SlideShare a Scribd company logo
3
Most read
5
Most read
6
Most read
Artificial Intelligence Computer Virus
Artificial intelligence-powered malware is coming – called the “smart virus”.
A.I. Apocalypse
It all looks normal, but!
The entire email was actuallywritten by a piece of smart
malware mimicking the client's email mannerisms, with a virus
attachedto the map.
Instead an artificialIntelligence(AI) activatedmalware has been
working hard to create a trustworthy email seemingly coming
from a trustworthy source.
Artificial intelligence implemented
in computer virus – A smart virus
Create an ArtificiallyIntelligent(AI) Computer virus , which can
modify its signature to avoiddetection from an Anti Virus
software.
A computer virus which can stop all its infectiousactivities and
go into the state of incubationwhen a full system scan is going
on through an Anti Virus scan.
What is the possibilityof seeing such computer viruses in near
future?
A computer virus can use AI, and the question we ask ourselves
would it allow it to evade detection for very long?
The closest to a AI powered virus we have now is the
polymorphictype of virus, but virus scanners use heuristics
methods to detect these.
A virus which can detect when a system scan is going on doesn't
require AI. If a virus has taken control of your system, it can be
programmed to detect and avoidtypicalvirus scanners.
Artificial intelligence implemented
in computer virus – A smart virus
The problem with a really-goodAI powered virus is that it
requires tons of top-end hardware to run effectively.
However, computerviruses need to be lightweightand nimble
little pieces of code that slip into and out of systems and avoid
detection.
They can't really command the necessary resources to be truly
smart.
A smart virus could take over a whole network of computers, like
a botnet does now.
It could use the intelligenceof the whole network to prevent the
takeover of any one of its hosts.
Theoreticallythat could work, at least for a while, under present-
day conditions.
If such an attackwere ever developed,a new defense would
have to be developedfor it.
The arms race between hackers and
security firms
Artificial intelligencebecomes more and more sophisticatedand
it will inevitablyfind its way into malware.
Potentiallydisastrousresults for the businesses and individuals
that hackers target.
Hackers will compete with AI-driven defense systems for
networks and computers within it. Defenses created with an
"immune system" for users that learnshow businesses operate
then monitors for potentialirregularities.
How cybersecurity is going to evolve
Today
Ransomware is endemic. It's a type of malware that encrypts everythingon
the victim's computer or network,then demands a bitcoin ransom to decrypt
it. If they don't payup in a set timeframe,the data is lost for good.
Near future and maybe alreadytoday.
AI-infused ransomware will acceleratethe risks these malware attacks make.
Self-organizingmalware made to inflict maximumdamage, and going after
new, even more lucrative targets.
Future
Malware will perform coordinatedaction.Ransomware will be layingwaiting
until it's spread across a number of areas of the network before it suddenly
takes action.
Malware will cause extortionofassets as well as data.Factoryequipment,
MRI scanners in hospitals,retail equipmentwill be kept hostages. Equipment
and data you would payto haveback online because it is business critical.
Data hostage is one thingas you can havebeen fortunate enough having
backed up, but if your equipment stops workingthen you're business can be
stopped,oreven lives can be in jeopardy.Imagine the power grid to be kept
hostage bya AI activated ransomware.
Bridging Networks
An Animated PowerPoint Slide
Type text here or delete this box.
Type text here or delete this
box.
AI Powered Emails or correspondence
You have got something on you laptop that can read all
your emails, reads your messages, can read your
calendar, and then sends people messages in the same
communication style you use with them. You will get an
email from what looks to be a friend or colleague in a
style and manner as you are used to get. Attached to this
email there is attached r included in the email a map of a
location of where to meet for a meeting or event. Because
the AI powered malware can see in your calendar that
we're due to meet up for a meeting or event. And you'd
open it, because it'd be relevant, it'd be contextual, but
the map would have a malware payload included in it.
It is a sophisticated version of a "CFO
email" scam or "trust attack“, where the
scammer, purporting to be a company
employee, sends an email to the target
asking them to make a money transfer.
MALWARE WILL LEARN TO MIMIC
PEOPLE YOU KNOW
Using recurring neural networks, AI software is taught to mimic writing styles.
Malwarewill be able to look through your correspondence, learn how you communicate,
and then mimic you in order to infect other targets.
Destructive hacks
‱ In December 2015, a Ukrainianpower stationwas knocked offline by
an unprecedentedhack.
‱ The power cut was caused by a type of hacking known as "spear-
phishing“.
‱ The attackcaused a blackout for 80,000 customers of western
Ukraine's Prykarpattyaoblenergoutility.
‱ DHS said the "Black Energy Malware"used in the attack appearsto
have infected Ukraine's systems via a corrupted Microsoft Word
attachment.
‱ The same code was detected in 2014 within systems at US facilities
but there was no known successful disruption to the US grid.
Destructive hacks
‱ OilRig Malware Campaigns
‱ In May2016 the firstOilRig campaign wasregistered and analyzed.
‱ The group behindthe OilRig campaign continuesto leverage spear-phishingemails
with malicious MicrosoftExcel documentsto compromisevictims.
‱ When the users.xls file is executed and macrosare enabled, the victim is presented
with a decoy document.
‱ Anemail sequence was sent to a Turkish governmentorganizationusing a lure of
purportednew portal logins foran airline’s website.
‱ This same documentcontent wasused withHelminth samplestargeting government
organizationsin multiple nations.
‱ Tracked a numberof changesto the malware usedby the actors responsible for
OilRig forvarious victims and purposes.
‱ The attackers shifted fromthe update.vbsvariantof their malware in late May 2016
