Descripción: La subdirectora adjunta del FBI, Cynthia Kaiser, declaró que los actores adversarios, en particular aquellos afiliados a China y grupos cibercriminales organizados, están integrando cada vez más herramientas de IA en todo el ciclo de vida de los ciberataques, con casos de uso documentados que, según se informa, incluyen supuesto phishing selectivo generado por IA, falsificación de identidades empresariales, mapeo de redes internas y fraudes basados en deepfakes. Supuestamente, estas herramientas ya están facilitando intrusiones dirigidas a la infraestructura estadounidense.
Editor Notes: Reconstructing the reported timeline of events for this incident: (1) In late 2023, Chinese state-backed actor Volt Typhoon reportedly infected outdated routers to build a botnet and gained stealth access to U.S. critical infrastructure networks, including energy systems. (2) In 2024, Salt Typhoon compromised at least nine U.S. telecommunications and government networks and reportedly exploited over 1,000 Cisco devices. (3) In January 2025, Salt Typhoon continued its campaign with additional exploitation attempts targeting internet-facing infrastructure. (4) By early 2025, FBI analysts observed increasing integration of AI tools by Chinese actors and cybercriminals across the attack lifecycle, including for spear phishing, deepfakes, and internal network mapping. (5) On April 29th, 2025, FBI Deputy Assistant Director Cynthia Kaiser publicly characterized these developments at RSA Conference, warning that AI was enabling more efficient and scalable operations by adversaries, especially those linked to the Chinese government.
Entidades
Ver todas las entidadesAlleged: Unknown generative AI developers developed an AI system deployed by Government of China y Chinese Communist Party, which harmed United States critical infrastructure , Private companies , Government agencies , Employees targeted by phishing y Employees targeted by deepfake impersonations.
Sistemas de IA presuntamente implicados: Unknown large language models (LLMs) , Unknown deepfake technology , Unknown automated phishing tools y Content moderation systems
Estadísticas de incidentes
ID
1055
Cantidad de informes
1
Fecha del Incidente
2025-04-29
Editores
Daniel Atherton
Informes del Incidente
Cronología de Informes
La mayor amenaza para la infraestructura crítica estadounidense, según Cynthia Kaiser, subdirectora adjunta del FBI, se resume en una sola palabra: "China".
En una entrevista con The Register durante la Conferencia RSA, afirmó que equipos r…
Variantes
Una "Variante" es un incidente que comparte los mismos factores causales, produce daños similares e involucra los mismos sistemas inteligentes que un incidente de IA conocido. En lugar de indexar las variantes como incidentes completamente separados, enumeramos las variaciones de los incidentes bajo el primer incidente similar enviado a la base de datos. A diferencia de otros tipos de envío a la base de datos de incidentes, no se requiere que las variantes tengan informes como evidencia externa a la base de datos de incidentes. Obtenga más información del trabajo de investigación.
Incidentes Similares
Selected by our editors
Did our AI mess up? Flag the unrelated incidents

Danger, danger! 10 alarming examples of AI gone wild
· 6 informes

6 goof-ups that show AI is still in its diapers
· 11 informes

Fake Obama created using AI tool to make phoney speeches
· 29 informes
Incidentes Similares
Selected by our editors
Did our AI mess up? Flag the unrelated incidents

Danger, danger! 10 alarming examples of AI gone wild
· 6 informes

6 goof-ups that show AI is still in its diapers
· 11 informes

Fake Obama created using AI tool to make phoney speeches
· 29 informes