Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Artificial intelligence’s role in cyberattacks continues to expand
    Cyber Security

    Artificial intelligence’s role in cyberattacks continues to expand

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 19, 2024Editorial DepartmentGenerative AI/Incident Response

    cyber attack

    Today, large language models (LLMs) powered by artificial intelligence (AI) tools can be used to develop self-enhancing malware that can bypass YARA rules.

    “Generative AI can effectively reduce detection rates by enhancing the source code of small malware variants to evade string-based YARA rules,” Recorded Future said in a new report shared with The Hacker News.

    The findings are part of a red team exercise designed to uncover malicious use cases of artificial intelligence techniques that threat actors are already experimenting with to create snippets of malware code, generate phishing emails and conduct reconnaissance on potential targets.

    Internet security

    The cybersecurity firm said it submitted a known piece of malware called STEELHOOK, which is linked to the APT28 hacker group, to LLM and submitted YARA rules requiring it to modify the source code to avoid detection. , thus keeping the original functionality intact and generating original code that is syntactically error-free.

    Using this feedback mechanism, modified malware generated by LLM can avoid detection of simple string-based YARA rules.

    This approach has its limitations, most notably the amount of text the model can handle as input at one time, which makes operating on larger code bases difficult.

    In addition to modifying malware to fly under the radar, such AI tools can be used to create deepfakes impersonating senior executives and leaders and conduct influence operations that mimic legitimate websites at scale.

    Additionally, generative AI is expected to accelerate threat actors’ ability to conduct reconnaissance of critical infrastructure and gather information that may have strategic use in subsequent attacks.

    “By leveraging multimodal models, in addition to aerial imagery, public images and videos of industrial control systems and manufacturing equipment can be parsed and enriched to find additional metadata such as geographic location, equipment manufacturer, model,” the company said. and software version control.”

    Indeed, Microsoft and OpenAI warned last month that APT28 uses LL.M.s.

    Internet security

    Organizations are advised to carefully review publicly available images and videos depicting sensitive devices and sanitize them if necessary to mitigate the risk of such threats.

    This development comes as a group of academics discovered that it is possible to jailbreak LLM-powered tools and produce harmful content by passing input in ASCII art form (for example, “How to Make a Bomb”, where the word BOMB is represented by the characters “*” and a space).

    The actual attack, called ArtPrompt, “weaponized LLM’s poor performance at identifying ASCII art to bypass security measures and elicit bad behavior from LLM.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.