to use the fireeye.vbs variant.More recently, the upd.vbsvariantwasdiscovered,
which appearsto be an actively developed copy.
‱ The attackers using the Helminth and Clayslide malware families continue to target
varioushigh value companiesand organizationsacrossthe globe usingtheir
customizedmalware.
‱ While the malware deployed is not terribly sophisticated,it uses techniquessuch as
DNScommandand control (C2) thatallows it to stay under the radar at many
establishments.
Corporate stealth hacks
‱ To perform real harm to an energy company
you would have your self-hunting, self-
targeting malware go in to their systems and
then start to change the geological and
geophysical data on which they make their
decisions where they're going explore, exploit
or produce. Over a longer period of time you
will make their performance going down as
their discovery rate or production rate is
falling, as wells are coming up dry in a more
frequent rate than they used to do. This would
create serious harm to their business in a way
they're much less likely to notice and be able
to respond to before the harm is done.
Internet of Things (IoT) Targets
The attacksof the future could likely be in their IoT sensors, their
submarines, their scanning equipment that's collecting [the data]
in the first place.
Good luck finding those attacks.
Artificial intelligence revolution becomes ever-more advanced
and ever-more accessible and it is, inevitably, going to be used for
ill.
Timeframe of AI powered Malware
Within the next 12 months it would be possible to train a neural network that would be
smart enough to carry out a trust attack in a rudimentaryway.
If you look at the progress people like Google DeepMindare making on naturalspeech
and language tools, it's in the next couple of years when the more sophisticatedAI
powered malware attacks.
The evolutionary virus Leon creates is based on biological principles
Leon Tsarev is a high school student set on getting into a greatcollege program, untilhis uncle, a
member of the Russian mob, coerces him into developing a new computer virus for the mob’s
botnet - the slave army of computersthey used to commit digital crimes.
The virus continues to evolve,
developing intelligence,
communication, and finally an
entire civilization.
All the world’s computers are
infected. Everything from cars to
payment systems and, of course,
computers and smart phones stop
functioning, and with them go
essential functions including
emergency services,
transportation,and the food
supply. Billionsmay die.
Ramifications of a powerful supercomputer.
The story of the novellaexploresthe nature of humandesire andthe uses and abuses of
technology inthe satisfactionof desire.
The Metamorphosis of Prime
Intellect by Roger Williams
An online novel from 1994.
Warning: The book is very graphicallyviolent and
sexual, especially in earlier chapters.
It deals with the ramifications of a powerful, super
intelligent supercomputer that discovers a method of
rewriting the "BIOS" of reality while studying a little-known
quirk of quantum physics discovered during the prototyping
of its own specialized processors, ultimately heralding
a technological singularity.
After remaining unpublished for years, the novel
was published online in 2002, hosted byKuro5hin.
Williams later published a print edition via print-on-demand
publisher Lulu. One reviewer called the novel "a well-
written and very creative, if flawed, piece of work" and
ranked it as one of the more important works of fiction to
deal with the idea of a technological singularity.
AI powered malware
Artificial intelligencebased viruses with Evolutionarycode embedded
into the malware, and malware that detects the hard drives contents
and imitates other programs to evade detection do exist.
Such viruses do exist, but not in the open.
There are research papers that mention such approaches to malware,
but for academic purposes only.
There is even a research paper discussing a p2p based botnet, that uses
AI to evolve its p2p topology, to prevent detection of the source, to
maximize efficiency, and to make the network robust against attack.
‱Artificial General Intelligence: Can a computer be built whose modifications in code only come from itself?
‱Artificial Intelligence: Can humans engineer a conscious computer faster than nature evolved a conscious brain?
‱Can artificially intelligent computers take our jobs?
‱Can Artificial Intelligence computers be creative?
‱What is computer vision in artificial intelligence?
‱Do Computer Engineers make Artificial Intelligence?
‱Could artificially intelligent computers replace programmers in the future?
‱How & why is Artificial Intelligence implemented in social networks?
‱How can I implement artificial intelligence in my social network?
‱Will quantum computers pave the way for Artificial Intelligence?
‱Does Neumont University's artificial intelligence program stand up to those offered at older schools? Has anyone
graduated from it yet that ca...
‱Can Artificial Intelligence be implemented using Java and JavaScript?
‱Can an unhackable computer with artificial general intelligence be built?
‱Could artificially intelligent computers experience the placebo effect?
‱Is computational neuroscience related to artificial intelligence in some way?
‱Why do scientists fail to define intelligece in such a way that it can be implemented artificially in software, like we
can create light arti...
‱Has anyone created a polymorphic computer virus with the hope of studying emergent intelligent behavior?
‱What happens if a computer virus contains artificial intelligence?
‱Is anyone who actually knows how to implement artificial intelligence/machine learning applications worried
about its future?
‱Can one create an artificial general intelligence using distributed computing?
‱Artificial General Intelligence: Can a computer be built whose modifications in code only come from itself?
‱Artificial Intelligence: Can humans engineer a conscious computer faster than nature evolved a conscious brain?
‱Can artificially intelligent computers take our jobs?
‱Can Artificial Intelligence computers be creative?
‱What is computer vision in artificial intelligence?
Questions? More
Information?
Stig-Arne Kristoffersen
sak@ec-ba.com
www.Valioso.rocks
www.stig-arne.com
www.vap4u.eu

