Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeRisk ManagementsNation-State Hackers Exploit Gemini AI Tool

Nation-State Hackers Exploit Gemini AI Tool

Published on

spot_img

Nation-state threat actors have been identified as frequent abusers of Google’s generative AI tool, Gemini, for their malicious cyber operations. The Google Threat Intelligence Group (GTIG) conducted an analysis revealing that APT groups from Iran, China, Russia, and North Korea are utilizing the large language model (LLM) for a variety of nefarious activities. These tasks mainly include research, vulnerability exploitation, malware development, and the creation and localization of content like phishing emails.

While the GTIG has not yet observed any original or persistent attempts by nation-state threat actors to use prompt attacks or other AI-specific threats, the tool has primarily been used to enhance productivity thus far. There have been only a “handful” of unsuccessful attempts to bypass Gemini’s safety controls through publicly available jailbreak prompts. Gemini has responded with safety fallback responses and refused to follow the threat actors’ instructions.

The researchers at GTIG noted that instead of enabling disruptive change, generative AI allows threat actors to operate at a faster pace and with greater volume. However, with new AI models and agentic systems emerging on a daily basis, they anticipate that threat actors will evolve their use of AI accordingly.

In the case of Iran, government-backed actors, particularly APT42, accounted for the largest Gemini use among Iranian APT actors. They used Gemini for reconnaissance on potential targets, research on vulnerabilities, and crafting phishing emails that appeared legitimate. Iranian actors targeted defense experts, organizations, foreign governments, and individual dissidents.

Chinese APT groups focused on reconnaissance of US military and IT organizations using Gemini. They also used the tool to assist with compromise, post-compromise activities, and finding solutions to technical challenges. For instance, a PRC-backed group sought assistance from Gemini in deploying a plugin for Microsoft Outlook to all computers silently.

North Korean state actors utilized Gemini for various stages of the attack lifecycle, including researching how to compromise Gmail accounts and other Google services. They also used Gemini for IT worker schemes, generating revenue for the DPRK government. Some North Korean APT groups attempted to use Gemini for development and scripting tasks, such as code for sandbox evasion.

Russian nation-state groups showed limited engagement with Gemini compared to other nations, with observed uses including rewriting malware into another language and adding encryption functionality to code. The low engagement may be due to Russian actors avoiding Western-controlled platforms like Gemini to evade monitoring of their activities, instead opting for AI tools from Russian firms or locally hosting LLMs.

Overall, the abuse of generative AI tools by nation-state threat actors poses a significant cybersecurity risk that could potentially lead to more sophisticated and widespread malicious activities in the future. The continuous evolution of AI technology will undoubtedly shape the landscape of cyber warfare, requiring constant vigilance and innovation in defense mechanisms to combat these threats effectively.

Source link

Latest articles

Lazarus Hackers Utilizing IIS Servers for ASP-based Web Shell Deployment

The recent cybersecurity landscape has been shaken by the emergence of sophisticated attacks carried...

Threat Actor Poses as Booking.com in Phishing Scam

The technology giant, Microsoft, recently disclosed a complex cyberattack campaign that utilizes a clever...

Insurer notifies 335,500 customers, agents, others of hack

New Era Life Insurance Companies, a Texas-based insurance firm, has recently announced that it...

Nationwide Cyber Security Review Sees Historic Participation and Positive Outcomes

In the ongoing battle to protect our nation’s state, local, tribal, and territorial (SLTT)...

More like this

Lazarus Hackers Utilizing IIS Servers for ASP-based Web Shell Deployment

The recent cybersecurity landscape has been shaken by the emergence of sophisticated attacks carried...

Threat Actor Poses as Booking.com in Phishing Scam

The technology giant, Microsoft, recently disclosed a complex cyberattack campaign that utilizes a clever...

Insurer notifies 335,500 customers, agents, others of hack

New Era Life Insurance Companies, a Texas-based insurance firm, has recently announced that it...