July 16th, 2024

The golden age of scammers: AI-powered phishing

AI technology is transforming phishing attacks, allowing scammers to send personalized emails at scale. The rise of AI phishing has led to a 1,265% surge in malicious emails. Organizations must implement robust security measures to combat this evolving threat.

Read original articleLink Icon
ConcernSkepticismSolutions
The golden age of scammers: AI-powered phishing

AI technology is revolutionizing phishing attacks, enabling scammers to send more convincing and personalized emails at scale. By leveraging generative AI tools like WormGPT, scammers can automate mass campaigns, spoof domains, and access sensitive data with ease. The rise of AI phishing has led to a significant increase in malicious emails, with cyber security firm SlashNext reporting a 1,265% surge since 2022. Traditional phishing attacks rely on social engineering, while AI-powered attacks use machine learning to personalize messages based on extensive data analysis. To defend against these evolving threats, organizations are advised to implement multi-layered security measures, recognize AI phishing attempts, and prioritize sender reputation. As scammers continue to exploit AI advancements, staying vigilant and proactive in email security is crucial to safeguarding sensitive information and preventing financial losses.

Related

Hackers 'jailbreak' powerful AI models in global effort to highlight flaws

Hackers 'jailbreak' powerful AI models in global effort to highlight flaws

Hackers exploit vulnerabilities in AI models from OpenAI, Google, and xAI, sharing harmful content. Ethical hackers challenge AI security, prompting the rise of LLM security start-ups amid global regulatory concerns. Collaboration is key to addressing evolving AI threats.

Bots Compose 42% of Overall Web Traffic; Nearly Two-Thirds Are Malicious

Bots Compose 42% of Overall Web Traffic; Nearly Two-Thirds Are Malicious

Akamai Technologies reports 42% of web traffic is bots, 65% malicious. Ecommerce faces challenges like data theft, fraud due to web scraper bots. Mitigation strategies and compliance considerations are advised.

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

Microsoft warns of "Skeleton Key" attack exploiting AI models to generate harmful content. Mark Russinovich stresses the need for model-makers to address vulnerabilities. Advanced attacks like BEAST pose significant risks. Microsoft introduces AI security tools.

I Received an AI Email

I Received an AI Email

A blogger, Tim Hårek, received an AI-generated email from Raymond promoting Wisp CMS. Tim found the lack of personalization concerning, leading him to question the ethics of AI-generated mass emails.

Google Researchers Publish Paper About How AI Is Ruining the Internet

Google Researchers Publish Paper About How AI Is Ruining the Internet

Google researchers warn about generative AI's negative impact on the internet, creating fake content blurring authenticity. Misuse includes manipulating human likeness, falsifying evidence, and influencing public opinion for profit. AI integration raises concerns.

AI: What people are saying
The comments on the article about AI-powered phishing attacks highlight several key concerns and observations:
  • Many are surprised at the slow rollout of AI phishing, despite the technology being available for some time.
  • There is a call for better security measures, such as two-factor authentication and more transparent email and browser interfaces.
  • Concerns are raised about the potential for AI to create highly convincing phishing attacks, including deepfakes and voice impersonations.
  • Some suggest that phone carriers should block foreign calls to reduce the risk of phone-based phishing.
  • There is a recognition that AI phishing will make it harder to rely on traditional heuristics like bad grammar to detect scams.
Link Icon 17 comments
By @dbspin - 3 months
I'm kind of amazed how slow 'AI phishing' has been to roll out.

The technology for customised text based attacks at scale has been available at least since Llama was open sourced. The tech for custom voice and image based attacks is basically there too with whisper / tortoise and stable diffusion - though clearly more expensive to render. I'm honestly not sure why social networks aren't being leveraged more to target and spoof individuals - especially elderly people.

Tailored attacks impersonating text or voice messages from close contacts and family members should be fairly common, and yet they're not. Robo-calls that carry out a two way conversation convincingly impersonating bank or police officials should be everywhere. Yet the only spam-calls I ever receive are from Indian call centres or static messages using decades old synthesised voice tech.

By @nottorp - 3 months
> Is it your fate now to do due diligence on every email you receive?

Always has been.

Tbh the browser/email client makers are complicit in these phishing attempts for hiding the URLs and the actual email addresses.

Put them back!

By @greyrouting - 3 months
Why don’t US phone carriers give their users the ability to block foreign calls terminating in the U.S., at the telephony signaling layer? In almost no case do I ever want to receive a phone call from a foreign country with a spoofed number. Nor do I think anyone in my family wants to either.
By @manishsharan - 3 months
This is going to become so much worse

https://news.ycombinator.com/item?id=40942307

Imagine old people getting phone calls from frantic children. They won't know real from fake. Add tech like this to SIM forgery ..and we will devolve from a high trust society to a no trust society.

By @kagevf - 3 months
I expect that with AI, we'll be less able to rely on the heuristic of bad grammar to easily detect phishing. That one flaw gave the phishers away so often, and made it so obvious ...
By @feverzsj - 3 months
Artificial Intelligence vs. Actually Indian
By @29athrowaway - 3 months
On YouTube, I saw a deepfake of Elon Musk asking people to scan a QR code and buy crypto.
By @rldjbpin - 3 months
using ai might be bringing out some low-effort success but at the end of the day, it is skill issue on our front.

a common heuristic to look out for is "badly"-written/spoken communication. the "AI vs Actual Indian" comment and nigerian prince emails stand out for most people, but they still ended up working well enough to become this wide-spread.

you just need to employ some critical thinking now for most external communication now. it is no different from some highly-motivated scammers doing it the old-fashioned way. at the end of the day, we are trying to replicate the success of some native-speaking teens (https://news.ycombinator.com/item?id=32959001).

By @mmaniac - 3 months
I've already experienced two AI-powered phishing attempts personally in the last few weeks. One was pretty transparent, but the other almost got me. I expect we'll all see a lot more of these soon.
By @jbaczuk - 3 months
> link or attachment that when clicked or downloaded, takes you to a spoofed website or installs malicious software on your device.

Can someone show me a modern OS that would install software by clicking a link?

By @WesternWind - 3 months
Hey, just going to say what I've been telling folks IRL, if you are reading this, and your parents and family members aren't tech savvy, you need to set them up with two factor authentication now.

Because you know how to do that, and it's so much easier than helping them when they get hacked.

By @luen - 3 months
I want to know, how are you using AI now.
By @darefalcon - 3 months
It’s actually worse than that - AI powered phishing sites will also copy your device profile and mouse, gesture and keyboard signature and use this to get past common anti-fraud techniques like device fingerprinting and behavioural biometrics.
By @lordofmoria - 3 months
The section “Recognizing AI phishing attempts” is mournfully short, but there’s some companies out there like Jericho Security (https://www.jerichosecurity.com) that are working on countermeasures, at least for enterprises.