Agents are the great promise of AI. They also aim to become the new favorite weapon of cybercounts

The AI ​​agents are not the future: they are here. While chatbots like Chatgpt either Gemini They continue to gain ground in tasks that range from solving daily doubts to help you in programming tasks, large technological ones have begun to take determined steps towards a new generation of much more promising systems. They are able to execute tasks, make decisions and adapt to the environment. They not only respond: they act. And that change is presented as a very powerful advance. OpenAi is developing Operatoran assistant who can navigate pages, book trips or manage files. Anthropic proves your own agent with similar functions in controlled environments. Google works in Jarvis, his future digital butler. The idea is clear: delegate real tasks in artificial intelligences. But that same autonomy that makes them useful allies also makes them a potential risk for cybersecurity. Dangerous autonomy. Unlike traditional bots, AI agents are not limited to predefined instructions. They can control an operating system or make decisions depending on the context. In wrong hands, this autonomy could facilitate complex attacks without the need for human experts. Some laboratory tests already show how these models can replicate operations that previously required advanced technical knowledgesuch as automating spying tasks or manipulating system configurations. The threat begins to appear. Although there is no evidence that they are involved in large -scale cyber attacks, signs have begun to appear. Platforms like LLM Agent Honeypot, designed to detect suspicious accesses, have registered interactions with possible AI agents. In two confirmed cases, the agents responded to instructions embedded with a typical speed of language models, which points to their growing sophistication. We do not talk about organized offensives yet, but of an increasingly real phase. Cheaper, faster, more scalable. As Mit Technology Review points outone of the biggest risks is the potential for climbing. An agent can execute automated actions hundreds of times by a fraction of the cost of a human team. For criminals, that means expanding operations with unprecedented efficiency. If today the mass attacks require investment and specialized personnel, tomorrow they could be launched automatically, selecting objectives and exploring vulnerabilities without constant supervision. LLM Agent Honeypot operation operation scheme Detecting them is not so easy. Although current cybersecurity tools are effective against sophisticated threats, agents introduce a new type of challenge. Unlike classic malware, these systems can reason, adapt to the environment and modify their real -time behavior. This ability to mimic with legitimate traffic forces to rethink detection methods and to develop specific techniques to identify patterns of artificial intelligence. The industry is still exploring how far these systems can go. Some investigations show that, given ambiguous instructions, certain agents can execute unexpected actions. Although they still need human support to complete complex attacks, their evolution is rapid. And the most disturbing is not what they can do today, but what they could do tomorrow. And they will do it in an increasingly adverse scenario. According to checkpoint datain the third quarter of 2024, cyber attacks increased 75% compared to the same period of the previous year. Each organization suffered on average 1,876 weekly attacks. Sectors such as education, government or health are among the most beaten, and regions such as Africa, Europe and Latin America registered alarming growth. The hardware industry, for example, saw the attacks grow by 191% in just one year. More than 1,200 ransomware incidents were reported only in that quarter, mainly affecting manufacturers, hospitals and public administrations. If these types of attacks are delegated to AI agents capable of selecting objectives and launching chain offensives, the impact could be shot. The global panorama is tense, and the agents could be the multiplier that the attackers were waiting. Images | Xataka with chatgpt | Palisade Research In Xataka | There is a person who knows more than anyone in the world about password robberies. And they just steal his

They actually signed North Korean cybercounts

Finding technological talent has become a career with more expected obstacles. For many companies, expanding their teams is no longer just a matter of publishing an offer: it is to deal with processes that often lengthen and with the possibility of not having chosen the right person. And when, finally, an incorporation closes, The high rotation of the sector threatens to return everything to the starting point. But what many companies probably do not imagine is that, without knowing, they could be hiring North Korean cybercounts. This threat, that began to gain strength in the United Stateshas begun to spread. According to Google Threat Intelligence Group (GTIG)the environment has become more hostile for these actors in US territory, and are now displacing their attention to Europe. A threat in Europe. GTIG details the case of one of the workers linked to North Korea, whose modus operandi reflects the usual pattern of this type of operations. This individual used at least 12 different identities to run for jobs in Europe and the United States. In addition, it resorted to other identities controlled by himself to provide false references and gain credibility to recruiters. List of countries affected by North Korea’s workers Objective companies. Although the range of companies that hire IT profiles is broad, North Korean actors have focused their efforts on very specific sectors: above all, companies linked to the industrial defense base and government agencies. To achieve this, they took advantage of the rise of remote work and infiltrated false identities carefully prepared to overcome security filters. Income for North Korea. Every time the North Korean regime exhibits a new military advance, the same question returns: Where do you really finance it? Although the data on their economy are scarce and deeply opaque, it is clear that the international sanctions have been trying to stop the war machinery of one of the most isolated and hermetic countries on the planet. There are several investigations that point to at least two revenues for the country led by Kim Jong-un. One of them is the theft of cryptocurrencies: North Korean attackers have perfected their techniques and now hit high -value international objectives. The other is the deployment of false workers, such as the one we are seeing at this time, to carry out data theft and extortion practices. Not only attempts. Real cases. Although there is no exact figure of false workers hired by European companies, the GTIG notes that it has detected a diverse portfolio of projects in the United Kingdom executed by employees linked to North Korea. Among them include web developments, bots, content management systems (CMS), advanced artificial intelligence and applied blockchain technology. Images | Tai Bui | Xataka with chatgpt In Xataka | North Korea’s military tactics that prevents defections. Pyongyang’s “trick” to maintain the loyalty of his army

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.