Although this activity yet does not seem to be the standard through the environmental system of the ransom, the results are a flagrant warning.
“There are definitely some groups that use artificial intelligence to help develop ransom units and harmful programs, but as much as it can tell the future,” most “We see more artificial intelligence on a large scale is at first arrival,” says Alan Lesca, an analyst for the security company who has registered in the future specialized in Ransomwari.
Separately, researchers at the ESET CIA this week Claim To discover the “first -known” Acting Ransombers “, which is called ProsLuck. The researchers say that malware, which works locally on the device and uses an open source AI model from Openai, can “create malic LUA textual programs during flying” and use these files to examine files that the infiltrators may target, steal and encrypt the data. ESET believes that the code is evidence of the concept that has not apparently published against the victims, but researchers assert that it explains how Internet criminals begin to use LLMS as part of their tool groups.
Anton Cherbanov and Peter Strissik, who discovered a distance: “The publication of the AI-EI-backed Ransomware program.” As for development, it is almost certain that threatening representatives are actively exploring this field, and we are likely to see more attempts to create increasingly advanced threats. “
Although Promslock is not used in the real world, the results of the anthropor emphasize the speed with which Internet criminals move to build LLMS in their operations and infrastructure. The artificial intelligence company has also monitored another set of Cybercrimrenal, which it tracks like GTG-2002, using the Clauds icon to automatically find targets to attack, access victim networks, develop harmful programs, then data, analyze what was stolen, and develop a Ransom note.
Last month, this attack affected 17 government organizations, health care, emergency services, and religious institutions, says anthropor, without naming any of the affected organizations. Anthropier researchers wrote in their report, where artificial intelligence works as a technical advisor, technical operator and an active operator, enabling the attacks that will be more difficult and take time to implement them manually, “The process explains the process about the concern for the support of the supported electronic crimes.
https://media.wired.com/photos/68aeaf2a7cf142253a0a0226/191:100/w_1280,c_limit/GettyImages-2154076505.jpg
Source link