Threat assessment: Hackers exploit generative AI
This threat assessment outlines the ways in which hackers exploit
generative AI.
It is highly likely that hackers are exploiting generative AI. The exploitation of
generative AI by hackers does not change the overall cyber threat landscape despite the proliferation and availability of AI technology.
The reason is that foreign states and some cyber criminal community members already have the resources and capabilities required to perform the processes in which generative AI can prove an aid. The threat from cyber espionage and cyber crime is thus already VERY HIGH. Generative AI is but one of many tools driving these threats.
It is important to note that generative AI technology cannot plan and launch cyber attacks independently. Rather, the technology typically generates an output, based on a written or oral user input, which hackers can subsequently use to launch a cyber attack.
The purpose of this threat assessment is to outline the ways in which hackers exploit generative AI. It is written for management and IT security officers in Danish private companies, public authorities, and anyone with an interest in learning more about the threats connected with generative AI.
-
Author
Centre for Cyber Security
-
Release Date
July 3, 2024