www.darkreading.com
Open in
urlscan Pro
2606:4700::6810:dfab
Public Scan
URL:
https://www.darkreading.com/vulnerabilities-threats/ai-lowers-barrier-cyber-adversary-manipulation-2024-election
Submission: On April 22 via api from TR — Scanned from DE
Submission: On April 22 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia Cybersecurity Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives: * > Microsoft SEE ALL * Vulnerabilities & Threats AI LOWERS BARRIER FOR CYBER-ADVERSARY MANIPULATION IN 2024 ELECTION Securing the presidential election requires vigilance and hardened cybersecurity defenses. Shawn Henry, Chief Security Officer, CrowdStrike April 19, 2024 3 Min Read Source: thinkx2 via Alamy Stock Photo COMMENTARY Foreign adversaries have attempted to disrupt the US elections for years through various methods. This includes espionage and "hack and leak" campaigns that steal sensitive data and later amplify it in public forums. Today, generative AI (GenAI) is altering the battlefield for attacks, and in the modern information ecosystem where misinformation and disinformation can spread rapidly, it has the potential to transform geopolitics. Throughout my 24-year career with the FBI, I witnessed sophisticated adversaries attempt to sow confusion and cripple networks, as cyber-threat actors developed tools and tactics to disrupt businesses, governments, and more. The malicious use and proliferation of GenAI in 2024 presents one of the toughest challenges we'll face in an election year. ADVERSARIES CONTINUE ON THEIR PATH TO DISRUPT AND DISMANTLE Nation-state adversaries affiliated with and tied to the motivations of foreign governments have the resources to scale operations, and pose a constant threat to democracy. As we've seen previously, it's likely that threat actors from China, Russia, and Iran (charged for sending fake, intimidating emails to US voters in 2020) will seek to interfere with the 2024 US election. Adversaries may seek to target actual election infrastructure itself, including the hardware and software used to tally and transmit votes, as well as political campaign assets. While some actors have leveraged information operations, generative AI is poised to increase the attractiveness of this malicious activity. With GenAI, it is easier than ever for threat actors to create content and influence narratives that support their underlying goals and objectives. This, in turn, can undermine public confidence and perceptions of political issues, parties, and candidates. In fact, we're already starting to see the impacts. Threat actors from China recently weaponized deepfakes ahead of Taiwan's election, aiming to increase the voting public's confidence in candidates more diplomatic to China. Fabricated information campaigns stemming from state-nexus entities will not be novel in 2024; however, generative AI will make deciphering what is real or not infinitely more difficult. The rise of GenAI has also lowered the barrier of entry for virtually anyone to interfere with elections. Less sophisticated hackers or hacktivists with a specific geopolitical goal may be able to create high-quality disinformation campaigns with relative ease. We've already seen a local magician make global headlines this year by using AI to create fake robocalls, and it's only April. COUNTERING THESE GROWING THREATS So, what can be done? When it comes to protecting the disparate election systems, it is critical to apply a risk-informed approach. At the heart of this is hardening environments to protect systems and stop breaches, 24/7 continuous monitoring of systems, and deep visibility into critical areas of risk, including endpoints, cloud, and identity. Employing both threat hunting and threat intelligence is equally as important, as these tools help to proactively protect against adversaries who may attempt to penetrate networks. State and local elections administration entities have improved their security over the past several election cycles. So too have political parties and campaign entities. But additional attention and investment is warranted. With respect to information operations, we must continue to raise awareness. Defending against this threat starts with vigilance from everyone. Citizens must be on alert and validate the origin of information they are consuming, consider the source's political stance and objective, and attempt to validate information through trusted sources prior to amplifying it. All Americans have a crucial role to play in critically analyzing the information they are getting and, more importantly, sharing Social media companies and GenAI companies should work to detect and prevent threat actors' use of their tools and platform. At a minimum this means cooperating with each other where appropriate and collaborating with cybersecurity companies and IT providers that have experience tracking these groups. In 2024, voters in all 50 states and across 55 countries will participate in elections, providing numerous opportunities for adversaries with various motivations to disrupt and dismantle confidence in democracy. With proper awareness, preparation, and cybersecurity best practices in place, we can take a big step forward in defending democracy in the digital age. Failure to do so could be catastrophic. ABOUT THE AUTHOR(S) Shawn Henry Chief Security Officer, CrowdStrike Shawn Henry serves as chief security officer and is one of the company's longest tenured executive leaders, having joined in 2012 after retiring from the FBI senior executive service. In Henry’s role, he oversees all security aspects of CrowdStrike, including the company's information security, business continuity and resiliency, and risk reduction programs, as well as the physical security of CrowdStrike's global facilities, personnel, executive protection, and corporate events. Prior to joining CrowdStrike, Shawn oversaw half of the FBI's investigative operations as Executive Assistant Director, including all FBI criminal and cyber investigations worldwide, international operations, and the FBI's critical incident response to major investigations and disasters. See more from Shawn Henry Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- Vulnerabilities & Threats AlphaLock' Hacker Organization Launches Pen-Testing Training Group Vulnerabilities & Threats Atlassian Bug Escalated to 10, All Unpatched Instances Vulnerable Vulnerabilities & Threats Virtual Alarm: VMware Issues Major Security Advisory Vulnerabilities & Threats Generative AI Projects Pose Major Cybersecurity Risk to Enterprises More Insights Webinars * The fuel in the new AI race: Data April 23, 2024 * Securing Code in the Age of AI April 24, 2024 * Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise April 30, 2024 * Key Findings from the State of AppSec Report 2024 May 7, 2024 * Is AI Identifying Threats to Your Network? May 14, 2024 More Webinars Events * Black Hat USA - August 3-8 - Learn More August 3, 2024 * Cybersecurity's Hottest New Technologies: What You Need To Know March 21, 2024 More Events EDITOR'S CHOICE The letters EDR/XDR amid binary code Application Security Evil XDR: Researcher Turns Palo Alto Software Into Perfect MalwareEvil XDR: Researcher Turns Palo Alto Software Into Perfect Malware byNate Nelson, Contributing Writer Apr 19, 2024 4 Min Read A computer screen showing GPT-4 Threat Intelligence GPT-4 Can Exploit Most Vulns Just by Reading Threat AdvisoriesGPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories byNate Nelson, Contributing Writer Apr 18, 2024 4 Min Read An ICS control panel ICS/OT Security ICS Network Controllers Open to Remote Exploit, No Patches AvailableICS Network Controllers Open to Remote Exploit, No Patches Available byDark Reading Staff Apr 18, 2024 2 Min Read Reports * Industrial Networks in the Age of Digitalization * Zero-Trust Adoption Driven by Data Protection * How Enterprises Assess Their Cyber-Risk * The Infoblox Q1 2021 Cyberthreat Intelligence Report * Why You're Wrong About Operationalizing AI More Reports White Papers * Application Security's New Mandate in a DevOps World * Making Sense of Your Security Data: The 6 Hardest Problems * A Solution Guide to Operational Technology Cybersecurity * Demystifying Zero Trust in OT * Causes and Consequences of IT and OT Convergence More Whitepapers Events * Black Hat USA - August 3-8 - Learn More August 3, 2024 * Cybersecurity's Hottest New Technologies: What You Need To Know March 21, 2024 More Events DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. You can choose to accept all of these cookies or only essential cookies. To learn more or manage your preferences, click “Settings”. For further information about the data we collect from you, please see our Privacy Policy Accept All Settings COOKIE PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Cookies * Name cookie name Confirm My Choices