Learning To Be Dangerous. How OpenAI’s Latest Innovation Will Alter The Cybersecurity Landscape

https://elitemoran.com/2023/02/13/learning-to-be-dangerous-how-openais-latest-innovation-will-alter-the-cybersecurity-landscape/

Learning to be Dangerous. How OpenAI’s Latest Innovation Will Alter the Cybersecurity Landscape

ChatGPT has become wildly popular since it debuted in November 2022, with the AI-driven platform amassing more than 100 million users two months after it was launched.

The natural language processing tool has human-like functions that have taken the world by storm, but it has also raised concerns across various industries. A New York school banned the tool due to concerns that students can use it to cheat, and Google has become so alarmed over its capabilities that it has issued a code red since ChatGPT is a threat to its search business.

All the more serious, the cybersecurity sector has noticed that ChatGPT can heighten security threats. And there is statistics to back the concerns.

According to new research from Blackberry, the AI-powered chatbot poses significant security threats, with increasing evidence showing that threat actors are already testing ChatGPT’s ability to create phishing emails and malicious payloads. Blackberry’s CTO for cybersecurity, Shishir Sigh, said that Blackberry expects hackers to become better at using ChatGPT for nefarious activities in 2023.

Furthermore, 51% of IT security experts from Australia, the UK, and North America participating in the survey believe that a ChatGPT-enabled cyberattack will occur before 2023 ends, and 71% agree that nation-state adversaries are likely exploring how they can use the technology to target other countries. 

The Rising Threat Of The ChatGPT Malware

An enhanced AI program like ChatGPT can become dangerous when used for nefarious reasons. For example, hackers can use ChatGPT to draft malicious code, with numerous dark web underground networks deploying it for scripting malware for use in ransomware attacks.

However, industry giants like Microsoft have forged multi-billion partnerships with OpenAI to develop more AI capabilities, which does little to alleviate the concerns that it will eventually become a serious threat to countries and organizations worldwide. This is due to reasons like:

  • ChatGPT is very easy to use: The simplicity of ChatGPT in creating sophisticated malware attracts amateurs and hackers with limited technical capabilities. It will cause a new breed of hackers to emerge, thus increasing cybersecurity threats.
  • High accessibility: Free availability of the AI-driven tool is one of its primary selling points. Anyone with an internet connection can use the program anonymously from any location to churn out phishing emails and dangerous malware.
  • Automated outputs: ChatGPT is designed to produce output automatically based on user prompts. Therefore, it makes it easier for cybercriminals to develop malware consistently and rapidly, enabling them to create multiple malware variants.

Cybersecurity Researchers Use ChatGPT To Develop Malware.

CyberArk cybersecurity researchers published a blog detailing using ChatGPT to develop polymorphic malware. They used ChatGPT to create polymorphic code, which is code mutated to create varying iterations to bypass signature-based detection software.

While the process was complicated due to the content policy filters that OpenAI has implemented to prevent users from abusing ChatGPT, the researchers used a process they called insisting and demanding during input requests to develop malicious executable code. Although the code is purely malicious and detectable using security software, the researchers note that the danger lies in that ChatGPT is an AI and machine learning tool that learns from its inputs to produce better outputs. It will get better at creating undetectable malware.

In addition, a few weeks after its launch, security researchers from Israeli cybersecurity firm Check Point demonstrated how nefarious actors could use ChatGPT to create convincing phishing emails capable of delivering malicious payloads. Specifically, they revealed how ChatGPT could be used with OpenAI’s code development system, Cordex, to create phishing emails. Sergey Shykevich, group manager at Check Point threat intelligence, said that such use cases demonstrate that ChatGPT can alter the cyber threat landscape significantly, noting that it marks a major step towards the dangerous evolution of effective and increasingly complex AI-enabled cyber threat capabilities.

A Great Learning Platform For Aspiring And Novice Cybercriminals

ChatGPT cannot execute codes or programs, including those it produces. Hence, attackers using it to execute cyberattacks is out of the question. Since cybercriminals can’t get it to run scans or launch attacks, they will use it for the next best thing – to learn how to perform various attacks.

