PromptRiskDBThreat intelligence atlas
AI Risk

Cybersecurity

"LLMs may exacerbate cybersecurity risks in various ways (Newman, 2024). Firstly, LLMs may significantly amplify the effectiveness of deceptive operations aimed at tricking people into disclosing sensitive information or granting adversary access to critical resources. For example, LLMs might prove highly effective at crafting personalized phishing emails or messages at scale that may be harder for an average user...

AI Risk4. Malicious Actors & Misuse4.3 > Fraud, scams, and targeted manipulation2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques10Attack methods connected to this risk.
Mitigations2Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"LLMs may exacerbate cybersecurity risks in various ways (Newman, 2024). Firstly, LLMs may significantly amplify the effectiveness of deceptive operations aimed at tricking people into disclosing sensitive information or granting adversary access to critical resources. For example, LLMs might prove highly effective at crafting personalized phishing emails or messages at scale that may be harder for an average user to recognize as phishing attempts (Karanjai, 2022; Hazell, 2023). In addition to being directly harmful to the targeted individual, such ‘social engineering’ attacks are often the base of larger hacking operations (Plachkinova and Maurer, 2018; Salahdine and Kaabouch, 2019)."

Domain4. Malicious Actors & Misuse
Subdomain4.3 > Fraud, scams, and targeted manipulation
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryDual-Use Capabilities Enable Malicious Use and Misuse of LLMs
SubcategoryCybersecurity

Suggested mitigations

Defenses that may help with related attacks.

User Training

Business and Data UnderstandingData Preparation+4 more
LifecycleBusiness and Data Understanding + 5 moreCategoryPolicy

Deepfake Detection

DeploymentMonitoring and Maintenance+2 more
LifecycleDeployment + 3 moreCategoryTechnical - ML

Source

Research source for this risk, when available.