Altszn.com
  • Home
  • Crypto
    • Altcoins
    • Bitcoin
    • Ethereum
    • Monero
    • XRP
    • Zcash
  • Web3
  • DeFi
  • NFTs
No Result
View All Result
Altszn.com
  • Home
  • Crypto
    • Altcoins
    • Bitcoin
    • Ethereum
    • Monero
    • XRP
    • Zcash
  • Web3
  • DeFi
  • NFTs
No Result
View All Result
Altszn.com
No Result
View All Result

Data Heists Evolve: How Cybercriminals Are Using Artificial Intelligence to Steal Your Data

Altszn.com by Altszn.com
September 1, 2023
in Metaverse, Web3
0
Data Heists Evolve: How Cybercriminals Are Using Artificial Intelligence to Steal Your Data
399
SHARES
2.3k
VIEWS
Share on FacebookShare on Twitter


Data Heists Evolve: How Cybercriminals Are Using Artificial Intelligence to Steal Your Data

Published: 1 September 2023, 7:11 am Updated: 01 Sep 2023, 10:41 am

AI integration in the digital world has revolutionized not only the way we live and work but also the sinister world of cybercrime.

In an exclusive interview with Carlos Salort, Senior Data Scientist at Forta, a cybersecurity network, Metaverse Post delves into the intersection of AI and cyber threats. Sarlot offers insights into how malevolent actors harness AI to amplify traditional hacking techniques, evolving cyberattacks, and the strategies and technologies the cybersecurity industry is employing to stay one step ahead of cybercriminals.

Furthermore, he sheds light on Forta’s cutting-edge AI-driven approach to safeguarding Web3 systems, providing a unique perspective on the battle to protect digital assets and user data in an increasingly complex and interconnected digital world.

 AI-Powered Cybercriminal Tactics Threaten User Data and Digital Assets

Salort explains that AI is a powerful tool for many tasks, and like any tool, when used with ill intent, can be dangerous. “Think as an example of a very common type of scam, emails with social engineering. This type of attack preys on people less familiar with digital technologies, and one of the easiest ways to recognize them is by finding the many irregularities in the emails (plenty of orthographic mistakes, unreliable email domain, etc.).”

“Now imagine if those emails were perfectly written: while there are other ways of detecting them, it suddenly becomes much harder. This is what happens when cybercriminals start using Large Language Models (LLMs) to write these scams. This type of model can generate text which is almost impossible to differentiate from human-written text, increasing the efficacy of this type of scam,” he added.

AI also aids hackers in circumventing spam filters and creating seemingly legitimate email addresses, adding to the sophistication of their attacks.

Ransomware attacks have also seen a significant AI-driven transformation. Hackers now employ AI to encrypt files and subsequently demand ransoms from their victims. AI comes into play by assisting hackers in evading antivirus software and pinpointing the most valuable files to encrypt, maximizing their leverage over victims.

Deepfakes, another disturbing facet of AI exploitation, allow hackers to create remarkably realistic fake videos, images, or audio recordings. Deceptive media assets serve purposes like blackmail, propaganda, and spreading misinformation. AI enables the creation of such content and allows hackers to manipulate facial expressions, voices, or gestures of real individuals, further blurring the line between fact and fiction.

Furthermore, AI has found application in creating and managing botnets—networks of compromised devices controlled by cybercriminals. These botnets can be utilized for various malicious activities, including distributed denial-of-service (DDoS) attacks, spam distribution, and data theft. AI plays a pivotal role in streamlining the coordination and optimization of these botnet activities, making them more potent and elusive threats.

“One way that cybercriminals can try to exploit AI is by reverse-engineering AI engines. If they can simulate the AI systems, they will know if an attack that they are planning will be detected by a system. That’s one of the reasons why at Forta we have multiple approaches to detect attacks, as with a greater volume of security tools, it becomes harder for cybercriminals to reverse engineer them all,”

Sarlot said.

How Cybersecurity Tackles AI-Driven Threats

The race between cybersecurity and cybercriminals is about one- upping the opposite faction. For some types of attacks, cybercriminals run simulations on how they can extract benefits from front-running (or acting before) certain transactions take place, the expert shared with Metaverse Post.

These types of attacks are difficult to identify beforehand, but they can be prevented by using the same techniques: If security researchers discover that one of these attacks may take place, they can run the same simulations as the criminals and front-run the criminals. This is known as white hat hacking, and in that case, the funds will be extracted from the original owner but will belong to the security researchers instead of the criminals.

There are also other ways of using AI technologies to improve defense. Once a cybercriminal finds a new type of scam, and it’s detected by security researchers (for the first time, normally after it has taken place), there is already a sample of how the attack works, showing all the preparation, etc. 

“With novel AI techniques, cybersecurity researchers can train models that will detect this new scam (to a certain extent), without needing to wait to have a lot of examples of the scam taking place,”

he added. 

