{"id":9030,"date":"2018-08-09T20:00:05","date_gmt":"2018-08-09T20:00:05","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=84787"},"modified":"2018-08-09T20:00:05","modified_gmt":"2018-08-09T20:00:05","slug":"protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/","title":{"rendered":"Protecting the protector: Hardening machine learning defenses against adversarial attacks"},"content":{"rendered":"<p>Harnessing the power of machine learning and artificial intelligence has enabled Windows Defender Advanced Threat Protection (<a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a>) <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/windows-defender-antivirus-in-windows-10?ocid=cx-blog-mmpc\">next-generation protection<\/a> to stop new malware attacks before they can get started \u2013 often within milliseconds. These predictive technologies are central to scaling protection and delivering effective threat prevention in the face of unrelenting attacker activity.<\/p>\n<p>Consider this: On a recent typical day, 2.6 million people encountered newly discovered malware in 232 different countries (Figure 1). These attacks were comprised of 1.7 million distinct, first-seen malware and 60% of these campaigns were finished within the hour.<\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84895\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2.png\" alt=\"\" width=\"900\" height=\"432\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2.png 900w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2-300x144.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2-768x369.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2-330x158.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2-800x384.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig01-a-single-day-of-malware-attacks-2-400x192.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><\/em><\/p>\n<p><em>Figure 1. A single day of malware attacks: 2.6M people from 232 countries encountering malware<\/em><\/p>\n<p>While intelligent, cloud-based approaches represent a sea change in the fight against malware, attackers are not sitting idly by and letting advanced ML and AI systems eat their Bitcoin-funded lunch. If they can find a way to defeat machine learning models at the heart of next-gen AV solutions, even for a moment, they\u2019ll gain the breathing room to launch a successful campaign.<\/p>\n<p>Today at Black Hat USA 2018, in our talk \u201c<a href=\"https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/index.html#protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks-11669\">Protecting the Protector: Hardening Machine Learning Defenses Against Adversarial Attacks<\/a>\u201d, we presented a series of lessons learned from our experience investigating attackers attempting to defeat our ML and AI protections. We share these lessons in this blog post; we use a case study to demonstrate how these same lessons have hardened Microsoft\u2019s defensive solutions in the real world. We hope these lessons will help provide defensive strategies on deploying ML in the fight against emerging threats.<\/p>\n<h2>Lesson: Use a multi-layered approach<\/h2>\n<p>In our <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/12\/11\/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses\/\">layered ML approach<\/a>, defeating one layer does not mean evading detection, as there are still opportunities to detect the attack at the next layer, albeit with an increase in time to detect. To prevent detection of first-seen malware, an attacker would need to find a way to defeat each of the first three layers in our ML-based protection stack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84802\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach.png\" alt=\"\" width=\"900\" height=\"530\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach.png 900w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach-300x177.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach-768x452.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach-330x194.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach-800x471.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig02-multilayer-approach-400x236.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 2. Layered ML protection<\/em><\/p>\n<p>Even if the first three layers were circumvented, leading to \u201cpatient zero\u201d being infected by the malware, the next layers can still uncover the threat and start protecting other users as soon as these layers reach a malware verdict.<\/p>\n<h2>Lesson: Leverage the power of the cloud<\/h2>\n<p>ML models trained on the backend and shipped to the client are the first (and fastest) layer in our ML-based stack. They come with some drawbacks, not least of which is that an attacker can take the model and apply pressure until it gives up its secrets. This is a very old trick in the malware author\u2019s playbook: iteratively tweak prospective threats and keep scanning it until it\u2019s no longer detected, then unleash it.<\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84898\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2.png\" alt=\"\" width=\"950\" height=\"360\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2.png 950w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2-300x114.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2-768x291.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2-330x125.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2-800x303.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig03-Client-vs-cloud-models-2-400x152.png 400w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\"\/><\/em><\/p>\n<p><em>Figure 3. Client vs. cloud models<\/em><\/p>\n<p>With models hosted in the cloud, it becomes more challenging to brute-force the model. Because the only way to understand what the models may be doing is to keep sending requests to the cloud protection system, such attempts to game the system are \u201cout in the open\u201d and can be detected and mitigated in the cloud.