{"id":4396,"date":"2025-08-18T15:54:40","date_gmt":"2025-08-18T07:54:40","guid":{"rendered":"https:\/\/www.rzautoassembly.com\/?p=4396"},"modified":"2025-08-18T15:54:40","modified_gmt":"2025-08-18T07:54:40","slug":"now-hackers-around-the-world-are-using-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.rzautoassembly.com\/hu\/now-hackers-around-the-world-are-using-artificial-intelligence\/","title":{"rendered":"Now, hackers around the world are using artificial intelligence"},"content":{"rendered":"<figure id=\"attachment_4398\" aria-describedby=\"caption-attachment-4398\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.rzautoassembly.com\/hu\/product\/epson-robot\/\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-4398\" src=\"https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6-300x218.png.webp\" alt=\"\" width=\"300\" height=\"218\" srcset=\"https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6-300x218.png.webp 300w, https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6-1024x745.png.webp 1024w, https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6-768x559.png.webp 768w, https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6-16x12.png.webp 16w, https:\/\/www.rzautoassembly.com\/wp-content\/smush-webp\/2025\/08\/\u975e\u6807\u81ea\u52a8\u5316\u8bbe\u5907\u5e7f\u544a\u521b\u610f-141-6.png.webp 1187w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4398\" class=\"wp-caption-text\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Rugalmas vibr\u00e1ci\u00f3s adagol\u00f3<\/figcaption><\/figure>\n<p><span style=\"font-size: 14pt;\"><strong>This summer,<\/strong><\/span> Russian hackers made new improvements to the large number of phishing emails sent to Ukrainians.<\/p>\n<p>&nbsp;<\/p>\n<p>Hackers attached an artificial intelligence program to the email attachment. Once installed, the program automatically searches the victim\u2019s computer for sensitive files and sends them back to Moscow.<\/p>\n<p>&nbsp;<\/p>\n<p>The Ukrainian government and several cybersecurity companies detailed this activity in technical reports in July. It was the first time that Russian intelligence agencies were found to use large language models (LLMs) to build malicious code. This type of artificial intelligence chatbot has become ubiquitous in corporate culture.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14pt;\">These Russian spies are not alone<\/span><\/strong>. In recent months, various types of hackers\u2014cybercriminals, spies, researchers, and corporate security personnel\u2014have begun to integrate artificial intelligence tools into their work.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14pt;\">LLMs like ChatGPT are still prone to errors<\/span><\/strong>. But they have become very skilled in processing language instructions, translating ordinary language into computer code, and identifying and summarizing documents.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>So far<\/strong>, this technology has not completely revolutionized hacking techniques, turning complete novices into experts, nor has it allowed potential cyber terrorists to shut down power grids. But it is making skilled hackers better and faster. Cybersecurity companies and researchers are now also using artificial intelligence, which has intensified an escalating cat-and-mouse game: offensive hackers discover and exploit software vulnerabilities, while defensive parties try to fix them first.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Heather Adkins, vice president of Google\u2019s security engineering, said: \u201cThis is just the beginning, and maybe moving towards the medium term.\u201d<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In 2024, Adkins\u2019 team launched a project using Google\u2019s LLM \u201cGemini\u201d software to search for important software vulnerabilities (or bugs) before cybercriminals discover them. Earlier this month, Adkins announced that her team has so far found at least 20 neglected important bugs in commonly used software and has notified relevant companies so that they can fix them in time. Currently, this work is still in progress.<\/p>\n<p>&nbsp;<\/p>\n<p>She said that none of these vulnerabilities are shocking or can only be discovered by machines. But with artificial intelligence, the process is indeed faster. \u201cI haven\u2019t seen anyone discover anything new,\u201d she said. \u201cIt\u2019s just doing things we already know how to do. But this will improve.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Adam Meyers, senior vice president of cybersecurity company CrowdStrike, said that his company not only uses artificial intelligence to help those who think they have been hacked, but also sees more and more evidence of the use of artificial intelligence from Chinese, Russian, Iranian and criminal hackers tracked by the company.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>\u201cThe more advanced adversaries are using it to their advantage,\u201d he told NBC News. \u201cWe see more and more of this every day.\u201d<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>This shift has only just begun to catch up with years of hype in the cybersecurity and artificial intelligence industries, especially since ChatGPT was launched to the public in 2022. These tools are not always effective, and some cybersecurity researchers complain that potential hackers are deceived by false vulnerability discoveries generated by artificial intelligence.<\/p>\n<p>&nbsp;<\/p>\n<p>Scammers and social engineers (those who pretend to be others or write convincing phishing emails in hacking operations) have been using LLMs to make themselves more persuasive since at least 2024.<\/p>\n<p>&nbsp;<\/p>\n<p>But the use of artificial intelligence to directly attack targets has only just really started, said Will Pearce, CEO of DreadNode, one of the few new security companies that specialize in using LLMs for hacking.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14pt;\">He said the reason is simple: the technology has finally begun to live up to expectations.