Criminals are exploiting AI to create more convincing scams • Blisstech Solutions

One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human.

AI chatbots can be prompted to generate text that you’d never know was written by a robot. And they can keep producing it – quickly, and with minimal human intervention.

So it’s no surprise that cybercriminals have been using AI chatbots to try to make their own lives easier.

Police have identified the three main ways crooks have been found to use the chatbot for malicious reasons.

1. Better phishing emails

Until now, terrible spelling and grammar have made it easy to spot many phishing emails. These are intended to trick you into clicking a link to download malware or steal information. AI-written text is way harder to spot, simply because it isn’t riddled with mistakes.

Worse, criminals can make every phishing email they send unique, making it harder for spam filters to spot potentially dangerous content.

2. Spreading misinformation

“Write me ten social media posts that accuse the CEO of the Acme Corporation of having an affair. Mention the following news outlets”.  Spreading misinformation and disinformation may not seem like an immediate threat to you, but it could lead to your employees falling for scams, clicking malware links, or even damage the reputation of your business or members of your team.

3. Creating malicious code

AI can already write pretty good computer code and is getting better all the time. Criminals could use it to create malware.

It’s not the software’s fault – it’s just doing what it’s told – but until there’s a reliable way for the AI creators to safeguard against this, it remains a potential threat.

The creators of AI tools are not the ones responsible for criminals taking advantage of their powerful software. ChatGPT creator OpenAI, for example, is working to prevent its tools from being used maliciously.

This shows the need to stay one step ahead of the cybercrooks in everything we do. That’s why we work so hard with our clients to keep them protected from criminal threats and informed about what’s coming next.

If you’re concerned about your people falling for increasingly sophisticated scams, be sure to keep them updated about how the scams work and what to look out for.

If you need help with that, get in touch.

More Content

Tech Tip: Capture Your Screen Like a Pro – Essential Screenshot Techniques for Windows

Welcome to a new Tuesday tech tip video where I will show you how to take screenshots in Windows. Screenshots are an indispensable tool for anyone who uses a computer. They allow us to capture specific areas of our screen, share instructions, document errors, or...

Tech Tip: How to Sync Teams Files to Your Computer

Hello everyone, welcome to a new Tuesday Two Minute Tech Tip.    👉 Do you use Microsoft 365?    👉 Do you need to collaborate on documents with your colleagues?    👉 Do you want to do this using the same familiar Windows...
Laptop and stethoscope

How Much Should You Pay for IT Managed Service Costs in the UK?

If you are looking for managed IT services in the UK, you should understand there is no "one-size-fits-all" solution. There are many managed service providers out there and they offer a huge range of prices. This can be overwhelming when trying to choose between them!...

Windows is the prime target for cyber criminals

With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals.

HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend £1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent £1,300 How long does it last? It will...

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online What is Phishing? Phishing is a common online scam in which cybercriminals try to trick you into sharing personal information, such as passwords and credit card numbers. Phishers often use email or...
Beware this malware: It “annoys” you into handing over login details

Beware this malware: It “annoys” you into handing over login details

A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped… But you can easily escape and we’ll tell you how…

Laptop and stethoscope

Get a FREE IT RISC Assessment (and that’s not a typo!)

Most small businesses don't have the time or resources to perform in-depth IT assessments on their own. This can be a major problem, as failing to keep your technology up to date can lead to reliability and security issues down the road. Therefore, Blisstech Solutions...
Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Tech Tip: How to name cells in Excel

Welcome to a new Tuesday tech tip video where I will show you how to name cells in Microsoft Excel. Naming cells can make your spreadsheets easier to understand and maintain and help you write more concise and efficient formulas. In the video, I show one way of doing...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05