'What's special about DeepLocker is that the use of AI creates' triggering conditions 'to perform attacks that are almost impossible to reverse engineer,' the researchers explained.'Malware will only unlock when approaching the victim'.
To describe DeepLocker's ability, the researchers created cloaked simulations for the famous extortion code WannaCry in a video calling application without being detected by security tools.
When conditions are triggered, DeepLocker does not execute malicious code until it recognizes the victim's face, and can use the image.'When the victim sits on the computer and uses the application, the camera recognizes the face and the malicious code is executed by the victim's face, which is already programmed to open the attack'.
All that DeepLocker needs is just your photos, can be found in any of your social networking sites like Facebook, Instagram . Trustware has recently launched as an open source face recognition tool called Social Mapper, can be used to find victims on many social networks.
The IBM Research team will publish more details about DeepLocker at the upcoming Back Hat USA event.
See more: