Jump to content

Malwarfare: Triton, the first Malware designed to kill people


Recommended Posts

This is only the beginning.  Once true AI comes online we'll see automated attacks the likes of which the world has never known which discover and exploit 0-hour vulnerabilities in real-time and build threats and attacks on the fly to counter any security measures and crash through any barricades in their path with startling speed and efficiency with both brute force and machine learning heuristics as well as (potentially) evolutionary cognitive adaptation to develop and push their malicious code and have their way with devices and systems, short-circuiting anything not equally equipped with 'good' AI to counter the threats (and even then, a race condition or 'tie' between such systems could easily result in a drastic drain on resources and infrastructure resulting in DoS of varying scope anywhere from the endpoint under attack to parts of the internet's infrastructure as the machines use distributed networks to pool resources and bring 'troops' into the battle to attack one another).

It sounds like sci-fi, but much of what we've seen over the past decade was once thought impossible in the field of computing and technology, and I assure you, this will happen.  It's only a matter of time.

Link to post
Share on other sites

That's exactly the kind of tech I'm talking about (though much earlier in development/dumber compared to the kind of true AI I was referring to).  The issue is, that once it comes down to AI vs AI everyone loses because then it's just like a conflict between two AVs on the same system; resource usage escalates and eventually the system crashes or freezes due to a race condition.  Imagine that on a scale that impacts entire sectors of the internet's backbone/infrastructure.  We'd live in a world at constant risk of being attacked and/or used by AIs for their botnets and roaming blackouts of major portions of the web on a regular basis potentially becoming an everyday occurrence.  Not a pretty sight.

Link to post
Share on other sites

1. https://www.wired.com/2016/06/demonically-clever-backdoor-hides-inside-computer-chip/ 
	2. https://en.wikipedia.org/wiki/Hybrid_computer 
	3. https://en.wikipedia.org/wiki/Analog_computer#Resurgence 
	4. https://www.dwavesys.com/take-leap 
	5. https://spectrum.ieee.org/computing/software/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them  

Here we go... Hopefully something good will actually come out of me sharing all this information.

Link to post
Share on other sites

Yep, I was already familiar with most of that, but again, I'm referring to real, true, actual "thinking" AI, not just complex math and branching algorithms (which is literally all that exists right now).  Think of it like a super genius controlling one or many machines trying to hack into a network while another genius of equal measure attempts to thwart their efforts.  Eventually a stalemate will occur as the system(s) and/or infrastructure being used/attacked run out of hardware resources to feed their efforts so ultimately in the end you get a successful Denial Of Service (DoS) attack whether that was the intent or not.

As for current AI techniques (which aren't true Artificial Intelligence at all, just complex algorithms/math, not real 'thought' in any sense of the word):


Edited by exile360
Link to post
Share on other sites

15 minutes ago, Amaroq_Starwind said:

This is why the security providers need to get their hands on the quantum computers first, and why we need to start using mesh nets.

It doesn't matter who gets what 'first' because in the end the other side will always catch up and likely eventually leap ahead at some point resulting in a stalemate or loss (especially since the bad guys are ALWAYS better financed than the good guys, even the largest of good guys like Microsoft and Symantec, as the bad guys are financed by rogue governments, wealthy criminals and organized crime).

13 minutes ago, Amaroq_Starwind said:

Just out of curiosity: would analog computers be more resistant to Malware?

No idea, not my area of expertise.  But I'd imagine any device can be hacked/made to run 'bad code' (the original hackers used analog phones to hack systems/networks through audio tones over phone lines).

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.