition, geolocation and voice recognition.”You can think of this capability as similar to a sniper attack, in contrast to the “spray and pray” approach of traditional malware. DeepLocker is designed to be stealthy. It flies under the radar, avoiding detection until the precise moment it recognizes a specific target. This AI-powered malware is particularly dangerous because, like nation-state malware, it could infect millions of systems without being detected. But, unlike nation-state malware, it is feasible in the civilian and commercial realms.To show off DeepLocker’s capabilities, the researchers camouflaged WannaCry ransomware in a video conferencing app. Going undetected by security tools, DeepLocker did not unlock and execute the ransomware until it recognized the face of the target.They added:Imagine that this video conferencing application is distributed and downloaded by millions of people, which is a plausible scenario nowadays on many public platforms. When launched, the app would surreptitiously feed camera snapshots into the embedded AI model, but otherwise behave normally for all users except the intended target. When the victim sits in front of the computer and uses the application, the camera would feed their face to the app, and the malicious payload will be secretly executed, thanks to the victim’s face, which was the preprogrammed key to unlock it.The researchers said we need to prepare for AI-powered attacks and they intend to give a live demonstration of a proof-of-concept implementation at Black Hat USA. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe