The Criminal Use Of AI Is Increasing 

An onslaught of new cyber attacks techniques has been developed by criminals to subvert established security measures.  Today, those responsible for cyber security in organisations must anticipate the evolving range of threats they face and modify the measures they take to defend their networks.

In particular, they face a new threat as criminals transition to using Artificial Intelligence (AI) to deliver a whole new level of threats - highly convincing phishing emails and automated cyber attacks. The dynamic nature of AI-driven attacks often renders static defence mechanisms ineffective. 

Traditional cyber security measures, like antivirus software, firewalls, and intrusion detection systems, struggle to keep pace, highlighting the need for more adaptive and advanced cyber security strategies. Some of the most notable emerging threats stem from the rapid uptake of AI and cyber security professionals have witnessed hackers adopt AI at speed, in many cases faster than enterprise SecOps and cybersecurity teams.

With the rise of generative AI systems like ChatGPT and Google Bard, AI is becoming embedded in our everyday lives with growing excitement around what these tools are capable of doing. 

The threat landscape surrounding AI is expanding at an alarming rate. Between January to February 2023,researchers at leading AI-driven cyber security firm  Darktrace observed a 135% increase in “novel social engineering” attacks, corresponding with the widespread adoption of ChatGPT.

AI is a double-edged sword in cyber security. Its use by cyber attackers is still in its infancy, but Darktrace expects that the mass availability of generative AI tools like ChatGPT will significantly enhance attackers’ capabilities by providing better tools to generate and automate human-like attacks. 

As organisations increase their digital capabilities across hybrid, multicloud, and Internet-of-things (IoT) environments, they gain more areas to protect and control. 

It also enables criminals to damage operational reliability, undertake new types of crimes, that will lead to even faster and more effective AI-powered attacks and exploits. This type of offensive AI can supercharge criminal attacks, intelligently shifting attack techniques, without human input. 

Currently there are three areas where Darktrace sees potential for AI to significantly enhance the capabilities of attackers:

  • Increasing the sophistication of low-level threat actors.
  • Increasing the speed of attacks through automation.
  • Eroding trust among users.

Attack data collected between May and July underscore a trend where cyber criminals are increasingly using social engineering techniques to deliver multistage payloads. Darktrace report a 59% increase in malicious emails sent to potential victims that encourages them to follow a series of steps before delivering a malicious payload or attempting to harvest sensitive information. "Nearly 50,000 more of these attacks were detected by Darktrace in July than May, indicating potential use of automation, and the speed of these types of attacks will likely rise as greater automation and AI are adopted and applied by attackers," according to the Darktrace Cyber AI Research Centre.

The multistage payload technique saw the rise in Quishing, phishing using QR codes, which researchers said indicated the use of automation in attacks.

The common denominator in multistage attacks and one-and-done phishing attacks is persuasive and believable text-based communication. Darktrace's research is based on analysis of its own customers and, while it did not conclude that AI was being used in these attacks, it does assert that AI technology could easily be leveraged to streamline attacks. Among the types of products that use AI are antivirus and antimalware, data loss prevention, fraud detection/anti-fraud, identity and access management, intrusion detection/prevention system, and risk and compliance management. 

According to Darktrace, phishing emails impersonating senior executives are down 11%. Attackers switched to impersonating company IT teams, which are up 19%, as employees caught on to the VIP impersonation ruse, according to Darktrace’s data. “While it’s common for attackers to pivot and adjust their techniques as efficacy declines, generative AI, particularly deepfakes, has the potential to disrupt this pattern in favor of attackers,” according to Jack Stockdale, Darktrace’s chief technology officer.   

While Generative AI is a significant new tool for cyber criminals to develop attacks at speed, it can equally have a positive impact to improve enterprise cyber security in target organisations. 

Owen Morris, Director of Enterprise Architecture at Doherty Associates, commented, “It’s clear to see that generative AI is changing the cyber security landscape... what we need to be most concerned about is an arms race in the use of AI, with black-hats adopting it quickly and white-hats needing to do the same. While generative AI can support threat analysts, it is also giving threat actors the capabilities to write scripts that they previously lacked the technical expertise to execute, so business leaders now need to make sure their organisations are equipped to respond to a potential increase in threats."  

Patrick Haar, the CEO of SlashNext, commented “With the increase in sophistication and volume of threats attacking organisations on all devices, generative AI-based security provides organisations with a fighting chance at stopping these breaches.” 

Nicole Carignan, Darktrace' vice president of Strategic Cyber AI, said organisations must also entrust AI to interrupt in-progress, sophisticated attacks. “Adoption will need to increase in the future as novel threats become the new normal,” 

Constantly changing malware signatures can help attackers evade static defenses such as firewalls and perimeter detection systems. 

Similarly, AI-powered malware can sit inside a system, collecting data and observing user behavior up until it’s ready to launch another phase of an attack or send out information it has collected with relatively low risk of detection, demonstrating a whole new level of threat that cyber security professionals must adapt to dealing with. 

Darktrace:      Darktrace:    SCMagazine:    CSO Online:     Forrester:    CNBC:    Forbes

Image: igor-omilaev

You Might Also Read: 

A Microchip To Reshape Artificial Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defenders Of The Cybersecurity Command Centre  
Half Of Cyber Attacks On British Organisations Succeed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.