<\/p>\n<h2>Lesson: Use a diverse set of models<\/h2>\n<p>In addition to having multiple layers of ML-based protection, within each layer we run numerous individual ML models trained to recognize new and emerging threats. Each model has its own focus, or \u201carea of expertise.\u201d Some may focus on a specific file type (for example, PE files, VBA macros, JavaScript, etc.) while others may focus on attributes of a potential threat (for example, behavioral signals, fuzzy hash\/distance to known malware, etc.). Different models use different ML algorithms and train on their own unique set of features.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84901\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3.png\" alt=\"\" width=\"900\" height=\"409\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3.png 2200w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-300x136.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-768x349.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-1024x465.png 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-330x150.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-800x364.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig04-Diversity-machine-learning-3-400x182.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 4. Diversity of machine learning models<\/em><\/p>\n<p>Each stand-alone model gives its own independent verdict about the likelihood that a potential threat is malware. The diversity, in addition to providing a robust and multi-faceted look at potential threats, offers stronger protection against attackers finding some underlying weakness in any single algorithm or feature set.<\/p>\n<h2>Lesson: Use stacked ensemble models<\/h2>\n<p>Another effective approach we\u2019ve found to add resilience against adversarial attacks is to use ensemble models. While individual models provide a prediction scoped to a particular area of expertise, we can treat those individual predictions as features to additional \u201censemble\u201d machine learning models, combining the results from our diverse set of \u201cbase classifiers\u201d to create even stronger predictions that are more resilient to attacks.<\/p>\n<p>In particular, we\u2019ve found that logistic stacking, where we include the individual probability scores from each \u201cbase classifier\u201d in the ensemble feature set provides increased effectiveness of malware prediction.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84904\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2.png\" alt=\"\" width=\"750\" height=\"680\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2.png 750w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2-300x272.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2-276x250.png 276w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2-330x299.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig05-Ensemble-machine-learning-model-2-400x363.png 400w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\"\/><em>Figure 5. Ensemble machine learning model with individual model probabilities as feature inputs<\/em><\/p>\n<p>As discussed in detail in our Black Hat talk, experimental verification and real-world performance shows this approach helps us resist adversarial attacks. In June, the ensemble models represented nearly 12% of our total malware blocks from cloud protection, which translates into tens of thousands of computers protected by these new models every day.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84811\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud.png\" alt=\"\" width=\"450\" height=\"390\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud.png 615w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud-300x260.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud-288x250.png 288w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud-330x286.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig06-blocks-by-ensemble-vs-other-cloud-400x347.png 400w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"\/><em>Figure 6. Blocks by ensemble models vs. other cloud blocks<\/em><\/p>\n<h2>Case study: Ensemble models vs. regional banking Trojan<\/h2>\n<p><em>\u201cThe idea of ensemble learning is to build a prediction model by combining the strengths of a collection of simpler base models.\u201d<\/em><br \/><em>\u2014 Trevor Hastie, Robert Tibshirani, Jerome Friedman<\/em><\/p>\n<p>One of the key advantages of ensemble models is the ability to make a high-fidelity prediction from a series of lower-fidelity inputs. This can sometimes seem a little spooky and counter-intuitive to researchers, but uses cases we\u2019ve studied show this approach can catch malware that the singular models cannot. That\u2019s what happened in early June when a new banking trojan (detected by Windows Defender ATP as TrojanDownloader:VBS\/Bancos) targeting users in Brazil was unleashed.<\/p>\n<h3>The attack<\/h3>\n<p>The attack started with spam e-mail sent to users in Brazil, directing them to download an important document with a name like \u201cDoc062108.zip\u201d inside of which was a \u201cdocument\u201d that is really a highly obfuscated .vbs script.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84814\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig07-Initial-infection-chain.png\" alt=\"\" width=\"700\" height=\"194\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig07-Initial-infection-chain.png 700w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig07-Initial-infection-chain-300x83.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig07-Initial-infection-chain-330x91.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig07-Initial-infection-chain-400x111.png 400w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\"\/><em>Figure 7. Initial infection chain<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84817\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script.png\" alt=\"\" width=\"900\" height=\"542\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script.png 1339w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-300x181.