Microsoft stopped AI technology using hackers from China, Russia, and Iran

Microsoft stopped AI technology using hackers from China, Russia, and Iran
Microsoft stopped AI technology using hackers from China, Russia, and Iran

Microsoft stopped AI technology using hackers from China, Russia, and Iran – Key Notes

  • State-sponsored hackers are using tools from OpenAI to enhance hacking skills.
  • Microsoft identifies and stops hackers by leveraging AI tools.
  • Hackers from China, Russia, Iran, and North Korea improve strategies using AI.
  • OpenAI and Microsoft restrict state-sponsored hacking groups from using their AI.
  • Concerns rise over AI technology’s swift spread and potential misuse.

AI as Weapon

Microsoft has claimed that it has identified and stopped hackers from China, Russia, and Iran by utilizing its AI tools. This information was shared through a link on WhatsApp.

According to a report published on Wednesday, state-sponsored hackers from Russia, China, and Iran are utilizing tools from OpenAI, which is supported by Microsoft, to improve their abilities and deceive their intended victims.

Artificial Intelligence Misuse by Hackers

According to its report, Microsoft stated that it monitored several hacking organizations connected to Russian military intelligence, Iran’s Revolutionary Guard, and the Chinese and North Korean governments as they endeavored to improve their hacking strategies through the use of extensive language models.

Google News

Stay on Top with AI News!

Follow our Google News page!

These computer programs, also known as AI, utilize large quantities of written content to produce responses that sound like they were made by humans. The corporation revealed this discovery while implementing a general prohibition on state-sponsored hacking groups utilizing their AI technology.

In an interview with Reuters prior to the release of the report, Microsoft’s Vice President for Customer Security Tom Burt stated that the company does not want individuals identified as threat actors, who are being monitored and tracked, to have access to their technology. This applies regardless of any potential violations of the law or terms of service.

There has been no immediate response from Russian, North Korean, and Iranian diplomatic representatives to inquiries regarding the accusations.

According to the spokesperson of China’s US embassy, Liu Pengyu, they are against any baseless attacks and allegations made against China. They believe in the responsible and secure implementation of AI technology to improve the welfare of humanity.

The claim that government-affiliated hackers have been discovered utilizing AI technology to enhance their espionage abilities is bound to raise worries regarding the swift spread of this technology and its potential for misuse.

Since last year, senior officials in the Western world have been issuing warnings about the exploitation of these tools by unauthorized individuals. However, there has been a lack of concrete details until now.

According to Bob Rotsted, the leader of cybersecurity threat intelligence at OpenAI, this marks one of the earliest examples of an AI company openly addressing the use of AI technologies by cybersecurity threat actors.

The Geopolitical Implications of AI in Cybersecurity

According to OpenAI and Microsoft, the utilization of their AI tools by the hackers was characterized as “preliminary” and “gradual”. Microsoft said, hackers believed to be affiliated with the Russian military intelligence agency, also known as the GRU, utilized the models to investigate

“various satellite and radar technologies that may pertain to conventional military operations in Ukraine”

According to Microsoft, North Korean hackers utilized the models to produce material that was probably intended for spear-phishing attacks on experts in the region.

Iranian hackers utilized the models to create more persuasive emails, even going as far as to draft a message aimed at enticing

“prominent feminists”

to a website that was rigged with traps.

According to the software giant, Chinese hackers supported by the government are currently testing out extensive language models. Their usage includes inquiries about competing intelligence organizations, cybersecurity concerns, and noteworthy figures.

Both Burt and Rotsted refused to disclose the amount of activity or number of accounts that were suspended. Burt also defended the strict ban on hacking groups, but clarified that it does not apply to Microsoft’s search engine Bing, citing the newness of AI and the concerns surrounding its use.

According to him, this technology is not only cutting-edge but also remarkably potent.

Frequently Asked Questions

  1. What is AI technology using hackers?
    • It refers to state-sponsored hackers exploiting AI tools to refine their hacking abilities and deceive targets.
  2. How does OpenAI respond to hackers using AI technology?
    • OpenAI, supported by Microsoft, restricts these groups from accessing their technology to prevent misuse.
  3. Which countries’ hackers are reported to utilize AI technology?
    • Hackers from China, Russia, Iran, and North Korea are known to use AI to enhance their hacking strategies.
  4. What are the concerns surrounding hackers using AI technology?
    • The rapid spread and potential for misuse of AI technology by hackers raise significant security and ethical concerns.
  5. How can AI technology be safeguarded against hackers?
    • Through stringent access controls, monitoring, and international cooperation to limit the misuse of AI tools by malicious actors.

Juhasz "the Mage" Gabor

As a fervent tech and AI enthusiast, I blend my passion for the latest in technology with a flair for writing, illuminating the fascinating world of Artificial Intelligence and its endless possibilities.

Categories

Follow us on Facebook!

Rumors about the OpenAI Web Search Engine a Challenge in Google's Own Field
Previous Story

Rumors about the OpenAI Web Search Engine: a Challenge in Google’s Own Field?

Next Story

Hyperscale AI: Torch.AI Awarded New Patent for Autonomous Graph Compute Invention

Latest from Blog

Go toTop