AI and Web3 Synergy in Cybersecurity

Sarlot said that due to its novelty, security around Web3 applications is still not as developed as security around Web2. In practice, this allows hackers to be successful using less refined techniques, as the defenses towards those are still not fully developed. Therefore, they still haven’t developed a lot of attacks based on attacks. But given that security is evolving to catch up with cybercriminals, there is no doubt that they will eventually evolve to use these new techniques.

The Forta Network works by monitoring the blockchain in real-time. The AI-based bots running in the network run based on multiple types of models. Some bots run as an AI-ensemble, combining the alerts generated from a myriad of bots to ensure that new attacks are covered. 

Another bot detects similarities between contracts, triggering alerts when a newly deployed contract shares a structure or functions with known malicious contracts. Also, there’s a bot that employs AI to identify addresses associated with scammers based on their transaction history.

Data generated by the AI bots can be used in multiple ways. Wallets can analyze transactions to understand if they may be malicious, and security teams can use these real-time alarms to enhance their security knowledge. Also, anyone (end users, DeFi protocol/bridges developer team, cybersecurity researchers) can use the network to deploy custom bots, enriching the data that everyone can benefit from.

“Don’t settle. Cybercriminals are always on the move and trying to one-up current security standards. Security should be among the highest priorities for any organization, being involved in best practices, and collaborating with other security teams, as together it will be easier to defend from cyber-attacks.”

Salort

Read more:





Read More: mpost.io

Tags: ArtificialCybercriminalsdataEvolveHeistsintelligenceMetaversesteal
ADVERTISEMENT

Recent

Top L2 Arbitrum’s Scaling Roadmap Seeks to Avoid ‘Trade-offs’

Top L2 Arbitrum’s Scaling Roadmap Seeks to Avoid ‘Trade-offs’

May 16, 2025
Pixelmon Announces Strategic Partnership with Ava Labs to Launch Two Mobile Games Including ‘Warden’s Ascent’ on Avalanche with Dedicated Layer-1

Pixelmon Announces Strategic Partnership with Ava Labs to Launch Two Mobile Games Including ‘Warden’s Ascent’ on Avalanche with Dedicated Layer-1

May 16, 2025
Gamers Hate Crypto, but a New High-Profile Partnership Marks a Shift

Gamers Hate Crypto, but a New High-Profile Partnership Marks a Shift

May 16, 2025

Categories

  • Bitcoin (4,812)
  • Blockchain (11,331)
  • Crypto (9,270)
  • Dark Web (540)
  • DeFi (8,355)
  • Ethereum (4,866)
  • Metaverse (7,449)
  • Monero (287)
  • NFT (1,436)
  • Solana (5,028)
  • Web3 (20,606)
  • Zcash (501)

Category

Select Category

    Advertise

    Advertise your site, company or product to millions of web3, NFT and cryptocurrency enthusiasts. Learn more

    Useful Links

    Advertise
    DMCA
    Contact Us
    Privacy Policy
    Shipping & Returns
    Terms of Use

    Resources

    Exchanges
    Changelly
    Web3 Jobs

    Recent News

    Top L2 Arbitrum’s Scaling Roadmap Seeks to Avoid ‘Trade-offs’

    Top L2 Arbitrum’s Scaling Roadmap Seeks to Avoid ‘Trade-offs’

    May 16, 2025
    Pixelmon Announces Strategic Partnership with Ava Labs to Launch Two Mobile Games Including ‘Warden’s Ascent’ on Avalanche with Dedicated Layer-1

    Pixelmon Announces Strategic Partnership with Ava Labs to Launch Two Mobile Games Including ‘Warden’s Ascent’ on Avalanche with Dedicated Layer-1

    May 16, 2025

    © 2022 Altszn.com. All Rights Reserved.

    No Result
    View All Result
    • Home
      • Home – Layout 1
      • Home – Layout 2
      • Home – Layout 3

    © Altszn.com. All Rights Reserved.

