Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

State-Sponsored Hackers Employ ChatGPT Cybercrime Schemes

admin by admin
Feb 19, 2024
in News
A A
0

Advanced Persistent Threat (APT) groups have been adopting and leveraging Artificial Intelligence (AI) to enhance their productivity and evade security measures employed by defenders.

With the help of their security cooperation, Microsoft and OpenAI are prepared to respond to established and new threats. Among the almost 300 distinct threat actors monitored by Microsoft Threat Intelligence are 50 ransomware gangs and 160 nation-state actors.

Cybercrime organizations, nation-state actors, and adversaries evaluate new AI technologies to determine their usefulness in attack methods.

OpenAI has recently taken action to shut down a number of accounts that were being used to generate phishing emails and malware.

These accounts were utilizing OpenAI’s natural language processing technology to create convincing and sophisticated fraudulent messages with the aim of stealing valuable information or infecting systems with malicious software.

While OpenAI’s technology is powerful and valuable, it can also be misused in harmful ways, and the organization remains committed to preventing such misuse whenever possible.

Document

Live Account Takeover Attack Simulation

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks

.


Language model support capabilities offered by LLMs are highly appealing to threat actors focusing on social engineering and other deceptive communication methods.

However, as per the OpenAI study, significant attacks using LLMs have yet to be reported. Nonetheless, this research is critical to identify early-stage movements by well-known threat actors and discuss how to block and fight them with the defensive community.

Keeping track of APT groups and their tactics, techniques, and procedures is crucial for cybersecurity experts.

Details of Some of the Notorious APT Groups and Their Targets:

  • Salmon Typhoon (SODIUM), a Chinese state-affiliated APT group, targets US defense contractors, government institutions, and cryptographic technology companies. They use malware like Win32/Wkysol to access vulnerable systems remotely.
  • Charcoal Typhoon (CHROMIUM), another Chinese state-affiliated APT group, targets government, higher education, communications infrastructure, oil & gas, and IT, with their primary focus being Taiwan, Thailand, Mongolia, Malaysia, France, and Nepal. However, they are also interested in worldwide anti-China groups.
  • Crimson Sandstorm (CURIUM), an Iranian APT group linked to the Islamic Revolutionary Guard Corps, has been active since 2017 and targets defense, maritime shipping, transportation, healthcare, and technology. They regularly spread custom .NET malware using watering hole attacks and social engineering.
  • Emerald Sleet (THALLIUM), a North Korean APT group, utilizes spear-phishing emails to compromise and obtain intelligence from top North Korean experts. They have been known to impersonate legitimate academic institutions and NGOs to con victims into providing expert opinions on North Korea’s foreign policy.
  • Forest Blizzard (STRONTIUM), a Russian military intelligence APT group related to GRU Unit 26165, targets tactical and strategic organizations in defense, transportation/logistics, government, energy, NGOs, and IT. They have been known to target Russia’s war in Ukraine-related organizations, and Microsoft believes their operations support Russia’s foreign policy and military goals in Ukraine and abroad.

Threat actors have been keeping up with technological advances alongside defenders for years. Like defenders, threat actors are also exploring AI, including LLMs, to boost productivity and use available platforms to further their goals and attack methods.

Finally, different types of threat actors will keep studying and improving AI technologies. Microsoft will keep an eye out for bad actors and their LLM-related activities, and the company will collaborate with OpenAI and other allies to exchange information, strengthen customer security, and help the security community as a whole.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.