Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail

Posted on August 25, 2025August 25, 2025 By CWS

Autonomous automobiles and lots of different automated programs are managed by AI; however the AI could possibly be managed by malicious attackers taking up the AI’s weights.

Weights inside AI’s deep neural networks signify the fashions’ studying and the way it’s used. A weight is normally outlined in a 32-bit phrase, and there may be a whole lot of billions of bits concerned on this AI ‘reasoning’ course of. It’s a no-brainer that if an attacker controls the weights, the attacker controls the AI.

A analysis workforce from George Mason College, led by affiliate professor Qiang Zeng, introduced a paper (PDF) at this yr’s August USENIX Safety Symposium describing a course of that may flip a single bit to change a focused weight. The impact might change a benign and useful final result to a doubtlessly harmful and disastrous final result.

Instance results might alter an AV’s interpretation of its atmosphere (for instance, recognizing a cease signal at the least velocity signal), or a facial recognition system (for instance, deciphering anybody sporting a specified kind of glasses as the corporate CEO). And let’s not even think about the hurt that could possibly be executed via altering the result of a medical imaging system.

All that is attainable. It’s tough, however achievable. Flipping a particular bit can be comparatively simple with Rowhammer. (By deciding on which rows to hammer, an attacker can flip particular bits in reminiscence). Discovering an acceptable bit to flip among the many a number of billions in use is advanced, however may be executed offline if the attacker has white-box entry to the mannequin. The researchers have largely automated the method of finding appropriate single bits that could possibly be flipped to dramatically change particular person weight worth. Since this is only one weight amongst a whole lot of tens of millions it is not going to have an effect on the efficiency of the mannequin. The AI compromise could have built-in stealth, and the reason for any resultant ‘accident’ would most likely by no means be found.

The attacker then crafts, once more offline, a set off focusing on this one weight. “They use the method x’ = (1-m)·x + m·Δ, the place x is a traditional enter, Δ is the set off sample, and m is a masks. The optimization balances two targets: making the set off activate neuron N1 with excessive output values, whereas preserving the set off visually imperceptible,” write the researchers in a separate weblog.

Lastly, the Rowhammer motion and set off are inserted (by any appropriate exploit means) into the web AI mannequin. There it sits, imperceptible and dormant, till the mannequin is triggered by the focused sensor enter.

The assault has been dubbed OneFlip. “OneFlip,” writes Zeng within the Usenix paper, “assumes white-box entry, that means the attacker should acquire the goal mannequin, whereas many corporations hold their fashions confidential. Second, the attacker-controlled course of should reside on the identical bodily machine because the goal mannequin, which can be tough to attain. Total, we conclude that whereas the theoretical dangers are non-negligible, the sensible danger stays low.” 

The mixed impact of those difficulties suggests a low risk stage from financially motivated cybercriminals – they like to assault low-hanging fruit with a excessive ROI. However it’s not a risk that needs to be ignored by AI builders and customers. It might already be employed by elite nation state actors the place the ROI is measured by political impact somewhat than monetary return.Commercial. Scroll to proceed studying.

Moreover, Zeng advised SecurityWeek, “The sensible danger is excessive if the attacker has average sources/information. The assault requires solely two circumstances: firstly, the attacker is aware of the mannequin weights, and secondly the AI system and attacker code run on the identical bodily machine. Since massive corporations similar to Meta and Google typically prepare fashions after which open-source or promote them, the primary situation is definitely glad. For the second situation, attackers could exploit shared infrastructure in cloud environments the place a number of tenants run on the identical {hardware}. Equally, on desktops or smartphones, a browser can execute each the attacker’s code and the AI system.”

Safety should all the time look to the potential way forward for assaults somewhat than simply the present risk state. Take into account deepfakes. Only some years in the past, they had been a identified and sometimes used assault, however not extensively and never all the time efficiently. At present, aided by AI, they’ve grow to be a significant, harmful, frequent, and profitable assault vector.

Zeng added, “When the 2 circumstances we point out are met, our launched code can already automate a lot of the assault – for instance, figuring out which bit to flip. Additional analysis might make such assaults much more sensible. One open problem, which is on our analysis agenda, is how an attacker would possibly nonetheless mount an efficient backdoor assault with out realizing the mannequin’s weights.”

The warning in Zeng’s analysis is that each AI builders and AI customers ought to concentrate on the potential of OneFlip and put together attainable mitigations as we speak.

Associated: Pink Groups Jailbreak GPT-5 With Ease, Warn It’s ‘Practically Unusable’ for Enterprise

Associated: AI Guardrails Beneath Fireplace: Cisco’s Jailbreak Demo Exposes AI Weak Factors

Associated: Grok-4 Falls to a Jailbreak Two Days After Its Launch

Associated: GPT-5 Has a Vulnerability: Its Router Can Ship You to Older, Much less Secure Fashions

Security Week News Tags:Crash, Emerging, Facial, Fail, OneFlip, Recognition, Threat, Vehicles

Post navigation

Previous Post: Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
Next Post: UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

Related Posts

Organizations Warned of Exploited PaperCut Flaw Security Week News
Email Protection Startup StrongestLayer Emerges From Stealth Mode Security Week News
The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Telecom Giant Orange Hit by Cyberattack Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News