概要: FBI副長官シンシア・カイザー氏は、特に中国や組織化されたサイバー犯罪グループと関係のある攻撃者が、サイバー攻撃のライフサイクル全体にわたってAIツールをますます活用していると述べた。報告されている使用事例には、AI生成を装ったスピアフィッシング、企業IDの偽造、内部ネットワークマッピング、ディープフェイクを利用した詐欺などが含まれている。これらのツールは、既に米国のインフラを標的とした侵入を支援しているとの指摘もある。
Editor Notes: Reconstructing the reported timeline of events for this incident: (1) In late 2023, Chinese state-backed actor Volt Typhoon reportedly infected outdated routers to build a botnet and gained stealth access to U.S. critical infrastructure networks, including energy systems. (2) In 2024, Salt Typhoon compromised at least nine U.S. telecommunications and government networks and reportedly exploited over 1,000 Cisco devices. (3) In January 2025, Salt Typhoon continued its campaign with additional exploitation attempts targeting internet-facing infrastructure. (4) By early 2025, FBI analysts observed increasing integration of AI tools by Chinese actors and cybercriminals across the attack lifecycle, including for spear phishing, deepfakes, and internal network mapping. (5) On April 29th, 2025, FBI Deputy Assistant Director Cynthia Kaiser publicly characterized these developments at RSA Conference, warning that AI was enabling more efficient and scalable operations by adversaries, especially those linked to the Chinese government.
Alleged: Unknown generative AI developers developed an AI system deployed by Government of China と Chinese Communist Party, which harmed United States critical infrastructure , Private companies , Government agencies , Employees targeted by phishing と Employees targeted by deepfake impersonations.
インシデントのステータス
インシデントID
1055
レポート数
1
インシデント発生日