One of the most amazing capabilities of ChatGPT is that it can output easy and clear instructions for software and cybersecurity programs, such as popular network scanning and pen-testing tools like Metasploit and Nmap. In most cases, ChatGPT can advise users on the most effective tools to use and provides understandable instructions on how to use them for malicious cyber activities.

Potentially, this implies that ChatGPT can help individuals with zero technical skills to effectively use various attack tools to engage in a wide range of malicious activities. These include conducting network scans and screening systems for security weaknesses and exploitable vulnerabilities.

The AI-powered chatbot can then assist users with how to exploit security flaws to gain unauthorized access to sensitive data, networks, and systems.

Ominously, these capabilities increase risks for organizations, where begrudged employees or upcoming hackers can leverage ChatGPTs capabilities to exploit vulnerabilities to cause harm.

What Is The Way Forward?

Cybersecurity threats from artificial intelligence are not new since the technology has existed for many years. However, with emerging interactive tools like ChatGPT demonstrating distinct examples of how AI can alter the cyber threat landscape, AI cyber threats are now scarier.

Thus, cybersecurity vendors must become more proactive in implementing behavioral AI components in security systems and software to detect and deter AI-generated attacks.

Dr. Raj Sharma, a lead AI and cybersecurity consultant at the University of Oxford, believe that AI-generated attacks cannot be countered using traditional security controls. “If there is some kind of hacking tool that uses AI, then we have to use AI to understand its behavior,” he says.

As such, artificial intelligence technologies will become critical in developing defensive measures against the evolving cyber landscape where attackers turn to AI-powered platforms to create malware and launch attacks.

Ultimately, the impacts of ChatGPT and other similar platforms on the cybersecurity landscape depend on users’ intentions. The bottom line is that it is crucial to be aware of all potential risks resulting from its use to inform the appropriate mitigation actions to reduce those risks

More blogs

Cybersecurity Priorities for Mobile Operators in 2023

https://elitemoran.com/2023/01/24/cybersecurity-priorities-for-mobile-operators-in-2023/

Cybersecurity Priorities for Mobile Operators in 2023

In recent years, mobile operators have reinvented themselves as the top digital service providers by investing in emerging technologies, such as IoT and 5G connectivity. The rapid transformation provides many opportunities for telecom operators to open new revenue streams and climb the value chain.

While harnessing the power of newer technologies propels mobile operators to achieve their digital aspirations and address disruptive market forces, they should understand that cybersecurity is crucial to completing the transformation journey.

Therefore, aligning cybersecurity strategies to transformation initiatives is essential to gaining a high return on investment.

So, what are the top cybersecurity priorities for mobile operators in 2023? This article looks into five main issues – 5G security, organized crime from hostile nations, ransomware protection, cybersecurity regulations, and security collaboration. 

1.    5G security

5G networks provide connected devices with increased bandwidth to enable faster speeds. In addition, the design of 5G networks is based on the flexibility to integrate with multiple systems, unlike its predecessors, the 3G and LTE network architectures.

However, the same open network design that allows easy integration and greater flexibility make 5G networks to be vulnerable to unknown threats and vulnerabilities.

For example, while older network generations’ functions were done by purpose-built hardware, the fifth negation network functions are performed in virtualized software which can be hacked. According to a report by Nokia, almost three-quarters of mobile network operators participating in a study said they had experienced at least six security breaches in 2022, which resulted in monetary losses and financial fraud, network disruption, leaked customer data, and regulatory penalties. 

That said, one of the primary challenges facing mobile operators is optimizing the 5G network interoperability and advanced functionality while recognizing and mitigating the threats and vulnerabilities resulting from the flexible and open 5G architecture.

Dmitry Kurbatov, SecurityGen CTO and co-founder, notes that 5G cyber threats will continue increasing as more countries deploy the 5G network infrastructure worldwide. “In 2023, operators must be aware of the range of these threats and take necessary steps to properly defend their networks, protect their customers, and safeguard their operations and revenue,” Kurbatov notes.

