
科技界正在热议能够自主执行任务的AI“代理”所蕴含的商业潜力。但对于负责保护企业免受网络犯罪侵害的安全从业者而言,这类AI工具的涌入意味着他们需要应对一个棘手的新对手。
安全专家将这种能够分多个步骤自主解决问题的"代理型"AI工具列为2025年最大的威胁之一。尽管基于OpenAI的GPT模型等生成式工具的AI黑客攻击,尚未如人们所担心的那样猖獗,但AI代理正为网络罪犯进行强大的军火库升级,使这种工具的角色从基础助手转变为永不疲倦的“积极且活跃的帮凶”。
令人担忧的是,在现有安全团队已疲于应对的当下,这些新型AI代理可能对网络安全防御者和企业形成巨大冲击。
网络安全公司Malwarebytes的技术布道师马克·斯托克利表示:“代理型网络攻击者带来的风险在于,‘大型’网络攻击可能成为日常操作,令安全团队不堪重负。”此类攻击通常针对坐拥千万乃至上亿美元资金的高价值目标。
斯托克利指出,AI代理“能极大扩展大型勒索软件攻击的规模,使网络罪犯摆脱当前的技术瓶颈”。
与此同时,谷歌(Google)威胁分析小组的最新研究显示,以牟利为目的的黑客与试图隐匿恶意行为的国家行为体正加强勾结。随着犯罪生态对执法行动的韧性增强,美国及其盟国采用破坏性打击手段的难度日益增加;在当今网络犯罪黑市中,黑客更替犹如走马灯般频繁。
谷歌威胁情报副总裁桑德拉·乔伊斯在声明中表示:“网络犯罪生态的核心市场让每个参与者都易于被替代,整个体系具备抗干扰韧性。遗憾的是,我们的诸多行动只能给犯罪分子带来暂时的困扰,但我们绝不能掉以轻心,必须加倍努力实现实质性打击。”
迭代越快,风险越高
专家警告称,正如OpenAI在2024年2月的报告中所言,当前AI模型对“恶意网络安全任务仅有有限增量能力”的时代即将终结。更严峻的是,AI编程工具的普及将导致劣质代码激增,黑客及其AI代理可利用的漏洞也将随之暴增。
软件安全公司Contrast Security的联合创始人兼首席技术官杰夫·威廉姆斯表示:“不幸的是,所有模型都基于存在漏洞的代码训练,它们所生成的代码必然继承缺陷。这意味着代码越多、漏洞越多、迭代越快,用户面临的风险就越大。”
Malwarebytes的斯托克利指出,勒索软件攻击的天然瓶颈在于,高水平黑客的数量与防御专家规模的制衡。但随着AI代理的扩散,这种平衡可能被打破。
以钓鱼邮件为例:针对已识破“尼日利亚王子”等低劣骗局的警惕用户,黑客利用文本生成工具设计更逼真的骗局。生成式AI工具能轻易扩大此类攻击的规模并提升可信度,但它能为潜在黑客做的只有这些,而如何将恶意点击转化为持续收益仍是难题。AI代理则可能指导潜在黑客在得手之后如何进行后续操作。
斯托克利认为:“短期内,企业需借助自动化技术尽量将攻击面最小化,让安全团队专注于高影响、高价值工作。”他表示,为了应对规模不断扩大的威胁,企业未来的防御方向应是投资网络安全专用AI代理。
Malwarebytes的报告警告,资金雄厚的勒索软件团伙可能利用AI代理同时攻击多个目标。2024年,尽管LockBit、ALPHV等大型犯罪团伙遭到执法机构的更多打击,但已知攻击增加数量仍创历史新高。
谷歌的最新报告显示,随着更多国家试图从黑客处购买网络工具和能力,攻击规模或将进一步扩大。
报告指出:“每日海量发生的逐利型网络入侵会产生累积效应,不仅削弱国家经济竞争力,更令防御者不堪重负,导致战备水平下降与职业倦怠。”
一场看似普通的勒索软件攻击,幕后可能是国家扶持的黑客,他们拥有远超普通黑客的资源与耐心,对企业的威胁程度将呈指数级上升。
面对国家扶持的黑客,企业虽常处劣势,但可通过基础安全措施实现自我保护,例如升级遗留系统,这类系统最容易成为勒索软件团伙和国家黑客的首选目标。(财富中文网)
译者:刘进龙
审校:汪皓
科技界正在热议能够自主执行任务的AI“代理”所蕴含的商业潜力。但对于负责保护企业免受网络犯罪侵害的安全从业者而言,这类AI工具的涌入意味着他们需要应对一个棘手的新对手。
