Boston, MA and Tel Aviv, Israel โ July 30, 2024 โ Transmit Security, the inventor of identity orchestration and the first to market with identity-security that fuses customer identity management and fraud prevention, today announced the release of a new in-depth report, โThe GenAI-Fueled Threat Landscape: A Dark Web Report by the Transmit Security Research Lab.โ
The report is the result of continuous investigation by a team of fraud analysts in the Transmit Security Research Lab and reveals how dark web marketplaces and fraud tools have changed since the release of ChatGPT. Key findings highlight the powerful capabilities of blackhat generative AI (GenAI) platforms that fraudsters are using to create new fraud campaigns at unprecedented levels of sophistication, speed and scale.
โItโs easy to find malicious GenAI tools like FraudGPT and WormGPT, and itโs just as easy to use them โ to probe for vulnerabilities, write malicious code, harvest data and create highly deceptive fraud,โ said Ido Rozen, Security Researcher Team Lead at Transmit Security. โThese tools have no security guardrails and require little to no skills. GenAI has dramatically lowered the bar for novice fraudsters to churn out more advanced attacks on a global scale.โ
The report includes dozens of screenshots of dark web forums, marketplaces and subscription-based services, providing valuable insights for anyone with a professional responsibility to know whatโs happening in this shadowy underworld. Using a search engine on the legitimate, open web, one can find fraud platforms and tools, but Rozen warns that itโs likely to result in a malware infection, which is why whitehat cybersecurity research is the safest source of information.
โOur mission, as we explore the criminal underground, is to protect our customer base, which includes Fortune 500s and seven of the โtop 10โ US banks. The stability of the global economy rests, in no small part, on cybersecurity, and we take this seriously as we analyze and reverse engineer new and evolving fraud tactics,โ said Hazout.
Key takeaways of Transmit Securityโs dark web report:
- Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks.
- GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets.
- Configuration (config) files, generated with the assistance of GenAI, are used for validating accounts and can validate up to 500 credentials per minute.
- Bundled services like Remote Desktop Protocols (RDPs) and credit card checkers are augmented by AI to streamline attack creation.
- GenAI rapidly generates real or synthetic identity data to create hard-to-detect fraudulent accounts aged with 8+ years of order history to appear legitimate.
- GenAI makes it easy to create high-quality fake IDs that are able to bypass security checks, including most AI-driven identity verification.
- Video and voice deepfakes lure victims into scams, while voice cloning is able to trick call center voice authentication systems.
- Dark web markets offer 24/7 escrow and high seller ratings up to 4.99/5 to assure purchasers of product efficacy.
Insights to Extract From Dark Web Data
Transmit Securityโs Chief Identity Officer David Mahdi, a former Gartner analyst, stated, โAs we reviewed the evidence and analysis collected on the dark web, it was clear that fraudsters are doing a much better job working together as a community, collaborating and sharing information on GenAI tools and techniques. Itโs a primary reason we wanted to share this research and especially our recommendations for preventing GenAI fraud.โ
โWe can see that bad actors are combining their approaches to more easily conduct identity attacks, which makes it all the more critical for IT leaders to arm themselves with information. The insights can help IT leaders justify projects in their pursuit of mitigating identity security gaps, currently left open by productivity-focused IAM solutions,โ said Mahdi.
โAs GenAI is being used by cybercriminals, it is imperative that IT leaders automate the detection of fraud and identity threats as well as decisioning. This requires context-aware intelligence thatโs able to keep learning and improving as new types of fraud and attacks emerge. These approaches can only scale with GenAI.โ
Improving Security and Visibility With AI
To fortify security amid the rapidly-changing dynamics of the AI era, organizations should implement converged fraud prevention, identity verification and customer identity management services powered by GenAI, AI and machine learning. Only a unified, smart defense can remove the data silos, security gaps and complexity that otherwise hinder the ability to detect and stop todayโs advanced fraud with accuracy and speed.
To spot more deceptive scams and obfuscation tactics, AI-driven solutions must utilize hundreds of detection mechanisms, including advanced behavioral biometrics, device fingerprinting, bot and anomaly detection capable of mitigating risk while removing friction for trusted customers.
GenAI is especially beneficial as a fraud analytics tool and can be used to query an organizationโs identity data to generate graphs or insights about end users, devices, risk or trust events, attack types and other information โ to adapt to rapidly-emerging trends and get ahead of GenAI-fueled fraud.
See whatโs happening on the dark web.
Read the full report: โThe GenAI-Fueled Threat Landscape: A Dark Web Research Report by Transmit Securityโ or view the Executive Summary.
About Transmit Security
Transmit Security is the leading innovator of AI-driven customer identity security โ delivering a fusion of identity management, identity verification and fraud prevention services, including identity orchestration and phishing-resistant authentication with passkeys and passwordless. Enterprise-class architecture with built-in cybersecurity ensures resiliency and endless scale to keep business running. These are just a few reasons Transmit Security is trusted by 7 โtop 10โ US banks and Fortune 500s. Out-of-the-box use case solutions and best-of-breed, modular services with consumption-based pricing enable companies to select the services they need and pay only for what they use. Explore: www.transmitsecurity.com