{"id":1121030,"date":"2024-01-14T22:26:59","date_gmt":"2024-01-15T03:26:59","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/ai-is-helping-china-backed-hackers-but-its-also-helping-to-hunt-them-down-nsa-says-techradar\/"},"modified":"2024-01-14T22:26:59","modified_gmt":"2024-01-15T03:26:59","slug":"ai-is-helping-china-backed-hackers-but-its-also-helping-to-hunt-them-down-nsa-says-techradar","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ai-is-helping-china-backed-hackers-but-its-also-helping-to-hunt-them-down-nsa-says-techradar\/","title":{"rendered":"AI is helping China-backed hackers but it&#8217;s also helping to hunt them down, NSA says &#8211; TechRadar"},"content":{"rendered":"<p><p>    Cybercriminals of all skill levels are using    AI to    enhance their abilities, but AI is also helping to hunt them    down, security experts have warned.  <\/p>\n<p>    At a conference at Fordham University, National Security    Agencys director of cybersecurity, Rob Joyce, said that    Chinese hacking groups are being assisted by AI to slip past    firewalls when    infiltrating networks.  <\/p>\n<p>    Hackers are using generative AI to improve their use of English    in phishing scams, and also using it for technical guidance    when infiltrating a network or launching an attack, Joyce    warned.  <\/p>\n<p>    2024 is set to be a critical year for state-backed hacking    groups, particularly those working on behalf of China and    Russia. Taiwans presidential election kicks off in just a few    days, which China will be looking to influence in its pursuit    of reunification. But eyes will also be on the US elections    coming up in November and the UK is expected to hold a general    election in the second half of 2024.  <\/p>\n<p>    China backed groups are already developing highly effective    methods for infiltrating organizations and are using AI to do    so. Theyre all subscribed to the big name companies that you    would expect - all the generative AI models out there, Joyce    says. Were seeing intelligence operators [and] criminals on    those platforms.  <\/p>\n<p>    The US experienced an increased number of attacks on        critical energy and water infrastructure sites in 2023,    which US government officials attributed to groups linked to    China and Iran. One of the attack methods used by the China    backed Volt Typhoon group involves accessing a network    covertly and then using built-in network administration tools    to perform attacks.  <\/p>\n<p>    While no particular examples were given of recent attacks    involving AI, Joyce points out, Theyre in places like    electric, transportation pipelines and courts, trying to hack    in so that they can cause societal disruption and panic at the    time in place of their choosing.  <\/p>\n<p>    China backed groups have been gaining access to networks by    abusing implementation flaws - bugs caused by poorly    implemented software updates - and then establishing themselves    what would appear to be a legitimate user of the system.    However, their activities and traffic within the network is    often unusual.  <\/p>\n<p>    Joyce explains that, Machine learning, AI and big data helps    us surface those activities [and] brings them to the fore    because those accounts dont behave like the normal business    operators on their critical infrastructure, so that gives us an    advantage.  <\/p>\n<p>    Just as generative AI is expected to help bridge the skills gap    in cybersecurity by providing insights, definitions and advice    to those working in the industry, it can also be reverse    engineered or abused by cybercriminals to provide guidance on    their hacking activities.  <\/p>\n<p>    Joyce explained that AI is not a silver bullet that can    suddenly make someone with no experience into a cybercriminal    mastermind, but its going to make those that use AI more    effective and more dangerous.  <\/p>\n<p>    Via     TechCrunch  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.techradar.com\/pro\/ai-is-helping-china-backed-hackers-but-its-also-helping-to-hunt-them-down-nsa-says\" title=\"AI is helping China-backed hackers but it's also helping to hunt them down, NSA says - TechRadar\" rel=\"noopener\">AI is helping China-backed hackers but it's also helping to hunt them down, NSA says - TechRadar<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cybercriminals of all skill levels are using AI to enhance their abilities, but AI is also helping to hunt them down, security experts have warned.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/ai-is-helping-china-backed-hackers-but-its-also-helping-to-hunt-them-down-nsa-says-techradar\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1121030","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121030"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1121030"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121030\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1121030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1121030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1121030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}