安全专家将这种能够分多个步骤自主解决问题的"代理型"AI工具列为2025年最大的威胁之一。尽管基于OpenAI的GPT模型等生成式工具的AI黑客攻击,尚未如人们所担心的那样猖獗,但AI代理正为网络罪犯进行强大的军火库升级,使这种工具的角色从基础助手转变为永不疲倦的“积极且活跃的帮凶”。
令人担忧的是,在现有安全团队已疲于应对的当下,这些新型AI代理可能对网络安全防御者和企业形成巨大冲击。
网络安全公司Malwarebytes的技术布道师马克·斯托克利表示:“代理型网络攻击者带来的风险在于,‘大型’网络攻击可能成为日常操作,令安全团队不堪重负。”此类攻击通常针对坐拥千万乃至上亿美元资金的高价值目标。
斯托克利指出,AI代理“能极大扩展大型勒索软件攻击的规模,使网络罪犯摆脱当前的技术瓶颈”。
与此同时,谷歌(Google)威胁分析小组的最新研究显示,以牟利为目的的黑客与试图隐匿恶意行为的国家行为体正加强勾结。随着犯罪生态对执法行动的韧性增强,美国及其盟国采用破坏性打击手段的难度日益增加;在当今网络犯罪黑市中,黑客更替犹如走马灯般频繁。
谷歌威胁情报副总裁桑德拉·乔伊斯在声明中表示:“网络犯罪生态的核心市场让每个参与者都易于被替代,整个体系具备抗干扰韧性。遗憾的是,我们的诸多行动只能给犯罪分子带来暂时的困扰,但我们绝不能掉以轻心,必须加倍努力实现实质性打击。”
迭代越快,风险越高
专家警告称,正如OpenAI在2024年2月的报告中所言,当前AI模型对“恶意网络安全任务仅有有限增量能力”的时代即将终结。更严峻的是,AI编程工具的普及将导致劣质代码激增,黑客及其AI代理可利用的漏洞也将随之暴增。
软件安全公司Contrast Security的联合创始人兼首席技术官杰夫·威廉姆斯表示:“不幸的是,所有模型都基于存在漏洞的代码训练,它们所生成的代码必然继承缺陷。这意味着代码越多、漏洞越多、迭代越快,用户面临的风险就越大。”
Malwarebytes的斯托克利指出,勒索软件攻击的天然瓶颈在于,高水平黑客的数量与防御专家规模的制衡。但随着AI代理的扩散,这种平衡可能被打破。
以钓鱼邮件为例:针对已识破“尼日利亚王子”等低劣骗局的警惕用户,黑客利用文本生成工具设计更逼真的骗局。生成式AI工具能轻易扩大此类攻击的规模并提升可信度,但它能为潜在黑客做的只有这些,而如何将恶意点击转化为持续收益仍是难题。AI代理则可能指导潜在黑客在得手之后如何进行后续操作。
斯托克利认为:“短期内,企业需借助自动化技术尽量将攻击面最小化,让安全团队专注于高影响、高价值工作。”他表示,为了应对规模不断扩大的威胁,企业未来的防御方向应是投资网络安全专用AI代理。
Malwarebytes的报告警告,资金雄厚的勒索软件团伙可能利用AI代理同时攻击多个目标。2024年,尽管LockBit、ALPHV等大型犯罪团伙遭到执法机构的更多打击,但已知攻击增加数量仍创历史新高。
谷歌的最新报告显示,随着更多国家试图从黑客处购买网络工具和能力,攻击规模或将进一步扩大。
报告指出:“每日海量发生的逐利型网络入侵会产生累积效应,不仅削弱国家经济竞争力,更令防御者不堪重负,导致战备水平下降与职业倦怠。”
一场看似普通的勒索软件攻击,幕后可能是国家扶持的黑客,他们拥有远超普通黑客的资源与耐心,对企业的威胁程度将呈指数级上升。
面对国家扶持的黑客,企业虽常处劣势,但可通过基础安全措施实现自我保护,例如升级遗留系统,这类系统最容易成为勒索软件团伙和国家黑客的首选目标。(财富中文网)
译者:刘进龙
审校:汪皓
The tech industry is abuzz over the business potential of AI “agents,” which can execute tasks on their own. For those tasked with protecting organizations against cybercriminals however, the influx of AI agents will mean preparing for a challenging new adversary to contend with.
