Home Technology Gen AI Fueling Surge of Sophisticated Email Attacks

Gen AI Fueling Surge of Sophisticated Email Attacks

by news

Generative AI tools like ChatGPT are sparking an increase in sophisticated email attacks, according to a report released Wednesday by a global, cloud-based email security company.
Security leaders have worried about the possibilities of AI-generated email attacks since ChatGPT was released, and we’re starting to see those fears validated, noted the report from Abnormal Security.
The company reported that it has recently stopped a number of attacks that contain language strongly suspected to be written by AI.
“High-end threat actors have always used artificial intelligence. Generative AI isn’t a big deal for them because they already had access to tools to enable these kinds of attacks,” said Dan Shiebler, Abnormal’s head of machine learning and author of the report.
“What generative AI does is commoditize sophisticated attacks so we will see more of them,” he told TechNewsWorld.
“We have seen an increase in business email compromise (BEC) attacks, which these kinds of technologies make easier to do,” he continued.
“The release of ChatGPT was a consumer milestone, but the release of GPT3 in 2020 enabled threat actors to use AI in email attacks,” he added.
Mika Aalto, co-founder and CEO of Hoxhunt, a provider of enterprise security awareness solutions in Helsinki, told TechNewsWorld that attackers are adopting AI technology to create more convincing BEC campaigns and develop more sophisticated BEC attack kits that are then sold on the dark web.
“According to our own research, human social engineers are still better at crafting phishing emails than large language models, but that gap is closing,” he said. “Hackers are improving at prompt engineering and circumventing guardrails against the misuse of ChatGPT for BEC campaigns.”
“One pretty scary application of this technology is iterative resending of an attack,” noted Shiebler. “


“A system can send an attack, determine if it made it through to the recipients, and if it doesn’t make it through, modify the attack repeatedly,” he explained. “Essentially, it learns how the defense is functioning and modifies the attack to take advantage of that.”
In its report, Abnormal demonstrated how generative AI was used in three attacks on its customers — a credential phishing attack, a traditional BEC attack, and a vendor fraud attack.
These three examples are only a small percentage of the email attacks generated by AI, which Abnormal is now seeing on a near-daily basis, the report noted.
Unfortunately, it continued, as the technology continues to evolve, cybercrime will evolve with it, and both the volume and sophistication of these attacks will continue to increase.
Generative AI tools can increase the effectiveness of a phishing campaign, especially those originating outside the United States.
“Many email attacks originate outside the U.S. by non-native speakers, resulting in emails with obvious grammatical issues and unusual tone of voice, which trigger suspicion by the recipient,” explained Dror Liwer, co-founder of Coro, a cloud-based cybersecurity company based in Tel Aviv, Israel.
“Generative AI allows the sender to create a customized, conversational, extremely credible email that would trigger no suspicion, resulting in more users falling into the trap,” he told TechNewsWorld.
“Proper context and grammar make the content more believable and less likely to be suspicious to the user,” added James McQuiggan, a security awareness advocate at KnowBe4, a security awareness training provider in Clearwater, Fla.
“Additionally,” he told TechNewsWorld, “generative AI can pull information from the internet about an organization to create a targeted or more believable spear phishing campaign.”
Joey Stanford, head of global security and privacy at Platform.sh, a global platform as a service provider, noted that email attacks crafted with generative AI might appear more realistic and convincing because they use sophisticated linguistic techniques and large datasets of phishing emails.
“This allows bad actors to automatically generate new, compelling phishing emails that are more difficult to detect,” he told TechNewsWorld. “Generative AI tools like OpenAI’s ChatGPT may be behind the 135% increase in scam emails using these techniques revealed in a recent Darktrace report.”
Stanford maintained that organizations could protect themselves at the network level against email attacks crafted with generative AI by using cybersecurity tools with self-learning AI. Those tools, he explained, can detect and respond to anomalous and malicious email activity in real time without relying on prior knowledge of past threats.
“These tools can also help organizations to educate their employees on how to spot and report phishing emails and enforce security policies and best practices across the network,” he said.
He acknowledged that those tools were new and undergoing rapid development, but fighting AI with AI appears to be the best solution to the problem for several reasons. Those include:
However, the generative AI problem can’t be solved in the long term with more AI, countered John Bambenek, principle threat hunter at Netenrich, an IT and digital security operations company in San Jose, Calif.
“What is needed is looking at what is normal and abnormal from a behavior analytics standpoint and to realize that email is insecure and non-securable,” he told TechNewsWorld. “The more something matters, the less it should rely on email.”

