fbpx
Question? Call Us 858-777-0040
Logo 01

Nine ways to protect against ChatGPT black mamba malware

ChatGPT BlackMamba malware
Download the accountant's guide to the safeguards ruleGet your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Security researchers were recently able to use a large language model (LLM) (like ChatGPT) to create the “BlackMamba” malware that bypasses security solutions like Endpoint Detection and Response (EDR) by adapting and transforming itself on the fly. (Tech Kahunas uses AI in its Managed Detection & Response (MDR) software agents.) 

What is BlackMamba?

BlackMamba is a new type of AI-powered polymorphic malware with the following features:

1. BlackMamba’s executable file is installed on an endpoint (computer, tablet, or phone) through a user clicking on phishing emails, downloading malicious software, or falling prey to social engineering tactics.

2. The file then downloads an infected file from a benign source, such as Pastebin, Dropbox, Microsoft Azure, AWS, or other cloud services. This malware changes its code every time it infects a new system, delivering unique malware payloads each time. Detection capabilities can’t keep up.

3. The malware steals the infected user’s keystrokes and bypasses many types of authentication by monitoring user activities and stealing confidential information. The malware hides through encryption and obfuscation of its code. This function bypasses even the most advanced, signature-based anti-malware and intrusion detection and prevention software.

The new file is unrecognizable–even if an earlier version of the same malware was detected and blocked. The malicious part of BlackMamba remains in memory, and its creators claim that existing EDRs may be unable to detect it. One industry-leading EDR saw zero alerts or detections of BlackMamba’s actions.

4. The malware can adapt to different environments, downloading modules that steal sensitive data, launching DDoS attacks, encrypting files, installing additional malware, taking control of the infected system, or launching attacks on critical infrastructure.

BlackMamba can encrypt communication channels to exfiltrate your company data and to communicate with command and control (C2C) servers. It can also detect which applications (like Microsoft Word or Excel) are running on an infected ­system and capture user actions while running them.

How Was BlackMamba Created?

The technical part: researchers used “generative adversarial networks” (GANs) to train two LLMs to compete against each other. One generates new malware code, while the other attempts to detect it. The model becomes more sophisticated and can produce increasingly difficult-to-detect code.

Me: ChatGPT, what do you know about BlackMamba?

ChatGPT: The BlackMamba malware is designed to infect Windows systems and can be delivered through various methods. It’s important to note that BlackMamba is a proof-of-concept malware and is not currently in widespread use.

Different Method, Same Tactic

Of course, cybercriminals had tried to use LLMs for malicious actions before ChatGPT was released. In general, many threat actors will try to hide their malicious traffic in the hustle of legitimate network services. Polymorphic malware is one method of achieving this.

With malware like BlackMamba, cybercriminals no longer have to write custom code, and the malware does not have to be saved to disk but can run in memory only, making detection harder. (Though simply constraining malicious code to memory will not evade a good endpoint security solution.)

Generative AI and LLMs, including ChatGPT, are just tools. But malware has now been supercharged with artificial intelligence, AI that changes the game. For malware that changes itself, security has to be rethought. Systems that use AI can monitor for malware and intrusions.

The Need For A Layered Approach

The emergence of BlackMamba (and other polymorphic malware) highlights the need for a layered approach to cybersecurity that combines AI with other security technologies and human intelligence (the human ability to reason and to think creatively and critically) to supplement AI’s capabilities.

Fighting this seems like an immense challenge. 
The threat landscape is evolving, and organizations must stay vigilant and be proactive in dealing with threats. Polymorphic malware can alter its own code, encryption keys, and other characteristics each time it infects a new system or device, making it difficult for security software to recognize and remove it.

Nine Recommendations

Your security expert should help you in the following ways:

1. They should help you establish a layered approach to your security: firewalls, anti-malware software, intrusion detection and prevention systems, and other preventative security measures. 

2. They should regularly update their anti-malware software and other security measures to detect and respond to new threats like BlackMamba. They should help you patch and update your network and endpoints regularly. 

3. They should implement strong access controls to limit sensitive data and systems access

4. They should train their employees to identify phishing attacks and other types of social engineering. Your training protocols will include anti-phishing training, social engineering awareness, and regular training updates. 

5. They should segment your networks to limit the spread of malware within your organization. 

6. They should install solutions that use AI and other advanced technologies to detect and respond to threats in real-time

7. They should regularly back up your critical data and store it in a secure, air-gapped location. They should establish scheduled backups so you can recover from ransomware or a data breach more quickly. 

8. They should regularly conduct vulnerability assessments and penetration testing or institute 24/7 monitoring (one requirement of the FTC Safeguards Rule) to identify and mitigate weaknesses in your network’s defenses. They should install MDR agents on your systems to continuously monitor your “endpoints,” e.g., mobile phones, laptops, and Internet-of-Things devices, to mitigate cyber threats like ransomware and malware. 

9. They should help you establish strong, regularly updated security policies with best practices for data protection, network security, and incident response

By following these best practices, your business can better protect itself against polymorphic malware and other cyber threats.

Conclusion

The development of AI malware can be frightening. LLMs can use prompts from their users to surprise us with new creations, like new types of software. The use of AI language models can undoubtedly aid in the development process of software, but ultimately, the creation of complex software programs requires a collaborative effort from human experts in the field.

Currently, malicious software programs like BlackMamba may not be available to the average cybercriminal but could require a team of skilled software developers, computer scientists, and engineers. That doesn’t mean you and your security partner should neglect to prepare with measures like the above recommendations. Attackers will exploit whatever means they can for malicious purposes, and you must prepare yourself.

You need a security partner who will help you combat malicious actors who intend to misuse ChatGPT and similar LLMs. Research and development in the field of cybersecurity are ongoing. Advanced security measures are developing with the threats.

Your security partner should be part of your stakeholders, which include your security team, vendors, customers, and law enforcement agencies.

Part of this piece was derived from from DESCERT, SecureOps and SentinelOne.

The four elements of the KahunaVision Technology Assessment are:

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Kahuna Shield will tie it all together.

Get your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Leave a comment

Your email address will not be published. Required fields are marked *

Peter Bondaryk
Peter Bondaryk
Facebook
Twitter
LinkedIn
Pinterest

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Wield the Kahuna Shield

Schedule a strategy session

Get Our FREE C-Suite and Business Owner's Guide
to Cybersecurity
csuite-ebook-homesplash
Latest posts
Follow us

Get Our FREE Accountant's Guide to the FTC Safeguards Rule Ebook!

The New FTC Requirements
That Will Change the Way You
Do Business

Get Your FREE Copy!​

Sign up to learn how you can protect against cybercrime

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

If today your business was hacked and you were at risk of losing it all...
Do you have a plan?
We will not spam, rent, or sell your information.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Join our newsletter and get a 20% discount
Promotion nulla vitae elit libero a pharetra augue