
DeepLocker — when AI hides the trigger inside malware (demo from IBM Research)
Researchers demonstrated a class of AI-embedded targeted malware: the attack packs the targeting logic inside a neural network that generates a secret key only when very specific attributes are observed (face, voice, geolocation, sensor fingerprint, network shape, etc.). The payload stays encrypted and dormant until the DNN outputs the right key meaning millions of benign installs can contain a weapon that only activates for a handful of high-value targets. Why it matters: this flips classic detection assumptions. Instead of an obvious “if X then do Y” trigger, the decision boundary is encoded in a model that is hard to interpret or reverse-engineer. That makes targeted attacks ultra-stealthy (low false positives), scalable, and resilient to static analysis and conventional sandboxing. Key technical takeaways • Concealment via model: target logic + key generation live inside DNN weights; inspectors can’t easily read the “who” or “what.” • Deterministic key gen: a secondary model maps n
Continue reading on Dev.to
Opens in a new tab