“The key is still the same, think twice before taking action on an email, especially if it’s something sensitive like a financial transaction or a request for authentication,” he added.
Whether an email is generated by an AI, bot, or human, the steps for vetting it remain the same, advised McQuiggan. A recipient should ask three questions: Is this email unexpected? Is it from someone I don’t know? Are they asking me to do something unusual or in a hurry?
“If the answer is yes to any of those questions, take the extra time to verify the information in the email,” he said.
“Taking the extra few moments to check the links, the email’s source, and the request can reduce additional costs or resources because someone clicked a link and initiated a risk of data breach to the organization,” he advised.
John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.
Please sign in to post or reply to a comment. New users create a free account.

Thoughts on Apple Vision Pro and its impact on mixed-reality technology?
– select any or all that apply –

Loading ... Loading …




The fusion of real-world interaction with immersive experiences is a game-changer.
Intrigued by its design and features but deterred by the $3,499 price.
Interested but waiting for user reviews to surface in 2024.
Mixed reality is more of a novelty than a necessity.
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/Ubuntu-Lunar-Lobster.jpg
https://www.technewsworld.com/story/ubuntu-23-04-lunar-lobster-lands-with-newly-minted-cinnamon-desktop-flavor-177026.html
Ubuntu 23.04 ‘Lunar Lobster’ Lands With Newly Minted Cinnamon Desktop Flavor
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/HP-E45c-G5-DQHD.jpg
https://www.technewsworld.com/story/new-hp-and-sonos-devices-accentuate-the-ultimate-home-office-workstation-178336.html
New HP and Sonos Devices Accentuate the Ultimate Home Office Workstation
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/qualcomm-sign.jpg
https://www.technewsworld.com/story/qualcomms-gen-ai-a-unique-opportunity-beyond-innovation-178358.html
Qualcomm’s Gen AI: A Unique Opportunity Beyond Innovation
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/satisfied-computer-user.jpg
https://www.technewsworld.com/story/linux-what-linux-it-just-works-177075.html
Linux? What Linux? It Just Works
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/computer-programmers.jpg
https://www.technewsworld.com/story/selecting-the-right-sbom-for-your-enterprise-178366.html
Selecting the Right SBOM for Your Enterprise
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/remote-worker.jpg
https://www.technewsworld.com/story/personal-data-harvesting-and-how-to-reduce-your-digital-footprint-178046.html
Personal Data Harvesting and How To Reduce Your Digital Footprint
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/cloud-server.jpg
https://www.technewsworld.com/story/canonical-broadens-commercial-openstack-to-small-clouds-177091.html
Canonical Broadens Commercial OpenStack to Small Clouds
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/ChatGPT-smartphone.jpg
https://www.technewsworld.com/story/the-future-of-ai-in-retail-beyond-the-chatgpt-hype-177681.html
The Future of AI in Retail: Beyond the ChatGPT Hype
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/ai-robot.jpg
https://www.technewsworld.com/story/the-ai-revolution-is-at-a-tipping-point-178143.html
The AI Revolution Is at a Tipping Point
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/student-computer.jpg
https://www.technewsworld.com/story/edtech-developers-study-game-approach-aces-med-school-testing-curve-177727.html
EdTech Developer’s Study Game Approach Aces Med School Testing Curve
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/03/russian-hacker-group.jpg
https://www.technewsworld.com/story/doj-five-eyes-nations-unite-to-dismantle-russian-cyber-espionage-network-178292.html
DOJ, Five Eyes Nations Unite To Dismantle Russian Cyber-Espionage Network
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/circuit-board-cpu-gpu.jpg
https://www.technewsworld.com/story/2024-and-how-the-coming-cpu-war-is-likely-to-play-out-178325.html
2024 and How the Coming CPU War Is Likely To Play Out
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/telehealth-provider.jpg
https://www.technewsworld.com/story/digital-health-care-flourishing-despite-legal-logistical-hurdles-177497.html
Digital Health Care Flourishing Despite Legal, Logistical Hurdles
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/Telly-TV.jpg
https://www.technewsworld.com/story/telly-offers-half-million-free-55-inch-4k-tvs-advertisers-to-pick-up-tab-178301.html
Telly Offers Half-Million Free 55-Inch 4K TVs, Advertisers To Pick Up Tab
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/01/smart-home-2-story.jpg
https://www.technewsworld.com/story/leverage-the-power-of-data-to-monitor-home-energy-efficiency-178147.html
Leverage the Power of Data To Monitor Home Energy Efficiency
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/iot.jpg
https://www.technewsworld.com/story/unresolved-conflicts-slow-esim-upgrade-path-to-better-iot-security-176886.html
