{"id":41955,"date":"2021-07-22T15:11:40","date_gmt":"2021-07-22T15:11:40","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32489\/Researchers-Hid-Malware-Inside-An-AIs-Neurons-And-It-Worked-Scarily-Well.html"},"modified":"2021-07-22T15:11:40","modified_gmt":"2021-07-22T15:11:40","slug":"researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/","title":{"rendered":"Researchers Hid Malware Inside An AI&#8217;s Neurons And It Worked Scarily Well"},"content":{"rendered":"<div readability=\"23.633663366337\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/60f97f19e857ed009b4e806c\/lede\/1626964840698-gettyimages-1137862835.jpeg?crop=1xw:0.9998556581986143xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/60f97f19e857ed009b4e806c\/lede\/1626964840698-gettyimages-1137862835.jpeg?crop=1xw:0.9998556581986143xh;center,center&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/60f97f19e857ed009b4e806c\/lede\/1626964840698-gettyimages-1137862835.jpeg?crop=1xw:0.9998556581986143xh;center,center&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"Researchers Hid Malware Inside an AI's 'Neurons' And It Worked Scarily Well\"><\/picture><\/div>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"81.860392766868\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>Neural networks could be the next frontier for malware campaigns as they become more widely used, according to a new study.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28.375404530744\"><\/p>\n<p>According to the study, which was <a href=\"https:\/\/arxiv.org\/abs\/2107.08590\" target=\"_blank\" rel=\"noopener\"><span>posted to the arXiv preprint server<\/span><\/a> on Monday, malware can be embedded directly into the artificial neurons that make up machine learning models in a way that keeps them from being detected. The neural network would even be able to continue performing its set tasks normally.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>\u201cAs neural networks become more widely used, this method will be universal in delivering malware in the future,\u201d the authors, from the University of the Chinese Academy of Sciences, write.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>Using real malware samples, their experiments found that replacing up to around 50 percent of the neurons in the AlexNet model\u2060\u2014a benchmark-setting classic in the AI field\u2060\u2014with malware still kept the model\u2019s accuracy rate above 93.1 percent. The authors concluded that a 178MB AlexNet model can have up to 36.9MB of malware embedded into its structure without being detected using a technique called steganography. Some of the models were tested against 58 common antivirus systems and the malware was not detected.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>Other methods of hacking into businesses or organizations, such as attaching malware to documents or files, often cannot deliver malicious software en masse without being detected. The new research, on the other hand, envisions a future where an organization may bring in an off-the-shelf machine learning model for any given task (say, a chat bot, or image detection) that could be loaded with malware while performing its task well enough not to arouse suspicion.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.750677506775\"><\/p>\n<p>According to the study, this is because AlexNet (like many machine learning models) is made up of millions of parameters and many complex layers of neurons including <a href=\"https:\/\/d2l.ai\/chapter_convolutional-modern\/alexnet.html\" target=\"_blank\" rel=\"noopener\"><span>what are known as fully-connected &#8220;hidden&#8221; layers<\/span><\/a>. By keeping the huge hidden layers in AlexNet completely intact, the researchers found that changing some other neurons had little effect on performance.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>In the paper, the authors lay out a playbook for how a hacker might design a malware-loaded machine learning model and have it spread in the wild:<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"16\">\n<p>&#8220;First, the attacker needs to design the neural network. To ensure more malware can be embedded, the attacker can introduce more neurons. Then the attacker needs to train the network with the prepared dataset to get a well-performed model. If there are suitable well-trained models, the attacker can choose to use the existing models. After that, the attacker selects the best layer and embeds the malware. After embedding malware, the attacker needs to evaluate the model\u2019s performance to ensure the loss is acceptable. If the loss on the model is beyond an acceptable range, the attacker needs to retrain the model with the dataset to gain higher performance. Once the model is prepared, the attacker can publish it on public repositories or other places using methods like supply chain pollution, etc.&#8221;<\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>According to the paper, in this approach the malware is &#8220;disassembled&#8221; when embedded into the network&#8217;s neurons, and assembled into functioning malware by a malicious receiver program that can also be used to download the poisoned model via an update. The malware can still be stopped if the target device verifies the model before launching it, according to the paper. It can also be detected using \u201ctraditional methods\u201d like static and dynamic analysis.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cToday it would not be simple to detect it by antivirus software, but this is only because nobody is looking in there,\u201d cybersecurity researcher and consultant Dr. Lukasz Olejnik told Motherboard.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Olejnik also warned that the malware extraction step in the process could also risk detection. Once the malware hidden in the model was compiled into, well, malware, then it could be picked up. It also might just be overkill.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>&nbsp;&#8220;But it&#8217;s also a problem because custom methods to extract malware from the [deep neural network] model means that the targeted systems may already be under attacker control,&#8221; he said &#8220;But if the target hosts are already under attacker control, there&#8217;s a reduced need to hide extra malware.&#8221;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>&#8220;While this is legitimate and good research, I do not think that hiding whole malware in the DNN model offers much to the attacker,\u201d he added.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>The researchers noted in the study that they hoped that this could \u201cprovide a referenceable scenario for the defense on neural network-assisted attacks.\u201d They did not return Motherboard\u2019s request for comment.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.845303867403\"><\/p>\n<p>This isn&#8217;t the first time that researchers have looked into how neural networks can be exploited by malicious actors, such as with <a href=\"https:\/\/www.vice.com\/en\/article\/78xxad\/theres-a-bit-of-a-flaw-in-the-way-artificial-intelligence-is-being-developed\"><span>images designed to confuse<\/span><\/a> them or <a href=\"https:\/\/arxiv.org\/pdf\/2107.07240.pdf\" target=\"_blank\" rel=\"noopener\"><span>by embedding backdoor<\/span><\/a>s that would cause models to misbehave. If neural networks really are the future of hacking, this could become a new threat to large companies as malware campaigns increase.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cWith the popularity of AI, AI-assisted attacks will emerge and bring new challenges for computer security. Network attack and defense are interdependent,\u201d the paper notes. \u201cWe hope the proposed scenario will contribute to future protection efforts.\u201d<\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32489\/Researchers-Hid-Malware-Inside-An-AIs-Neurons-And-It-Worked-Scarily-Well.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[592],"class_list":["post-41955","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinemalware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Hid Malware Inside An AI&#039;s Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Hid Malware Inside An AI&#039;s Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-22T15:11:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researchers Hid Malware Inside An AI&#8217;s Neurons And It Worked Scarily Well\",\"datePublished\":\"2021-07-22T15:11:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/\"},\"wordCount\":850,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"keywords\":[\"headline,malware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/\",\"name\":\"Researchers Hid Malware Inside An AI's Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2021-07-22T15:11:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researchers Hid Malware Inside An AI&#8217;s Neurons And It Worked Scarily Well\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Hid Malware Inside An AI's Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Hid Malware Inside An AI's Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-22T15:11:40+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researchers Hid Malware Inside An AI&#8217;s Neurons And It Worked Scarily Well","datePublished":"2021-07-22T15:11:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/"},"wordCount":850,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"keywords":["headline,malware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/","url":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/","name":"Researchers Hid Malware Inside An AI's Neurons And It Worked Scarily Well 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2021-07-22T15:11:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researchers-hid-malware-inside-an-ais-neurons-and-it-worked-scarily-well\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalware\/"},{"@type":"ListItem","position":3,"name":"Researchers Hid Malware Inside An AI&#8217;s Neurons And It Worked Scarily Well"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41955"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41955\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}