Furthermore, 5G roaming traffic volume will continue increasing as mobile operators deploy more networks to meet the demand for 5G connectivity from users purchasing 5G-enabled devices. But, most of the excessive roaming traffic flows through 5G networks built on existing 4G infrastructure, whose core network utilizes legacy technologies, such as Diameter and GTP signaling protocols. These are hackable, and mobile operators risk exposing their 5G networks to disruptive and damaging security threats without implementing proper cybersecurity measures.

2.    Organized crime and attacks from hostile nations

Mobile operators are responsible for operating and managing critical infrastructure. As a result, they are precariously positioned as prime targets for attacks during geopolitical tensions and conflicts.

For example, Kyivstar, Ukraine’s largest mobile operator, has suffered serious phishing and DDoS attacks since the Ukraine-Russia conflict began, affecting almost all of its 26 million customers. In 2023, mobile operators should prioritize investing in robust measures to protect against state-sponsored attacks.

Besides, the increased use of mobile connectivity to connect and remotely monitor critical infrastructure, including public transport systems, smart cities, energy grids, and automated industries, amplifies the disruption and damage resulting from a successful attack.

Also, the importance of mobile operators in facilitating mobile financial services places them in the crossfires of organized crime. Most organized crime groups target mobile operators and their operators for financial gain.

Therefore, defending against organized crime and nation-state attacks should be a top priority for mobile operators in 2023.

3.    Defending against ransomware attacks

Mobile operators are prone to ransomware to ransomware attacks due to several reasons. Firstly, they provide services that most organizations consider critical. Many businesses rely on mobile operators for internet connection, communication, and other services crucial to driving daily operations. Secondly, mobile operators keep a large amount of sensitive consumer data, which further attracts cybercriminals seeking to launch a ransomware attack. Such data includes phone numbers, payment data, and email addresses.

Cybercriminals perceive that compromising such valuable information would result in a higher ransom payout. For example, a ransomware attack that targeted Orange, the fourth largest telecom company in Europe, caused an uproar after the hackers leaked some vital data of corporate clients.

As the frequency and number of ransomware attacks continue increasing, mobile operators should brace for more sophisticated measures in 2023 as cybercriminals leverage more advanced technologies to carry out targeted ransomware attacks.

Ultimately, implementing robust defenses to protect against ransomware attacks should be a priority for mobile operators in 2023.

4.    Go beyond cybersecurity regulations

The benefits of digital technologies have seen many mobile operators expand their infrastructure at an unprecedented rate to be leaders in their respective regions. However, their importance in managing critical infrastructure and enabling worldwide connectivity has caused the resilience and security of mobile operators to be more important in light of heightened ransomware, nation-state, and other nefarious global incidents.

As such, in collaboration with national and regional regulators, many governments have pushed for mobile operators to comply with various cybersecurity regulations to enhance security and protection from attacks targeting digital infrastructures.

Nevertheless, over-emphasizing compliance at the expense of meeting the cybersecurity needs of the mobile operators’ cyber threat environment does little to ensure a strong security posture. Considering mobile network security as an afterthought and preferring a one-off security approach rather than adopting a security-by-design, network-wide security approach is ill-advised. It leaves some parts of a network exposed to security threats.

In 2023, mobile operators must prioritize security-by-design and zero-trust cybersecurity approaches while ensuring compliance.

5.    Collaboration is key to effective cybersecurity

Undoubtedly, geopolitical tensions and rivalries undermine international collaboration between mobile operators and other layers in the telecommunication sector, making it difficult to work together on joint efforts to strengthen cybersecurity.

Meanwhile, the current acute shortage of cybersecurity experts in the telecom sector, combined with the lack of threat intelligence and knowledge sharing, gives attackers an upper hand.

Hence, mobile operators should understand that a single-point solution cannot solve the cybersecurity issues plaguing the telecommunications industry. Solving the challenges requires a strategic collaboration approach between all players.

In this case, mobile operators and other sectorial partners should collaborate through intelligence sharing and join hands with regulators and government bodies to ensure a robust cybersecurity approach to securing networks, critical infrastructure, and customer data.