Page 179 - Cyber Defense eMagazine April 2023
P. 179

of network breaches. Some of the most devastating attacks endured by this country’s corporations have
            started with a single compromised password.

            How Does ChatGPT Do Damage?

            ChatGPT utilizes AI-based “transformer” algorithms—based on the same principles that connect human
            neural cells—to scan the internet for germane material based on keywords, prompts, or other search
            parameters,  generating  what’s  referred  to  as  “natural  language  text.”  This  same  capability  can  be
            leveraged by malicious hackers to create phishing emails and malware designed to infiltrate a corporate
            network with far more speed, efficiency, and stealth than ever before.

            Not only does this type of technology create natural language, it can also aid programmers in creating
            code—and we all know not all code is leveraged for good. Sophisticated AI allows hackers to create
            blocks of nefarious code almost instantaneously; or to automate portions of a cyberattack launch, such
            as the initial infection code.

            In the case of phishing and imposter attacks, the ability for AI-based bots to scrub the internet for accurate
            details on a victim’s identity makes it nearly impossible for those users to recognize the attack. Gone are
            the  days  when  phony  emails  were  glaringly  marked  by  spelling  mistakes  and  generic  requests  for
            information. Today’s attacks will include the name of the user’s actual bank or healthcare provider, it will
            refer to their home city or local pharmacy (“geo-phishing”), or will supposedly have come from a vendor
            with whom the user regularly transacts.

            Data is gathered with lightning speed through AI bots, pulled from existing references that populate the
            internet. The email incorporating these details then typically supplies a link leading the recipient to a
            brand imposter site where they will volunteer their user names and passwords.



            The New Wave of AI-generated Security Threats

            Just as CAD-based design programs now allow anyone with basic computer knowledge to function as a
            designer, advanced AI content generators deliver programming capabilities and automated coding short-
            cuts to even the least accomplished of wanna-be hackers. It is exponentially expanding the base of
            criminals who can crank-out malware.

            The  rise  of  AI  technologies  like  ChatGPT,  Replica,  and  YouChat  stands  to  produce  a  frightening
            escalation of malicious activity targeting business networks, since it hands-over powerful tools to the ill-
            intentioned. The increase in cyberattacks will likely include a wave of activity that targets email data,
            since these systems are typically a point of entry for malware, viruses, and other threats.

            Malicious  software  only  needs  to  compromise  a single  account  to  infiltrate  an  entire  network.  Many
            viruses will sit dormant on the system for a length of time, to avoid detection that can be traced back to
            the date of infection, making the breach harder to mitigate. The viral code is later activated and works its
            way through the network, scraping data for sale, collecting private credentials, or conducting denial-of-
            service activities.






                                                                                                             179
   174   175   176   177   178   179   180   181   182   183   184