Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Descubrir
Enviar
  • Bienvenido a la AIID
  • Descubrir Incidentes
  • Vista espacial
  • Vista Tabular
  • Vista de lista
  • Entidades
  • Taxonomías
  • Enviar Informes de Incidentes
  • Ranking de Reportadores
  • Blog
  • Resumen de noticias de IA
  • Control de Riesgos
  • Incidente aleatorio
  • Registrarse
Colapsar
Descubrir
Enviar
  • Bienvenido a la AIID
  • Descubrir Incidentes
  • Vista espacial
  • Vista Tabular
  • Vista de lista
  • Entidades
  • Taxonomías
  • Enviar Informes de Incidentes
  • Ranking de Reportadores
  • Blog
  • Resumen de noticias de IA
  • Control de Riesgos
  • Incidente aleatorio
  • Registrarse
Colapsar

Incidente 644: State-Sponsored Hackers Escalate Phishing Attacks Using Artificial Intelligence

Descripción: State-sponsored hackers from North Korea, Iran, Russia, and China are reportedly leveraging artificial intelligence to conduct sophisticated phishing and social engineering attacks. They target global defense, cybersecurity, and cryptocurrency sectors, aiming to steal sensitive information and, in the case of North Korea, cryptocurrencies to help fund its illicit nuclear program.

Herramientas

Nuevo InformeNuevo InformeNueva RespuestaNueva RespuestaDescubrirDescubrirVer HistorialVer Historial

Entidades

Ver todas las entidades
Alleged: North Korean government , Iranian government , Russian government y Chinese government developed an AI system deployed by North Korean hackers , Iranian hackers , Russian hackers y Chinese hackers, which harmed Individual professionals on LinkedIn , Global defense companies , Cybersecurity firms y Cryptocurrency exchanges.

Estadísticas de incidentes

ID
644
Cantidad de informes
6
Fecha del Incidente
2024-02-18
Editores
Applied Taxonomies
GMF, MIT

Clasificaciones de la Taxonomía MIT

Machine-Classified
Detalles de la Taxonomía

Risk Subdomain

A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
 

4.3. Fraud, scams, and targeted manipulation

Risk Domain

The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
 
  1. Malicious Actors & Misuse

Entity

Which, if any, entity is presented as the main cause of the risk
 

Human

Timing

The stage in the AI lifecycle at which the risk is presented as occurring
 

Post-deployment

Intent

Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
 

Intentional

Informes del Incidente

Cronología de Informes

North Korea and Iran using AI for hacking, Microsoft saysNorth Korean hackers take phishing efforts to next level with AI tools: Report+1
North Korean hackers use AI for more sophisticated scams
+2
ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
North Korea and Iran using AI for hacking, Microsoft says

North Korea and Iran using AI for hacking, Microsoft says

theguardian.com

North Korean hackers take phishing efforts to next level with AI tools: Report

North Korean hackers take phishing efforts to next level with AI tools: Report

nknews.org

North Korean hackers use AI for more sophisticated scams

North Korean hackers use AI for more sophisticated scams

ft.com

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

tech.co

North Korean hackers use ChatGPT to scam Linkedin users

North Korean hackers use ChatGPT to scam Linkedin users

readwrite.com

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

ndtv.com

North Korea and Iran using AI for hacking, Microsoft says
theguardian.com · 2024

US adversaries – chiefly Iran and North Korea, and to a lesser extent Russia and China – are beginning to use generative artificial intelligence to mount or organize offensive cyber operations, Microsoft said on Wednesday.

Microsoft said it…

North Korean hackers take phishing efforts to next level with AI tools: Report
nknews.org · 2024

North Korean cybercriminals have turned to artificial intelligence (AI) to advance their spear-phishing efforts targeting DPRK-focused experts and organizations, Microsoft and OpenAI announced Wednesday, a move that one expert called "frigh…

North Korean hackers use AI for more sophisticated scams
ft.com · 2024

North Korean cyber criminals are turning to artificial intelligence to help Pyongyang steal cutting-edge technologies and secure funds for its illicit nuclear weapons programme.

The hackers have long targeted employees of global d…

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
tech.co · 2024

Microsoft has confirmed North Korean hacking groups are using AI tools like ChatGPT to scam folks out of sensitive information on platforms like LinkedIn as the country tries to draw more funds into its nuclear weapons program.

North Korea,…

North Korean hackers use ChatGPT to scam Linkedin users
readwrite.com · 2024

North Korean hackers are reportedly using ChatGPT to trick users on LinkedIn and other social media platforms into providing sensitive information and data, according to a report.

ChatGPT parent company OpenAI and investor Microsoft reveale…

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams
ndtv.com · 2024

Hacking groups in North Korea, notorious for their cybercrime sprees, are increasingly employing artificial intelligence tools like ChatGPT to carry out sophisticated scams, the Financial Times reported. According to the report, hackers are…

Variantes

Una "Variante" es un incidente que comparte los mismos factores causales, produce daños similares e involucra los mismos sistemas inteligentes que un incidente de IA conocido. En lugar de indexar las variantes como incidentes completamente separados, enumeramos las variaciones de los incidentes bajo el primer incidente similar enviado a la base de datos. A diferencia de otros tipos de envío a la base de datos de incidentes, no se requiere que las variantes tengan informes como evidencia externa a la base de datos de incidentes. Obtenga más información del trabajo de investigación.
Incidente AnteriorSiguiente Incidente

Investigación

  • Definición de un “Incidente de IA”
  • Definición de una “Respuesta a incidentes de IA”
  • Hoja de ruta de la base de datos
  • Trabajo relacionado
  • Descargar Base de Datos Completa

Proyecto y Comunidad

  • Acerca de
  • Contactar y Seguir
  • Aplicaciones y resúmenes
  • Guía del editor

Incidencias

  • Todos los incidentes en forma de lista
  • Incidentes marcados
  • Cola de envío
  • Vista de clasificaciones
  • Taxonomías

2023 - AI Incident Database

  • Condiciones de uso
  • Política de privacidad
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • 8b8f151