Power-backed hackers from Russia, China and Iran are violating OpenAI tools to Sharpen your skills and fool your targets.
Microsoft announced this, RBC-Ukraine reported to Reuters.
The report contains information about the fact that the company supported hacker groups associated with the Russian military intelligence, the War Corps of the Islamic Revolution, as well as the orders of China and Southern Korea, if they tried to thoroughly refine their hacker campaigns, vikoryst and great modern models.
These computer programs, often called piece intelligence, contribute heavily to text to generate human-like responses.
The company announced this when it introduced a new barrier to government-backed hacker groups on the Internet the origin of products of piece intelligence.
“Regardless of the fact that there may be a violation of the law or any minds being served, we simply do not want those subjects, which we have identified, which we know, to know that the stench is with the subjects of threats of various kinds “We don’t want them to deny access to this technology,” said Microsoft Vice President of Customer Security Tom Burt.
The development of artificial intelligence
Statements about those that government-backed hackers were caught on the Internet artificial intelligence tools for Expanding one's spy capabilities likely reinforces concerns about the rapid expansion of technology and the potential for exploitation.
High-ranking representatives of cybersecurity at Sunset have long anticipated that criminals exploit such tools, although the specifics have not yet been understood.
“This is one of the first, as well as not the first, attacks, if the company that borrows be a piece of intelligence, publicly “I’m talking about how cybersecurity threat actors are violating computer intelligence technologies,” Bob Rothsted, a researcher who analyzed cybersecurity threats at OpenAI, said.
OpenAI and Microsoft described hackers’ abuse of their tools. scientific intelligence as the “early stage”.< /p> How hackers work themselves
These hacker groups have different vikoryst models.
Hackers, who apparently operate on behalf of the Russian military espionage agency, widely known as the GRU, have been vikoristing the and models for tracking various satellite and radar technologies, such as may be related to the latest military operations in Ukraine.
Korean hackers have been exploiting these models to create content that will likely be used in targeted phishing campaigns against regional experts.
According to Microsoft, Iranian hackers were also vikorizing these models to write more overflowing electronic sheets, and at some point they were vikoristing them for a comprehensive message that could lure “famous feminists” into replacing the Internet -site.
And Chinese hackers, supported by the state, also experimented with great modern models, for example, to raise questions about rival intelligence agencies, cybersecurity problems and household people.
Attacks of Russian hackers
Previously, we were informed that what are the Russians hackers hijacked the mobile operator “Kyivstar” to disseminate lists with viruses.
We also wrote that hackers from Russia attacked Ukraine and Poland for the help of electronic sheets.
Russian hackers from the group Midnight Blizzard (also known as Nobelium) has denied access to Microsoft cloud storage records.
Read terms and important information about the war between Russia and Ukraine on the RBC-Ukraine channel on Telegram.