AI in Social Engineering

[June 2024] AI is revolutionizing social engineering. AI鈥檚 use of automation and stealthy techniques dramatically raises the stakes of cybersecurity.  Threat actors can create convincing written messages, voice mimicking and phone-based attacks.

I'm joined by Bill Anker, executive director of strategic programs at the University of Alaska system Office for information technology.

00:13

We're discussing social engineering using AI.
 
In recent headlines Forbes declared that AI is revolutionizing social engineering and likened generative AI to "social engineering on steroids." AI's use of automation and stealthy techniques dramatically raises the stakes of cyber security.

00:34

What used to amount to a peppering of emails with some clumsy grammar and misspelled words, now is really sophisticated.

It feels like we're entering into an alternative reality where you just don't know what's fake and what's real.

00:47

It鈥檚 a real problem. We're now living in the intersection of AI and social engineering and that's dangerous territory.

For example, threat actors can now create flawless, convincing messages in perfect English using tools like chat GPT that makes detecting fraudulent messages really challenging.

01:04

There are also voice mimicking and phone-based attacks. As many of you know, AI tools can generate lifelike spoken words that mimic specific individuals. This capability opens the door to phone calls that can convincingly imitate anyone, such as the head of finance, a chancellor or the university president. Threat actors generally use a two-pronged approach. They start with credible emails and follow that by voice calls, adding a layer of deception to social engineering attacks.

01:30

That's troubling. I know that in addition to email and voice attacks, picture and video can also be AI generated. Are these so-called deep fakes a concern for the university?

01:41

Absolutely. You may have seen deep fakes in the news recently. For example, as recently as this past February, a finance worker paid out more than $25 million in response to fake video requests from someone impersonating the Chief Financial Officer of the company.

Concern about election year deep fakes is in the news quite a bit and is leading to the introduction of AI related legislation to combat attempts to mislead voters during the 2024 election.

AI can be used to create deep fakes using pictures, video, and audio footage found in the public space. And with that they can pretty easily make completely realistic fake videos and fake virtual identities.

02:18

What are the big risks related to social engineering using AI for the University?

With AI's hyper-speed ability to analyze an employee's digital behavior, scams can take on an unsettling personalization, increasing the likelihood of successfully tricking our employees into providing access or sharing private information.

02:36

Beyond social engineering AI also accelerates the detection of vulnerabilities in systems, potentially leading to rapid breaches even before staff recognize a threat.

AI tools can autonomously probe defenses,learn from mistakes, distribute malware and extract sensitive data often bypassing traditional security alarms. Adaptive AI-powered malware can dynamically create real-time countermeasures against the university's defenses resulting in more prolonged and disruptive attacks.

03:03

What are some countermeasures that we can take against AI fueled attacks?

This can be broken down into three main strategies. First, training our users to detect social engineering. Second, implementing improved authentication. And third, deploying AI based security controls.

Employee awareness and vigilance is by far the most powerful tool in our arsenal. The use of multi-factor authentication can reduce account compromises by up to 99%.

And finally, AI-based defenses can react and adapt to attacks in real time dramatically speeding up our response times. 绿奴天花板 is already implementing the first two and is currently investigating the third.

03:38

Remember there is always time to verify the authenticity of a request. If you have any doubts, aren't expecting this type of communication, or aren't sure if you should proceed, reach out to the requester directly, using an alternate communication method.

For urgent matters contact your local service desk and if you need further assistance including individualized help do not hesitate to contact OIT security operations at ua-oit-security@alaska.edu or visit OIT's website.

04:07

Thanks Bill. I'm impressed with the work that you and the entire OIT team are doing on behalf of the university to protect our online security.

Everyone thanks for joining this compliance chat. If you have any further questions, please feel free to contact OIT security operations.


鈥淐ompliance Chat鈥 videos are informal conversations where Senior Institutional Compliance Liaison Mary Gower meets with subject matter experts covering frequently asked compliance questions and issues in quick, bite-sized clips.