Hackers use AI to commit online fraud: Experts can also fall into the trap
Even experienced cybersecurity professionals fall victim to sophisticated phishing attacks.
A recent study by Kaspersky found that the number of cyberattacks faced by organizations has increased by almost half in the past 12 months, according to 49% of respondents. The most common threat is phishing, with 49% of respondents saying they have encountered this. Half of the survey respondents (50%) expect the number of phishing attacks to increase significantly, as cybercriminals increasingly use AI.
To better understand, Kaspersky analyzed how criminals use AI in phishing scams, as well as why even experienced people can fall victim to AI-powered phishing attacks.
Advertisement
Advertisement
Cyber attacks using AI are becoming a trend. (Illustration photo)
When Phishing Attacks Get Personalized with AI
Traditionally, phishing attacks relied on blasting out the same generic messages to thousands of people, luring a select few into the trap. AI has changed that by creating sophisticated, personalized phishing emails at scale. AI-powered tools can use publicly available personal information on social media, job boards, or company websites to create tailored emails that are tailored to each individual's role, interests, and communication style.
For example, a CFO might receive a phishing email that copies the tone and style of a message from the CEO, even referencing recent company events. This level of customization makes it difficult for employees to distinguish between a real message and a phishing message.
Deepfake technology - a powerful weapon in cyber security attacks
Deepfake technology in AI has also become a powerful weapon, used by cybercriminals in scams. Attackers take advantage of this technology to create fake audio and video clips, simulating the voices and appearances of leaders and managers with an astonishing level of accuracy.
For example, in one documented case, an attacker used deepfakes to impersonate multiple employees during an online meeting, convincing one employee to wire transfer approximately $25.6 million. As deepfake technology continues to advance, attacks of this type are expected to become more widespread and sophisticated.
How AI Helps Attackers Bypass Traditional Security Methods?
Cybercriminals can use AI to trick traditional email filtering systems. By analyzing and mimicking legitimate email templates, AI-generated phishing emails can bypass security software checks. Machine learning algorithms can also test and refine scams in real time, increasing the success rate and making scams increasingly sophisticated.
Why Even Experienced People Can Fall for AI-Enhanced Phishing Attacks
Even experienced cybersecurity professionals have fallen victim to sophisticated phishing attacks. The authenticity and personalization of AI-generated content can sometimes overwhelm the skepticism that keeps experienced professionals on their toes. Furthermore, these attacks often play on human psychology, such as urgency, fear, or power, which puts pressure on employees to act without properly verifying the authenticity of the request.
How to Respond to AI-Enhanced Phishing Attacks
To combat AI-based phishing attacks, organizations need to take a proactive, multi-layered approach that focuses on comprehensive cybersecurity systems. Regular updates and training to raise employee awareness of AI-based cybersecurity are critical to helping employees identify sophisticated phishing and other malicious attack tactics. In parallel, businesses should deploy robust security tools that can detect anomalies in emails, such as suspicious sentence patterns or metadata.
The 'zero-trust' security model also plays a key role in reducing the risk of damage from attacks. By limiting access to sensitive systems and data, it ensures that attackers cannot compromise the entire network even if they bypass one layer of security. Together, these measures form a comprehensive 'shield' of defense, combining advanced technology with close human oversight.
Saved post successfully
You can review saved articles on the Saved Articles page.
Agree
You should read it
- How to detect scam online
- Thousands of websites use COVID-19 to scam and distribute malware created every day
- Funny caption of hackers spreading WannaCry malicious code
- Detect dangerous macOS virus developed by Chinese hacker group
- Downloaded malware? Try these fixes before factory reset!
- What to do to handle 'No Internet After Malware Removal' error?
- 5 types of malware on Android
- Answer these 5 questions before clicking on any link
May be interested
- Cybercriminals are using Microsoft Teams calls to commit fraudcybercriminals are calling people over microsoft teams pretending to be a company and offering help, but they won't do anything.
- The leading site to learn hacking skillswhen it comes to hackers, perhaps the first model we imagine is college students or experts in computer science.
- Vietnamnet network crashes: What is anticipatedvietnamnet's online newspaper, which was hacked by hackers yesterday (november 22), is considered a big warning for all vietnamese websites today. however, this incident has been predicted by network security experts many years ago.
- Excel continues to be used as a lure for online fraud with complex mechanismsthe popular tools and software used by microsoft have become the target of hackers to deploy online attacks many times.
- Which smartwatches and fitness trackers have fall detection?fall detection is useful because it can notify emergency contacts or call for help if the device registers that the wearer has fallen or experienced some kind of impact.
- Tricks Imposter trap in Among Useffective tactics for you to 'brief' imposter imposter, here is how to create a very clever trap in among us helps you to immediately catch the imposter.
- Hackers use banks as a starting point for phishing attacksthe cybercrime attacks banks and financial institutions entering and using a compromised infrastructure to have access to specific goals in every region or country that is trending. increase.
- The Toyota subsidiary lost $ 37 million just after an online fraud campaigntoyota boshoku has confirmed the loss of more than 37 million dollars after becoming the victim of an online email fraud attack campaign.
- Patch operation in Gitthe patch is a text file, its content is similar to git diff, but in parallel with the code, it also has metadata about commits such as commit ids, dates, commit messages ... we can create a patch from commits and others can apply them to their repository.
- Free Games on Steam: Hackers' New Dangerous Traphackers exploit free games on steam to steal passwords, valve warns affected users.