Record summary
A quick snapshot of what this page covers.
Risk profile
How this risk is described and categorized.
"Just as every other type of individual and organization has explored possible use cases for generative AI products, so too have malicious actors. This could take the form of facilitating or scaling up existing threat methods, for example drafting actual malware code,87 business email compromise attempts,88 and phishing attempts.89 This could also take the form of new types of threat methods, for example mining information fed into the AI’s learning model dataset90 or poisoning the learning model data set with strategically bad data.91 We should also expect that there will be new attack vectors that we have not even conceived of yet made possible or made more broadly accessible by generative AI."
Suggested mitigations
Defenses that may help with related attacks.
Use Multi-Modal Sensors
Deepfake Detection
User Training
Source
Research source for this risk, when available.
Included resource
Generating Harms: Generative AI's Impact & Paths Forward
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
