Artificial Intelligence Set to Compound Cyber Challenges

Artificial intelligence (AI) growing more potent and easier to use, threatens to exacerbate the already-considerable challenges companies face as they deal with cyberattacks, researchers warn.

Source: WSJ - Steve Norton | Published on November 16, 2017

Artificial Intelligence rules

While rare, researchers say early signs of such advanced forms of attacks have already been detected.

Earlier this year, cybersecurity firm Darktrace Inc. spotted a never-before-seen attack at a client company in India that used rudimentary machine learning to observe and learn patterns of normal user behavior inside a network, Chief Executive Nicole Eagan said. The software then began to mimic that normal behavior, effectively blending into the background and becoming harder for security tools to spot. Darktrace declined to discuss the case in greater detail.

It wasn't exactly clear what the goal of the attack was, but Ms. Eagan said the use of AI and machine learning in cyber breaches opens up a range of dangerous scenarios, from the ability of intruders to more easily scan networks for unpatched ports to the automated composition of emails that match the tone and writing style of someone that the intended target knows.

"We do imagine that there will be a time when attackers use machine learning and artificial intelligence as part of the attack. We have seen early signs of that," she said.

Early manifestations of machine learning in cyberattacks already can be found.

For years, a service called Death by Captcha has used machine learning models to quickly defeat the familiar CAPTCHA system, in which people verify their identity by entering a string of squiggly letters. Using a process called optical character recognition,the software identifies and learns from millions of different images of those blurry figures until it's trained to recognize them and solve the CAPTCHA.

Another tool, Sentry MBA, enables hackers to automatically test stolen usernames and passwords across a large number of sites. It uses machine learning to do optical character recognition, similar to DeathByCAPTCHA. It can then masquerade as Safari, Firefox or another web browser to make a set of login requests look like they are coming from many different users instead of from a single attacker's computer, said Shuman Ghosemajumder, chief technology officer at Shape Security. The practice could give criminals control of millions of accounts each day.

Data scientists at ZeroFOX Inc. in 2016 built a neural network that parsed Twitter data to write phishing posts that targeted specific users. Phishing is a common attack method in which hackers use fake emails or other tools to trick employees into giving them access to a target system or victim. The research project established that algorithms could analyze a person's social media feeds to craft highly-targeted social engineering attacks.

"Attackers try to match the phishing attack to users by extracting data on them. You can scale a lot of the crime economy by utilizing a form of basic machine learning," said Tomer Weingarten, founder and CEO of SentinelOne, a company that deploys machine learning and artificial intelligence to defend against attacks at the endpoints of a network. "It happens with every phishing campaign you see. I would call it statistical analysis, a form of machine learning."