Today's AI/ML headlines are brought to you by ThreatPerspective

Digital Event Horizon

The Rise of AI-Assisted Cyber Attacks: A New Era of Threats


The rise of AI-assisted cyber attacks poses a significant challenge to individuals and organizations alike, as attackers increasingly utilize large language models to craft personalized messages and execute complex social engineering campaigns. As the threat landscape continues to evolve, it is essential to stay informed about the latest developments and to take proactive steps to protect yourself against these emerging threats.

  • The use of large language models (LLMs) in AI-assisted cyber attacks is becoming increasingly sophisticated.
  • The number of LLM-based attacks has risen, with a 10x increase in July 2024 compared to the previous month.
  • Attackers are targeting cloud credentials to access LLMs, leaving victims footing the bill for high costs.
  • A recent attack exploited an Anthropic model for financial gain, highlighting the threat of AI-assisted cyber attacks.
  • Attackers can use LLMs to craft personalized messages and enable voice-call phishing through AI-powered voice cloning technology.
  • Supply chain attacks using LLMs could become increasingly common in 2025, utilizing social engineering skills for malicious goals.



  • In a world where artificial intelligence (AI) has revolutionized numerous industries, a new and growing threat has emerged: AI-assisted cyber attacks. The use of large language models (LLMs) in these attacks is becoming increasingly sophisticated, making it challenging for individuals and organizations to defend against them.

    According to recent reports by Sysdig, a leading cybersecurity firm, the number of LLM-based attacks has been on the rise. In July 2024, there was a 10x increase in LLM requests compared to the previous month. Moreover, researchers discovered that attackers were targeting cloud credentials to access these models, leaving the victims footing the bill for the hefty price tag of $46,000 per day related to LLM consumption costs.

    One such attack occurred when attackers targeted Anthropic's Claude LLM model. Instead of exploiting this access to extract training data, their primary goal was to sell access to other criminals, further emphasizing the growing threat of AI-assisted cyber attacks.

    The broader script used in these attacks could check credentials for 10 different AI services, including AI21 Labs, Azure, and GCP Vertex AI. This indicates that attackers are learning and understanding the landscape just as quickly as cybersecurity professionals, leaving them on a "footrace" to keep up with the rapidly evolving threat landscape.

    Sysdig's former intelligence analyst and cybersecurity strategist, Crystal Morin, warns of an increasingly complex threat environment where spear phishing and social engineering become more prevalent. The use of LLMs enables attackers to craft unique messages tailored to specific targets based on their interests, location, and other personal details.

    Moreover, the rise of voice-call phishing will likely become harder to distinguish due to AI-powered voice cloning technology. This makes it even more challenging for individuals to protect themselves from these sophisticated attacks.

    As we move into 2025, cybersecurity experts predict that supply chain attacks using LLMs could become increasingly common. These attacks are not necessarily fully AI-generated but can utilize the skills of LLMs in social engineering campaigns to achieve their goals.

    The threat landscape is shifting rapidly, and individuals must take proactive steps to protect themselves against these emerging threats. With AI-assisted cyber attacks on the rise, it is essential to stay informed about the latest developments and to understand the tactics employed by attackers.

    In conclusion, the use of LLMs in AI-assisted cyber attacks represents a significant shift in the threat landscape. As we move forward into 2025, it will be crucial for individuals and organizations to remain vigilant and proactive in protecting themselves against these increasingly sophisticated threats.



    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2024/12/29/llm_supply_chain_attacks/


  • Published: Sun Dec 29 14:00:11 2024 by llama3.2 3B Q4_K_M











    © Digital Event Horizon . All rights reserved.

    Privacy | Terms of Use | Contact Us