Foreign Hackers Are Using Google’s Gemini in Attacks on the US

MT HANNACH
5 Min Read
Disclosure: This website may contain affiliate links, which means I may earn a commission if you click on the link and make a purchase. I only recommend products or services that I personally use and believe will add value to my readers. Your support is appreciated!

The rapid rise of In depthA Chinese generative AI platform has increased concerns this week about the domination of the United States, as Americans are increasingly adopting digital services belonging to Chinese. With current criticisms on the alleged security problems posed by Tiktok’s relationship with China, Deepseek’s policy in matters of confidentiality confirms that he Stocke user data on the country’s servers.

Meanwhile, Wiz safety researchers have discovered that Deepseek left a critical database exposed onlineLeak of more than a million recordings, including user prompts, system newspapers and API authentication tokens. While the platform promotes its cheaper R1 reasoning model, safety researchers tested 50 well-known jailbreaks against the Deepseek chatbot and found Late security protection Compared to Western competitors.

Brandon Russell, 29 -year -old co -founder of the Atomwaffen division, a neonazia guerrilla organization, is in judgment this week On an alleged plot to eliminate the Baltimore electricity network and trigger a racing war. The trial gives an overview of the federal survey on the application of laws on a worrying propaganda network aimed at inspiring mass events in the United States and beyond.

An informal group of West African fraudsters calling themselves the Yahoo boys Use news presenters generated by AI to extort the victimsProducing reports wrongly manufactured accusing them of crimes. A wired review of Telegram publications reveals that these crooks create very convincing news of false news to put pressure on the victims to pay ransoms by threatening public humiliation.

That’s not all. Each week, we bring together the news of security and confidentiality that we have not covered in depth ourselves. Click on the titles to read full stories. And stay safe there.

According to a Wall Street Journal report, hacking groups with known links with China, Iran, Russia and North Korea exploit AI chatbots like Google Gemini to help tasks such as writing malicious code and the search for potential attack targets.

While Western officials and security experts have long warned of AI use potential for malicious use, the review, citing a Google Wednesday report, noted that dozens of hacking groups In more than 20 countries mainly use the platform as a research and productivity tool – focus on efficiency rather than the development of sophisticated and new hacking techniques.

Iranian groups, for example, used the chatbot to generate phishing content in English, Hebrew and Farsi. China -related groups have used Gemini for tactical research on technical concepts such as data exfiltration and climbing privileges. In North Korea, pirates used it to write motivation letters for remote technological jobs, would have supported the regime’s efforts to place spies in technological roles to finance its nuclear program.

This is not the first time that foreign hacking groups have been found using chatbots. Last year, Openai revealed that five of these groups used Chatgpt in the same way.

On Friday, WhatsApp revealed that nearly 100 journalists and members of civil society were targeted by spy software developed by the Israeli company Paragon Solutions. The metal company alerted affected people, declaring with “great confidence” that at least 90 users had been targeted and “perhaps compromised”, according to a statement from The Guardian. WhatsApp did not reveal where the victims were, especially if in the United States were in the United States.

The attack seems to have used a “zero-click” feat, which means that the victims were infected without the need to open a malicious link or attachment. Once a phone is compromised, spyware – known as graphite – grants full access to the operator, including the possibility of reading encrypted messages from start to finish via applications like Whatsapp and Signal.

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *