Era Ai-Generated Ransomare has been silent


Although this activity so far does not seem normal through the ransom of ecosystems, the findings are a warning of the Stark.

“There are definitely some groups used by AI to help develop modules of redemption and malware, but as for the written future, it can tell, most They are not, “Allan Liska says, the security company analyst recorded the future that specializes in the ransom.” Where we will see more AI which is widely used is in the initial approach. “

Separately, researchers in Cyber ​​price of ESET this week claimed To discover “the first famous AI and the purchase software”, named execution. Researchers say that malicious software lasts on the machine and use an open source and Model from Openai, and use them to view files that hackers can target, stealed, stolen data and deploy encryption. ESET believes that the Code is a concept that is apparently not arranged against victims, but researchers emphasize that the Cybercriminals begin to use LLMS as part of the tool.

“Application AI-Assisted RansomVare presents certain challenges, primarily that cyber-malfanic programs will find ways to facilitate these limits” ESET Malware Malware, who discovered new purchase software that has discovered new purchase software. “In terms of development, it is almost certain that the threat active actively researches this area and we will probably see more attempts to create all sophisticated threats.”

Although in the real world is not used in the real world, the findings of anthropy further underline the speed with which with cyberriminals move to building LLM into their business and infrastructure. The AI ​​also noticed another Cybercriminal group that follows the GTG-2002, using Claude Conde to attack the targets, to develop malware, and then put out the data, and then the redemption is stolen.

In the last month, this attack was influenced by the “minimum” of 17 organizations in government, health care, emergency services and religious institutions, says anthropic, without appointing any of the organizations. “The operation shows regarding the evolution in AI-AI Cybercrime,” investigators of the anthropics “, wherein and serves as a technical consultant and active operator, which would be attacked and long-lasting and long-term for individual actors that individual actors are manually.”



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *