{"id":21448,"date":"2023-10-10T17:48:07","date_gmt":"2023-10-10T16:48:07","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=21448"},"modified":"2023-10-10T17:53:23","modified_gmt":"2023-10-10T16:53:23","slug":"the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/","title":{"rendered":"The industrialization of AI by cybercriminals: should we really be worried?"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal&#8217;s arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Continuing our series on cybersecurity and AI (<\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/06\/attacking-ai-a-real-life-example\/\"><i><span data-contrast=\"none\">Attacking AI: a real-life example<\/span><\/i><\/a><i><span data-contrast=\"auto\">, <\/span><\/i><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/language-as-a-sword-the-risk-of-prompt-injection-on-ai-generative\/\"><i><span data-contrast=\"none\">Language as a sword: the risk of prompt injection on AI Generative,<\/span><\/i><\/a> <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/08\/chatgpt-devsecops-what-are-the-new-cybersecurity-risks-introduced-by-the-use-of-ai-by-developers\/\"><i><span data-contrast=\"none\">ChatGPT &amp; DevSecOps \u2013 What are the new cybersecurity risks introduced by the use of AI by developers?<\/span><\/i><\/a> <span data-contrast=\"auto\">), we delve into the instrumentalization of AI by cybercriminals. While AI enables an escalation in the quality and quantity of <\/span><span data-contrast=\"auto\">cyber attacks, its exploitation by cybercriminals does not fundamentally challenge the defense models for organizations.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">The malicious use of AI by cybercriminals: hijacking, the black market and DeepFake<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">The hijacking of general public Chatbots<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In 2023, it&#8217;s impossible to miss ChatGPT, the generative AI developed by OpenAI. Garnering billions of requests per day, it&#8217;s a marvellous tool, and the use cases are numerous. The potential and value added by this type of tool are vast, making it a prime target for exploitation by malicious actors.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Despite the implementation of security measures aimed at preventing misuse for malicious purposes, such as the widely-known moderation points, certain techniques like <\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/language-as-a-sword-the-risk-of-prompt-injection-on-ai-generative\/\"><b><span data-contrast=\"none\">prompt injection<\/span><\/b><\/a><b><span data-contrast=\"auto\"> can evade these safeguards<\/span><\/b><span data-contrast=\"auto\">. Attackers are not hesitant to share their discoveries on criminal forums. These techniques predominantly target the most extensively used bots in the public domain: ChatGPT and Google Bard.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21468 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image.png\" alt=\"\" width=\"1607\" height=\"848\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image.png 1607w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-362x191.png 362w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-71x37.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-768x405.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-1536x811.png 1536w\" sizes=\"auto, (max-width: 1607px) 100vw, 1607px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Screenshot from <\/span><\/i><a href=\"https:\/\/slashnext.com\/blog\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/?utm_content=256636270&amp;utm_medium=social&amp;utm_source=twitter&amp;hss_channel=tw-721089455193337856\"><i><span data-contrast=\"none\">Slahnext<\/span><\/i><\/a> <i><span data-contrast=\"auto\">article.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">But other, more powerful tools could do even more damage. For example, <\/span><a href=\"https:\/\/s2w.inc\/\"><span data-contrast=\"none\">DarkBert<\/span><\/a><span data-contrast=\"auto\">, created by S2W Inc. claims to be the first generative AI trained on dark web data. The company claims to pursue a defensive objective, in particular by monitoring the dark web to detect the appearance of malicious sites or new threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In their <\/span><a href=\"https:\/\/videopress.com\/v\/le846tBj\"><span data-contrast=\"none\">demonstration video<\/span><\/a><span data-contrast=\"auto\">, they draw a comparison in response quality from different Chatbots (GPT, Bard, DarkBert) when ask about &#8220;the latest attacks in Europe?&#8221;. In this particular case, Google Bard provides the names of the victims and a fairly detailed answer to the type of attack (plus some basic security advice), ChatGPT replies that it doesn&#8217;t have the capacity to answer, while <\/span><b><span data-contrast=\"auto\">DarkBert is able to answer with the names, exact date and even the stolen data sets! <\/span><\/b><span data-contrast=\"auto\">Even in instances where the data is supposedly inaccessible, it&#8217;s conceivable to coerce the model into revealing and disseminating the specific data sets. through the use of oracle attack techniques (attacks that combine a set of techniques to &#8220;pull the wool over the AI&#8217;s eyes&#8221; and bypass its moderation framework), to get the model to reveal and communicate the data sets in question.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21464 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2.png\" alt=\"\" width=\"4400\" height=\"2471\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2.png 4400w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-340x191.png 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-768x431.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-1536x863.png 1536w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-2048x1150.png 2048w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-2-800x450.png 800w\" sizes=\"auto, (max-width: 4400px) 100vw, 4400px\" \/><\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The paramount lies in malevolent actors harnessing the capabilities of these tools for nefarious purposes, such as to <\/span><b><span data-contrast=\"auto\">obtain malicious code, have particularly realistic fraud documents drafted, or obtain sensitive data.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Nonetheless, the utilization of prompt injection and Oracle techniques remains somewhat time-consuming for attackers, at least until automated tools are developed. Simultaneously, chatbots continually fortify their defence mechanisms and moderation capabilities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">The black market in criminal AI\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">Slightly more worrying is the publication of purely criminal generative AI Chatbots. In this case, the attackers get hold of open source AI technologies, remove the security measures<\/span><\/b><span data-contrast=\"auto\">, and publish an &#8220;unbridled&#8221; model.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Prominent tools such as <\/span><a href=\"https:\/\/digiplace-my.sharepoint.com\/personal\/coraline_joly_wavestone_com\/Documents\/FraudGPT\"><b><span data-contrast=\"none\">FraudGPT<\/span><\/b><\/a> <b><span data-contrast=\"auto\">and<\/span><\/b> <a href=\"https:\/\/slashnext.com\/blog\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/?utm_content=256636270&amp;utm_medium=social&amp;utm_source=twitter&amp;hss_channel=tw-721089455193337856\"><b><span data-contrast=\"none\">WormGPT<\/span><\/b><\/a> <span data-contrast=\"auto\">have now surfaced in various forums. These new bots empower users to go even further: <\/span><b><span data-contrast=\"auto\">find vulnerabilities, learn how to hack a site, create phishing e-mails, code malware, automate it and so on.<\/span><\/b><span data-contrast=\"auto\"> Cybercriminals are going so far as to commercialize these models, creating a new black market in generative AI engines.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21466 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3.png\" alt=\"\" width=\"1918\" height=\"840\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3.png 1918w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3-437x191.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3-71x31.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3-768x336.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-3-1536x673.png 1536w\" sizes=\"auto, (max-width: 1918px) 100vw, 1918px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Screenshot from the <\/span><\/i><a href=\"https:\/\/netenrich.com\/blog\/fraudgpt-the-villain-avatar-of-chatgpt\"><i><span data-contrast=\"none\">Netenrich blog article<\/span><\/i><\/a><i><span data-contrast=\"auto\"> showing the different uses of Fraud Bot.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Exploiting human vulnerability: ultra-realistic DeepFakes<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The major concern lies in the increasing use of ultra-realistic DeepFake. You&#8217;ve probably seen the now-famous <\/span><a href=\"https:\/\/time.com\/6266606\/how-to-spot-deepfake-pope\/\"><span data-contrast=\"none\">photos of the Pope in Balenciaga<\/span><\/a><span data-contrast=\"auto\">, or the video of the <\/span><a href=\"https:\/\/www.linkedin.com\/pulse\/incroyable-mitterrand-et-chirac-sexpriment-en-anglais-antoine-dumont\/?originalSubdomain=fr\"><span data-contrast=\"none\">1988 French presidential debate between Chirac and Mitterrand,<\/span><\/a><span data-contrast=\"auto\"> perfectly dubbed in English and bluffingly realistic.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In the latest <\/span><a href=\"https:\/\/media.defense.gov\/2023\/Sep\/12\/2003298925\/-1\/-1\/0\/CSI-DEEPFAKE-THREATS.PDF\"><i><span data-contrast=\"none\">Cybersecurity Information Sheet (CSI), Contextualizing Deepfake Threats to Organizations<\/span><\/i><\/a><span data-contrast=\"auto\"> (September 2023), published by the NSA, FBI and CISA, some examples of DeepFake attacks are given. Among them, a case in 2019 in which a British subsidiary in the energy sector paid out $243,000 because of an AI-generated audio; the attackers had impersonated the group&#8217;s CEO, urging the subsidiary&#8217;s CEO to pay him this sum with the promise of a refund. <\/span><b><span data-contrast=\"auto\">In 2023, cases of CEO video identity fraud have already been reported.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">These attacks introduce a novel and concerning dimension to cybercrime, presenting formidable challenges in identity verification and evoking ethical and legal questions, particularly regarding the dissemination of false information and identity theft. They exacerbate the most critical vulnerability in IT cybersecurity: the human element. There&#8217;s a clear trajectory indicating a proliferation of cases involving President fraud and phishing employing DeepFake techniques in the upcoming months and years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">AI as a tool for attackers, not a revolution for defenders<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">It&#8217;s undeniable that the utilization of AI Chatbots, whether for consumer engagement or criminal endeavors, will facilitate a surge in carried-out attacks, delivering higher quality results. With enhanced technical skills and the ability to identify vulnerabilities, alongside readily available resources, both comprehensive and partial, <\/span><b><span data-contrast=\"auto\">less experienced individuals can now conduct advanced, more qualitative, and higher-impact attacks.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">However, the application of AI by malicious actors will not fundamentally revolutionize how companies defend themselves. <\/span><b><span data-contrast=\"auto\">The impact of an AI-generated or AI-supported attack will remain limited for mature organizations, just as with any other forms of attacks<\/span><\/b><span data-contrast=\"auto\">. When your defenses are fortified, the caliber of the weapon firing at them becomes less significant.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">Messages, processes and tools will have to be adapted, but the concepts remain the same. <\/span><\/b><span data-contrast=\"auto\">Even the most sophisticated and automated malware will struggle to make headway against a company that has properly implemented <\/span><b><span data-contrast=\"auto\">defense-in-depth and segmentation mechanisms<\/span><\/b><span data-contrast=\"auto\"> (rights, network, etc.). Basically, even if an attack is AI-boosted, the objective remains to protect against phishing, fraud, ransomware, data theft, and the like.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Concerning DeepFakes, employee awareness will continue to be paramount. Anti-phishing training courses must be adjusted to encompass techniques for detecting and responding to this evolving threat. Lastly, prevention encompasses fostering an understanding of disinformation techniques and adopting appropriate precautions (reporting, evidence preservation, source verification, metadata checks, etc.).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Undoubtedly, <\/span><b><span data-contrast=\"auto\">those employing behavioral analysis tools or automating aspects of their incident response possess an advantage in mitigating potential compromises.<\/span><\/b><span data-contrast=\"auto\"> To further this advantage, consider exploring and testing the AI beta features within your existing solutions \u2014 a gradual integration of AI into your security strategy. Although not all vendor promises have been fully realized yet, integrating AI in this strategic manner is a step forward. <\/span><b><span data-contrast=\"auto\">For the more mature, take advantage of your new strategy cycle to explore new AI-boosted tools<\/span><\/b><span data-contrast=\"auto\">, for example for detecting deep fakes in real time, capable of analyzing audio and video streams. These will provide an additional layer of security to existing detection tools.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">In conclusion, let&#8217;s keep a cool head!<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The integration of AI by cybercriminals poses a significant threat that demands urgent attention and proactive measures. However, <\/span><b><span data-contrast=\"auto\">it&#8217;s not so much about revolutionizing security practices as it is about continual improvement, updating, and adaptation.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Above all, security teams <\/span><b><span data-contrast=\"auto\">must adopt a proactive stance in confronting the challenges raised by artificial intelligence.<\/span><\/b><span data-contrast=\"auto\"> Through process adaptation and staying informed about advancements in these technologies, teams can navigate these changes calmly, enhancing their ability to detect emerging threats. Existing defense techniques should be flexible enough to cover a majority of risks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">It&#8217;s also important <\/span><b><span data-contrast=\"auto\">not to neglect the security of your use of AI:<\/span><\/b><span data-contrast=\"auto\"> whether it&#8217;s the risk of loss of data and intellectual property with the use of consumer Chatbots by your employees, or the risk of attacks (poisoning, oracle, evasion) on your internal AI algorithms. It&#8217;s vital to integrate security throughout the entire development cycle, adopting an approach based on the risks specific to the use of AI.