<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14pt;\">\u201cCurrently, both the technology and the models are very good,\u201d he said.<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Pearce told NBC News that less than two years ago, automated artificial intelligence hacking tools required a lot of adjustments to work properly, but now they have become more skilled. Similarly, in the field of physical manufacturing, the combination of<span style=\"color: #00ccff;\"> <a style=\"color: #00ccff;\" href=\"https:\/\/www.rzautoassembly.com\/hu\/products\/automatic-feeding-equipment-for-small-metal-shee\/\"><strong><u><b>Automatic feeding equipment for small metal sheets<\/b><\/u><\/strong><\/a>\u00a0<\/span>and AI visual recognition has enabled real-time detection and screening of material defects. Hackers are trying to migrate this logic of \u201cprecise identification + automated operation\u201d to cyber attacks. Through AI training, malicious programs can accurately locate and exploit system vulnerabilities like screening metal sheets.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Xbow<\/strong>, another startup focused on using artificial intelligence for hacking, made history in June this year by becoming the first artificial intelligence company to top the HackerOne U.S. rankings. HackerOne is a real-time scoreboard that records the dynamics of global hackers. Since 2016, it has been tracking hackers who discover the most important vulnerabilities and giving them bragging rights. Last week, HackerOne added a new category specifically for groups that automatically use artificial intelligence hacking tools to distinguish them from human researchers. Xbow still maintains its leading position.<\/p>\n<p>&nbsp;<\/p>\n<p>Hackers and cybersecurity experts have not yet determined whether artificial intelligence will ultimately help attackers or defenders more. But for now, defense seems to have the upper hand.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14pt;\">Alexei Bulazel<\/span><\/strong>, senior cyber director of the White House National Security Council, said at a panel discussion at the Def Con hacking conference in Las Vegas last week that this trend will continue as long as the United States has most of the world\u2019s most advanced technology companies.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\"><strong>\u201cI firmly believe that artificial intelligence is more beneficial to the defensive side than the offensive side,\u201d Bulazel said.<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>He pointed out that it is rare for hackers to find highly destructive vulnerabilities in large U.S. technology companies. Criminals usually invade computers by looking for neglected small vulnerabilities in small companies that lack elite cybersecurity teams. He said that artificial intelligence is particularly useful in finding these vulnerabilities before criminals do.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cWhat artificial intelligence is better at is identifying vulnerabilities in a low-cost and simple way, which really democratizes access to vulnerability information,\u201d Bulazel said.<\/p>\n<p>&nbsp;<\/p>\n<p>However, as technology develops, this trend may not continue. One reason is that there are currently no free, AI-integrated automatic hacking tools or penetration testers available. Such tools are already widely available online, nominally programs used to test the behavioral flaws of cybercriminals.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Google\u2019s Adkins said that if a person has an advanced LLM and it can be obtained for free,<\/strong> it may mean that small companies\u2019 projects will face an open period of risk.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cI think there\u2019s also reason to assume that at some point someone will release [such a tool],\u201d she said. \u201cAt that point, I think things will get a bit dangerous.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Meyers of CrowdStrike said that the rise of agent artificial intelligence (tools that perform more complex tasks, such as writing and sending emails or executing program code) may bring significant cybersecurity risks.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cAgent AI is really AI that can act on your behalf, right? This will become the next internal threat because although organizations have deployed these agent AIs, they do not have built-in protective measures to prevent others from abusing them,\u201d he said.<\/p>\n<p><span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.rzautoassembly.com\/hu\/products\/\">Component assembly machine<\/a><\/span><br \/>\n<span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/www.rzautoassembly.com\/hu\/2985-2\/(\">Artificial intelligence component assembly machine<\/a><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>This summer, Russian hackers made new improvements to the large number of phishing emails sent to Ukrainians. &nbsp; Hackers attached an artificial intelligence program to the email attachment. Once installed, the program automatically searches the victim&#8217;s computer for sensitive files and sends them back to Moscow. &nbsp; The Ukrainian government and several cybersecurity companies detailed [&hellip;]<\/p>","protected":false},"author":1,"featured_media":4397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,124],"tags":[],"class_list":["post-4396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/posts\/4396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/comments?post=4396"}],"version-history":[{"count":0,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/posts\/4396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/media\/4397"}],"wp:attachment":[{"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/media?parent=4396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/categories?post=4396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rzautoassembly.com\/hu\/wp-json\/wp\/v2\/tags?post=4396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}