Common Information
Type | Value |
---|---|
Value |
Artificial Intelligence - T1588.007 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-14 | 1 | Сrimeware and financial cyberthreats in 2025 | ||
Details | Website | 2024-11-14 | 1 | Crimeware and financial predictions for 2025 | ||
Details | Website | 2024-11-14 | 0 | Mastering SAST vs. DAST: An In-Depth Guide to Application Security Testing | ||
Details | Website | 2024-11-14 | 0 | Staying Secure in the AI-powered Cyberworld | ||
Details | Website | 2024-11-14 | 0 | Top IT Services in UAE, Australia, USA, UK | ||
Details | Website | 2024-11-14 | 0 | The AI Revolution in Intrusion Detection and Prevention Systems: Transforming Cybersecurity for a… | ||
Details | Website | 2024-11-14 | 0 | The Wild World of Cybersecurity in 2024: What You Need to Know | ||
Details | Website | 2024-11-14 | 2 | Best 7 Compliance Risk Assessment Tools for 2024 | ||
Details | Website | 2024-11-14 | 0 | AI for Advancing Cybersecurity | ||
Details | Website | 2024-11-14 | 0 | Emerging Threats: Cybersecurity Forecast 2025 | Google Cloud Blog | ||
Details | Website | 2024-11-13 | 0 | 🌐 Google AI Platform Bugs Expose Enterprise LLMs: Why Wire Tor Pentest Services Are Essential for… | ||
Details | Website | 2024-11-13 | 3 | OpenText Cybersecurity Unveils 2024's Nastiest Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-13 | 0 | The Rise of AI in Everyday Life: How Artificial Intelligence is Transforming Our Daily Experiences | ||
Details | Website | 2024-11-13 | 0 | Cybersecurity in 2025: How Companies Are Battling Next-Gen Cyberattacks | ||
Details | Website | 2024-11-13 | 0 | Fool me once, fool me twice | ||
Details | Website | 2024-11-13 | 0 | A Security-First Approach to 6G | ||
Details | Website | 2024-11-13 | 0 | The Dark Side of AI: Challenges of Using Deep Learning in Cybersecurity | ||
Details | Website | 2024-11-13 | 1 | Leading account and intent-based sales and marketing providers and technology solutions for the tech industry | ||
Details | Website | 2024-11-13 | 0 | The Road Ahead: 2025 Cybersecurity Predictions - ReliaQuest | ||
Details | Website | 2024-11-13 | 0 | Broadcom introduces VeloRAIN platform for optimized edge networking | ||
Details | Website | 2024-11-13 | 3 | Top challenges for implementing multi-domain correlation in the cloud | ||
Details | Website | 2024-11-13 | 0 | 2024’s Most Common Cyber Threats and How to Defend Against Them | ||
Details | Website | 2024-11-13 | 0 | How to Protect Yourself and Your Business from Cyber Attacks in 2025 | ||
Details | Website | 2024-11-13 | 0 | Critical Infrastructure in Australia Faces Heightened Threats in 2024, Says Annual Risk Review | ||
Details | Website | 2024-11-13 | 0 | The Top 5 Cybersecurity Threats in 2024 — And How to Defend Against Them |