Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Découvrir
Envoyer
  • Bienvenue sur AIID
  • Découvrir les incidents
  • Vue spatiale
  • Vue de tableau
  • Vue de liste
  • Entités
  • Taxonomies
  • Soumettre des rapports d'incident
  • Classement des reporters
  • Blog
  • Résumé de l’Actualité sur l’IA
  • Contrôle des risques
  • Incident au hasard
  • S'inscrire
Fermer
Découvrir
Envoyer
  • Bienvenue sur AIID
  • Découvrir les incidents
  • Vue spatiale
  • Vue de tableau
  • Vue de liste
  • Entités
  • Taxonomies
  • Soumettre des rapports d'incident
  • Classement des reporters
  • Blog
  • Résumé de l’Actualité sur l’IA
  • Contrôle des risques
  • Incident au hasard
  • S'inscrire
Fermer

Incident 644: State-Sponsored Hackers Escalate Phishing Attacks Using Artificial Intelligence

Description: State-sponsored hackers from North Korea, Iran, Russia, and China are reportedly leveraging artificial intelligence to conduct sophisticated phishing and social engineering attacks. They target global defense, cybersecurity, and cryptocurrency sectors, aiming to steal sensitive information and, in the case of North Korea, cryptocurrencies to help fund its illicit nuclear program.

Outils

Nouveau rapportNouveau rapportNouvelle RéponseNouvelle RéponseDécouvrirDécouvrirVoir l'historiqueVoir l'historique

Entités

Voir toutes les entités
Alleged: North Korean government , Iranian government , Russian government et Chinese government developed an AI system deployed by North Korean hackers , Iranian hackers , Russian hackers et Chinese hackers, which harmed Individual professionals on LinkedIn , Global defense companies , Cybersecurity firms et Cryptocurrency exchanges.

Statistiques d'incidents

ID
644
Nombre de rapports
6
Date de l'incident
2024-02-18
Editeurs
Applied Taxonomies
GMF, MIT

Classifications de taxonomie MIT

Machine-Classified
Détails de la taxonomie

Risk Subdomain

A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
 

4.3. Fraud, scams, and targeted manipulation

Risk Domain

The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
 
  1. Malicious Actors & Misuse

Entity

Which, if any, entity is presented as the main cause of the risk
 

Human

Timing

The stage in the AI lifecycle at which the risk is presented as occurring
 

Post-deployment

Intent

Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
 

Intentional

Rapports d'incidents

Chronologie du rapport

North Korea and Iran using AI for hacking, Microsoft saysNorth Korean hackers take phishing efforts to next level with AI tools: Report+1
North Korean hackers use AI for more sophisticated scams
+2
ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
North Korea and Iran using AI for hacking, Microsoft says

North Korea and Iran using AI for hacking, Microsoft says

theguardian.com

North Korean hackers take phishing efforts to next level with AI tools: Report

North Korean hackers take phishing efforts to next level with AI tools: Report

nknews.org

North Korean hackers use AI for more sophisticated scams

North Korean hackers use AI for more sophisticated scams

ft.com

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users

tech.co

North Korean hackers use ChatGPT to scam Linkedin users

North Korean hackers use ChatGPT to scam Linkedin users

readwrite.com

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams

ndtv.com

North Korea and Iran using AI for hacking, Microsoft says
theguardian.com · 2024

US adversaries – chiefly Iran and North Korea, and to a lesser extent Russia and China – are beginning to use generative artificial intelligence to mount or organize offensive cyber operations, Microsoft said on Wednesday.

Microsoft said it…

North Korean hackers take phishing efforts to next level with AI tools: Report
nknews.org · 2024

North Korean cybercriminals have turned to artificial intelligence (AI) to advance their spear-phishing efforts targeting DPRK-focused experts and organizations, Microsoft and OpenAI announced Wednesday, a move that one expert called "frigh…

North Korean hackers use AI for more sophisticated scams
ft.com · 2024

North Korean cyber criminals are turning to artificial intelligence to help Pyongyang steal cutting-edge technologies and secure funds for its illicit nuclear weapons programme.

The hackers have long targeted employees of global d…

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users
tech.co · 2024

Microsoft has confirmed North Korean hacking groups are using AI tools like ChatGPT to scam folks out of sensitive information on platforms like LinkedIn as the country tries to draw more funds into its nuclear weapons program.

North Korea,…

North Korean hackers use ChatGPT to scam Linkedin users
readwrite.com · 2024

North Korean hackers are reportedly using ChatGPT to trick users on LinkedIn and other social media platforms into providing sensitive information and data, according to a report.

ChatGPT parent company OpenAI and investor Microsoft reveale…

''Attacks Are Getting Sophisticated': How North Korean Hackers Are Using ChatGPT For LinkedIn Scams
ndtv.com · 2024

Hacking groups in North Korea, notorious for their cybercrime sprees, are increasingly employing artificial intelligence tools like ChatGPT to carry out sophisticated scams, the Financial Times reported. According to the report, hackers are…

Variantes

Une "Variante" est un incident qui partage les mêmes facteurs de causalité, produit des dommages similaires et implique les mêmes systèmes intelligents qu'un incident d'IA connu. Plutôt que d'indexer les variantes comme des incidents entièrement distincts, nous listons les variations d'incidents sous le premier incident similaire soumis à la base de données. Contrairement aux autres types de soumission à la base de données des incidents, les variantes ne sont pas tenues d'avoir des rapports en preuve externes à la base de données des incidents. En savoir plus sur le document de recherche.
Incident précédentProchain incident

Recherche

  • Définition d'un « incident d'IA »
  • Définir une « réponse aux incidents d'IA »
  • Feuille de route de la base de données
  • Travaux connexes
  • Télécharger la base de données complète

Projet et communauté

  • À propos de
  • Contacter et suivre
  • Applications et résumés
  • Guide de l'éditeur

Incidents

  • Tous les incidents sous forme de liste
  • Incidents signalés
  • File d'attente de soumission
  • Affichage des classifications
  • Taxonomies

2023 - AI Incident Database

  • Conditions d'utilisation
  • Politique de confidentialité
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • 8b8f151