More Related Content

PDF
Windows CMD commands.pdf
PPTX
Types of cloud computing
PPT
Computer viruses
PDF
Computer viruses and its prevention
PPT
Cookies and sessions
PDF
1. GRID COMPUTING
PPTX
Unit 1
PPTX
Operating system
Windows CMD commands.pdf
Types of cloud computing
Computer viruses
Computer viruses and its prevention
Cookies and sessions
1. GRID COMPUTING
Unit 1
Operating system

Viewers also liked (10)

PPTX
Minecraft och gÀvle!
PDF
Telpa. 2. sesija. Ievads
PPTX
Iedvesmai. 3. sesija. Nerimstoơā vēlme uzzināt
PPTX
TehnoloÄŁijas. 3. sesija
PPTX
Jaunā pedagoģija. 1. sesija. Ievads
PPTX
Iedvesmai. 3. sesija. Kopā jautrāk un jaudīgāk
PPTX
CeČā uz kompetencēs balstÄ«tu mācÄ«bu procesu. 1. sesija. Kompetenču pieeja vis...
PPTX
Mƫsdienīga mācību vide. Ievads
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PPTX
Security Technology Vision 2016
Minecraft och gÀvle!
Telpa. 2. sesija. Ievads
Iedvesmai. 3. sesija. Nerimstoơā vēlme uzzināt
TehnoloÄŁijas. 3. sesija
Jaunā pedagoģija. 1. sesija. Ievads
Iedvesmai. 3. sesija. Kopā jautrāk un jaudīgāk
CeČā uz kompetencēs balstÄ«tu mācÄ«bu procesu. 1. sesija. Kompetenču pieeja vis...
Mƫsdienīga mācību vide. Ievads
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Security Technology Vision 2016
Ad

Similar to Artificial Intelligence powered malware - A Smart virus (20)

