Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

Cyber Attack Warning As Hackers Use AI And Gmail In New Campaign

Nov 07, 2024 - forbes.com
A new large-scale cyber attack campaign, dubbed CopyRh(ight)adamantys, is leveraging Gmail and AI to target both consumers and corporations with a financially-motivated payload. The campaign uses a new variant of the Rhadamanthys information stealer malware and falsely accuses victims of copyright infringement violations. The attackers use dedicated Gmail accounts to distribute emails impersonating legitimate organizations, primarily claiming copyright violations on Facebook accounts. The AI capabilities are used to create customized emails and multiple Gmail accounts per target.

The campaign is more sophisticated than previous ones and is purely financially motivated, according to Check Point Software researchers. The discovery of this campaign highlights the evolving sophistication of cyber threats and the increasing use of AI by cybercriminals to enhance their reach and operational scale. The researchers suggest that security leaders should prioritize automation and AI in their defense strategies to counteract these globally scaled, financially motivated phishing campaigns.

Key takeaways:

  • A new large-scale cyber attack campaign, dubbed CopyRh(ight)adamantys, is leveraging Gmail and AI to target both consumers and corporates with a financially-motivated payload.
  • The attack uses a newly discovered variant of the Rhadamanthys information stealer malware and a false premise of the victim being responsible for copyright infringement violations.
  • The cyber attackers are using dedicated Gmail accounts to distribute emails that impersonate legitimate organizations to claim copyright violations on social media accounts, primarily Facebook.
  • The discovery of the CopyRh(ight)adamantys cyber attack campaign highlights the evolving sophistication of cyber threats and the increasing use of AI and automation by cybercriminals to enhance their reach and operational scale.
View Full Article

Comments (0)

Be the first to comment!