Skip to content

ChatGPT 會開始編寫殺手級的惡意程式嗎?

 

 

 

 

 


ChatGPT 的表現令人驚嘆,現在我們可以利用人工智能做更多的事,例如功課答案、研究論文、法律諮詢、醫學診斷等⋯⋯它在不斷的觀察人類世界,我們也是時間從另一角度思考,它會否開始編寫殺手級的惡意程式?

ESET 網絡安全專家認為,ChatGPT 令人印象深刻,儘管它非常擅長生成並改善代碼,但我們距離「完全由 AI 生成的惡意軟件」還相差很遠。目前,最有可能被使用的三個領域包括:

1)網絡釣魚
分析更多的數據並製作出特製電子郵件,有望提高點擊率。

2)贖金談判自動化
在通信中添加 ChatGPT 功能,降低攻擊者在談判期間的工作量。

3)電話詐騙案
隨著自然語言生成越來越多,電話詐騙的情況相信會越來越多。

這一切聽起來像是未來的事情,不會一下子全部發生,但犯罪分子一定會變得越來越好,我們將要看看如何應對挑戰。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

ChatGPT 會開始編寫殺手級的惡意程式嗎?

 

 

 

 

 


ChatGPT 的表現令人驚嘆,現在我們可以利用人工智能做更多的事,例如功課答案、研究論文、法律諮詢、醫學診斷等⋯⋯它在不斷的觀察人類世界,我們也是時間從另一角度思考,它會否開始編寫殺手級的惡意程式?

ESET 網絡安全專家認為,ChatGPT 令人印象深刻,儘管它非常擅長生成並改善代碼,但我們距離「完全由 AI 生成的惡意軟件」還相差很遠。目前,最有可能被使用的三個領域包括:

1)網絡釣魚
分析更多的數據並製作出特製電子郵件,有望提高點擊率。

2)贖金談判自動化
在通信中添加 ChatGPT 功能,降低攻擊者在談判期間的工作量。

3)電話詐騙案
隨著自然語言生成越來越多,電話詐騙的情況相信會越來越多。

這一切聽起來像是未來的事情,不會一下子全部發生,但犯罪分子一定會變得越來越好,我們將要看看如何應對挑戰。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

How to Secure Building Management Systems

As infrastructure modernizes, building management systems (BMS) are becoming increasingly sophisticated. They provide automation, control and management of the physical environment of buildings, and to operate reliably, you need to ensure their security. This can be crucial in some buildings, such as hospitals. What can you do to make buildings safer?

An Introduction to BMS

BMS stands for Building Management System. It is a computer-based system that controls and monitors a building’s mechanical and electrical equipment, such as heating, ventilation, and air conditioning (HVAC), lighting, and other building systems. There are several common BMSs used in buildings today, each with their own specific features and capabilities, these include:
  • Siemens Desigo
  • Johnson Controls Metasys
  • Honeywell WEBs
  • Schneider Electric Andover Continuum
  • Trane Tracer
  • Delta Controls
There are many more systems and the choice of BMS depends on the specific requirements of the building and the needs of the building owner or operator. However, they have one thing in common – the BACnet protocol is frequently used between these systems and HVAC-endpoints.

