Monday, December 16, 2024
HomeArtificial IntelligenceChinese Hackers Using AI Tools To Influence Upcoming Elections

Chinese Hackers Using AI Tools To Influence Upcoming Elections

Published on

SIEM as a Service

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in election campaigns.

Large language models (LLMs) can also enable them to produce realistic but misleading content at scale, thereby exacerbating division and fake news on social media.

Recently, cybersecurity analysts at Microsoft discovered that Chinese hackers are actively exploiting AI tools to influence the upcoming elections.

- Advertisement - SIEM as a Service

State-sponsored actors leverage evolving tactics to advance geopolitical agendas. Beijing employs fake social media accounts and AI-generated content to sow discord and influence U.S. elections.

AI Tools To Influence Elections

Besides this, North Korea has increased the pace of cryptocurrency theft and supply chain attacks with AI to fund military expansion.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The most recent Microsoft East Asia threat report highlights these facts as further evidence that nation-state threats are ever-evolving.

The coordinated Chinese campaign on social media to influence the U.S. elections is going, with fake accounts pretending to be voters and making louder content about climate change, immigration, and race via original as well as recycled posts.

Chinese sockpuppets solicit opinions on political topics (Source – Microsoft)

In recent times, “polling” has been employed to establish voter opinion on controversial matters that could allow for customization of information operations during peak seasons associated with the presidential election cycle. 

China’s IO in the US exploited events to serve strategic interests by casting a bad light on America.

They alleged that the U.S. intentionally started Maui wildfires, insinuated that the U.S. may have caused a Kentucky train derailment, and accused the U.S. of water poisoning for power sustenance. 

Such methods also included calling into question Japan’s wastewater disposal system as part of efforts to undermine IAEA findings.

AI-Generated Memes (Source – Microsoft)

The 2024 Taiwanese presidential election marked the first known instance of AI-generated content being used in foreign influence operations by China-affiliated Storm-1376. 

Videos published by Storm-1376 used AI-generated voice recordings of Terry Gou (Source – Microsoft)

They uploaded what appeared to be computer-generated audio of former candidate Terry Gou supporting someone else, which was quickly removed from YouTube.

The first-ever country that has employed AI in interfering with elections seems to be China.

Storm-1376 increased AI-generated memes mocking Taiwanese officials and dissidents, including AI news anchors, since early 2023.

North Korea prioritized crypto theft and supply chain attacks against adversaries to fund weapons, stealing over $3 billion since 2017, $600 million-$1 billion in 2023 alone.

Timeline of AI influence in Taiwan election (Source – Microsoft)

Used AI tools by Emerald Sleet group to enhance operations against the U.S.-Japan-South Korea alliance before Microsoft and OpenAI disrupted their activities.

Major elections in 2024 risk China amplifying AI-generated content to serve its interests, though the impact remains limited for now. 

However, China’s AI meme/video/audio augmentation experiments persist.

Expect North Korea’s crypto heists and supply chain attacks on the defense sector to fund weapons programs.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code

Cybercriminals exploited typosquatting to deploy a malicious npm package, `@typescript_eslinter/eslint`, targeting developers seeking the...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

Microsoft Patch Tuesday December 2024, 71 Vulnerabilities Fixed Including 1 Zero-day

In its final Patch Tuesday of 2024, Microsoft has released a significant security update...