Unresolved Conflicts Slow eSIM Upgrade Path to Better IoT Security
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/06/technical-controller.jpg
https://www.technewsworld.com/story/cyber-chiefs-brace-for-major-attacks-in-next-12-months-178283.html
Cyber Chiefs Brace for Major Attacks in Next 12 Months
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/RSA-Conference-2023.jpg
https://www.technewsworld.com/story/rsa-conference-rebounds-as-business-risks-soar-178281.html
RSA Conference Rebounds as Business Risks Soar
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/smartphone-texting.jpg
https://www.technewsworld.com/story/mobile-shopping-apps-linked-to-digital-wallets-a-loyalty-driving-duo-177650.html
Mobile Shopping Apps Linked to Digital Wallets: A Loyalty-Driving Duo
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/computer-dual-monitors.jpg
https://www.technewsworld.com/story/new-distro-makes-running-arch-linux-very-cachy-176997.html
New Distro Makes Running Arch Linux Very ‘Cachy’
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/ai-cybersecurity-lock.jpg
https://www.technewsworld.com/story/researchers-instantly-crack-simple-passwords-with-ai-178233.html
Researchers Instantly Crack Simple Passwords With AI
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/poly-voyager-free-60-earbuds.jpg
https://www.technewsworld.com/story/poly-voyager-60-series-earbuds-provide-a-premium-audio-experience-178290.html
Poly Voyager 60 Series Earbuds Provide a Premium Audio Experience
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/online-psychology.jpg
https://www.technewsworld.com/story/is-chatgpt-smart-enough-to-practice-mental-health-therapy-178064.html
Is ChatGPT Smart Enough To Practice Mental Health Therapy?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/Bard-wait-list.jpg
https://www.technewsworld.com/story/google-invites-public-to-test-drive-its-ai-chatbot-bard-178066.html
Google Invites Public To Test Drive Its AI Chatbot Bard
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/12/server-racks-data-center.jpg
https://www.technewsworld.com/story/are-mainframes-an-indicator-of-banking-reliability-178260.html
Are Mainframes an Indicator of Banking Reliability?
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/Pixel-Fold.jpg
https://www.technewsworld.com/story/google-taking-pre-orders-for-its-first-foldable-phone-178309.html
Google Taking Pre-Orders for Its First Foldable Phone
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/Silicon-Valley-Bank.jpg
https://www.technewsworld.com/story/social-media-fueled-the-run-on-silicon-valley-bank-study-178230.html
Social Media Fueled the Run on Silicon Valley Bank: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/Space-BACN.jpg
https://www.technewsworld.com/story/darpa-moves-forward-with-project-to-revolutionize-satellite-communication-177003.html
DARPA Moves Forward With Project To Revolutionize Satellite Communication
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/vr-female.jpg
https://www.technewsworld.com/story/gen-ai-and-ar-vr-unintended-consequences-unproven-mainstream-appeal-178156.html
Gen AI and AR/VR: Unintended Consequences, Unproven Mainstream Appeal
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/phone-charging-station.jpg
https://www.technewsworld.com/story/fbi-issues-warning-about-juice-jacking-at-public-usb-charging-stations-178151.html
FBI Issues Warning About ‘Juice Jacking’ at Public USB Charging Stations
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/office-worker-concerned.jpg
https://www.technewsworld.com/story/study-finds-ai-threatening-many-womens-jobs-178362.html
Study Finds AI Threatening Many Women’s Jobs
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/05/ai-brain.jpg
https://www.technewsworld.com/story/the-importance-of-microsofts-5-point-blueprint-for-public-governance-of-ai-178345.html
The Importance of Microsoft’s 5-Point Blueprint for Public Governance of AI
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/07/evs-charging.jpg
https://www.technewsworld.com/story/study-finds-ev-battery-replacement-rare-most-covered-by-warranty-178257.html
Study Finds EV Battery Replacement Rare, Most Covered by Warranty
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/08/metaverse-future.jpg
https://www.technewsworld.com/story/why-nvidia-is-winning-the-race-to-dominate-the-metaverse-178079.html
Why Nvidia Is Winning the Race To Dominate the Metaverse
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/HP-Amplify.jpg
https://www.technewsworld.com/story/hp-affirms-better-together-at-its-amplify-event-178127.html
HP Affirms ‘Better Together’ at Its Amplify Event
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/11/female-soldier-soluting.jpg
https://www.technewsworld.com/story/female-army-veteran-uses-tech-to-help-create-a-better-future-177372.html
Female Army Veteran Uses Tech To Help Create a Better Future
Copyright 1998-2023 ECT News Network, Inc. All Rights Reserved.
Enter your Username and Password to sign in.

source

Related Posts