Jon Shih
In 2016, over 20 thousand cybersecurity experts gathered at Bally’s Las Vegas for DEF CON, the largest hacker convention in the world. Over the four-day event, participants attended demonstrations and talks about disabling electronic locks, remotely controlling airplanes and bypassing ATM security. That year, however, conference organizers wanted to try something new. Instead of humans hacking machines, they wanted machines to hack each other. This bold move opened up a new realm of possibilities, revealing potential levels of vulnerability and information system breaches not seen before.
Working together with the Defense Advanced Research Projects Agency (DARPA), DEF CON masterminded the first and only Cyber Grand Challenge that has taken place thus far. This one-of-a-kind hacking competition featured artificial intelligence (AI) systems competing against each other to hack other AI-protected computer programs autonomously. The contest was designed as a game, with the winning AI effectively identifying and exploiting weaknesses in its opponent while defending its own. The winners would walk away with a $2-million prize.
Fast forward seven years…
Artificial intelligence has increasingly become a double-edged sword in the realm of cybersecurity. While it bolsters defenses against cyber threats, it also enables hackers to weaponize technology for nefarious purposes. In recent years, cybercriminals have begun employing AI-enhanced malware to target vulnerable users and systems more effectively. This sophisticated approach has led to the emergence of smart botnets Swarmbots intelligence
In 2019, a case of deepfake technology exploitation
“The thing with AI hackers is that it’s not just that they’re faster or that there’s more of them. They’re a different animal.” — Bruce Schneier
Throughout history, hacking has been reserved for skilled humans, requiring expertise, time, creativity, and a bit of luck. However, the advent of AI-driven hacking has transformed the landscape. When left on its own, Artificial intelligence can surpass human limitations, operating around the clock and devising unconventional strategies that challenge our expectations.
The AI’s influence on hacking resonates across three dimensions:
Firstly, speed: Traditional human-driven hacking, which can take months or years to execute, may be condensed to mere days, hours, or even seconds when using AI. Imagine an AI system that analyzes and exploits social media platforms to influence public opinion and shape political outcomes. By analyzing massive amounts of user data, AIs could identify patterns and trends, then use this information to craft highly targeted and persuasive content. This content could range from fake news articles to emotionally charged social media posts, all designed to sway the opinions of specific groups or individuals.
The AI-driven hacker could also target key influencers and decision-makers, manipulating their social media feeds and online interactions to guide them toward certain decisions or actions. This could have far-reaching consequences, potentially altering the course of elections, public policy, and social norms.
Secondly, scale: As AI systems discover unique vulnerabilities, they will have the ability to leverage them on a magnitude that humans cannot fathom. For instance, the AI-driven hacking of healthcare systems may intensify inequalities in access to medical care. The adoption of AI by big pharma, private healthcare providers, and medical research may lead to increased access by cybercriminals to sensitive patient data and critical medical systems, potentially exacerbating healthcare disparities and putting vulnerable populations at greater risk. AI-driven hacking would then potentially widen the gap in healthcare accessibility, disproportionately affecting vulnerable populations. By exploiting vulnerabilities on a massive scale, these cyberattacks may further disadvantage those who already struggle to obtain adequate medical care.
Thirdly, scope: Societal systems addressing hacking were established in an era when human hackers operated at a human pace. Currently, there are no systems in place to handle the onslaught of potentially thousands of newly discovered vulnerabilities in critical infrastructure, such as power grids or transportation systems. Patching these systems at such a rapid pace would be an impossible challenge. The struggle to prevent human-driven hacking of sensitive data through traditional means pales in comparison to the potential consequences of AI-driven hacking. Therefore, finding ways to adapt and develop new strategies to tackle these AI-powered threats is vital.
The war between whitehat cybersecurity professionals and blackhat hackers is far from over; as AI continues to reshape the security landscape, the stakes will only grow higher. The question remains: will AI ultimately prove to be a force for good or a weapon of mass destruction?
The answer lies in the hands of those who wield its power. By embracing AI’s potential for good and using it responsibly, the cybersecurity community can turn the tide against blackhat hacking and secure a brighter future for the digital world. However, complacency and overreliance on AI may well lead to devastating consequences.
The future of cybersecurity hangs in the balance, and only time will reveal whether AI can truly turn the tables on blackhat hackers or if it will become a double-edged sword that cuts both ways.