BACnet Protocol: Essential for Building Management Systems Security

The Building Automation and Control Network (BACnet) protocol is a communication protocol that is widely used in building automation and control systems for HVAC, lighting, and other building systems. BACnet was designed to provide a standard way for different building systems to communicate and share data, and is now used in thousands of buildings worldwide. One of the key features of BACnet is its support for security. BACnet includes several security features to protect against unauthorized access, tampering, and other types of attacks. These features include:
  • Authentication: BACnet supports the use of passwords and other forms of authentication to ensure that only authorized users can access the building automation and control systems.
  • Encryption: BACnet supports the use of encryption to protect the confidentiality and integrity of data as it is transmitted between different devices and systems.
  • Access control: BACnet includes features to restrict access to specific objects and properties within the building automation and control systems. This allows building operators to control who can access and control different systems within the building.
  • Auditing: BACnet includes the capability to record and log all access to the building automation and control systems. This allows building operators to detect and investigate any unauthorized access or tampering.
Despite these security features, the BACnet protocol has some security weaknesses. For example, some security experts have raised concerns about the use of static passwords for authentication, which can be easily guessed or cracked by attackers. Additionally, BACnet does not include support for security certificates or other forms of digital authentication, which can make it more difficult to ensure that devices are communicating with the correct systems. Another concern with BACnet security is that its security feature is not widely implemented. Many building automation and control systems using BACnet do not have security features enabled or are configured in an insecure way. This leaves them vulnerable to attacks and can make it easy for unauthorized users to gain access to sensitive systems and data.
BACnet is a communication protocol that is widely used in building automation and control systems, and provides several security features to protect against unauthorized access and tampering. However, there are some concerns about the security of the protocol, particularly regarding the use of static passwords and the lack of wide implementation of security features. It is important for building operators to be aware of these security risks and to take steps to secure their building automation and control systems, such as regularly changing passwords, enabling encryption, and monitoring for suspicious activities.

Risk Mitigation in BMS Security

One of the most important aspects of risk mitigation is the visualization of the flows from and to a BMS, whether it is executed via BACnet or a different OT-protocol. This allows a user to optimize their network configuration, mitigating the risks of:
  • Static passwords
  • Lack of certificates
  • Disabled security features on various BACnet-enabled assets
One tool you can use for the flow visualization is GREYCORTEX Mendel, which has protocol parsers and BMS-asset identification built into its core.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

Fake installers for popular apps targeting Southeast and East Asia with dangerous Trojan, ESET Research discovers

  • ESET researchers discovered a malware campaign that targets Chinese-speaking people in Southeast and East Asia.
  • The attackers purchased advertisements to position their malicious websites in the “sponsored” section of Google search results. ESET reported these ads to Google and they were promptly removed.
  • The websites and installers downloaded from them are mostly in Chinese and, in some cases, falsely offer Chinese-language versions of software that is not available in China.
  • We observed victims mostly in Southeast and East Asia, suggesting that the advertisements were targeting that region.
  • The malware delivered by this campaign is FatalRAT, a remote access Trojan that provides a set of functionalities to perform various malicious activities on a victim’s computer.

BRATISLAVA, MONTREAL — February 16, 2023 — ESET researchers discovered a malware campaign that targets Chinese-speaking people in Southeast and East Asia by buying misleading advertisements to appear in Google search results that lead to downloading Trojanized installers. The unknown attackers created fake websites that look identical to those of popular applications such as Firefox, WhatsApp, Signal, Skype, and Telegram, but in addition to providing the legitimate software, also deliver FatalRAT, a remote access Trojan that grants the attacker control of the victimized computer. The attacks affected users mostly in mainland China, Hong Kong, and Taiwan, but also in Southeast Asia and Japan.

FatalRAT provides a set of functionalities to perform various malicious activities on a victim’s computer. Among other capabilities, the malware can capture keystrokes, steal or delete data stored by some browsers, and download and execute files. ESET Research observed these attacks between August 2022 and January 2023, but according to our telemetry, previous versions of the installers have been used since at least May 2022.

The attackers registered various domain names that all pointed to the same IP address: a server hosting multiple websites that download Trojanized software. Most of these websites look identical to their legitimate counterparts but deliver malicious installers instead. The other websites, possibly translated by the attackers, offer Chinese-language versions of software that is not available in China, such as Telegram. While, in theory, there are many possible ways that potential victims can be directed to these fake websites, a Chinese-language news site reported that they were being shown an advertisement that led to one of these malicious websites when searching for the Firefox browser in Google. The attackers purchased advertisements to position their malicious websites in the “sponsored” section of Google search results; we reported these ads to Google and they were promptly removed.

