Cyber Attack Warning As Hackers Use AI And Gmail In New Campaign

New cyber attack campaign leverages Gmail and AI in campaign
GettyHackers using AI very nearly compromised the account of a Gmail user, as I recounted in a recent report that went viral. Now both Gmail and AI are back in the spotlight together, but as part of a large-scale hacking campaign targeting both consumers and corporates with a financially-motivated payload. Here’s everything you need to know about the CopyRh(ight)adamantys cyber attack.

ForbesFBI Warns Gmail, Outlook Users Of $100 Government Emergency Data Email HackBy Davey Winder
CopyRh(ight)adamantys: The Cyber Attack With Global Reach Targeting Victims With AI-Generated Messaging Through Dedicated Gmail Accounts
Unlike the deepfake AI-generated cyber attack that so nearly compromised a Gmail account user by impersonating Google support, the newly uncovered CopyRh(ight)adamantys campaign is simultaneously more sophisticated and a lot simpler.

Let’s deal with that overly complicated name first: this cyber attack, described as a large-scale phishing campaign by Check Point Software researchers, uses a newly discovered variant of the Rhadamanthys information stealer malware. The attack also uses a false premise of the victim being responsible for copyright infringement violations. The conflation of these two things giving us that awful, pun-laden, CopyRh(ight)adamantys label.

The Check Point team has been tracking multiple threat actors utilizing Rhadamanthys information stealer malware, including an Iranian group operating in Israel called Void Manticore and Handala, a hacktivist group linked to it. Now, the researchers have identified a new large-scale phishing operation targeting both individuals and organizations. Rather than a political or nation-state agenda, the Check Point analysis suggests the motivation is purely financial and carried out by a criminal cybercrime operative.

ForbesRansomware Gang Demands $125,000 Payment In French Bread And CryptoBy Davey Winder
Gmail And AI At The Heart Of New Cyber Attack
The Check Point report reveals that the cyber attackers in question are using dedicated Gmail accounts, created solely to distribute emails that impersonate legitimate organizations to claim copyright violations on social media accounts, primarily Facebook. “Using falsified Gmail accounts sending emails from these well-known companies,” Check Point said, “the email addresses and language are customized per each target to inform the victim of their supposed copywriting violation.” It should come as no surprise that AI capabilities have been leveraged as part of this new cyber attack campaign. However, according to the researchers, these capabilities are limited to older optical character recognition models which are using AI automation “to create customized emails and multiple Gmail accounts per target.”

Sergey Shykevich, threat intelligence group manager at Check Point Software, said that the discovery of the CopyRh(ight)adamantys cyber attack campaign reveals not only the evolving sophistication of cyber threats but also “highlights how cybercriminals are leveraging AI for marketing purposes and use automation to enhance their reach and operational scale. For security leaders.” As such, Shykevich concluded, “it’s a wake-up call to prioritise automation and AI in defence strategies to counteract these globally scaled, financially motivated phishing campaigns."
ForbesGmail 2FA Cyber Attacks—Open Another Account Before It’s Too LateBy Davey Winder

{Categories} _Category: Inspiration{/Categories}
{URL}https://www.forbes.com/sites/daveywinder/2024/11/07/cyber-attack-warning-as-hackers-use-ai-and-gmail-in-new-campaign/{/URL}
{Author}Davey Winder, Senior Contributor{/Author}
{Image}https://imageio.forbes.com/specials-images/imageserve/479801072/0x0.jpg?format=jpg&height=600&width=1200&fit=bounds{/Image}
{Keywords}Cybersecurity,/cybersecurity,Innovation,/innovation,Cybersecurity,/cybersecurity,Consumer Tech,/consumer-tech,innovation,innovation,standard{/Keywords}
{Source}Inspiration{/Source}
{Thumb}{/Thumb}

Exit mobile version