PromptRiskDBThreat intelligence atlas
AI Risk

Amplification of cyberattacks

"General-purpose AI models may significantly enhance the magnitude and ef- fectiveness of cyberattacks, by amplifying existing capabilities or resources of malicious actors [3]. For example, GPAI models may be employed to: • Automatically scan open-source codebases and compiled binaries for po- tential vulnerabilities • Apply known exploits flexibly and at scale (e.g., identifying vulnerable computers based on sub...

AI Risk4. Malicious Actors & Misuse4.2 > Cyberattacks, weapon development or use, and mass harm2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques2Attack methods connected to this risk.
Mitigations2Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"General-purpose AI models may significantly enhance the magnitude and ef- fectiveness of cyberattacks, by amplifying existing capabilities or resources of malicious actors [3]. For example, GPAI models may be employed to: • Automatically scan open-source codebases and compiled binaries for po- tential vulnerabilities • Apply known exploits flexibly and at scale (e.g., identifying vulnerable computers based on subtle cues in response times or output formats) • Assist with different aspects of cyberattacks, including planning, recon- naissance, exploit searching, remote control, malware implementation, and data exfiltration • Combine social engineering (phishing, deepfakes, etc.) with cyberattacks at scale."

Domain4. Malicious Actors & Misuse
Subdomain4.2 > Cyberattacks, weapon development or use, and mass harm
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryImpacts of AI (Cyberattacks)
SubcategoryAmplification of cyberattacks

Suggested mitigations

Defenses that may help with related attacks.

User Training

Business and Data UnderstandingData Preparation+4 more
LifecycleBusiness and Data Understanding + 5 moreCategoryPolicy

Deepfake Detection

DeploymentMonitoring and Maintenance+2 more
LifecycleDeployment + 3 moreCategoryTechnical - ML

Source

Research source for this risk, when available.