Be sure to check out Keypoint Intelligence's Cybersecurity page!
We have been warning for some time now that artificial intelligence (AI) changes the cybersecurity threat landscape by allowing even unsophisticated bad actors to launch attacks easily, quickly, and repeatedly with relatively little effort. Alas, now we have proof.
The September 2024 edition of the HP Wolf Security Threat Insights Report, which provides in-depth analysis of the latest cybersecurity trends and threats, revealed evidence of cybercriminals’ use of generative AI (GenAI) in crafting malicious code. This allows them to become increasingly adept at evading security measures many organizations may have in place to thwart attacks. Such activity was particularly evident in the detection of a malware campaign using AsyncRAT—where the structure, comments, and choice of function names in the VBScript and JavaScript strongly suggest GenAI was involved. The use of AI in this context lowers the bar for cybercriminals, making it easier to generate complex malware scripts that can evade traditional detection systems.
The HP report also details other emerging threats detected by the team, including:
Email Is the Main Culprit
The HP report also noted that email remains the primary vector for delivering malware, accounting for 61% of detected threats. A significant portion of these (12%) successfully evaded email gateway scanners, highlighting the ongoing challenges organizations face in securing their email infrastructure. A range of defense-evasion techniques used by threat actors to avoid detection were noted in the report. For example, the Aggah campaign disables Microsoft’s Antimalware Scan Interface (AMSI) and Microsoft Defender before deploying its payload. Additionally, the use of code-signing certificates—particularly in the ChromeLoader campaign—allows malware to pass through security policies that typically block unsigned code. These tactics point to a growing trend of attackers not only focusing on evasion, but also persistence and lateral movement within compromised networks.
Keypoint Intelligence Opinion
In the never-ending game of cat-and-mouse, cybercriminals are innovating new attack methods to stay ahead of cybersecurity defenses. The use of GenAI to write malware, the increasing sophistication of browser-based attacks, and the reliance on unconventional file formats all underscore the necessity for organizations to take a layered approach to cybersecurity and strengthen their endpoint protection so that if a malware payload does get through, it can be stopped before the harm spreads. For example, HP Wolf Security’s hardware-enforced isolation techniques (available in the company’s business-class PCs and laptops) will automatically contain a detected threat within a micro-virtual machine “sandbox” on the infected machine, preventing it from spreading or causing damage.
Organizations can take other steps, as well, such as contracting with a leading threat intelligence services provider that will collect, analyze, and distribute information about the latest threat actors, tactics, techniques, and procedures in real-time. Most importantly, organizations need to continually train employees to be vigilant against phishing and social engineering attacks—especially since email remains the most common vector for attacks.
How well are various MFP OEMs securing their devices against potential vulnerabilities? Visit our MFP Security Validation testing page to find out!
Browse through our Industry Reports Page (latest reports only). Log in to the InfoCenter to view research on cybersecurity through our Workplace CompleteView Advisory Service. If you’re not a subscriber, contact us for more info by clicking here.