PPTX
First line of defense for cybersecurity : AI
PDF
AI Powered Cyber Crimes (1).pdf escuerescuerescuerescuerescuerescuerescueres
PDF
AI is Hacking You - Digital Workplace Conference Australia 2024
PPT
computer security
PPTX
2nd Class PPT.pptx
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cybertestqas.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-.ppt
PPT
cs0123.ppt
PPTX
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPTX
Cyber security by vinod sencha for education
PPT
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
PPT
Direct infection: virus can infect files every time a user opens that specif...
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
First line of defense for cybersecurity : AI
AI Powered Cyber Crimes (1).pdf escuerescuerescuerescuerescuerescuerescueres
AI is Hacking You - Digital Workplace Conference Australia 2024
computer security
2nd Class PPT.pptx
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
cybertestqas.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-.ppt
cs0123.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857 (1).ppt
Cyber security by vinod sencha for education
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Direct infection: virus can infect files every time a user opens that specif...
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Ad

More from Stig-Arne Kristoffersen (20)

PDF
Storre behov for att effektivt rekrytera
PDF
Distans for-imot
PDF
SKL behover dig
PDF
Jobbsokning under pandemin
PDF
Hockey vanskapsprogram
PDF
Kultur och fritid
PDF
VarumÀrke inom Svensk hockey
PDF
LÄgutbildade, arbetslösa mindre delaktiga i informationssamhÀllet
PDF
Digital mogenhet - nödvÀndigt för alla företag
PPTX
Mining and artificial intelligence - a new paradigm growing!
PDF
Matchning av dem lÄngt frÄn arbetsmarknaden
PDF
s AI s - seismic Artificial Intelligence system
PDF
Transform unstructured e&p information
PDF
Den passiva arbetssökaren
PDF
Hitta varandra med Algoritmer som fungerar för alla!
PDF
Hitta varandra i arbetsmarknaden!
PDF
Arbetsförmedling och Rekrytering - en samverkan
PDF
Vatten frÄn olika kÀllor i VÀstra Götaland
PDF
BÀttre match mellan jobbsökare och arbetsgivare
PDF
Vilken riktning tar rekryteringen i nÀrmaste framtid?
Storre behov for att effektivt rekrytera
Distans for-imot
SKL behover dig
Jobbsokning under pandemin
Hockey vanskapsprogram
Kultur och fritid
VarumÀrke inom Svensk hockey
LÄgutbildade, arbetslösa mindre delaktiga i informationssamhÀllet
Digital mogenhet - nödvÀndigt för alla företag
Mining and artificial intelligence - a new paradigm growing!
Matchning av dem lÄngt frÄn arbetsmarknaden
s AI s - seismic Artificial Intelligence system
Transform unstructured e&p information
Den passiva arbetssökaren
Hitta varandra med Algoritmer som fungerar för alla!
Hitta varandra i arbetsmarknaden!
Arbetsförmedling och Rekrytering - en samverkan
Vatten frÄn olika kÀllor i VÀstra Götaland
BÀttre match mellan jobbsökare och arbetsgivare
Vilken riktning tar rekryteringen i nÀrmaste framtid?

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
A comparative analysis of optical character recognition models for extracting...
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

