{"id":10105,"date":"2024-02-16T15:47:14","date_gmt":"2024-02-16T10:17:14","guid":{"rendered":"https:\/\/cccfornews.com\/index.php\/2024\/02\/16\/hackers-from-china-russia-iran-north-korea-may-use-openai-for-cyber-operations\/"},"modified":"2024-02-16T15:47:14","modified_gmt":"2024-02-16T10:17:14","slug":"hackers-from-china-russia-iran-north-korea-may-use-openai-for-cyber-operations","status":"publish","type":"post","link":"https:\/\/cccfornews.com\/index.php\/2024\/02\/16\/hackers-from-china-russia-iran-north-korea-may-use-openai-for-cyber-operations\/","title":{"rendered":"Hackers from China, Russia, Iran, North Korea May Use OpenAI for Cyber Operations"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Microsoft Threat Intelligence <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/14\/staying-ahead-of-threat-actors-in-the-age-of-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">wrote in a blog post<\/a> that hackers are using OpenAI for cyber operations.<\/p>\n<p>\u201cMicrosoft and OpenAI have not yet observed particularly novel or unique AI-enabled attack or abuse techniques resulting from threat actors\u2019 usage of AI,\u201d Microsoft wrote. \u201cHowever, Microsoft and our partners continue to study this landscape closely.\u201d<\/p>\n<p>\u201cImportantly, our research with OpenAI has not identified significant attacks employing the LLMs we monitor closely,\u201d the post added. \u201cAt the same time, we feel this is important research to publish to expose early-stage, incremental moves that we observe well-known threat actors attempting, and share information on how we are blocking and countering them with the defender community.\u201d<\/p>\n<p>Some of the threat actors described in the post are Charcoal Typhoon and Salmon Typhoon from China, Crimson Sandstorm from Iran, Forest Blizzard from Russia, and Emerald Sleet from North Korea.<\/p>\n<p>Forest Blizzard often targets organizations \u201cin and related to Russia\u2019s war in Ukraine throughout the duration of the conflict, and Microsoft assesses that Forest Blizzard operations play a significant supporting role to Russia\u2019s foreign policy and military objectives both in Ukraine and in the broader international community,\u201d as well as being involved in researching \u201cvarious satellite and radar technologies.\u201d<\/p>\n<p>Emerald Sleet is known to impersonate \u201creputable academic institutions.\u201d<\/p>\n<p>Crimson Sandstorm has been active since at least 2017 and has targeted \u201cdefense, maritime shipping, transportation, healthcare, and technology.\u201d<\/p>\n<p>Charcoal Typhoon has a \u201cbroad operational scope\u201d across Taiwan, Thailand, Mongolia, Malaysia, France, and Nepal, while Salmon Typhoon targets \u201cUS defense contractors, government agencies, and entities within the cryptographic technology sector.\u201d<\/p>\n<p>A similar <a href=\"https:\/\/openai.com\/blog\/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> from OpenAI read, \u201cAs is the case with many other ecosystems, there are a handful of malicious actors that require sustained attention so that everyone else can continue to enjoy the benefits. Although we work to minimize potential misuse by such actors, we will not be able to stop every instance. But by continuing to innovate, investigate, collaborate, and share, we make it harder for malicious actors to remain undetected across the digital ecosystem and improve the experience for everyone else.\u201d<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/americanfaith.com\/hackers-from-china-russia-iran-north-korea-use-openai-for-cyber-operations\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Threat Intelligence wrote in a blog post that hackers are using OpenAI for cyber operations. \u201cMicrosoft and OpenAI have not yet observed particularly novel or unique AI-enabled attack or abuse techniques resulting from threat actors\u2019 usage of AI,\u201d Microsoft wrote. \u201cHowever, Microsoft and our partners continue to study this landscape closely.\u201d \u201cImportantly, our research [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10106,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jnews-multi-image_gallery":[],"jnews_single_post":[],"jnews_primary_category":[]},"categories":[43],"tags":[],"_links":{"self":[{"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/posts\/10105"}],"collection":[{"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/comments?post=10105"}],"version-history":[{"count":0,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/posts\/10105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/media\/10106"}],"wp:attachment":[{"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/media?parent=10105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/categories?post=10105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cccfornews.com\/index.php\/wp-json\/wp\/v2\/tags?post=10105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}