{"id":43019,"date":"2024-08-27T07:16:00","date_gmt":"2024-08-27T07:16:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2024\/08\/27\/alarming-surge-in-ai-driven-cybercrime-in-h1-2024\/"},"modified":"2024-08-27T07:16:00","modified_gmt":"2024-08-27T07:16:00","slug":"alarming-surge-in-ai-driven-cybercrime-in-h1-2024","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2024\/08\/27\/alarming-surge-in-ai-driven-cybercrime-in-h1-2024\/","title":{"rendered":"Alarming Surge in AI-Driven Cybercrime in H1 2024"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>        HONG KONG SAR &#8211;<br \/>\n<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media OutReach Newswire<\/a> &#8211; 27 August 2024 &#8211;<br \/>\n<a href=\"http:\/\/www.trendmicro.com.hk\/\" rel=\"sponsored\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\" rel=\"sponsored\">TYO: 4704<\/a>;<a href=\"http:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\" rel=\"sponsored\"> TSE: 4704<\/a>) a global cybersecurity leader, today warned that threat actors have bounced back from recent law enforcement efforts to unleash a new wave of attacks leveraging AI and other techniques.<\/p>\n<p><b>Read the report &#8220;<i>Pushing the Outer Limits: Trend Micro 2024 Midyear Cybersecurity Threat Report&#8221;<\/i>: <\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/threat-reports\/roundup\/pushing-the-outer-limits-trend-micro-2024-midyear-cybersecurity-threat-report\" rel=\"sponsored\">https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/threat-reports\/roundup\/pushing-the-outer-limits-trend-micro-2024-midyear-cybersecurity-threat-report<\/a><b> <\/b>\n<\/p>\n<p><b>Tony Lee, Head of Consulting <\/b><b>at Trend Micro<\/b><b> Hong Kong and Macau<\/b><b>: <\/b>&#8220;Trend Micro blocked over 75.9 billion threats for customers in the first half of the year, but there&#8217;s no time for complacency. As malicious actors begin to embrace AI as a tool, industry must respond in kind, by designing security strategies to take account of evolving threats. This is an arms race we can&#8217;t afford to lose.&#8221;\n<\/p>\n<p>As detailed in the mid-year roundup report, the threat from malicious actors remains acute despite successful law enforcement actions against LockBit (<a href=\"https:\/\/www.nationalcrimeagency.gov.uk\/the-nca-announces-the-disruption-of-lockbit-with-operation-cronos\" rel=\"sponsored\">Operation Cronos<\/a>), dropper malware networks (<a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/largest-ever-operation-against-botnets-hits-dropper-malware-ecosystem\" rel=\"sponsored\">Operation Endgame<\/a>), and unsanctioned use of Cobalt Strike (<a href=\"https:\/\/www.nationalcrimeagency.gov.uk\/news\/national-crime-agency-leads-international-operation-to-degrade-illegal-versions-of-cobalt-strike\" rel=\"sponsored\">Operation Morpheus<\/a>).\n<\/p>\n<p>A big cause of concern is criminal use and abuse of AI. Trend Micro has observed threat actors<br \/>\n<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/f\/behind-the-great-wall-void-arachne-targets-chinese-speaking-user.html\" rel=\"sponsored\">hiding malware<\/a> in legitimate AI software, operating criminal LLMs, and even<br \/>\n<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/back-to-the-hype-an-update-on-how-cybercriminals-are-using-genai\" rel=\"sponsored\">selling jailbreak-as-a-service offerings<\/a>. The latter enable cybercriminals to trick generative AI bots into answering questions that go against their own policies\u2014primarily for developing malware and social engineering lures.\n<\/p>\n<p>Also in H1 2024, cybercriminals have been ramping up deepfake offerings to carry out virtual kidnapping scams, conduct<br \/>\n<a href=\"https:\/\/edition.cnn.com\/2024\/05\/16\/tech\/arup-deepfake-scam-loss-hong-kong-intl-hnk\/index.html#:~:text=A%20British%20multinational%20design%20and,out%20%2425%20million%20to%20fraudsters.\" rel=\"sponsored\">targeted BEC-type impersonation<\/a> fraud, and bypass KYC checks. Trojan malware has<br \/>\n<a href=\"https:\/\/www.group-ib.com\/blog\/goldfactory-ios-trojan\/\" rel=\"sponsored\">been developed<\/a> to harvest biometric data to help with the latter.\n<\/p>\n<p>Other highlights from the first half of 2024 include:\n<\/p>\n<ul>\n<li>\n    LockBit remains the most prevalent ransomware family despite law enforcement disruption, and has even developed a new variant,<br \/>\n    <a href=\"https:\/\/www.trendmicro.com\/en_gb\/research\/24\/b\/lockbit-attempts-to-stay-afloat-with-a-new-version.html\" rel=\"sponsored\">LockBit-NG-Dev<\/a>\n  <\/li>\n<li>\n    Cybercriminals have leveraged major events such as the Olympics and national elections to launch targeted attacks\n  <\/li>\n<li>\n    Notable APT campaigns have exploited geopolitical tensions, such as<br \/>\n    <a href=\"https:\/\/www.trendmicro.com\/en_gb\/research\/24\/b\/earth-lusca-uses-geopolitical-lure-to-target-taiwan.html\" rel=\"sponsored\">Earth Lusca&#8217;s<\/a> campaign around the China-Taiwan relations\n  <\/li>\n<li>\n    State-aligned actors<br \/>\n    <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/e\/router-roulette.html\" rel=\"sponsored\">used sophisticated techniques<\/a> to compromise internet-facing routers for anonymization of targeted attacks\n  <\/li>\n<li>\n    Various groups have targeted cloud environments, apps and services by abusing exposed credentials, dangling resources, vulnerabilities, and<br \/>\n    <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/observability-exposed-exploring-risks-in-cloud-native-metrics\" rel=\"sponsored\">even legitimate<\/a> (but misconfigured) tools\n  <\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.trendmicro.com.hk\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/generic_link.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.trendmicro.com.hk<\/a><br \/><a href=\"https:\/\/www.linkedin.com\/in\/trend-micro-hong-kong-96353768\/\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-linkedin-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.linkedin.com\/in\/trend-micro-hong-kong-96353768\/<\/a><br \/><a href=\"https:\/\/twitter.com\/TrendKon\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-twitter-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/twitter.com\/TrendKon<\/a><br \/><a href=\"https:\/\/www.facebook.com\/TrendMicroLimited\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-facebook-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.facebook.com\/TrendMicroLimited<\/a>            <\/p>\n<p><b>Hashtag: <\/b>#trendmicro #securityreport #threatreport #cybersecurity<\/p>\n<p>\n            <em>The issuer is solely responsible for the content of this announcement.<\/em>\n        <\/p>\n<p>        <img loading=\"lazy\" src=\"http:\/\/track.media-outreach.com\/index.php\/WebView\/322331\/4121\" alt=\"\" width=\"1\" height=\"1\" style=\"width:1px;height:1px;\"\/>\n    <\/div>\n<p><script async src=\"http:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/hong-kong-sar\/2024\/08\/27\/322331\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211; Media OutReach Newswire &#8211; 27 August 2024 &#8211; Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cybersecurity leader, today warned that threat actors have bounced back from recent law enforcement efforts to unleash a new wave of attacks leveraging AI and other techniques. Read the report &#8220;Pushing the Outer Limits: &hellip;<\/p>\n","protected":false},"author":1,"featured_media":43020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/43019"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=43019"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/43019\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/43020"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=43019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=43019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=43019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}