Artificial Intelligence powered malware - A Smart virus

  • 1. Artificial Intelligence Computer Virus Artificial intelligence-powered malware is coming – called the “smart virus”. A.I. Apocalypse
  • 2. It all looks normal, but! The entire email was actuallywritten by a piece of smart malware mimicking the client's email mannerisms, with a virus attachedto the map. Instead an artificialIntelligence(AI) activatedmalware has been working hard to create a trustworthy email seemingly coming from a trustworthy source.
  • 3. Artificial intelligence implemented in computer virus – A smart virus Create an ArtificiallyIntelligent(AI) Computer virus , which can modify its signature to avoiddetection from an Anti Virus software. A computer virus which can stop all its infectiousactivities and go into the state of incubationwhen a full system scan is going on through an Anti Virus scan. What is the possibilityof seeing such computer viruses in near future? A computer virus can use AI, and the question we ask ourselves would it allow it to evade detection for very long? The closest to a AI powered virus we have now is the polymorphictype of virus, but virus scanners use heuristics methods to detect these. A virus which can detect when a system scan is going on doesn't require AI. If a virus has taken control of your system, it can be programmed to detect and avoidtypicalvirus scanners.
  • 4. Artificial intelligence implemented in computer virus – A smart virus The problem with a really-goodAI powered virus is that it requires tons of top-end hardware to run effectively. However, computerviruses need to be lightweightand nimble little pieces of code that slip into and out of systems and avoid detection. They can't really command the necessary resources to be truly smart. A smart virus could take over a whole network of computers, like a botnet does now. It could use the intelligenceof the whole network to prevent the takeover of any one of its hosts. Theoreticallythat could work, at least for a while, under present- day conditions. If such an attackwere ever developed,a new defense would have to be developedfor it.
  • 5. The arms race between hackers and security firms Artificial intelligencebecomes more and more sophisticatedand it will inevitablyfind its way into malware. Potentiallydisastrousresults for the businesses and individuals that hackers target. Hackers will compete with AI-driven defense systems for networks and computers within it. Defenses created with an "immune system" for users that learnshow businesses operate then monitors for potentialirregularities.
  • 6. How cybersecurity is going to evolve Today Ransomware is endemic. It's a type of malware that encrypts everythingon the victim's computer or network,then demands a bitcoin ransom to decrypt it. If they don't payup in a set timeframe,the data is lost for good. Near future and maybe alreadytoday. AI-infused ransomware will acceleratethe risks these malware attacks make. Self-organizingmalware made to inflict maximumdamage, and going after new, even more lucrative targets. Future Malware will perform coordinatedaction.Ransomware will be layingwaiting until it's spread across a number of areas of the network before it suddenly takes action. Malware will cause extortionofassets as well as data.Factoryequipment, MRI scanners in hospitals,retail equipmentwill be kept hostages. Equipment and data you would payto haveback online because it is business critical. Data hostage is one thingas you can havebeen fortunate enough having backed up, but if your equipment stops workingthen you're business can be stopped,oreven lives can be in jeopardy.Imagine the power grid to be kept hostage bya AI activated ransomware.
  • 7. Bridging Networks An Animated PowerPoint Slide Type text here or delete this box. Type text here or delete this box.
  • 8. AI Powered Emails or correspondence You have got something on you laptop that can read all your emails, reads your messages, can read your calendar, and then sends people messages in the same communication style you use with them. You will get an email from what looks to be a friend or colleague in a style and manner as you are used to get. Attached to this email there is attached r included in the email a map of a location of where to meet for a meeting or event. Because the AI powered malware can see in your calendar that we're due to meet up for a meeting or event. And you'd open it, because it'd be relevant, it'd be contextual, but the map would have a malware payload included in it. It is a sophisticated version of a "CFO email" scam or "trust attack“, where the scammer, purporting to be a company employee, sends an email to the target asking them to make a money transfer.
  • 9. MALWARE WILL LEARN TO MIMIC PEOPLE YOU KNOW Using recurring neural networks, AI software is taught to mimic writing styles. Malwarewill be able to look through your correspondence, learn how you communicate, and then mimic you in order to infect other targets.
  • 10. Destructive hacks ‱ In December 2015, a Ukrainianpower stationwas knocked offline by an unprecedentedhack. ‱ The power cut was caused by a type of hacking known as "spear- phishing“. ‱ The attackcaused a blackout for 80,000 customers of western Ukraine's Prykarpattyaoblenergoutility. ‱ DHS said the "Black Energy Malware"used in the attack appearsto have infected Ukraine's systems via a corrupted Microsoft Word attachment. ‱ The same code was detected in 2014 within systems at US facilities but there was no known successful disruption to the US grid.
  • 11. Destructive hacks ‱ OilRig Malware Campaigns ‱ In May2016 the firstOilRig campaign wasregistered and analyzed. ‱ The group behindthe OilRig campaign continuesto leverage spear-phishingemails with malicious MicrosoftExcel documentsto compromisevictims. ‱ When the users.xls file is executed and macrosare enabled, the victim is presented with a decoy document. ‱ Anemail sequence was sent to a Turkish governmentorganizationusing a lure of purportednew portal logins foran airline’s website. ‱ This same documentcontent wasused withHelminth samplestargeting government organizationsin multiple nations. ‱ Tracked a numberof changesto the malware usedby the actors responsible for OilRig forvarious victims and purposes. ‱ The attackers shifted fromthe update.vbsvariantof their malware in late May 2016 to use the fireeye.vbs variant.More recently, the upd.vbsvariantwasdiscovered, which appearsto be an actively developed copy. ‱ The attackers using the Helminth and Clayslide malware families continue to target varioushigh value companiesand organizationsacrossthe globe usingtheir customizedmalware. ‱ While the malware deployed is not terribly sophisticated,it uses techniquessuch as DNScommandand control (C2) thatallows it to stay under the radar at many establishments.
