Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Incident 644: State-Sponsored Hackers Escalate Phishing Attacks Using Artificial Intelligence

Description: State-sponsored hackers from North Korea, Iran, Russia, and China are reportedly leveraging artificial intelligence to conduct sophisticated phishing and social engineering attacks. They target global defense, cybersecurity, and cryptocurrency sectors, aiming to steal sensitive information and, in the case of North Korea, cryptocurrencies to help fund its illicit nuclear program.

Tools

New ReportNew ReportNew ResponseNew ResponseDiscoverDiscoverView HistoryView History

Entities

View all entities
Alleged: North Korean government , Iranian government , Russian government and Chinese government developed an AI system deployed by North Korean hackers , Iranian hackers , Russian hackers and Chinese hackers, which harmed Individual professionals on LinkedIn , Global defense companies , Cybersecurity firms and Cryptocurrency exchanges.

Incident Stats

Incident ID
644
Report Count
6
Incident Date
2024-02-18
Editors
Applied Taxonomies
GMF, MIT

MIT Taxonomy Classifications

Machine-Classified
Taxonomy Details

Risk Subdomain

A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
 

4.3. Fraud, scams, and targeted manipulation

Risk Domain

The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
 
  1. Malicious Actors & Misuse

Entity

Which, if any, entity is presented as the main cause of the risk
 

Human

Timing

The stage in the AI lifecycle at which the risk is presented as occurring
 

Post-deployment

Intent

Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
 

Intentional

Incident Reports

Reports Timeline

North Korea and Iran using AI for hacking, Microsoft saysNorth Korean hackers take phishing efforts to next level with AI tools: Report+1
North Korean hackers use AI for more sophisticated scams
+2
ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
North Korea and Iran using AI for hacking, Microsoft says

North Korea and Iran using AI for hacking, Microsoft says

theguardian.com

North Korean hackers take phishing efforts to next level with AI tools: Report

North Korean hackers take phishing efforts to next level with AI tools: Report

nknews.org

North Korean hackers use AI for more sophisticated scams

North Korean hackers use AI for more sophisticated scams

ft.com

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

tech.co

North Korean hackers use ChatGPT to scam Linkedin users

North Korean hackers use ChatGPT to scam Linkedin users

readwrite.com

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

ndtv.com

North Korea and Iran using AI for hacking, Microsoft says
theguardian.com · 2024

US adversaries – chiefly Iran and North Korea, and to a lesser extent Russia and China – are beginning to use generative artificial intelligence to mount or organize offensive cyber operations, Microsoft said on Wednesday.

Microsoft said it…

North Korean hackers take phishing efforts to next level with AI tools: Report
nknews.org · 2024

North Korean cybercriminals have turned to artificial intelligence (AI) to advance their spear-phishing efforts targeting DPRK-focused experts and organizations, Microsoft and OpenAI announced Wednesday, a move that one expert called "frigh…

North Korean hackers use AI for more sophisticated scams
ft.com · 2024

North Korean cyber criminals are turning to artificial intelligence to help Pyongyang steal cutting-edge technologies and secure funds for its illicit nuclear weapons programme.

The hackers have long targeted employees of global d…

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
tech.co · 2024

Microsoft has confirmed North Korean hacking groups are using AI tools like ChatGPT to scam folks out of sensitive information on platforms like LinkedIn as the country tries to draw more funds into its nuclear weapons program.

North Korea,…

North Korean hackers use ChatGPT to scam Linkedin users
readwrite.com · 2024

North Korean hackers are reportedly using ChatGPT to trick users on LinkedIn and other social media platforms into providing sensitive information and data, according to a report.

ChatGPT parent company OpenAI and investor Microsoft reveale…

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams
ndtv.com · 2024

Hacking groups in North Korea, notorious for their cybercrime sprees, are increasingly employing artificial intelligence tools like ChatGPT to carry out sophisticated scams, the Financial Times reported. According to the report, hackers are…

Variants

A "variant" is an incident that shares the same causative factors, produces similar harms, and involves the same intelligent systems as a known AI incident. Rather than index variants as entirely separate incidents, we list variations of incidents under the first similar incident submitted to the database. Unlike other submission types to the incident database, variants are not required to have reporting in evidence external to the Incident Database. Learn more from the research paper.
Previous IncidentNext Incident

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2023 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • 30ebe76