Monday , December 23 2024
Home / Media OutReach / Alarming Surge in AI-Driven Cybercrime in H1 2024

Alarming Surge in AI-Driven Cybercrime in H1 2024

HONG KONG SAR –
Media OutReach Newswire – 27 August 2024 –
Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cybersecurity leader, today warned that threat actors have bounced back from recent law enforcement efforts to unleash a new wave of attacks leveraging AI and other techniques.

Read the report “Pushing the Outer Limits: Trend Micro 2024 Midyear Cybersecurity Threat Report”: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/pushing-the-outer-limits-trend-micro-2024-midyear-cybersecurity-threat-report

Tony Lee, Head of Consulting at Trend Micro Hong Kong and Macau: “Trend Micro blocked over 75.9 billion threats for customers in the first half of the year, but there’s no time for complacency. As malicious actors begin to embrace AI as a tool, industry must respond in kind, by designing security strategies to take account of evolving threats. This is an arms race we can’t afford to lose.”

As detailed in the mid-year roundup report, the threat from malicious actors remains acute despite successful law enforcement actions against LockBit (Operation Cronos), dropper malware networks (Operation Endgame), and unsanctioned use of Cobalt Strike (Operation Morpheus).

A big cause of concern is criminal use and abuse of AI. Trend Micro has observed threat actors
hiding malware in legitimate AI software, operating criminal LLMs, and even
selling jailbreak-as-a-service offerings. The latter enable cybercriminals to trick generative AI bots into answering questions that go against their own policies—primarily for developing malware and social engineering lures.

Also in H1 2024, cybercriminals have been ramping up deepfake offerings to carry out virtual kidnapping scams, conduct
targeted BEC-type impersonation fraud, and bypass KYC checks. Trojan malware has
been developed to harvest biometric data to help with the latter.

Other highlights from the first half of 2024 include:

  • LockBit remains the most prevalent ransomware family despite law enforcement disruption, and has even developed a new variant,
    LockBit-NG-Dev
  • Cybercriminals have leveraged major events such as the Olympics and national elections to launch targeted attacks
  • Notable APT campaigns have exploited geopolitical tensions, such as
    Earth Lusca’s campaign around the China-Taiwan relations
  • State-aligned actors
    used sophisticated techniques to compromise internet-facing routers for anonymization of targeted attacks
  • Various groups have targeted cloud environments, apps and services by abusing exposed credentials, dangling resources, vulnerabilities, and
    even legitimate (but misconfigured) tools




Hashtag: #trendmicro #securityreport #threatreport #cybersecurity

The issuer is solely responsible for the content of this announcement.




Source link

About admin

Check Also

Molex Anticipates Steady Growth in High-Speed Connectivity in 2025, Driving Electronics Design Innovations Across Diverse Industry Sectors

Increase in opportunities predicted for high-speed optical transceivers and miniaturized connectivity solutions to address data-intensive …

Leave a Reply

Your email address will not be published.