The Criminal Use Of AI Is Increasing 

An onslaught of new cyber attacks techniques has been developed by criminals to subvert established security measures.  Today, those responsible for cyber security in organisations must anticipate the evolving range of threats they face and modify the measures they take to defend their networks.

In particular, they face a new threat as criminals transition to using Artificial Intelligence (AI) to deliver a whole new level of threats - highly convincing phishing emails and automated cyber attacks. The dynamic nature of AI-driven attacks often renders static defence mechanisms ineffective. 

Traditional cyber security measures, like antivirus software, firewalls, and intrusion detection systems, struggle to keep pace, highlighting the need for more adaptive and advanced cyber security strategies. Some of the most notable emerging threats stem from the rapid uptake of AI and cyber security professionals have witnessed hackers adopt AI at speed, in many cases faster than enterprise SecOps and cybersecurity teams.

With the rise of generative AI systems like ChatGPT and Google Bard, AI is becoming embedded in our everyday lives with growing excitement around what these tools are capable of doing. 

The threat landscape surrounding AI is expanding at an alarming rate. Between January to February 2023,researchers at leading AI-driven cyber security firm  Darktrace observed a 135% increase in “novel social engineering” attacks, corresponding with the widespread adoption of ChatGPT.

AI is a double-edged sword in cyber security. Its use by cyber attackers is still in its infancy, but Darktrace expects that the mass availability of generative AI tools like ChatGPT will significantly enhance attackers’ capabilities by providing better tools to generate and automate human-like attacks. 

As organisations increase their digital capabilities across hybrid, multicloud, and Internet-of-things (IoT) environments, they gain more areas to protect and control. 

It also enables criminals to damage operational reliability, undertake new types of crimes, that will lead to even faster and more effective AI-powered attacks and exploits. This type of offensive AI can supercharge criminal attacks, intelligently shifting attack techniques, without human input. 

Currently there are three areas where Darktrace sees potential for AI to significantly enhance the capabilities of attackers:

  • Increasing the sophistication of low-level threat actors.
  • Increasing the speed of attacks through automation.
  • Eroding trust among users.

Attack data collected between May and July underscore a trend where cyber criminals are increasingly using social engineering techniques to deliver multistage payloads. Darktrace report a 59% increase in malicious emails sent to potential victims that encourages them to follow a series of steps before delivering a malicious payload or attempting to harvest sensitive information. "Nearly 50,000 more of these attacks were detected by Darktrace in July than May, indicating potential use of automation, and the speed of these types of attacks will likely rise as greater automation and AI are adopted and applied by attackers," according to the Darktrace Cyber AI Research Centre.

The multistage payload technique saw the rise in Quishing, phishing using QR codes, which researchers said indicated the use of automation in attacks.

The common denominator in multistage attacks and one-and-done phishing attacks is persuasive and believable text-based communication. Darktrace's research is based on analysis of its own customers and, while it did not conclude that AI was being used in these attacks, it does assert that AI technology could easily be leveraged to streamline attacks. Among the types of products that use AI are antivirus and antimalware, data loss prevention, fraud detection/anti-fraud, identity and access management, intrusion detection/prevention system, and risk and compliance management. 

According to Darktrace, phishing emails impersonating senior executives are down 11%. Attackers switched to impersonating company IT teams, which are up 19%, as employees caught on to the VIP impersonation ruse, according to Darktrace’s data. “While it’s common for attackers to pivot and adjust their techniques as efficacy declines, generative AI, particularly deepfakes, has the potential to disrupt this pattern in favor of attackers,” according to Jack Stockdale, Darktrace’s chief technology officer.   

While Generative AI is a significant new tool for cyber criminals to develop attacks at speed, it can equally have a positive impact to improve enterprise cyber security in target organisations. 

Owen Morris, Director of Enterprise Architecture at Doherty Associates, commented, “It’s clear to see that generative AI is changing the cyber security landscape... what we need to be most concerned about is an arms race in the use of AI, with black-hats adopting it quickly and white-hats needing to do the same. While generative AI can support threat analysts, it is also giving threat actors the capabilities to write scripts that they previously lacked the technical expertise to execute, so business leaders now need to make sure their organisations are equipped to respond to a potential increase in threats."  

Patrick Haar, the CEO of SlashNext, commented “With the increase in sophistication and volume of threats attacking organisations on all devices, generative AI-based security provides organisations with a fighting chance at stopping these breaches.” 

Nicole Carignan, Darktrace' vice president of Strategic Cyber AI, said organisations must also entrust AI to interrupt in-progress, sophisticated attacks. “Adoption will need to increase in the future as novel threats become the new normal,” 

Constantly changing malware signatures can help attackers evade static defenses such as firewalls and perimeter detection systems. 

Similarly, AI-powered malware can sit inside a system, collecting data and observing user behavior up until it’s ready to launch another phase of an attack or send out information it has collected with relatively low risk of detection, demonstrating a whole new level of threat that cyber security professionals must adapt to dealing with. 

Darktrace:      Darktrace:    SCMagazine:    CSO Online:     Forrester:    CNBC:    Forbes

Image: igor-omilaev

You Might Also Read: 

A Microchip To Reshape Artificial Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Defenders Of The Cybersecurity Command Centre  
Half Of Cyber Attacks On British Organisations Succeed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Cyber News Live (CNL)

Cyber News Live (CNL)

Cyber News Live provide vital information and raise awareness about all things 'cyber' to ensure you stay protected in the digital world.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.