Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Evade detection to avoid malicious ML model of hugging face leverage
Identity

Evade detection to avoid malicious ML model of hugging face leverage

userBy userFebruary 8, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 8, 2025Ravi LakshmananArtificial Intelligence/Supply Chain Security

Malicious ML Models

Cybersecurity researchers have discovered two malicious machine learning (ML) models of faces that utilize the unusual technique of “broken” pickle files to avoid detection.

“The pickle files extracted from the mentioned Pytorch archive revealed malicious Python content at the top of the file,” Reversinglabs researcher Karlo Zanki said in a report shared with Hacker News. “In both cases, the malicious payload was a typical platform-aware reverse shell that connected to a hard-coded IP address.”

Cybersecurity

This approach is called Nullifai. This is called Nullifai because it involves ClearCut’s attempts to avoid existing safeguards introduced to identify malicious models. The embracing face repository is listed below –

GLOCKR1/BALLR7 WHO-R-U0000/00000000

The model is thought to have more proof of concept (POC) than active supply chain attack scenarios.

The pickle serialization format common to ML model distribution has been repeatedly discovered to be a security risk, as it provides a way to load arbitrary code and run it immediately after decolorization.

Malicious ML Models

The two models detected by the cybersecurity company are stored in Pytorch format. This is nothing more than a compressed pickle file. Pytorch uses ZIP format for compression by default, but I found that the identified models are compressed using the 7Z format.

As a result, this behavior allowed the model to fly under the radar, avoiding pickle scoring maliciously flagging it.

“The interesting thing about this pickle file is that the object serialization (the purpose of the pickle file) breaks right after the malicious payload is executed, causing the object to decompile to fail,” Zanki said.

Cybersecurity

Further analysis revealed that such broken pickle files could still be partially de-removed due to the inconsistencies and how de-aeration works. The open source utility was then updated to fix this bug.

“The explanation for this behavior is that the object descent is performed in turn in the pickle file,” Zanki pointed out.

“The pickle opcode is executed when it is encountered and runs until all opcode is executed or a broken instruction is encountered. For discovered models, the malicious payload at the beginning of the pickle stream is Running a model is not a run of a model because it is inserted. “Hugging Face’s existing security scan tool will detect it as unsafe.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump’s order leaves academic researchers for fear of political impact on grants
Next Article Russia – Ukraine War: A list of important events – Day 1,080 | News of the Russian-Ukraine War
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.