  • 12. Corporate stealth hacks ‱ To perform real harm to an energy company you would have your self-hunting, self- targeting malware go in to their systems and then start to change the geological and geophysical data on which they make their decisions where they're going explore, exploit or produce. Over a longer period of time you will make their performance going down as their discovery rate or production rate is falling, as wells are coming up dry in a more frequent rate than they used to do. This would create serious harm to their business in a way they're much less likely to notice and be able to respond to before the harm is done.
  • 13. Internet of Things (IoT) Targets The attacksof the future could likely be in their IoT sensors, their submarines, their scanning equipment that's collecting [the data] in the first place. Good luck finding those attacks. Artificial intelligence revolution becomes ever-more advanced and ever-more accessible and it is, inevitably, going to be used for ill.
  • 14. Timeframe of AI powered Malware Within the next 12 months it would be possible to train a neural network that would be smart enough to carry out a trust attack in a rudimentaryway. If you look at the progress people like Google DeepMindare making on naturalspeech and language tools, it's in the next couple of years when the more sophisticatedAI powered malware attacks.
  • 15. The evolutionary virus Leon creates is based on biological principles Leon Tsarev is a high school student set on getting into a greatcollege program, untilhis uncle, a member of the Russian mob, coerces him into developing a new computer virus for the mob’s botnet - the slave army of computersthey used to commit digital crimes. The virus continues to evolve, developing intelligence, communication, and finally an entire civilization. All the world’s computers are infected. Everything from cars to payment systems and, of course, computers and smart phones stop functioning, and with them go essential functions including emergency services, transportation,and the food supply. Billionsmay die.
  • 16. Ramifications of a powerful supercomputer. The story of the novellaexploresthe nature of humandesire andthe uses and abuses of technology inthe satisfactionof desire. The Metamorphosis of Prime Intellect by Roger Williams An online novel from 1994. Warning: The book is very graphicallyviolent and sexual, especially in earlier chapters. It deals with the ramifications of a powerful, super intelligent supercomputer that discovers a method of rewriting the "BIOS" of reality while studying a little-known quirk of quantum physics discovered during the prototyping of its own specialized processors, ultimately heralding a technological singularity. After remaining unpublished for years, the novel was published online in 2002, hosted byKuro5hin. Williams later published a print edition via print-on-demand publisher Lulu. One reviewer called the novel "a well- written and very creative, if flawed, piece of work" and ranked it as one of the more important works of fiction to deal with the idea of a technological singularity.
  • 17. AI powered malware Artificial intelligencebased viruses with Evolutionarycode embedded into the malware, and malware that detects the hard drives contents and imitates other programs to evade detection do exist. Such viruses do exist, but not in the open. There are research papers that mention such approaches to malware, but for academic purposes only. There is even a research paper discussing a p2p based botnet, that uses AI to evolve its p2p topology, to prevent detection of the source, to maximize efficiency, and to make the network robust against attack.
  • 18. ‱Artificial General Intelligence: Can a computer be built whose modifications in code only come from itself? ‱Artificial Intelligence: Can humans engineer a conscious computer faster than nature evolved a conscious brain? ‱Can artificially intelligent computers take our jobs? ‱Can Artificial Intelligence computers be creative? ‱What is computer vision in artificial intelligence? ‱Do Computer Engineers make Artificial Intelligence? ‱Could artificially intelligent computers replace programmers in the future? ‱How & why is Artificial Intelligence implemented in social networks? ‱How can I implement artificial intelligence in my social network? ‱Will quantum computers pave the way for Artificial Intelligence? ‱Does Neumont University's artificial intelligence program stand up to those offered at older schools? Has anyone graduated from it yet that ca... ‱Can Artificial Intelligence be implemented using Java and JavaScript? ‱Can an unhackable computer with artificial general intelligence be built? ‱Could artificially intelligent computers experience the placebo effect? ‱Is computational neuroscience related to artificial intelligence in some way? ‱Why do scientists fail to define intelligece in such a way that it can be implemented artificially in software, like we can create light arti... ‱Has anyone created a polymorphic computer virus with the hope of studying emergent intelligent behavior? ‱What happens if a computer virus contains artificial intelligence? ‱Is anyone who actually knows how to implement artificial intelligence/machine learning applications worried about its future? ‱Can one create an artificial general intelligence using distributed computing? ‱Artificial General Intelligence: Can a computer be built whose modifications in code only come from itself? ‱Artificial Intelligence: Can humans engineer a conscious computer faster than nature evolved a conscious brain? ‱Can artificially intelligent computers take our jobs? ‱Can Artificial Intelligence computers be creative? ‱What is computer vision in artificial intelligence?