    • bitcoinBitcoin (BTC) $ 103,021.00
    • ethereumEthereum (ETH) $ 2,476.26
    • tetherTether (USDT) $ 1.00
    • xrpXRP (XRP) $ 2.34
    • bnbBNB (BNB) $ 641.06
    • solanaSolana (SOL) $ 167.60
    • usd-coinUSDC (USDC) $ 0.999806
    • dogecoinDogecoin (DOGE) $ 0.215632
    • cardanoCardano (ADA) $ 0.753446
    • tronTRON (TRX) $ 0.271294
    • staked-etherLido Staked Ether (STETH) $ 2,474.40
    • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 102,946.00
    • suiSui (SUI) $ 3.78
    • wrapped-stethWrapped stETH (WSTETH) $ 2,973.23
    • chainlinkChainlink (LINK) $ 15.32
    • avalanche-2Avalanche (AVAX) $ 22.51
    • stellarStellar (XLM) $ 0.285709
    • hyperliquidHyperliquid (HYPE) $ 26.37
    • shiba-inuShiba Inu (SHIB) $ 0.000014
    • leo-tokenLEO Token (LEO) $ 8.97
    • hedera-hashgraphHedera (HBAR) $ 0.190392
    • bitcoin-cashBitcoin Cash (BCH) $ 391.37
    • the-open-networkToncoin (TON) $ 3.07
    • litecoinLitecoin (LTC) $ 97.78
    • polkadotPolkadot (DOT) $ 4.67
    • usdsUSDS (USDS) $ 0.999789
    • wethWETH (WETH) $ 2,478.16
    • moneroMonero (XMR) $ 336.54
    • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 1.00
    • wrapped-eethWrapped eETH (WEETH) $ 2,646.52
    • bitget-tokenBitget Token (BGB) $ 4.94
    • pepePepe (PEPE) $ 0.000012
    • ethena-usdeEthena USDe (USDE) $ 1.00
    • pi-networkPi Network (PI) $ 0.684409
    • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 103,093.00
    • whitebitWhiteBIT Coin (WBT) $ 30.09
    • bittensorBittensor (TAO) $ 421.26
    • daiDai (DAI) $ 1.00
    • uniswapUniswap (UNI) $ 5.84
    • aaveAave (AAVE) $ 223.50
    • nearNEAR Protocol (NEAR) $ 2.71
    • aptosAptos (APT) $ 5.13
    • okbOKB (OKB) $ 52.98
    • jito-staked-solJito Staked SOL (JITOSOL) $ 201.14
    • kaspaKaspa (KAS) $ 0.112387
    • ondo-financeOndo (ONDO) $ 0.920754
    • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
    • crypto-com-chainCronos (CRO) $ 0.097693
    • ethereum-classicEthereum Classic (ETC) $ 18.32
    • internet-computerInternet Computer (ICP) $ 5.19
    • bitcoinBitcoin (BTC) $ 103,021.00
    • ethereumEthereum (ETH) $ 2,476.26
    • tetherTether (USDT) $ 1.00
    • xrpXRP (XRP) $ 2.34
    • bnbBNB (BNB) $ 641.06
    • solanaSolana (SOL) $ 167.60
    • usd-coinUSDC (USDC) $ 0.999806
    • dogecoinDogecoin (DOGE) $ 0.215632
    • cardanoCardano (ADA) $ 0.753446
    • tronTRON (TRX) $ 0.271294
    • staked-etherLido Staked Ether (STETH) $ 2,474.40
    • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 102,946.00
    • suiSui (SUI) $ 3.78
    • wrapped-stethWrapped stETH (WSTETH) $ 2,973.23
    • chainlinkChainlink (LINK) $ 15.32
    • avalanche-2Avalanche (AVAX) $ 22.51
    • stellarStellar (XLM) $ 0.285709
    • hyperliquidHyperliquid (HYPE) $ 26.37
    • shiba-inuShiba Inu (SHIB) $ 0.000014
    • leo-tokenLEO Token (LEO) $ 8.97
    • hedera-hashgraphHedera (HBAR) $ 0.190392
    • bitcoin-cashBitcoin Cash (BCH) $ 391.37
    • the-open-networkToncoin (TON) $ 3.07
    • litecoinLitecoin (LTC) $ 97.78
    • polkadotPolkadot (DOT) $ 4.67
    • usdsUSDS (USDS) $ 0.999789
    • wethWETH (WETH) $ 2,478.16
    • moneroMonero (XMR) $ 336.54
    • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 1.00
    • wrapped-eethWrapped eETH (WEETH) $ 2,646.52
    • bitget-tokenBitget Token (BGB) $ 4.94
    • pepePepe (PEPE) $ 0.000012
    • ethena-usdeEthena USDe (USDE) $ 1.00
    • pi-networkPi Network (PI) $ 0.684409
    • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 103,093.00
    • whitebitWhiteBIT Coin (WBT) $ 30.09
    • bittensorBittensor (TAO) $ 421.26
    • daiDai (DAI) $ 1.00
    • uniswapUniswap (UNI) $ 5.84
    • aaveAave (AAVE) $ 223.50
    • nearNEAR Protocol (NEAR) $ 2.71
    • aptosAptos (APT) $ 5.13
    • okbOKB (OKB) $ 52.98
    • jito-staked-solJito Staked SOL (JITOSOL) $ 201.14
    • kaspaKaspa (KAS) $ 0.112387
    • ondo-financeOndo (ONDO) $ 0.920754
    • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
    • crypto-com-chainCronos (CRO) $ 0.097693
    • ethereum-classicEthereum Classic (ETC) $ 18.32
    • internet-computerInternet Computer (ICP) $ 5.19