“Although we couldn’t reproduce such search results, we believe that the ads were only served to users in the targeted region,” explains Matías Porolli, the ESET researcher who discovered the campaign. “Since many of the domain names that the attackers registered for their websites are very similar to the legitimate domains, it is also possible that the attackers rely on URL hijacking to attract potential victims to their websites,” he adds.

“It is possible that the attackers are solely interested in the theft of information like web credentials to sell them on underground forums, or to use them for another type of crimeware campaign, but for now, specific attribution of this campaign to a known or new threat actor is not possible,” elaborates Porolli. “Finally, it is important to check the URL that we are visiting before we download software. Even better, type it into your browser’s address bar after checking that it is the actual vendor site,” advises Porolli.

For more technical information about this malware campaign, check out the blogpost “These aren’t the apps you’re looking for: Fake installers targeting Southeast and East Asia” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

Countries where ESET detected the attacks between August 2022 and January 2023

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET launches ESET Cyber Security for macOS v7.3 with native ARM support

BRATISLAVA, February 14, 2023 ESET, a global leader in cybersecurity, today announces several enhancements to its popular ESET Cyber Security for macOS product line, designed to provide essential protection for Apple users from a variety of modern-day cyber threats. ESET Cyber Security for macOS v7.3 now features native support for ARM and automatic updates to ensure optimal protection at all times.

ARM has become increasingly popular as a chipset in recent years due to its ability to boost performance whilst keeping energy waste to a minimum, so much so that the ARM-based mobile computing market now outperforms the legacy x86-based mobile computing market in both revenue and units1.

“We’ve been working on native support for ARM for some time, to enhance the protection we can provide customers that rely upon Apple devices,” comments Mária Trnková, vice president of ESET’s Consumer and IoT segment. “The changes we have made to the underlying architecture of ESET Cyber Security for macOS bring greater stability and higher performance, making scanning quicker and more efficient than ever before.”

The new underlying ESET Cyber Security for macOS architecture is based on micro-services, meaning components run in a more secure and performance-optimal manner. This provides higher stability and resiliency, and the solution is also more lightweight than ever before. Micro-services are lighter on resources, helping to save battery life. In other words, each component of ESET Cyber Security for macOS starts only when needed and runs for its allotted time, after which it is automatically deactivated, helping to save on device resources.

The new automatic updates component of ESET Cyber Security for macOS ensures that users are provided with optimal protection, allowing the solution to find and download updates as soon as they are released.

The latest version of ESET Cyber Security for macOS also boasts an improved multilanguage installer that contains 24 different support languages. Language is set according to the system language upon installation, and the user can subsequently change it by using the macOS language and region settings. This streamlines installation and provides peace of mind for the user.

There is also a redesigned graphical user interface (GUI) for ESET Cyber Security for macOS v7.3 that fully supports dark mode in HiDPI, thus saving on device resources. Further advanced configuration will become available later in 2023.

ESET Cyber Security for macOS v7.3 includes several other components of ESET’s award-winning functionality that users have come to expect, including:

  • Anti-Phishing – protecting users against malicious HTTP websites attempting to acquire their sensitive information, whether that be usernames, passwords, banking information or credit card details
  • Antivirus and Antispyware – eliminating all types of modern-day threats, including viruses, worms and spyware
  • Cross-platform Protection – stopping malware from spreading from macOS to Windows endpoints and vice versa. This prevents a user‘s macOS from being turned into an attack platform for Windows-targeted threats
  • ESET LiveGrid® technology – whitelisting safe files based on a file reputation database in the cloud
  • Web and Email Scanning – scanning websites during browsing and checking all incoming emails for viruses and other threats

“ESET Cyber Security for macOS v7.3 includes multiple layers of real-time protection, anti-phishing and web and email protection that ensure peace of mind for Apple users when browsing online,” comments Mária Trnková. “Powered by the advanced ESET LiveGrid® technology, the solution combines speed, accuracy and minimal system impact, leaving more system resources for consumer needs.”

Further information can be found here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×