DS Tech Blog

AI Is Being Used By Hackers, Too

AI Is Being Used By Hackers, Too

Artificial intelligence, commonly known as AI, is used in several different ways in various industries, but one of the most impactful has been with cybersecurity and its automation. On the other hand, however, are the hackers who use AI in ways that fly in the face of the efforts of these cybersecurity professionals and use AI for cybercrime. What are some ways that AI is used in cybercrime, and why is it so scary for businesses to handle?

Deepfakes

The term “deepfake” stems from the words “deep learning” and “fake media.” Essentially, a deepfake uses false imaging or audio to create something which appears to be authentic when it really isn’t. Used incorrectly, deepfakes can be incredibly harmful in a variety of ways. Imagine reading something on the Internet and having it be accompanied by a fake video or image that skews your perspective and leads you to believe one thing rather than another. AI-generated deepfakes can (and have) been used in this way, and they can even be used in extortion and misinformation schemes.

Deepfakes use AI to generate realistic videos, typically of a famous person with a lot of source material online to pull from. Videos can be generated of a celebrity or government official doing and saying virtually anything, misguiding the viewer and causing confusion. 

AI-Supported Hacking Attacks

AI can also help cybercriminals when they are going about your average hacking attack, like trying to crack passwords or infiltrate a system. For example, hackers can use machine learning and artificial intelligence to analyze and parse password sets; they then use the information gleaned from these password sets to more accurately guess passwords. These systems can even go so far as to learn how people adjust their passwords over time.

Furthermore, there have been instances of hackers using machine learning to inform and automate their hacking practices. Some systems can use machine learning to identify weak points in a system and penetrate them through those weaker links. The systems used can then autonomously improve their operations for greater effectiveness. It is quite concerning to say the least.

Human Impersonation and Social Engineering

AI can also impersonate human beings themselves by imitating their behaviors. Through the use of automated bots, it is possible for hackers to create fake accounts that are capable of performing many of the everyday things your average user might do on social networking sites, like liking posts, sharing things out, and more. These bots can even be used to turn a profit in certain circumstances.

The possibilities for artificial intelligence in a cybercriminal’s toolbox are just as endless as they are for augmenting the operations of businesses, and it is a threat that should be closely monitored both now and in the future.

Don’t let cybercrime of any type complicate your business’ future. To learn more about what we can do for your business to keep it safe and sound from all kinds of threats, reach out to DS Tech at (906) 786-0057.

Spending More Time on Your Cybersecurity Has More ...
Should You Archive That Email or Delete It?

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 06 December 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.dstech.net/

Blog Archive

2017
January
February
March
April
May
June
July
August
September
October
November
December
2016
January
February
March
April
May
June
July
August
September
October
November
December
2015
January
February
March
April
May
June
July
August
September
October
November
December
2014
January
February
March
April
May
June
July
August
September
October
November
December
2013
January
February
March
April
May
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December
2006
January
February
March
April
May
June
July
August
September
October
November
December
2005
January
February
March
April
May
June
July
August
September
October
November
December
2004
January
February
March
April
May
June
July
August
September
October
November
December
2003
January
February
March
April
May
June
July
August
September
October
November
December
2002
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code