10.7 C
New York
Monday, November 25, 2024

The five ways criminals use AI to obtain your data, according to a hacker

The five ways criminals use AI to obtain your data, according to a hacker

The recent boost that the artificial intelligence (IA) also has its bad side: cybercriminals They are using it to commit their misdeeds.

Dr Katie Paxton-Fear is a professor of cybersecurity at Manchester Metropolitan University and is also what is known as an “ethical hacker” who “Hack companies before the bad guys do.”

In statements collected by the Daily Mail, Paxton-Fear explains that new research reveals that young employees expose their workplace to a higher risk of attacks from phishing through artificial intelligence than any other age group.

The study highlighted a “age gap” in awareness: the youngest personnel, between 18 and 24 years old, are the most vulnerable for these crimes. Gen Z staff appear to be much easier to hack than most: almost half (46%) have not updated their work password for more than a year, compared to an average of a third (33%) of the general staff.

The researchers surveyed 3,000 office workers and business leaders from small, medium and large UK businesses on a range of cybersecurity issues, including understanding cyber attacks. phishing of AI.

One of the tools these hackers use is voice cloning. Hackers only need “three seconds of audio”. Additionally, they usually follow five easy steps to carry out their scam. vishing (voice cloning phishing scam).

Recognition

“Any attack starts with reconnaissance,” says Paxton-Fear. A hacker will find a victim and will enter your social networks.

voice cloning

Now the hacker will browse the employee’s social media pages to find audio or video content.

“All we have to do is visit the social media pages, download a video and copy your speech style. We only need three seconds of audio,” says Paxton-Fear.

Establish contact

The hacker sends a text message to another employee posing as a colleague or boss; although it is from an unknown number, He says wait for a call.

The call

The hacker calls the employee from his computer using a program and then simply types the message he wants the clone to say. Normally, These are instructions for making a payment.

The wait

The employee has received specific instructions on how to make the payment. Now it’s a matter of waiting see if they do.

Katie Paxton-Fear says: “The final step is whether the victim takes the action or not. Most hackers “They will know if they were successful at the end of the phone call.”

Source link

Stay Connected

0FansLike
0FollowersFollow
0SubscribersSubscribe

Latest Articles