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">On September 11, 2023, CNIL (French National Data Protection Commission) President, Marie-Laure DENIS, called for <\/span><a href=\"https:\/\/www.cnil.fr\/sites\/cnil\/files\/2023-09\/audition_presidente-cnil_assemblee-nationale_11_09_2023.pdf\"><b><span data-contrast=\"none\">&#8220;the need to create the conditions for use that is ethical, responsible and respectful of our values\u201d<\/span><\/b><\/a><span data-contrast=\"auto\"> before the French National Assembly&#8217;s Law Commission. The emerging technological landscape necessitates a thorough understanding, risk assessment, and regulation of AI applications, particularly by aligning them with the GDPR. The time is ripe to contemplate these matters and establish appropriate processes accordingly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has&#8230;<\/p>\n","protected":false},"author":15,"featured_media":21661,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,3977],"tags":[3279,3158],"coauthors":[837,4292,4302],"class_list":["post-21448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-focus","tag-artificial-intelligence-en","tag-industrialization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal&#039;s arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal&#039;s arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T16:48:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T16:53:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"637\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois, Thomas Argheria, coraline.joly\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois, Thomas Argheria, coraline.joly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"The industrialization of AI by cybercriminals: should we really be worried?\",\"datePublished\":\"2023-10-10T16:48:07+00:00\",\"dateModified\":\"2023-10-10T16:53:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\"},\"wordCount\":1492,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png\",\"keywords\":[\"artificial intelligence\",\"industrialization\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\",\"name\":\"The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png\",\"datePublished\":\"2023-10-10T16:48:07+00:00\",\"dateModified\":\"2023-10-10T16:53:23+00:00\",\"description\":\"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal's arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png\",\"width\":1000,\"height\":637},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The industrialization of AI by cybercriminals: should we really be worried?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight","description":"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal's arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/","og_locale":"en_US","og_type":"article","og_title":"The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight","og_description":"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal's arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/","og_site_name":"RiskInsight","article_published_time":"2023-10-10T16:48:07+00:00","article_modified_time":"2023-10-10T16:53:23+00:00","og_image":[{"width":1000,"height":637,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png","type":"image\/png"}],"author":"G\u00e9r\u00f4me Billois, Thomas Argheria, coraline.joly","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois, Thomas Argheria, coraline.joly","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"The industrialization of AI by cybercriminals: should we really be worried?","datePublished":"2023-10-10T16:48:07+00:00","dateModified":"2023-10-10T16:53:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/"},"wordCount":1492,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png","keywords":["artificial intelligence","industrialization"],"articleSection":["Cloud &amp; Next-Gen IT Security","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/","name":"The industrialization of AI by cybercriminals: should we really be worried? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png","datePublished":"2023-10-10T16:48:07+00:00","dateModified":"2023-10-10T16:53:23+00:00","description":"Back in 2021, a video of Tom Cruise making a coin disappear went viral. It was one of the first deepfake videos, videos that both amused and frightened Internet users. Over the years, artificial intelligence in all its forms has been perfected to the extent that it is now possible, for example, to translate in real time or generate videos and audio of public figures that are truer than life. As crime progressed along with techniques and technologies, the integration of AI into the cybercriminal's arsenal was, all in all, fairly natural and predictable. Initially used for simple operations such as decrypting captchas or creating the first deepfakes, AI is now employed for a much wider range of malicious activities.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/10\/DALL\u00b7E-2023-10-10-16.56.37-Photo_-A-dimly-lit-room-with-sleek-computers-displaying-advanced-code-on-their-screens.-Behind-the--e1696956750862.png","width":1000,"height":637},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/10\/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"The industrialization of AI by cybercriminals: should we really be worried?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=21448"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21448\/revisions"}],"predecessor-version":[{"id":21663,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21448\/revisions\/21663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/21661"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=21448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=21448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=21448"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=21448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}