New Malware Using Generative AI Poses Increased Risk for Businesses, Google Warns

New Malware Using Generative AI Poses Increased Risk for Businesses, Google Warns

AI is transforming cybercrime, with tools like HONESTCUE and PROMPTFLUX automating data theft and evading detection, posing new challenges for cybersecurity defenses.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

The operationalization of artificial intelligence (AI) by cybercriminals has raised significant concerns, according to a report from Google Threat Intelligence Group and Google DeepMind. AI is enhancing the effectiveness and precision of existing cyberattack methods rather than creating entirely new threats. This trend suggests a transformation in the execution of cyber threats, which can now be carried out with greater clarity and speed.

The report highlights that large language models are playing a pivotal role in accelerating the transition from planning to execution in cyberattacks. Cyber adversaries are utilizing publicly available information to develop detailed profiles of targets, including executives and vendors. In social engineering, AI is effectively generating tailored narratives and identities to deceive individuals.

Furthermore, malware developers are leveraging generative tools to improve their exploits and rapidly produce variants, which poses a challenge to conventional cybersecurity defenses. The report identifies various malware families that utilize AI APIs for stealth and automation. Noteworthy examples include HONESTCUE, which uses the Gemini API to create executable code dynamically, and PROMPTFLUX, a VBScript dropper that mutates its source code hourly. Additionally, PROMPTSTEAL employs AI for on-demand system command generation, while the COINBAIT phishing kit clones cryptocurrency exchange interfaces to enhance credential theft.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close