Skip Navigation

Threat Actors Exploring Large Language Models for Cyberattacks, Microsoft and OpenAI Report

www.microsoft.com Staying ahead of threat actors in the age of AI | Microsoft Security Blog

Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity includes prompt-injections, attempted misuse ...

Staying ahead of threat actors in the age of AI | Microsoft Security Blog

Summary

This research, conducted by Microsoft and OpenAI, focuses on how nation-state actors and cybercriminals are using large language models (LLMs) in their attacks.

Key findings:

  • Threat actors are exploring LLMs for various tasks: gathering intelligence, developing tools, creating phishing emails, evading detection, and social engineering.
  • No major attacks using LLMs were observed: However, early-stage attempts suggest potential future threats.
  • Several nation-state actors were identified using LLMs: Including Russia, North Korea, Iran, and China.
  • Microsoft and OpenAI are taking action: Disabling accounts associated with malicious activity and improving LLM safeguards.

Specific examples:

  • Russia (Forest Blizzard): Used LLMs to research satellite and radar technologies, and for basic scripting tasks.
  • North Korea (Emerald Sleet): Used LLMs for research on experts and think tanks related to North Korea, phishing email content, and understanding vulnerabilities.
  • Iran (Crimson Sandstorm): Used LLMs for social engineering emails, code snippets, and evading detection techniques.
  • China (Charcoal Typhoon): Used LLMs for tool development, scripting, social engineering, and understanding cybersecurity tools.
  • China (Salmon Typhoon): Used LLMs for exploratory information gathering on various topics, including intelligence agencies, individuals, and cybersecurity matters.

Additional points:

  • The research identified eight LLM-themed TTPs (Tactics, Techniques, and Procedures) for the MITRE ATT&CK® framework to track malicious LLM use.
8

You're viewing a single thread.

8 comments
  • And thats why you dont produce tools that are not needed and cause harm, MicroShit

    • I am baffled that you appear to be attacking Microsoft over this. They're doing research to counter bad actors here.

      • They are funding and forcefully pushing that tool to Windows. And now they want to "protect" against "threat actors".

        Dont believe a word that comes out of Big Tech PR departments.

        • You think Microsoft is the only organization capable of producing these tools? They weren't even the first.

          • That is true. Still, huge big tech companies are the biggest threat actors

      • They’re doing research to counter bad actors here

        "Bad actors" as defined by the US gov't, of course. Home of the "brave" that bombs the shit out of everyone they dislike using unmanned drones, and currently supports a ongoing genocide happening right now in the middle east. Literally the paradise of freedom and justice on Earth.

You've viewed 8 comments.