Tuesday, November 5, 2024

HYAS Unveils EyeSpy Proof of Concept for New Type of Polymorphic, Intelligent and Fully Autonomous Malware

Related stories

Absci and Twist Bioscience Collaborate to Design Novel Antibody using Generative AI

Absci Corporation a data-first generative AI drug creation company, and...

GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI

GreyNoise Intelligence, the cybersecurity company providing real-time, verifiable threat...

Medidata Launches Bundled Solutions to Support Oncology and Vaccine Trials

Medidata, a Dassault Systèmes brand and leading provider of...

Blend Appoints Mike Mischel as SVP of AI Consulting

Blend, a leader in data science and AI-powered solutions,...

Patronus AI Launches Industry-First Self-Serve API for AI Evaluation and Guardrails

Patronus AI announced the launch of the Patronus API, the first...
spot_imgspot_img

HYAS Infosec, whose adversary infrastructure platform provides unparalleled visibility, protection and security against all kinds of malware and attacks, announced its EyeSpy proof-of-concept (PoC), an entirely new type of polymorphic, fully autonomous malware. The malware uses artificial intelligence to make informed decisions and synthesize its capabilities as needed to conduct cyberattacks and continuously morph to avoid detection.

The development of EyeSpy is part of HYAS Infosec’s ongoing research and will ensure that the company’s protection platform extends to the future of malware as well. As part of its continuing research, HYAS pioneered AI-synthesized, polymorphic malware with its recent BlackMamba PoC.

HYAS CEO David Ratner said: “We spend a lot of time modeling and theorizing what sort of attacks might hit us, and in response, what sort of defenses we need to build against them, because it’s imperative that our defensive technologies evolve to keep up with how AI will affect security.”

Using the current early versions of generative AI, EyeSpy is capable of:

  1. Selecting its intended victim independently or through a threat actor’s specification
  2. Assessing the target environment, platform, applications and environmental footprint
  3. Identifying optimal vectors to extract information
  4. Writing malware on the fly – for example, if a target is on a specific video conference app, it will compose, test & validate the malware for that app
  5. Executing the attack
  6. Analyzing the QA result
  7. Self-repair and continued attack iteration until it has achieved the attacker’s goals

Also Read: Hubble Announces Aurora, the Category Defining Cybersecurity Asset Intelligence Platform

Ratner said: “What if threat actors used AI tools to create malware that could reason and act on its own, while continuously refining its code in response to its targeted environment and evading detection? We could assume threat actors were likely already doing this. To sustain and advance our adversarial detection, we had to move, and quickly.”

EyeSpy catapults HYAS even further into a future where such intelligent, autonomous entities will be part of the cyber warfare landscape. EyeSpy represents a significant milestone in the potential evolution of adversary capabilities. Observers note that EyeSpy malware isn’t merely a program – it is an adaptive entity with evolving strategies, making its class of malware an ever-present, dynamic threat that evades detection.

“As experts in adversary threat infrastructure, we recognize that the next generation of attack infrastructure is going to be fully AI-synthesized, polymorphic attack frameworks,” explains David Mitchell, Chief Technology Officer, HYAS. “At this moment EyeSpy can enable cybersecurity professionals to train the way they’ll have to fight and to engineer security stack solutions that can defend against and mitigate even the worst emerging threats – before their destructive power can be brought to bear. Those two goals have driven our development of this technology so we can begin to defend against it.”

“Analysts have speculated that smart malware is on the horizon. Well, the future is now. The nightmare scenario where malware can autonomously respond to its environment is reality,” stated cybersecurity researcher Charles Kolodgy, Principal at Security Mindsets, formerly a senior expert with IDC and the NSA. “Cyber criminals will use similar technology to vastly expand the threat landscape. It is essential that the industry as a whole prepare to combat this level of fully autonomous, AI-synthesized polymorphic attack frameworks. By moving away from theory to the practical, HYAS has taken the first step in the development of defensive tools that can counter AI-enabled cyber attacks and tactics by creating a proof of concept to show us exactly what we are going to be up against.” Mr. Kolodgy offered his remarks following a demonstration of EyeSpy’s capabilities.

HYAS Labs threat research is accelerating work on technology capable of remediating this emerging class of AI-synthesized, polymorphic malware both to ensure its award-winning HYAS Protect, HYAS Confront, and HYAS Insight solutions provide the superb protection that the market urgently needs, and also to advance the sector’s understanding of and response to new generations of threats.

“This is the nightmare situation that we knew was coming, and now it’s here,” confirms Todd Graham, Managing Partner, M12. “There is no doubt this is the next threat landscape and the new theater of war. HYAS is developing the type of technology we will need to defend against the next generation of cyber attacks and warfare, and it is essential that the industry as a whole prepare to combat this level of fully autonomous, AI-synthesized, polymorphic attack frameworks.”

SOURCE: BusinessWire

Subscribe

- Never miss a story with notifications


    Latest stories

    spot_img