Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

The Evolution Of Sextortion Attacks: How Generative AI Is Taking A Front Seat

Feb 20, 2024 - forbes.com
The article discusses the rise of sextortion cyberattacks, which have increased by 178% between H1 2022 and H1 2023, ranking third among all email threats. These attacks, which involve blackmailing individuals with sexually explicit content, have become more common with the rise of generative artificial intelligence (GenAI) and the shift to remote work during the pandemic. The attacks are typically targeted at teenagers who are threatened to release sensitive photos or videos or reveal their hidden sexuality unless they provide access to their home network or install malware.

The article also highlights the role of GenAI in these attacks, as it allows for the creation of unique images with little effort, making the generation of explicit content simpler. The author suggests that the best defense against these attacks is awareness and education, including training for CEOs and their families on how to detect and report such attacks. Other recommended defenses include using strong passwords, multifactor authentication, not clicking on suspicious email links or attachments, and implementing a strong security awareness training program.

Key takeaways:

  • Sextortion attacks, which involve blackmailing with sexually motivated content, have increased by 178% between H1 2022 and H1 2023, ranking third among all email threats.
  • These attacks have evolved and are now often the root cause of harm when investigating compromised environments, with initial compromises going undetected for months or even years.
  • The availability of generative artificial intelligence (GenAI) to the public has made these attacks more widespread and convincing, with the technology being used to create unique images for blackmail.
  • It's crucial for company executives to be aware of these threats and have a strong executive protection program in place, which includes awareness training, technical defenses, and clear processes for detection and remediation.
View Full Article

Comments (0)

Be the first to comment!