Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
AI Crime

AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn (msn.com) 21

"On a recent assignment to test defenses, Dave Brauchler of the cybersecurity company NCC Group tricked a client's AI program-writing assistant into executing programs that forked over the company's databases and code repositories," reports the Washington Post.

"We have never been this foolish with security," Brauchler said... Demonstrations at last month's Black Hat security conference in Las Vegas included other attention-getting means of exploiting artificial intelligence. In one, an imagined attacker sent documents by email with hidden instructions aimed at ChatGPT or competitors. If a user asked for a summary or one was made automatically, the program would execute the instructions, even finding digital passwords and sending them out of the network. A similar attack on Google's Gemini didn't even need an attachment, just an email with hidden directives. The AI summary falsely told the target an account had been compromised and that they should call the attacker's number, mimicking successful phishing scams.

The threats become more concerning with the rise of agentic AI, which empowers browsers and other tools to conduct transactions and make other decisions without human oversight. Already, security company Guardio has tricked the agentic Comet browser addition from Perplexity into buying a watch from a fake online store and to follow instructions from a fake banking email...

Advanced AI programs also are beginning to be used to find previously undiscovered security flaws, the so-called zero-days that hackers highly prize and exploit to gain entry into software that is configured correctly and fully updated with security patches. Seven teams of hackers that developed autonomous "cyber reasoning systems" for a contest held last month by the Pentagon's Defense Advanced Research Projects Agency were able to find a total of 18 zero-days in 54 million lines of open source code. They worked to patch those vulnerabilities, but officials said hackers around the world are developing similar efforts to locate and exploit them. Some longtime security defenders are predicting a once-in-a-lifetime, worldwide mad dash to use the technology to find new flaws and exploit them, leaving back doors in place that they can return to at leisure.

The real nightmare scenario is when these worlds collide, and an attacker's AI finds a way in and then starts communicating with the victim's AI, working in partnership — "having the bad guy AI collaborate with the good guy AI," as SentinelOne's [threat researcher Alex] Delamotte put it. "Next year," said Adam Meyers, senior vice president at CrowdStrike, "AI will be the new insider threat."

In August more than 1,000 people lost data to a modified Nx program (downloaded hundreds of thousands of times) that used pre-installed coding tools from Google/Anthropic/etc. According to the article, the malware "instructed those programs to root out" sensitive data (including passwords or cryptocurrency wallets) and send it back to the attacker. "The more autonomy and access to production environments such tools have, the more havoc they can wreak," the article points out — including this quote from SentinelOne threat researcher Alex Delamotte.

"It's kind of unfair that we're having AI pushed on us in every single product when it introduces new risks."
This discussion has been archived. No new comments can be posted.

AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn

Comments Filter:
  • by jjaa ( 2041170 ) on Sunday September 21, 2025 @04:38PM (#65674812)
    hindsight - enabling script kiddies on steroids - good idea or not
  • The other angle/question I had for some time: How much closed source software is really "closed", when one could try to brute-guess the prompt that was used to generate it?

    How much security benefits closed source software would still have remaining?

    P.S. AI-powered reverse-engineer (to automate all those tedious repetitive 99% of work) may be a fun topic too.

    • If you have the binaries, no software is closed source. Once upon a time that may have meant that with much time and difficulty you could effectively reverse engineer the machine code into some high-level programming language, but today a lot of that can be automated even without AI. The AI tools can probably help clean up the generated code a little to make it more simpler to what a programmer would write and even fill in some comments.

      Unless the code is only running on your own machines that are isolat
      • You don't seem to know the difference between source code and assembly code. Source code has comments and variables with properly chosen names that cannot be derived from the binaries. That first statement means you don't really have any experience writing software and reverse engineering.
  • Every invention since the iron age has helped evildoers, and good people alike. AI is no different.

    The good news is, the technology also gives "powers" to those who want to fight hackers.

    • I think it will be difficult to fight cyber-criminals when the 'smart' machine follows the last person shoving orders into its eval function.

      The Hollywood trope of cyber-intrusion and penetration won by the person giving 'better' orders, will be true. Unfortunately, in reality, that would make every AI, a weapon for the enemy.

  • Looks like little Bobby Tables is all grown up.
  • by thesjaakspoiler ( 4782965 ) on Sunday September 21, 2025 @05:39PM (#65674878)

    With his newly acquired AI powers, making him hallucinate that he can do anything.

  • by gweihir ( 88907 ) on Sunday September 21, 2025 @06:51PM (#65674990)

    Why the timid language? Call it utterly dumb, greedy and immoral, because that is what this is. Just some assholes trying to get rich quick and damm the rest of humanity.

  • AI is incompetent at writing code, also think it's God-mode at writing malware. Just admit that you're glass half-empty kind of people.
    • I mean, it's a whole lot easier to break shit then build or fix shit. You can easily lookup CVEs to find exploits. It's not hard to scan for systems that are of the write version that contain the exploit. At that point, I'm quite sure AI could kludge together a tool or script that could gain you access to a system.

      Shoot, there are already "security" tools that are freely available that do precisely what I just described. The only different between a security tool and an exploit tool is the motivation of the

  • China: oh yeah? Bzzzzzzzt!!!

  • ... or we'll install AI on your computer.

There are two kinds of egotists: 1) Those who admit it 2) The rest of us

Working...