The Criminal Use Of AI Is Increasing 

An onslaught of new cyber attacks techniques has been developed by criminals to subvert established security measures.  Today, those responsible for cyber security in organisations must anticipate the evolving range of threats they face and modify the measures they take to defend their networks.

In particular, they face a new threat as criminals transition to using Artificial Intelligence (AI) to deliver a whole new level of threats - highly convincing phishing emails and automated cyber attacks. The dynamic nature of AI-driven attacks often renders static defence mechanisms ineffective. 

Traditional cyber security measures, like antivirus software, firewalls, and intrusion detection systems, struggle to keep pace, highlighting the need for more adaptive and advanced cyber security strategies. Some of the most notable emerging threats stem from the rapid uptake of AI and cyber security professionals have witnessed hackers adopt AI at speed, in many cases faster than enterprise SecOps and cybersecurity teams.

With the rise of generative AI systems like ChatGPT and Google Bard, AI is becoming embedded in our everyday lives with growing excitement around what these tools are capable of doing. 

The threat landscape surrounding AI is expanding at an alarming rate. Between January to February 2023,researchers at leading AI-driven cyber security firm  Darktrace observed a 135% increase in “novel social engineering” attacks, corresponding with the widespread adoption of ChatGPT.

AI is a double-edged sword in cyber security. Its use by cyber attackers is still in its infancy, but Darktrace expects that the mass availability of generative AI tools like ChatGPT will significantly enhance attackers’ capabilities by providing better tools to generate and automate human-like attacks. 

As organisations increase their digital capabilities across hybrid, multicloud, and Internet-of-things (IoT) environments, they gain more areas to protect and control. 

It also enables criminals to damage operational reliability, undertake new types of crimes, that will lead to even faster and more effective AI-powered attacks and exploits. This type of offensive AI can supercharge criminal attacks, intelligently shifting attack techniques, without human input. 

Currently there are three areas where Darktrace sees potential for AI to significantly enhance the capabilities of attackers:

  • Increasing the sophistication of low-level threat actors.
  • Increasing the speed of attacks through automation.
  • Eroding trust among users.

Attack data collected between May and July underscore a trend where cyber criminals are increasingly using social engineering techniques to deliver multistage payloads. Darktrace report a 59% increase in malicious emails sent to potential victims that encourages them to follow a series of steps before delivering a malicious payload or attempting to harvest sensitive information. "Nearly 50,000 more of these attacks were detected by Darktrace in July than May, indicating potential use of automation, and the speed of these types of attacks will likely rise as greater automation and AI are adopted and applied by attackers," according to the Darktrace Cyber AI Research Centre.

The multistage payload technique saw the rise in Quishing, phishing using QR codes, which researchers said indicated the use of automation in attacks.

The common denominator in multistage attacks and one-and-done phishing attacks is persuasive and believable text-based communication. Darktrace's research is based on analysis of its own customers and, while it did not conclude that AI was being used in these attacks, it does assert that AI technology could easily be leveraged to streamline attacks. Among the types of products that use AI are antivirus and antimalware, data loss prevention, fraud detection/anti-fraud, identity and access management, intrusion detection/prevention system, and risk and compliance management. 

According to Darktrace, phishing emails impersonating senior executives are down 11%. Attackers switched to impersonating company IT teams, which are up 19%, as employees caught on to the VIP impersonation ruse, according to Darktrace’s data. “While it’s common for attackers to pivot and adjust their techniques as efficacy declines, generative AI, particularly deepfakes, has the potential to disrupt this pattern in favor of attackers,” according to Jack Stockdale, Darktrace’s chief technology officer.   

While Generative AI is a significant new tool for cyber criminals to develop attacks at speed, it can equally have a positive impact to improve enterprise cyber security in target organisations. 

Owen Morris, Director of Enterprise Architecture at Doherty Associates, commented, “It’s clear to see that generative AI is changing the cyber security landscape... what we need to be most concerned about is an arms race in the use of AI, with black-hats adopting it quickly and white-hats needing to do the same. While generative AI can support threat analysts, it is also giving threat actors the capabilities to write scripts that they previously lacked the technical expertise to execute, so business leaders now need to make sure their organisations are equipped to respond to a potential increase in threats."  

Patrick Haar, the CEO of SlashNext, commented “With the increase in sophistication and volume of threats attacking organisations on all devices, generative AI-based security provides organisations with a fighting chance at stopping these breaches.” 

Nicole Carignan, Darktrace' vice president of Strategic Cyber AI, said organisations must also entrust AI to interrupt in-progress, sophisticated attacks. “Adoption will need to increase in the future as novel threats become the new normal,” 

Constantly changing malware signatures can help attackers evade static defenses such as firewalls and perimeter detection systems. 

Similarly, AI-powered malware can sit inside a system, collecting data and observing user behavior up until it’s ready to launch another phase of an attack or send out information it has collected with relatively low risk of detection, demonstrating a whole new level of threat that cyber security professionals must adapt to dealing with. 

Darktrace:      Darktrace:    SCMagazine:    CSO Online:     Forrester:    CNBC:    Forbes

Image: igor-omilaev

You Might Also Read: 

A Microchip To Reshape Artificial Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defenders Of The Cybersecurity Command Centre  
Half Of Cyber Attacks On British Organisations Succeed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.