{"id":28963,"date":"2024-04-23T03:22:05","date_gmt":"2024-04-23T03:22:05","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?p=28963"},"modified":"2024-04-26T00:36:40","modified_gmt":"2024-04-26T00:36:40","slug":"ai-phishing-attacks-how-cybercriminals-leverage-ai-for-spam-emails","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/ai-phishing-attacks-how-cybercriminals-leverage-ai-for-spam-emails\/","title":{"rendered":"AI Phishing Attacks: How Cybercriminals Leverage AI for Spam Emails"},"content":{"rendered":"\n<p>With technologies evolving almost every day, cybercriminals are also becoming increasingly smart and resourceful. Phishing cases, which is the most common form of <a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/cyber-security-month-unmasking-the-threat-ai-powered-social-engineering-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>, are at an all-time high. According to the Anti-Phishing Working Group, phishing attacks reached\u00a0<a href=\"https:\/\/apwg.org\/trendsreports\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">almost 5 million in 2023<\/a>, the worst year so far in terms of phishing.\u00a0<\/p>\n\n\n\n<p>To make matters worse, cybercriminals have started to leverage the evolving capabilities of artificial intelligence (AI) to create more sophisticated, more genuine-looking phishing attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI and Phishing<\/h2>\n\n\n\n<p>Unfortunately, AI has made it easier for cybercriminals to target people, especially when writing phishing emails. It can help cybercriminals quickly create customised, well-written, targeted emails in seconds.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity practitioners must continuously update security measures to protect their organisations from AI-powered phishing attacks. Additionally, educational and training programs are necessary to keep users informed and vigilant about new cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What do AI phishing emails look like?<\/h2>\n\n\n\n<p>Through AI, cybercriminals can make spam emails that can easily trick people because of the following characteristics:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Highly personalised<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Using AI, cybercriminals can find vast amounts of publicly available data about users, including names, job titles and recent activities from the internet to help create highly personalised messages.&nbsp;<\/p>\n\n\n\n<p>For example, cybercriminals might use your recent trip to Japan, which you posted about on social media, to craft an email appearing to be from the hotel you stayed at. The newly announced merger at your organisation could turn into an email from HR asking you to review new policies by clicking on a link.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Well-written<\/strong><\/li>\n<\/ol>\n\n\n\n<p>AI can significantly reduce spelling and grammatical errors, one of the most common phishing giveaways. Worse, AI can be used to mimic the tone and style of organisation leaders. This results in more professional-looking emails that give the impression of legitimacy.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Sneaky and targeted<\/strong><\/li>\n<\/ol>\n\n\n\n<p>The ability to rapidly generate phishing emails allows attackers to constantly adjust their emails to get past spam filters and other security protocols. Learning from successes and failures, AI can rapidly adapt and create emails to maneuver past security features and land in your inbox.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Stay Safe from AI Phishing Attacks<\/h2>\n\n\n\n<p>Despite all the AI-driven improvements, users can still avoid being phished by following these safety measures:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Beware of urgent requests or threats.<\/strong>\u202fCreating a sense of urgency or threatening dire consequences like account closure or disciplinary action is a common tactic to get quick, impulsive reactions out of users.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"741\" height=\"834\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/image-3.png\" alt=\"\" class=\"wp-image-28964\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/image-3.png 741w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/image-3-267x300.png 267w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Beware of requests for sensitive information.<\/strong>\u202fIt is rare for organisations to request sensitive information via email. Verify requests by contacting the sender through official trusted channels to verify the request\u2019s legitimacy.<\/li>\n\n\n\n<li><strong>Avoid links and attachments.<\/strong>\u202fUnexpected attachments or links can be dangerous, contain malicious software or lead to fraudulent web pages.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"792\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/avoid-links-and-attachments-1024x792.jpg\" alt=\"\" class=\"wp-image-28965\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/avoid-links-and-attachments-1024x792.jpg 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/avoid-links-and-attachments-300x232.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/avoid-links-and-attachments-768x594.jpg 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2024\/04\/avoid-links-and-attachments.jpg 1165w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>Report. Report. Report.<\/strong>\u202fIf you receive a phishing email or suspect that an email is phishing,\u00a0report it to your security team immediately.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Against AI Phishing Attacks<\/h2>\n\n\n\n<p>AI\u2019s not all bad. Just as AI has improved phishing attacks, it has also changed the game for phishing defense. Cybersecurity practitioners can develop AI algorithms to identify real-time threats on devices and to approach cybersecurity in a predictive manner, rather than analysing events after they\u2019ve already happened. Catching fraudsters at the identity verification phase is crucial, while also having the tools in place to monitor fraud on your platform.&nbsp;<\/p>\n\n\n\n<p>Is your organisation struggling to implement a solid security strategy? Insentra is here to help you. Explore our <a href=\"https:\/\/www.insentragroup.com\/nz\/services\/professional-services\/secure-workplace\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.insentragroup.com\/au\/services\/professional-services\/secure-workplace\/\" rel=\"noreferrer noopener\">Secure Workplace services<\/a> to create a cybersecurity solution fit for the ever-evolving world of cybercrime. <a href=\"https:\/\/www.insentragroup.com\/nz\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a> today to start designing a secure workplace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals use AI to create realistic, targeted emails, making phishing attacks more dangerous. Read this blog on how to stay safe from AI phishing attacks.<\/p>\n","protected":false},"author":96,"featured_media":28966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-28963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/28963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=28963"}],"version-history":[{"count":3,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/28963\/revisions"}],"predecessor-version":[{"id":28969,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/28963\/revisions\/28969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media\/28966"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=28963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=28963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=28963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}