Sign up to save tools and stay up to date with the latest in AI
bg
bg
2

Disrupting malicious uses of AI by state-affiliated threat actors

Feb 14, 2024 - openai.com
OpenAI, in collaboration with Microsoft Threat Intelligence, has disrupted five state-affiliated malicious actors who attempted to misuse AI services for cyber activities. These actors, known as Charcoal Typhoon, Salmon Typhoon, Crimson Sandstorm, Emerald Sleet, and Forest Blizzard, were affiliated with China, Iran, North Korea, and Russia respectively. They used OpenAI services for tasks such as querying open-source information, translating, finding coding errors, and running basic coding tasks, with some creating content for phishing campaigns.

In response to these threats, OpenAI is adopting a multi-pronged approach to ensure AI safety. This includes monitoring and disrupting malicious state-affiliated actors, collaborating with industry partners to exchange information about detected misuse of AI, learning from real-world misuse to improve safety measures, and maintaining transparency about potential misuses of AI. Despite the actions of a few malicious actors, OpenAI emphasizes that the majority of users employ their systems to improve their daily lives, and the company is committed to strengthening defenses against misuse.

Key takeaways:

  • OpenAI, in partnership with Microsoft Threat Intelligence, has disrupted five state-affiliated actors that sought to use AI services for malicious cyber activities.
  • The actors, affiliated with China, Iran, North Korea, and Russia, used OpenAI services for various tasks such as querying open-source information, translating, finding coding errors, and running basic coding tasks.
  • OpenAI is taking a multi-pronged approach to combat malicious state-affiliate actors’ use of their platform, including monitoring and disrupting activities, collaborating with industry partners, iterating on safety mitigations, and maintaining public transparency.
  • Despite the actions taken, OpenAI acknowledges that they will not be able to stop every instance of misuse, but they are committed to continuous innovation, investigation, collaboration, and sharing to make it harder for malicious actors to remain undetected.
View Full Article

Comments (0)

Be the first to comment!