Friday, February 21, 2025
HomeArtificial IntelligenceChinese Hackers Using AI Tools To Influence Upcoming Elections

Chinese Hackers Using AI Tools To Influence Upcoming Elections

Published on

SIEM as a Service

Follow Us on Google News

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in election campaigns.

Large language models (LLMs) can also enable them to produce realistic but misleading content at scale, thereby exacerbating division and fake news on social media.

Recently, cybersecurity analysts at Microsoft discovered that Chinese hackers are actively exploiting AI tools to influence the upcoming elections.

State-sponsored actors leverage evolving tactics to advance geopolitical agendas. Beijing employs fake social media accounts and AI-generated content to sow discord and influence U.S. elections.

AI Tools To Influence Elections

Besides this, North Korea has increased the pace of cryptocurrency theft and supply chain attacks with AI to fund military expansion.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The most recent Microsoft East Asia threat report highlights these facts as further evidence that nation-state threats are ever-evolving.

The coordinated Chinese campaign on social media to influence the U.S. elections is going, with fake accounts pretending to be voters and making louder content about climate change, immigration, and race via original as well as recycled posts.

Chinese sockpuppets solicit opinions on political topics (Source – Microsoft)

In recent times, “polling” has been employed to establish voter opinion on controversial matters that could allow for customization of information operations during peak seasons associated with the presidential election cycle. 

China’s IO in the US exploited events to serve strategic interests by casting a bad light on America.

They alleged that the U.S. intentionally started Maui wildfires, insinuated that the U.S. may have caused a Kentucky train derailment, and accused the U.S. of water poisoning for power sustenance. 

Such methods also included calling into question Japan’s wastewater disposal system as part of efforts to undermine IAEA findings.

AI-Generated Memes (Source – Microsoft)

The 2024 Taiwanese presidential election marked the first known instance of AI-generated content being used in foreign influence operations by China-affiliated Storm-1376. 

Videos published by Storm-1376 used AI-generated voice recordings of Terry Gou (Source – Microsoft)

They uploaded what appeared to be computer-generated audio of former candidate Terry Gou supporting someone else, which was quickly removed from YouTube.

The first-ever country that has employed AI in interfering with elections seems to be China.

Storm-1376 increased AI-generated memes mocking Taiwanese officials and dissidents, including AI news anchors, since early 2023.

North Korea prioritized crypto theft and supply chain attacks against adversaries to fund weapons, stealing over $3 billion since 2017, $600 million-$1 billion in 2023 alone.

Timeline of AI influence in Taiwan election (Source – Microsoft)

Used AI tools by Emerald Sleet group to enhance operations against the U.S.-Japan-South Korea alliance before Microsoft and OpenAI disrupted their activities.

Major elections in 2024 risk China amplifying AI-generated content to serve its interests, though the impact remains limited for now. 

However, China’s AI meme/video/audio augmentation experiments persist.

Expect North Korea’s crypto heists and supply chain attacks on the defense sector to fund weapons programs.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...