Connect with us

Hi, what are you looking for?

HEADLINES

Proliferation of AI-driven attacks anticipated in 2024

The widespread availability and improved quality of GenAI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market in 2024.

Photo by Muha Ajjan from Unsplash.com

Trend Micro Incorporated, a global cybersecurity player, warned of the transformative role of generative AI (GenAI) in the cyber threat landscape and a coming tsunami of sophisticated social engineering tactics and identity theft powered GenAI tools.

Eric Skinner, VP of market strategy at Trend Micro: “Advanced large language models (LLMs), proficient in any language, pose a significant threat as they eliminate the traditional indicators of phishing such as odd formatting or grammatical errors, making them exceedingly difficult to detect. Businesses must transition beyond conventional phishing training and prioritize the adoption of modern security controls. These advanced defenses not only exceed human capabilities in detection but also ensure resilience against these tactics.”

The widespread availability and improved quality of GenAI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market in 2024. This transformation will enable cost-effective creation of hyper-realistic audio and video content—driving a new wave of business email compromise (BEC), virtual kidnapping, and other scams, Trend predicts.

Given the potentially lucrative gains* that threat actors might achieve through malicious activities, threat actors will be incentivized to develop nefarious GenAI tools for these campaigns or to use legitimate ones with stolen credentials and VPNs to hide their identities.

Advertisement. Scroll to continue reading.

AI models themselves may also come under attack in 2024. While GenAI and LLM datasets are difficult for threat actors to influence, specialized cloud-based machine learning models are a far more attractive target. The more focused datasets they are trained on will be singled out for data poisoning attacks with various outcomes in mind—from exfiltrating sensitive data to disrupting fraud filters and even connected vehicles. Such attacks already cost less than $100 to carry out.

These trends may, in turn, lead to increased regulatory scrutiny and a push from the cybersecurity sector to take matters into its own hands.

“In the coming year, the cyber industry will begin to outpace the government when it comes to developing cybersecurity-specific AI policy or regulations,” said Greg Young, VP of cybersecurity at Trend. “The industry is moving quickly to self-regulate on an opt-in basis.”

Elsewhere, Trend’s 2024 predictions report highlighted:

A surge in cloud-native worm attacks, targeting vulnerabilities and misconfigurations and using a high degree of automation to impact multiple containers, accounts and services with minimal effort.

Advertisement. Scroll to continue reading.

Cloud security will be crucial for organizations to address security gaps in cloud environments, highlighting the vulnerability of cloud-native applications to automated attacks. Proactive measures, including robust defense mechanisms and thorough security audits, are essential to mitigate risks.

More supply chain attacks will target not only upstream open-source software components but also inventory identity management tools, such as telco SIMs, which are crucial for fleet and inventory systems. Cybercriminals will also likely exploit vendors’ software supply chains through CI/CD systems, with a specific focus on third-party components.

Attacks on private blockchains will increase as a result of vulnerabilities in the implementation of a number of private blockchains. Threat actors could use these rights to modify, override, or erase entries and then demand a ransom. Alternatively, they could try to encrypt the entire blockchain if it’s possible to seize control of enough nodes.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

COMPUTERS

Using SubWave sonar technology, divers can use Descent X50i to communicate with one another underwater and monitor each other’s tank pressure, depth, and distance...

HEADLINES

Huawei earns the title of industry overall leader with a high score of 86.4, topping the world in market share, innovation, and application capabilities.

HEADLINES

HP threat researchers observed large campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware that leverage the same techniques and loaders, suggesting the use of malware...

HEADLINES

“We are honored he (Dennis Uy) accepted our invitation to lead the conference this year. He will be ably guided and supported by the...

Biz Solutions

Designed to meet the evolving demands of B2B clients, the platform now offers the LG DOOH Ads advertising solution for digital signage products, as...

HEADLINES

Ascendion aims to create at least 6,000 new jobs in the Philippines, leading to an estimated economic impact of at least $500 million over...

HEADLINES

Task scammers often impersonate representatives of notable brands such as Shopee Mall or Shopee’s HR Recruitment Team, luring victims with fake part-time or full-time...

HEADLINES

Palo Alto Networks predicts that 2025 is the year deepfakes go mainstream in Asia Pacific. If high-profile individuals can fall victim to identity fraud, children...

Advertisement