Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.
 
Machine-learning code predicts whether connections are legit or likely to result in a bad day for someone. The majority of cyber-crime has always been financially motivated, and banking Trojans or botnets have been some of the primary drivers of botnet traffic and malicious activities. 
 
For example, The GameOver ZeuS (GOZ) group, was a crime ring that focused on corporate banking account takeovers, with an estimated 100 million dollars of losses attributed to the group. 
 
The steps below describe in greater detail how APT-based banking Trojan typically works: 
 
1. Reconnaissance and Weaponisation: Gathering information and preparation of an attack. Using Carbanak APT [22] as an example, Cyber-criminals registered new spoofing domains to impersonate a legitimate software or tech company in later spear phishing emails claiming required software update. 
2. Delivery: Common methods of malicious payload delivery by banking Trojans are email attachments, social engineering and drive by download through spear phishing campaigns targeting employees within the victim organisations. 
3. Exploitation and Installation: If an employee within the targeted organizations opened the attachments or visited the malicious websites in above spear phishing emails, the vulnerability is successfully exploited, and backdoor is installed on the victim’s system. 
4. Command and Control: Command-and-control (C2) infrastructure plays an essential role in coordinating botnets and malware. Attackers set up C2 servers to distribute commands or harvest sensitive data from victims’ computers, or gain access to the critical systems in the victim’s infrastructure. Many sophisticated malware families contain domain generation algorithms (DGAs) to generate pseudo-random domains in bulk to evade public blacklists. 
5. Action on Objectives: Once the attackers successfully compromised the victim’s networks, especially the critical systems such as money processing services or financial accounts, attackers can now perform fraudulent transactions or cash out. 
 
JPMorgan Chase is integrating AI into its internal security systems to thwart malware infections within its own networks.
The banls Technology and IT experts the describe how deep learning can be used to identify malicious activity, such as spyware on staff PCs attempting to connect to hackers' servers on the public internet. It can also finger URLs in received emails as suspicious. And it’s not just an academic exercise: some of these AI-based programs are already in production use within the financial giant.
 
The aim is to detect and neutralize malware that an employee may have accidentally installed on their workstation after, say, opening a booby-trapped attachment in a spear-phishing email. It can also block web-browser links that would lead the employee to a page that would attempt to install malware on their computer.
 
Neural networks can be trained to act as classifiers, and predict whether connections to the outside world are legit or fake: bogus connections may well be, for example, attempts by snoop-ware on an infected PC to reach the outside world, or a link to a drive-by-download site. These decisions are thus based on the URL or domain name used to open the connection. 
Specifically, long-short term memory networks (LSTM) used in the bank's AI software can predict if a particular URL or domain name is real or fake. The engineers trained theirs using a mixture of private and public datasets.
 
The public datasets included a list of real domains scraped from the top million websites as listed by Alexa; they also used 30 different Domain Generation Algorithms (DGA), typically used by malware, to spin up a million fake malicious domains. For the URL data, they took 300,000 benign URLs from the DMOZ Open Directory Project dataset and 267,418 phishing URLS from the Phishtank dataset. The researchers didn’t specify the proportion of data used for training, validation, and testing.
 
You might think just firewalling off and logging all network traffic from bank workers' PCs to the outside world would do the trick in catching naughty connections and thus has turned to machine-learning to improve its network monitoring while allowing ongoing connections.
 
How it Works
First, the string of characters in a particular URL or domain name to be checked are converted into vectors and fed into the LSTM as input. The model then spits out a number or probability that the URL or domain name is bogus.
 
The LSTM was able to a performance of 0.9956 (with one being the optimal result) when classifying phishing URLs and 91 per cent accuracy for DGA domains, with a 0.7 per cent false positive rate. AI is well adapted to discovering the common patterns and techniques used in malicious software, and can even be more effective than traditional URL and domain-name filters.
 
“Advanced Artificial Intelligence (AI) techniques, such as Deep learning, Graph analysis, play a more significant role in reducing the time and cost of manual feature engineering and discovering unknown patterns for Cyber security analysts,” the bank's researchers told The Register.
 
Next, they hope to experiment with other types of neural networks like convolutional neural networks and recurrent neural networks to clamp down on the spread of malware even further. 
 
The Regsister:     Arvix
 
You Might Also Read:
 
Malware Attacks Drop As Encrypted Attacks Increase:
 
Five Hi -Tech Ways To Fight Off Cyber Attackers:
 
 
 
« US National Security Agency’s Cyber Offensive
Is The Cloud Skills Gap A Problem? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.