AI and ransomware: cutting through the hype

Securex 2024 AI & Data Analytics, Information Security


Rick Vanover

It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it. AI is disrupting most digital industries, and cybercrime is no exception.

However, cutting through the hype and getting to the facts is worth it. Much has been made of AI's potential impact on the global ransomware threat, but how much does it really change the picture?

While the future potential of AI, on cybercrime and society in general, is immense (and a little scary), it is more helpful to focus on the here and now. Currently, AI is just another tool at threat actors’ disposal, but it is quite a significant one because it lowers the barrier to entry for criminals. The UK’s National Cyber Security Centre recently warned how AI will increase the ransomware threat through supporting “reconnaissance, phishing and coding”.

Using AI to assist with coding is already common among legitimate programmers. Even if it is just reviewing broken code or answering specific questions faster than Google, AI will support people hacking systems just as much as those developing them. While this might make ransomware gangs’ lives easier, it will not make things any worse for security teams. The result has not changed; depending on who you ask, the end product might even be worse.

However, the other current use cases are more consequential. AI algorithms can scan networks or environments to map architecture and endpoints and, crucially, spot vulnerabilities. Threat actors will already do this manually, but AI will make it much easier and more effective. AI can also be used to automate information gathering for more targeted attacks. These tools can scrape the internet (particularly social media) to collect as much information on a target as possible for phishing and social engineering.

This brings us to the last typical use of AI by cybercriminals. In a conversation where the hype is aplenty, describing AI as ‘supporting phishing’ is probably underselling it. At its most basic, even the most readily available AI tools can be used to craft better phishing emails – bridging the language barrier that often makes such scams spottable. That is another example of AI improving malicious activity that already exists, but the voice cloning (deepfakes) of specific people is another entirely different thing. When combined with automated information gathering on a target, we are looking at the next generation of social engineering.

What it means for security

While cybercriminals having more tools at their disposal is never going to feel great, there are two things to bear in mind: one, security teams have access to these tools as well, and two, AI is going to make attacks more sophisticated and effective. For now, it is not introducing any brand-new or entirely novel threats, so there is no need to tear up the playbook.

AI is already used on both sides of the battle line. It is probably fair to say that while ransomware gangs have access to their dark marketplaces of solutions and services, we ‘normies’ have access to far more. The ransomware industry was valued at $14 billion as of 2022, but the global security industry makes this look tiny when comparing it to its $222 billion.

On the security side, AI can be used for behavioural analytics, threat detection and vulnerability scanning to detect malicious activities and risks. AI can be employed to monitor both the system itself (scanning for vulnerabilities and entry points) and activity on the system (behavioural analytics, data analysis, etc.). AI-enabled security aims to predict and catch threats before they turn into breaches. More advanced tools will automatically respond to these threats, alerting security teams or restricting access. Much like on the criminal side, most of these concepts exist now (such as firewalls and malware detectors), but AI is making them more efficient and effective.

You cannot beat basic principles

So, even though AI will be used on both sides, it is not a case of getting AIs to battle each other in the cyber-realm (although that does sound cool.) Ransomware is not changing (for now, at least), and attackers' tactics are not transforming. Digital hygiene and zero trust all still work. Security will need to keep up, sure. After all, social engineering only needs to work once, but ransomware prevention and resilience need to work every time.

Ultimately, the best practice remains the best practice. As AI-enabled ransomware becomes more common, having copies of your data becomes more critical than ever. When all else fails – you need backup and recovery. All of these scary scenarios, even the most advanced phishing attack known to man (or machine), could all end up with – ‘thank God I had trusted backup and recovery’.

Backup is your last line of defence, so you must know you can rely on it. Again, the best practice has not changed here. You need multiple copies of your data, one offline and one off-site. You also need a well-rehearsed recovery strategy, including scanning backups for infection and setting up a recovery environment that is ready to rock.

It is less daunting than it seems. AI is not changing the game – it is just a natural progression. Progression is the game's name in cybersecurity – you cannot do everything, but you should do something. The basic principles still get you pretty far, so keep following those, keep up to date on best practices, and make sure you can trust your backup when all else fails.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Understanding the promise and perils of AI
AI & Data Analytics
Samuel Turcotte believes AI may kill us all. In this article, a condensed version of a white paper, he discusses AI's development and associated risks, all the while still hoping for a bright future.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.