Infostealers use the popularity of GenAI to corrupt victim devices with credentials sold for as little as $15.
Hackers are taking advantage of the growing popularity of GenAI technology to profit handsomely by selling stolen account passwords and data on the dark web.
The Threat Response Unit (TRU) of eSentire has discovered that over 400 account credentials are being traded by cybercriminals on a daily basis. Mostly taken from PCs used by corporate end users that have been infected with infostealer malware, which retrieves whatever data the user enters into their browser. Sensitive data like bank account information, financial records, customer information, and login credentials may be included in this. Furthermore, these credentials are stolen if end customers are enrolled in a GenAI model or service. The “stealer log” of stolen data is sold for about $10 after it is obtained via an infostealer. According to reports, OpenAI credentials are the most frequently stolen, with 200 listings on average every day.
Further research by Sysdig, a security research organization, revealed that threat actors are also taking control of a significant number of LLMs (Large Language Models), a practice known as “LLM Jacking.” TRU alerts users to the fact that hackers want to obtain, resell, and misuse access to LLMs. Sysdig has established that LLM Jacking frequently resells and monetizes their LLM access through the use of a reverse proxy and has issued a warning that the victim of this type of assault may have to pay up to $46,000 in consumption charges every day.
This method was employed by underground retailers such as LLM Paradise, who even advertised blatantly on platforms like TikTok, to acquire and sell GenAI credentials that had been stolen. Even though this website has subsequently closed, a thriving market guarantees that many more will take its place. The risk of cybercriminals finding new ways to make money off of stolen data has increased along with the use of artificial intelligence. It is recommended that businesses uphold stringent security protocols, including multi-factor authentication, effective vulnerability management procedures, and vigilant surveillance of any unusual activities.
Also read: Achieving Rapid Outcomes with AI-Driven Cloud Analytics
Do Follow: CIO News LinkedIn Account | CIO News Facebook | CIO News Youtube | CIO News Twitter
About us:
CIO News is the premier platform dedicated to delivering the latest news, updates, and insights from the CIO industry. As a trusted source in the technology and IT sector, we provide a comprehensive resource for executives and professionals seeking to stay informed and ahead of the curve. With a focus on cutting-edge developments and trends, CIO News serves as your go-to destination for staying abreast of the rapidly evolving landscape of technology and IT. Founded in June 2020, CIO News has rapidly evolved with ambitious growth plans to expand globally, targeting markets in the Middle East & Africa, ASEAN, USA, and the UK.
CIO News is a proprietary of Mercadeo Multiventures Pvt Ltd.