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-768x462.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-1024x616.png 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-330x199.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-800x482.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig08-Obfuscated-vbs-script-400x241.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 8. Obfuscated malicious .vbs script<\/em><\/p>\n<p>While the script contains several Base64-encoded Brazilian poems, its true purpose is to:<\/p>\n<ul>\n<li>Check to make sure it\u2019s running on a machine in Brazil<\/li>\n<li>Check with its command-and-control server to see if the computer has already been infected<\/li>\n<li>Download other malicious components, including a Google Chrome extension<\/li>\n<li>Modify the shortcut to Google Chrome to run a different malicious .vbs file<\/li>\n<\/ul>\n<p>Now whenever the user launches Chrome, this new .vbs malware instead runs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84820\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig09-modified-Chrome-shortcut.png\" alt=\"\" width=\"363\" height=\"496\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig09-modified-Chrome-shortcut.png 363w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig09-modified-Chrome-shortcut-220x300.png 220w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig09-modified-Chrome-shortcut-183x250.png 183w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig09-modified-Chrome-shortcut-256x350.png 256w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\"\/><em>Figure 9. Modified shortcut to Google Chrome<\/em><\/p>\n<p>This new .vbs file runs a .bat file that:<\/p>\n<ul>\n<li>Kills any running instances of Google Chrome<\/li>\n<li>Copies the malicious Chrome extension into %UserProfile%\\Chrome<\/li>\n<li>Launches Google Chrome with the \u201c\u2014load-extension=\u201d parameter pointing to the malicious extension<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84823\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file.png\" alt=\"\" width=\"885\" height=\"330\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file.png 885w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file-300x112.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file-768x286.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file-330x123.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file-800x298.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig10-Malcious-bat-file-400x149.png 400w\" sizes=\"auto, (max-width: 885px) 100vw, 885px\"\/><em>Figure 10. Malicious .bat file that loads the malicious Chrome extension<\/em><\/p>\n<p>With the .bat file\u2019s work done, the user\u2019s Chrome instance is now running the malicious extension.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84826\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig11-Chrome-extension.png\" alt=\"\" width=\"521\" height=\"256\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig11-Chrome-extension.png 521w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig11-Chrome-extension-300x147.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig11-Chrome-extension-330x162.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig11-Chrome-extension-400x197.png 400w\" sizes=\"auto, (max-width: 521px) 100vw, 521px\"\/><em>Figure 11. The installed Chrome extension<\/em><\/p>\n<p>The extension itself runs malicious JavaScript (.js) files on every web page visited.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84829\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig12-Inside-mallicious-Chrome-extension.png\" alt=\"\" width=\"624\" height=\"321\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig12-Inside-mallicious-Chrome-extension.png 624w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig12-Inside-mallicious-Chrome-extension-300x154.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig12-Inside-mallicious-Chrome-extension-330x170.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig12-Inside-mallicious-Chrome-extension-400x206.png 400w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\"\/><em>Figure 12. Inside the malicious Chrome extension<\/em><\/p>\n<p>The .js files are highly obfuscated to avoid detection:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84832\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file.png\" alt=\"\" width=\"900\" height=\"490\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file.png 1349w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-300x163.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-768x418.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-1024x558.png 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-330x180.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-800x436.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig13-Obfuscated-js-file-400x218.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 13. Obfuscated .js file<\/em><\/p>\n<p>Decoding the hex at the start of the script, we can start to see some clues that this is a banking trojan:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84835\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script.png\" alt=\"\" width=\"900\" height=\"82\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script.png 1353w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-300x27.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-768x70.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-1024x94.png 1024w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-330x30.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-800x73.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig14-Clues-in-script-400x37.