{"id":27712,"date":"2023-03-10T19:20:47","date_gmt":"2023-03-10T19:20:47","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=27712"},"modified":"2023-03-10T19:20:48","modified_gmt":"2023-03-10T19:20:48","slug":"blackmamba-malware-edr-bypass","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/","title":{"rendered":"BlackMamba PoC Malware Uses AI to Avoid Detection"},"content":{"rendered":"\n<p>HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms.<\/p>\n\n\n\n<p>The malware, dubbed &#8220;BlackMamba,&#8221; is the latest example of exploits that can evade even the most sophisticated cybersecurity products. While the HYAS researchers may have been wearing white hats, Mandiant researchers this week <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/suspected-chinese-persist-sonicwall\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a> on a &#8220;suspected Chinese campaign that involves maintaining long term persistence by running malware on an unpatched SonicWall Secure Mobile Access (SMA) appliance. The malware has functionality to steal user credentials, provide shell access, and persist through firmware upgrades.&#8221;<\/p>\n\n\n\n<p>In December, SafeBreach Labs researcher Or Yair discovered <a href=\"https:\/\/www.esecurityplanet.com\/threats\/flaws-in-edr-and-av-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day vulnerabilities<\/a> in several EDR and antivirus tools, while in October, the BlackByte ransomware group was found to be actively exploiting a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-group-bypasses-edr-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">known driver vulnerability<\/a> to bypass EDR protections.<\/p>\n\n\n\n<p><em>See the top <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>EDR<\/em><\/a><em> and <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>antivirus<\/em><\/a><em> products<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leveraging OpenAI<\/h2>\n\n\n\n<p>The BlackMamba PoC will likely heighten concerns that AI tools can be used by cybercriminals to create new exploits.<\/p>\n\n\n\n<p>&#8220;BlackMamba utilizes a benign executable that reaches out to a high-reputation API (OpenAI) at runtime, so it can return synthesized, malicious code needed to steal an infected user&#8217;s keystrokes,&#8221; HYAS principal security engineer Jeff Sims wrote in a <a href=\"https:\/\/www.hyas.com\/blog\/blackmamba-using-ai-to-generate-polymorphic-malware\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> detailing the threat.<\/p>\n\n\n\n<p>&#8220;It then executes the dynamically generated code within the context of the benign program using Python&#8217;s exec() function, with the malicious polymorphic portion remaining totally in-memory,&#8221; Sims added. &#8220;Every time BlackMamba executes, it re-synthesizes its keylogging capability, making the malicious component of this malware truly polymorphic.&#8221;<\/p>\n\n\n\n<p>The keylogger collects sensitive information, including usernames, passwords and credit card numbers, then uses Microsoft Teams to exfiltrate the data, sending it to an attacker-controlled Teams channel.<\/p>\n\n\n\n<p>The researchers say they tested the malware against an industry-leading EDR solution, which they were kind not to name, and it repeatedly failed to detect the threat.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\" target=\"_blank\" rel=\"noreferrer noopener\">Latest MITRE Endpoint Security Results Show Some Familiar Names on Top<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A New Breed of Threat<\/h2>\n\n\n\n<p>&#8220;The threats posed by this new breed of malware are very real,&#8221; Sims warned. &#8220;By eliminating C2 communication and generating new, unique code at runtime, malware like BlackMamba is virtually undetectable by today&#8217;s predictive security solutions.&#8221;<\/p>\n\n\n\n<p>BlackMamba serves as a vivid proof of concept for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/chatgpt-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyberArk&#8217;s warning earlier this year<\/a> that OpenAI&#8217;s ChatGPT tool could be leveraged to create polymorphic malware that&#8217;s extremely difficult to detect.<\/p>\n\n\n\n<p>More recently, <a href=\"https:\/\/blog.checkpoint.com\/2023\/02\/07\/cybercriminals-bypass-chatgpt-restrictions-to-generate-malicious-content\/\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point researchers<\/a> warned that cybercriminals are actively bypassing ChatGPT&#8217;s content filters by creating (and selling access to) Telegram bots that leverage ChatGPT&#8217;s API, which lacks the anti-abuse measures of ChatGPT&#8217;s user interface.<\/p>\n\n\n\n<p>&#8220;As a result, it allows malicious content creation, such as phishing emails and malware code, without the limitations or barriers that ChatGPT has set on their user interface,&#8221; the Check Point researchers added.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/ai-code-security\/\">AI Coding: A Security Problem?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\">Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">How Hackers Evade Detection<\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d701b4b1ba4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d701b4b1ba4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d701b4b1ba4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d701b4b1ba4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d701b4b1ba4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d701b4b1ba4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d701b4b1ba4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed &#8220;BlackMamba,&#8221; is the latest example of exploits that can evade even the most sophisticated cybersecurity products. While [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":20918,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[31986,2247,2369,3790,28055,1146,532,3414,2478,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,397,400,382,403,378,31780,31790,31782,392],"class_list":["post-27712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ai-security","tag-antivirus-software","tag-cloud-security","tag-cybersecurity","tag-edr","tag-malware","tag-microsoft","tag-network-security","tag-ransomware","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-anti-malware","b2b_product-antivirus","b2b_product-application-security-vulnerability-management","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-endpoint-security","b2b_product-patch-management","b2b_product-ransomware","b2b_product-threat-intelligence","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-10T19:20:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T19:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"BlackMamba PoC Malware Uses AI to Avoid Detection\",\"datePublished\":\"2023-03-10T19:20:47+00:00\",\"dateModified\":\"2023-03-10T19:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\"},\"wordCount\":506,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png\",\"keywords\":[\"AI security\",\"antivirus software\",\"cloud security\",\"cybersecurity\",\"EDR\",\"malware\",\"Microsoft\",\"network security\",\"ransomware\",\"security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\",\"name\":\"BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png\",\"datePublished\":\"2023-03-10T19:20:47+00:00\",\"dateModified\":\"2023-03-10T19:20:48+00:00\",\"description\":\"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png\",\"width\":900,\"height\":506,\"caption\":\"ai security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackMamba PoC Malware Uses AI to Avoid Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet","description":"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/","og_locale":"en_US","og_type":"article","og_title":"BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet","og_description":"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/","og_site_name":"eSecurity Planet","article_published_time":"2023-03-10T19:20:47+00:00","article_modified_time":"2023-03-10T19:20:48+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"BlackMamba PoC Malware Uses AI to Avoid Detection","datePublished":"2023-03-10T19:20:47+00:00","dateModified":"2023-03-10T19:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/"},"wordCount":506,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png","keywords":["AI security","antivirus software","cloud security","cybersecurity","EDR","malware","Microsoft","network security","ransomware","security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/","url":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/","name":"BlackMamba PoC Malware Uses AI to Avoid Detection | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png","datePublished":"2023-03-10T19:20:47+00:00","dateModified":"2023-03-10T19:20:48+00:00","description":"A new proof of concept (PoC) by security researchers shows that AI security concerns are real. Read about BlackMamba and AI exploits.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/ai-security-e1644632199505.png","width":900,"height":506,"caption":"ai security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/blackmamba-malware-edr-bypass\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"BlackMamba PoC Malware Uses AI to Avoid Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/27712"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=27712"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/27712\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20918"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=27712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=27712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=27712"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=27712"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=27712"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=27712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}