{"id":2082,"date":"2023-08-25T09:47:11","date_gmt":"2023-08-25T07:47:11","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2082"},"modified":"2023-12-20T11:49:58","modified_gmt":"2023-12-20T09:49:58","slug":"skynet-wants-your-passwords-1","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/skynet-wants-your-passwords-1\/","title":{"rendered":"Skynet wants your Passwords! \u2013 AI and Social Engineering"},"content":{"rendered":"\n<p><strong>As we explore the capabilities of modern AI in assisting us across both our personal and professional lives, malicious actors too are investigating its potential uses. In this series of blog posts, we delve into the realm of social engineering attacks that we need to be prepared for in this era of advanced AI. We aim to identify these threats and understand how to effectively defend against them. The initial post focuses on examining current attack scenarios and potential future developments.<\/strong><\/p>\n\n\n\n<p>Computers have significantly changed the scale at which we can process data, conduct simulations or communicate with one another. Similarly, AI may change the scale at which tasks that previously required humans can be conducted. For instance, crafting personalized emails for a thousand individuals formerly demanded humans to compose a thousand separate emails. Now it is feasible to instruct an LLM (large language model) like ChatGPT to create these mails.<\/p>\n\n\n\n<p>Just like any powerful tool, AI can be harnessed for both constructive and harmful purposes. While individuals might leverage AI to delegate email composition, similarly, attackers could exploit it to generate phishing emails. In the pre-AI era, executing social engineering attacks with a high success rate necessitated tailoring approaches to individual victims. Given the substantial effort involved, sophisticated social engineering attacks were predominantly aimed at high-value targets, such as orchestrating a CFO to initiate fund transfers. Today, AI tools enable mass customization of attacks, substantially diminishing the requisite investment. Consequently, we can anticipate a surge in highly targeted social engineering attacks directed at a broader audience.<\/p>\n\n\n\n<p>State of the art AI technologies yield content that closely resembles human-generated output (e.g., text, drawings) or closely mimics reality (e.g., images). Unsuspecting individuals are prone to perceiving such content as genuine, rendering them susceptible to automated social engineering attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Avenues of Abuse<\/h2>\n\n\n\n<p>AI empowers malicious actors with an array of social engineering techniques, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generating realistic images of individuals in order to impersonate them<\/li>\n\n\n\n<li>Synthesizing someone&#8217;s voice for phone calls and other audio content<\/li>\n\n\n\n<li>Creating convincing text for e-mails and chat messages, capable of fooling even the most careful readers<\/li>\n<\/ul>\n\n\n\n<p>The instances of these attacks witnessed in recent times only scratch the surface. As AI technology continues to progress, we can expect to see increasingly sophisticated and varied attack vectors, including video impersonation and other forms of &#8220;deepfake&#8221; media. <\/p>\n\n\n<div class=\"wp-block-image is-resized is-style-default\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/pope-1-819x1024.jpg\" alt=\"Pope wearing a puffy jacket\" class=\"wp-image-2088\" style=\"aspect-ratio:0.7998046875;width:400px;height:auto\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/pope-1-819x1024.jpg 819w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/pope-1-240x300.jpg 240w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/pope-1-768x960.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/pope-1.jpg 960w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/><figcaption class=\"wp-element-caption\">A convincing AI-generated image of the pope wearing a puffy jacket that recently went viral (created by <a href=\"https:\/\/www.midjourney.com\/\">Midjourney<\/a> and shared on <a href=\"https:\/\/twitter.com\/singareddynm\/status\/1639655045875507201\">Twitter\/X<\/a>).<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Autonomous AI and the Future<\/h2>\n\n\n\n<p>Autonomous agents, exemplified by systems like <a href=\"https:\/\/github.com\/Significant-Gravitas\/Auto-GPT\">AutoGPT<\/a>, bring a new level of flexibility to the realm of AI. Rather than assigning singular tasks to AI, autonomous agents can undertake a multitude of individual actions to achieve broader objectives. For instance, an attacker might set up an autonomous AI and direct it to carry out financial theft. The AI could then systematically execute all requisite steps: identifying targets, gathering relevant information, tailoring personalized attack strategies, creating websites, email addresses, and phone lines, implementing the attack itself, and adjusting its tactics as needed.<\/p>\n\n\n\n<p>By eliminating the human factor, these fraudulent schemes could operate at an unparalleled scale and pace. As autonomous agents advance in sophistication, they could concurrently target multiple victims and dynamically adapting their approaches based on the responses received.<\/p>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-1024x662.png\" alt=\"\" class=\"wp-image-2375\" style=\"aspect-ratio:1.5468277945619335;width:509px;height:auto\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-1024x662.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-300x194.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-768x497.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-1536x994.png 1536w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/11\/autonomous_AI-2048x1325.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A potential setup for an autonomous AI to conduct social engineering attacks. The bot autonomously conducts all necessary steps to fulfill a goal (e.g. steal money). <\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Regardless of whether AI is overhyped, there&#8217;s no denying the potential impact of AI technologies on our lives. In many regards, the cat&#8217;s out of the bag &#8211; since the technology is widely available it will be used. This is especially true for malicious actors who will not follow any legal limitations that may be set going forward. We will therefore need to be prepared to defend against these kinds of attacks, which we will explore in a future post.<\/p>\n\n\n\n<p><em>In our <a href=\"https:\/\/certitude.consulting\/blog\/de\/skynet-will-deine-passworter-verteidigung-gegen-ki-social-engineering-angriffe\/\" target=\"_blank\" rel=\"noreferrer noopener\">upcoming blogpost<\/a>, we will delve into the current <\/em>defenses against<em> AI-powered attacks. Stay tuned for an in-depth exploration of the cybersecurity implications of AI, and how we can best prepare for the challenges ahead.<\/em><\/p>\n\n\n\n<p>A list of all available posts of this series is also accessible under the following <a href=\"https:\/\/certitude.consulting\/blog\/en\/tag\/skynet-wants-your-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">link<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p id=\"footnote-1\"><sup>1<\/sup> Throughout this series, we will employ the terms AI and ML (Machine Learning) interchangeably. While the series is technically centered around ML, it&#8217;s worth noting that in the public sphere, the term AI has effectively become synonymous with this term.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we explore the capabilities of modern AI in assisting us across both our personal and professional lives, malicious actors too are investigating its potential uses. In this series of blog posts, we delve into the realm of social engineering attacks that we need to be prepared for in this era of advanced AI. We [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":2118,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[316,440,478,318],"class_list":["post-2082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-analysis","tag-ai","tag-phishing-en","tag-skynet-wants-your-passwords","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2082"}],"version-history":[{"count":29,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2082\/revisions"}],"predecessor-version":[{"id":2537,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2082\/revisions\/2537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2118"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}