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 14. Clues in script show its true intention<\/em><\/p>\n<p>The .js files detect whether the website visited is a Brazilian banking site. If it is, the POST to the site is intercepted and sent to the attacker\u2019s C&amp;C to gather the user\u2019s login credentials, credit card info, and other info before being passed on to the actual banking site. This activity is happening behind the scenes; to the user, they\u2019re just going about their normal routine with their bank.<\/p>\n<h3>Ensemble models and the malicious JavaScript<\/h3>\n<p>As the attack got under way, our cloud protection service received thousands of queries about the malicious .js files, triggered by a client-side ML model that considered these files suspicious. The files were highly polymorphic, with every potential victim receiving a unique, slightly altered version of the threat:<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84838\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig15-Polymorhic-malware.png\" alt=\"\" width=\"758\" height=\"367\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig15-Polymorhic-malware.png 758w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig15-Polymorhic-malware-300x145.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig15-Polymorhic-malware-330x160.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig15-Polymorhic-malware-400x194.png 400w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\"\/><em>Figure 15. Polymorphic malware<\/em><\/p>\n<p>The interesting part of the story are these malicious JavaScript files. How did our ML models perform detecting these highly obfuscated scripts as malware? Let\u2019s look at one of instances. At the time of the query, we received metadata about the file. Here\u2019s a snippet:<\/p>\n<table cellspacing=\"10\" cellpadding=\"10\" align=\"center\">\n<tbody>\n<tr>\n<td><strong>Report time<\/strong><\/td>\n<td>2018-06-14 01:16:03Z<\/td>\n<\/tr>\n<tr>\n<td><strong>SHA-256<\/strong><\/td>\n<td>1f47ec030da1b7943840661e32d0cb7a59d822e400063cd17dc5afa302ab6a52<\/td>\n<\/tr>\n<tr>\n<td><strong>Client file type model<\/strong><\/td>\n<td>SUSPICIOUS<\/td>\n<\/tr>\n<tr>\n<td><strong>File name<\/strong><\/td>\n<td>vNSAml.js<\/td>\n<\/tr>\n<tr>\n<td><strong>File size<\/strong><\/td>\n<td>28074<\/td>\n<\/tr>\n<tr>\n<td><strong>Extension<\/strong><\/td>\n<td>.js<\/td>\n<\/tr>\n<tr>\n<td><strong>Is PE file<\/strong><\/td>\n<td>FALSE<\/td>\n<\/tr>\n<tr>\n<td><strong>File age<\/strong><\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td><strong>File prevalence<\/strong><\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td><strong>Path<\/strong><\/td>\n<td>C:\\Users\\&lt;user&gt;\\Chrome\\1.9.6\\vNSAml.js<\/td>\n<\/tr>\n<tr>\n<td><strong>Process name<\/strong><\/td>\n<td>xcopy.exe<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Figure 16 \u2013 File metadata sent during query to cloud protection service<\/em><\/p>\n<p>Based on the process name, this query was sent when the .bat file copied the .js files into the %UserProfile%\\Chrome directory.<\/p>\n<p>Individual metadata-based classifiers evaluated the metadata and provided their probability scores. Ensemble models then used these probabilities, along with other features, to reach their own probability scores:<\/p>\n<table cellspacing=\"10\" cellpadding=\"10\" align=\"center\">\n<tbody>\n<tr>\n<th><strong>Model<\/strong><\/th>\n<th><strong>Probability that file is malware<\/strong><\/th>\n<\/tr>\n<tr>\n<td>Fuzzy hash 1<\/td>\n<td bgcolor=\"#FCFCFF\">0.01<\/td>\n<\/tr>\n<tr>\n<td>Fuzzy hash 2<\/td>\n<td bgcolor=\"#FCF4F7\">0.06<\/td>\n<\/tr>\n<tr>\n<td>ResearcherExpertise<\/td>\n<td bgcolor=\"#FA9698\">0.64<\/td>\n<\/tr>\n<tr>\n<td>Ensemble 1<\/td>\n<td bgcolor=\"#F97375\">0.85<\/td>\n<\/tr>\n<tr>\n<td>Ensemble 2<\/td>\n<td bgcolor=\"#F8696B\">0.91<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Figure 17. Probability scores by individual classifiers<\/em><\/p>\n<p>In this case, the second ensemble model had a strong enough score for the cloud to issue a blocking decision. Even though none of the individual classifiers in this case had a particularly strong score, the ensemble model had learned from training on millions of clean and malicious files that this combination of scores, in conjunction with a few other non-ML based features, indicated the file had a very strong likelihood of being malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84910\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2.png\" alt=\"\" width=\"600\" height=\"677\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2.png 600w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2-266x300.png 266w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2-222x250.png 222w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2-310x350.png 310w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/08\/Fig18-Ensemble-models-issue-block-2-400x451.png 400w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\"\/><em>Figure 18. Ensemble models issue a blocking decision<\/em><\/p>\n<p>As the queries on the malicious .js files rolled in, the cloud issued blocking decisions within a few hundred milliseconds using the ensemble model\u2019s strong probability score, enabling Windows Defender ATP\u2019s antivirus capabilities to prevent the malicious .js from running and remove it. Here is a map overlay of the actual ensemble-based blocks of the malicious JavaScript files at the time:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-84844\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model.png\" alt=\"\" width=\"900\" height=\"432\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model.png 900w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model-300x144.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model-768x369.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model-330x158.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model-800x384.