2024: AI-assisted cyberattacks on the rise

2024: AI-assisted cyberattacks on the rise

Share post

Trend Micro's 2024 cybersecurity predictions warn of the transformative role of generative artificial intelligence (AI) in the cyber threat landscape, as well as a new wave of sophisticated social engineering tactics and identity theft using AI-powered tools .

The widespread availability and improved quality of generative AI combined with Generative Adversarial Networks (GANs) to generate realistic photo, audio and video content will have a lasting impact on the phishing landscape in 2024. Trend Micro predicts a new wave of Business Email Compromise (BEC ), virtual kidnapping and other scams – triggered by the cost-effective creation of such content.

Cyber ​​gangsters are raking in billions of dollars

In view of lucrative profit prospects (According to the FBI, $2,7 billion from BCE). For such campaigns, threat actors either use legitimate AI tools with stolen credentials and VPNs to hide their identities or develop malicious generative AI tools specifically. But AI models themselves will also come under fire in 2024: While the data sets of generative AI and LLMs (Large Language Models) are difficult for threat actors to influence, specialized cloud-based machine learning models represent an attractive target. They will be used with more specific data sets trained and can fall victim to data poisoning attacks - from exfiltrating sensitive data to disrupting fraud filters and even influencing connected vehicles. Such attacks already cost actors less than $100.

“Advanced LLMs who are proficient in any language pose a significant threat because they avoid previously common indicators of phishing attacks, such as unusual formatting or grammatical errors. This makes it more difficult to detect such attacks,” reports Udo Schneider, IoT Security Evangelist Europe at Trend Micro. “Companies must therefore adapt their previous phishing training and also introduce modern technical protective measures. Advanced defense mechanisms not only exceed human detection capabilities, but also ensure resilience against these attack tactics.”

Government AI guidelines take too long

Such security developments can, in turn, lead to increased scrutiny from regulators and also prompt the technology industry to take matters into its own hands: “In the coming year, the cyber industry will overtake legislators in developing cybersecurity-specific AI guidelines . The industry is moving quickly towards voluntary self-regulation,” continued Udo Schneider.

The Japanese security expert Trend Micro also names further developments that IT security managers should pay particular attention to in 2024:

  • An increase in cloud-native worm attacks, which target vulnerabilities and misconfigurations and use a high level of automation to compromise containers, accounts and services with minimal effort.
  • Cloud security will be critical for organizations to address security gaps in cloud environments. It is worth emphasizing the vulnerability of cloud-native applications to automated attacks. Proactive measures, including robust defenses and thorough security audits, are essential to mitigate risks.
  • Attacks on private blockchains are increasing due to vulnerabilities in the implementation of a number of private blockchains. Threat actors could use access rights to modify, disable, or delete entries and then demand a ransom. Alternatively, if they manage to gain control of enough nodes, they could encrypt the entire blockchain.
  • Increasing supply chain attacks not only target open source software components within them, but also identity management tools such as Telco SIMs, which are crucial for fleet and inventory systems. Cybercriminals also exploit vendors' software supply chains via CI/CD systems, with a particular focus on third-party components.

Supply chain security also plays an important role in the new European NIS2 directive, which will concern affected companies in the coming year, as Richard Werner, Business Consultant at Trend Micro explains:

Important NIS2 directive is coming

“As soon as NIS2 has been implemented into national law – by October 2024 at the latest – there will initially be a ‘knock and shove’ as to who falls under it. Companies will initially try to evade stricter regulation. However, the obligation of those affected to include their supply chains will have the opposite effect, particularly for suppliers and logisticians. They will align their IT security architectures with the new requirements in order to be able to offer their customers a specific advantage in international competition. On the one hand, it is sad that we first need new legal requirements to make the danger of supply chain attacks clear. On the other hand, however, it is positive to see that the legislature is responding to a clear threat with clear rules.”

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more