HOW DO CYBERCRIMINALS USE AI TO EXTRACT IDENTIFYING INFORMATION?
With the advent of artificial intelligence (AI), cybercriminals have found sophisticated new ways to perfect their attacks. These techniques make invasions more effective and harder to detect, and provide access to a real goldmine: stolen credentials. Let's take a look at how these hackers are using AI to run scams based on passwords and the value of sets of credentials.
Password-based attacks
Entering passwords remains one of the most common methods of authentication, despite their many vulnerabilities. On the one hand, cybercriminals are able to "guess" sets of functional identifiers, and on the other they take advantage of those left by default by network administrators. The theft of this data and unauthorised access to the system then paves the way for more serious attacks, and AI facilitates the exploitation of these flaws in a variety of ways.
1. Brute force attacks
Brute force attacks consist of systematically trying all possible combinations of passwords until the correct one is found. Traditionally, this has been a lengthy and resource-intensive process; however, with AI, cybercriminals can speed up this process. AI algorithms can analyse common password patterns, reducing the number of attempts needed to crack them.
2. Phishing and spear-phishing
Phishing attacks involve tricking users into revealing their credentials by posing as trusted entities. Spear-phishing is a more targeted form of this attack, aimed at specific individuals or organisations. AI allows cybercriminals to create more credible intrusion campaigns by analysing data available online, mimicking the language and style of communications and customising messages for each victim.
The value of sets of credentials
As well as enabling you to log on to a system as an authorised user, stolen credentials also have a high value on the black market. It is often sold in bulk on underground forums and on the Dark Web. But why is this data so valuable?
1. Access to multiple accounts
Many people use the same passwords for multiple accounts, which means that a single set of credentials opens the door to multiple services. Cybercriminals can access email, social networks, online banking and more.
2. Escalation of privileges
Once a cybercriminal infiltrates an account, they may attempt to escalate privileges to gain administrator rights or access to critical information. This is of particular concern to businesses where system compromise can lead to major data breaches.
3. Fraud and identity theft
With stolen credentials, cybercriminals can commit fraud, open new credit accounts, transfer astronomical amounts of money to bogus suppliers or even impersonate the victim. This can have devastating consequences for the individuals or organisations involved, both financially and personally.
Password-based attacks have become faster and more accurate, and sets of credentials continue to have considerable value on the black market. In a future post, we'll look at ways to protect yourself against this growing threat. In all cases, MicroAge remains committed to providing the best cybersecurity solutions and advice. Contact one of our representatives today.