Technology

Alarming New Findings: How Criminals Are Exploiting Generative AI to Elevate Cyber Threats

2025-03-15

Author: Noah

Overview

A groundbreaking report by Google’s Threat Intelligence Group (GTIG) has unveiled how threat actors are leveraging generative AI technology, showcasing both their productivity surge and a lack of innovative tactics.

Misuse of Generative AI

GTIG argues that much of the misuse of generative AI remains largely speculative and does not reflect practical applications employed by malicious actors. Insights from interactions with Google's AI system, Gemini, revealed that there are no significant efforts to exploit it through sophisticated prompt attacks or machine learning-based threats as outlined in the Secure AI Framework (SAIF).

Rudimentary Exploits

Most attempts to exploit generative AI are reported to be basic, leveraging publicly available jailbreak prompts to evade Gemini's safety protocols without success.

Dual-Sided Nature of Generative AI

While generative AI is not revolutionizing threat techniques, it allows actors to operate more efficiently at a larger scale. Skilled individuals utilize AI tools akin to established hacking frameworks, while less experienced actors benefit from rapid tool development.

Enhancements in Cyber Threats

Attackers are utilizing AI to improve phishing strategies, spread disinformation, and develop malware, while defensive AI mechanisms are advancing quickly to combat these evolving threats.

Ongoing Jailbreak Attempts

The report outlines frequent AI-related threats, focusing on jailbreak attempts that have yet to breach Gemini's defenses and clarifies the terminology surrounding these threats.

Attribution and Observations

The report identified various government-aligned hackers, notably Iranian, Chinese, North Korean, and Russian APT actors. Iranian and Chinese threat actors are particularly prolific in their use of Gemini.

Experts' Insights

Cybersecurity experts emphasize the critical importance of attributing observed activities to known hackers, noting the evolution of malware from crude to increasingly sophisticated iterations, including AI-generated assaults.

Content Creation by IO Actors

IO actors predominantly use Gemini for creating content, enhancing localization efforts, with Iranian IO entities accounting for three-quarters of total usage among IO actors.

Conclusion

As cyber threats evolve with advanced technologies, vigilance is crucial. The utilization of generative AI for malicious activities presents significant challenges for cybersecurity professionals worldwide.