Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malicious ML models on the levering lever
Global Security

Malicious ML models on the levering lever

AdminBy AdminFebruary 8, 2025No Comments3 Mins Read
Malicious ML Models
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 8, 2025Red LakshmananArtificial intelligence / safety supply chain

Malic models ml

Cybersecurity researchers found two malicious machine learning models (ML) on the hug that used unusual “broken” salted cucumber files to avoid detection.

“Files of salted cucumbers extracted from the mentioned Pytorch archives showed malicious Python content at the beginning of the file,” Carl Zanka ReversingLabs Researcher – Note In a report that shared with Hacker News. “In both cases, the harmful load was a typical reverse platform reverse shell that connects to the tough code.”

Cybersecurity

The approach was named Nullifai because it provides attempts to solve The passage of existing guarantees Set to determine malicious models. Below were listed on the hug – below –

  • Glockr1/Ballr7
  • Someone-R-U0000/00000000000000000000000000

Models are believed to be the proof of the concept (POC) rather than the scenario of the active supply chain attack.

The format of the seasheration serialization used by the common ML models was repeatedly found To become a risk of safety, as it offers ways to execute arbitrary code as soon as they are loaded and deasserized.

Malic models ml

Both models found by cybersecurity are stored in Pytorch format, which is nothing more than a compressed file of salted cucumbers. While Pytorch uses Zip format to default, the detected models were compressed using 7z format.

Thus, this behavior allowed models to fly under the radar and avoiding how to indicate with an angry Pickson, a tool used, hugging the face to identify suspicious pickles files.

“An interesting thing in this salted salted pickle is that the serialization of the object is the purpose of the saline file – it is broken shortly after the harmful useful load, which leads to the abandonment of the object decomposition,” the Zanka said.

Cybersecurity

Further analysis showed that such broken salted cucumber files can be partially desserized with a mismatch between piclexon and how desserization works, causing the malicious code to be performed, despite the fact that the tool throws an error message . Open source utility has been since updated To correct this error.

“The explanation of such behavior is that the desserization of the object is performed in the Pickle files consistently,” the Zanka said.

“Salted salted codes are executed as they meet, and until all the opcodes are executed or there is no impaired instruction. In the case of the detected model, the harmful useful load is inserted at the beginning of the stream of salted cucumb existing security scanning tools. “

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.