

Most security specialists agree that more and more cybercriminals use ML to generate sophisticated attacks, evade detection, and bypass classic defenses. Combat arms classic malware series#ĬAPTCHA is no longer complex enoughĬAPTCHA, for example, are quick challenges that invite users to solve elementary math operations (or copy/paste a series of random letters and numbers), which is supposed to be trivial for humans but extremely difficult for robots.

However, models are now remarkably efficient in solving such operations. Even if developers have been trying to make CAPTCHA ever more challenging to recognize and crack, it’s now a losing game for defenders, even for big platforms such as Amazon. ML automates brute force attacksĪnother black hat use of ML is for brute force attacks. Hackers can now generate accurate password lists automatically and even customize them according to a specific set of data (e.g., the targeted user’s info), significantly increasing the chances of success.ĭefenders can no longer fight attacks with classic defenses, and it’s especially true with phishing campaigns. Phishing attacks are a traditional but efficient way to compromise a network. For years, attackers have manually collected information about their target to send them scams (e.g., malicious links) by email or social media messages using techniques like spoofing and social engineering.
