Skip to main content
 



  

8th August, 2018  By Nicky Cappella The Stack

 

Summary - While DeepLocker has yet to be seen outside of the research lab, all of the tools used to create it are readily available: existing malware, and AI tools that can be trained to recognize a target.

 

DeepLocker malware can remain undetected for lengthy periods, inactive until presented with an AI trigger – through facial or voice recognition, or geolocation – that indicates a specifically targeted individual. When the trigger is recognized, it acts as a key, activating the dormant malware on the system.

 

Article Link - Read more

 Glossary Blog Back to the Malware Manifesto
Be the first to reply!

Reply