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/sites\/13\/2018\/09\/Fig19-blocks-by-ensemble-model-400x192.png 400w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"\/><em>Figure 19. Blocks by ensemble model of malicious JavaScript used in the attack<\/em><\/p>\n<p>Ensemble ML models enabled <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a>\u2019s <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/windows-defender-antivirus-in-windows-10?ocid=cx-blog-mmpc\">next-gen protection<\/a> to defend thousands of customers in Brazil targeted by the unscrupulous attackers from having a potentially bad day, while ensuring the frustrated malware authors didn\u2019t hit the big pay day they were hoping for. Bom dia.<\/p>\n<h3>Further reading on machine learning and artificial intelligence in Windows Defender ATP<\/h3>\n<h3>Indicators of compromise (IoCs)<\/h3>\n<ul>\n<li><em>Doc062018.zip<\/em> (SHA-256: 93f488e4bb25977443ff34b593652bea06e7914564af5721727b1acdd453ced9)<\/li>\n<li><em>Doc062018-2.vbs<\/em> (SHA-256: 7b1b7b239f2d692d5f7f1bffa5626e8408f318b545cd2ae30f44483377a30f81)<\/li>\n<li><em>zobXhz.js<\/em> 1f47(SHA-256: ec030da1b7943840661e32d0cb7a59d822e400063cd17dc5afa302ab6a52)<\/li>\n<\/ul>\n<p><strong><em>Randy Treit, Holly Stewart, Jugal Parikh<\/em><\/strong><br \/><em>Windows Defender Research<\/em><br \/><em>with special thanks to Allan Sepillo and Samuel Wakasugui<\/em><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83215\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8.png\" alt=\"\" width=\"820\" height=\"150\" srcset=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8.png 820w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8-300x55.png 300w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8-768x140.png 768w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8-330x60.png 330w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8-800x146.png 800w, https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8-400x73.png 400w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\"\/><\/a><\/p>\n<hr\/>\n<h4><strong>Talk to us<\/strong><\/h4>\n<p>Questions, concerns, or insights on this story? Join discussions at the <a target=\"_blank\" href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" rel=\"noopener\">Microsoft community<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>Follow us on Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/WDSecurity\" rel=\"noopener\">@WDSecurity<\/a> and Facebook <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/MsftWDSI\/\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/08\/09\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Harnessing the power of machine learning and artificial intelligence has enabled Windows Defender Advanced Threat Protection (Windows Defender ATP) next-generation protection to stop new malware attacks before they can get started often within milliseconds. These predictive technologies are central to scaling protection and delivering effective threat prevention in the face of unrelenting attacker activity. Read more READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[349,347,351,232,1635,717,718,1068],"class_list":["post-9030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-artificial-intelligence","tag-cybersecurity","tag-machine-learning","tag-windows-10","tag-windows-defender","tag-windows-defender-antivirus","tag-windows-defender-atp","tag-windows-defender-av"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-09T20:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Protecting the protector: Hardening machine learning defenses against adversarial attacks\",\"datePublished\":\"2018-08-09T20:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/\"},\"wordCount\":1843,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png\",\"keywords\":[\"artificial intelligence\",\"Cybersecurity\",\"machine learning\",\"Windows 10\",\"Windows Defender\",\"Windows Defender Antivirus\",\"Windows Defender ATP\",\"Windows Defender AV\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/\",\"name\":\"Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png\",\"datePublished\":\"2018-08-09T20:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png\",\"width\":900,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"artificial intelligence\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/artificial-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting the protector: Hardening machine learning defenses against adversarial attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-09T20:00:05+00:00","og_image":[{"width":900,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Protecting the protector: Hardening machine learning defenses against adversarial attacks","datePublished":"2018-08-09T20:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/"},"wordCount":1843,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png","keywords":["artificial intelligence","Cybersecurity","machine learning","Windows 10","Windows Defender","Windows Defender Antivirus","Windows Defender ATP","Windows Defender AV"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/","name":"Protecting the protector: Hardening machine learning defenses against adversarial attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png","datePublished":"2018-08-09T20:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks.png","width":900,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"artificial intelligence","item":"https:\/\/www.threatshub.org\/blog\/tag\/artificial-intelligence\/"},{"@type":"ListItem","position":3,"name":"Protecting the protector: Hardening machine learning defenses against adversarial attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=9030"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/9031"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=9030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=9030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=9030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}