Security experts now view “agentic” AI tools that engage in multi-step problem solving and act on them autonomously as one of 2025’s biggest threats.And while the explosion of AI-enabled hacks powered by generative tools like OpenAI’s GPT models may not have been as bad as some feared, AI agents present cybercriminals with a powerful new upgrade to their arsenal, changing the tool from a basic assistant to an active and eager co-worker that never needs to sleep.
The concern is that these new AI agents could overwhelm cybersecurity defenders and businesses alike at a time when the workforce is struggling to keep up.
“The risk of agentic attackers is that it could make ‘big game’ attacks an everyday norm, overwhelming security teams,” said Mark Stockley, cybersecurity evangelist at the cyber firm Malwarebytes. Big game attacks are typically high-profile targets with millions or billions in company coffers.
Stockley said that AI agents “could scale up big game ransomware attacks enormously, freeing cybercriminals from the scaling problems that currently hold them back.”
At the same time, new research from Google’s Threat Analysis Group is showing tighter collaborations between criminal hackers looking for financial gain and nation-states seeking to hide malicious activity. The U.S. and international allies face increasing difficulty using disruptive methods as the criminal ecosystem becomes more resilient against law enforcement activities; malicious hackers are quick to replace and be replaced in today’s criminal underworld.
“The marketplace at the center of the cybercrime ecosystem has made every actor easily replaceable and the whole problem resilient to disruption. Unfortunately, many of our actions have amounted to temporary inconveniences for these criminals, but we can’t treat this like a nuisance and we will have to work harder to make meaningful impacts,” Sandra Joyce, vice president of Google Threat Intelligence, said in a statement.
More velocity, more risk
Experts warn that the time is drawing to a close when current AI models amount to “limited incremental capabilities for malicious cybersecurity tasks” as OpenAI noted in a February 2024 report. What’s more, the increase of AI-tools for software development will inevitably result in an increase in bad code, and as a result, more vulnerabilities will be available for hackers and their AI agents to abuse.
“Unfortunately, all the models were trained on code that has vulnerabilities, so the generated code will too. That means more code, more vulnerabilities, more velocity, and more risk for consumers,” said Jeff Williams, co-founder and chief technology officer at the software security firm Contrast Security.
Stockley, of Malwarebytes, points out that one of the natural bottlenecks on ransomware attacks has long been the amount of skilled hackers plying their trade, versus the skilled security professionals working to stop them. That balance could be upset as AI agents proliferate.
Take email phishing as an example: hackers use text generation tools to create realistic lures for victims who have become wise to lower-quality scams such as the fake Nigerian prince. Generative AI tools are an easy way to increase the scale and believability of those types of attacks — but that can only get a would-be hacker so far, since learning how to turn a malicious click into steady income is a challenge not as easily solved. Agents could be the next step to advising those would-be hackers on what to do after successfully tricking a victim.
“In the short term, organizations will need to turn to automation to ensure their attack surface is always as small as possible, and that security teams are free to focus on high impact, high value work,” said Stockley. Future goals for a business looking to keep up with the scale of threats would be to invest in cybersecurity-focused AI agents to further scale up defensive efforts, he said.
Malwarebyte’s report warns that well-funded ransomware gangs could use agents to attack multiple targets at the same time. Already, 2024 saw the biggest increase of known attacks even as some of the largest players like LockBit and ALPHV saw increased disruptions from law enforcement.
The scale of attacks is further expected to be exacerbated by the increase of states looking to purchase cyber tools and capabilities from criminal hackers, according to Google’s latest report.
“The enormous volume of financially motivated intrusions occurring every day also has a cumulative impact, hurting national economic competitiveness and placing huge strain on cyber defenders, leading to decreased readiness and burnout,” said Google’s report.
A cyberattack that appears to be a run-of-the-mill ransomware extortion could actually be state-backed hackers with far more resources and patience than your typical hacker and raising the threat to a business exponentially.
Businesses looking to protect themselves against state-backed hackers are often far outmatched, but can protect themselves by taking some basic security steps to modernize legacy systems, which is often an easy first target by ransomware gangs and state-backed hackers alike.