AI Ushers In A Whole New Era Of Hacking

Hackers won't necessarily always be human. Artificial Intelligence (AI) is a technology that also promises to revolutionize cybersecurity, could one day become the go-to hacking tool.  

Organisers of the Cyber Grand Challenge, a contest sponsored by the US defense agency DARPA, gave a glimpse of the power of AI during their August event. Seven supercomputers battled each other to show that machines can indeed find and patch software vulnerabilities.

Theoretically, the technology can be used to perfect any coding, ridding it of exploitable flaws. But what if that power was used for malicious purposes? The future of cyber defense might also pave the way for a new era of hacking.

The possible dangers

For instance, cyber-criminals might use those capabilities to scan software for previously unknown vulnerabilities and then exploit them for ill. However, unlike a human, an AI can do this with machine efficiency. Hacks that were time-consuming to develop might become cheap commodities in this nightmare scenario.

It’s a risk that the cybersecurity experts are well aware of, in a time when the tech industry is already developing self-driving cars, more advanced robots, and other forms of automation. "Technology is always frightening," said David Melski, vice president of research for GrammaTech.

Melski's company was among those that built a supercomputer to participate in August’s Cyber Grand Challenge. His firm is now considering using that technology to help vendors prevent flaws in their internet of things devices or make Internet browsers more secure.

"However, vulnerability discovery is a double-edge sword," he said. "We are also increasingly automating everything."

So it’s not hard for security experts to imagine a potential dark side, one where AIs can build or control powerful cyber weapons. Melski pointed to the case of Stuxnet, a malicious computer worm designed to disrupt Iran's nuclear program.  

"When you think about something like Stuxnet getting automated, that’s alarming," he said.

Tapping into the potential

"I don’t want to give any ideas to anyone," said Tomer Weingarten, CEO of security firm SentinelOne. But AI-driven technologies that crawl the internet, looking for vulnerabilities, might be among the future realities, he said.

That streamlining of cybercrime has already taken place. For instance, buyers on the black market can hire "rent-a-hacker" services, built with slick web interfaces and easy-to-understand commands, to pull off cybercrime like infecting computers with ransomware.  

Weingarten said it's possible these rent-a-hacker services may eventually incorporate AI technologies that can design entire attack strategies, launch them, and calculate the associated fee.  "The human attackers can then enjoy the fruits of that labor," he said.

However, the term AI is a loaded one. Tech companies may all be talking about it, but no company has created a true artificial intelligence. The industry has instead come up with technologies that can play games better than a human, act as digital assistants, or even diagnose rare diseases.

Cybersecurity firms such as Cylance have also been using a subset of AI called machine learning to stop malware. That's involved building mathematical models based on malware samples that can gauge whether certain activity on a computer is normal or not.

"Ultimately, you end up with a statistical probability that this file is good or bad," said Jon Miller, chief research officer of the security firm. More than 99 percent of the time the machine learning works to detect the malware, he said.

"We're continually adding new data, of malware samples, into the model," Miller said. "The more data you have, the more accurate you can be."

Escalation

A drawback is that using machine learning can be expensive. "We spend half a million dollars a month on computer models," he said. That money is spent on leasing cloud computing services from Amazon to run the models.

Anyone who attempts to use AI technologies for malicious purposes might face this same barrier to entry. In addition, they'll also need to secure top talent to develop the programming. But over time, the costs of computing power will inevitably decrease, Miller said.

Still, the day when hackers resort to using AI may be far off. "Why hasn’t this been done? It’s just not necessary," he said. "If you want to hack somebody, there are already enough known flaws in everything."

To this day, many hacks occur after a phishing email containing malware is sent to the target. In other instances, the victims secured their logins with weak passwords or forgot to upgrade their software with the latest patch – making them easier hack.

AI technologies like machine learning have shown the potential to resolve some of these problems, said Justin Fier, director for cyber intelligence at security firm Darktrace. But it may only be a matter of time before the hackers eventually upgrade their arsenal.

That will pit cybersecurity firms against the hackers, with AI on the frontlines. "It seems like we’re heading into a world of machine versus machine cyber warfare," Fier said.

CIO:            Five Things AI Can Do Better Than Humans:

 

« Cyber Police Stations Across India
Critical Cybersecurity Protocols To Implement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

National Security Services Group (NSSG)

National Security Services Group (NSSG)

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.