{"id":126240,"date":"2025-10-16T17:10:12","date_gmt":"2025-10-16T17:10:12","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/126240\/"},"modified":"2025-10-16T17:10:12","modified_gmt":"2025-10-16T17:10:12","slug":"russia-china-increasingly-using-ai-to-escalate-cyberattacks-on-us-microsoft-finds","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/126240\/","title":{"rendered":"Russia, China increasingly using AI to escalate cyberattacks on US, Microsoft finds"},"content":{"rendered":"<p class=\"EkqkG IGXmU nlgHS yuUao MvWXB TjIXL aGjvy ebVHC \">WASHINGTON &#8212; WASHINGTON (AP) \u2014 Russia, China, Iran and North Korea have sharply increased their use of artificial intelligence to deceive people online and mount cyberattacks against the United States, according to new research from Microsoft.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">This July, the company identified more than 200 instances of foreign adversaries using AI to create fake content online, more than double the number from July 2024 and more than ten times the number seen in 2023.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">The findings, published Thursday in Microsoft&#8217;s annual digital threats report, show how <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/election-interference-facebook-tiktok-russia-putin-china-1b5e5ce56d64dc356c2ad332068e2f8c\" rel=\"nofollow noopener\" target=\"_blank\">foreign adversaries are adopting new and innovative tactics<\/a> in their efforts to weaponize the internet as a <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/china-fbi-hacking-flax-typhoon-trump-ed1c4c2cf6fc3b07834c799add215f44\" rel=\"nofollow noopener\" target=\"_blank\">tool for espionage<\/a> and <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/russia-hurricane-disinformation-fema-9e37c73ab8ffa2a2d338797a1a827e57\" rel=\"nofollow noopener\" target=\"_blank\">deception<\/a>.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">America&#8217;s adversaries, as well as criminal gangs and <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/chinese-hacking-leak-documents-surveillance-spying-6276e8662ddf6f2c1afbae994d8b3aa2\" rel=\"nofollow noopener\" target=\"_blank\">hacking companies<\/a>, have exploited AI&#8217;s potential, using it to automate and improve cyberattacks, to spread <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/ai-misinformation-trump-putin-new-york-42ac9c41c5504d05412b492e48bcaded\" rel=\"nofollow noopener\" target=\"_blank\">inflammatory disinformation<\/a> and to penetrate sensitive systems. AI can translate poorly worded phishing emails into fluent English, for example, as well as <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/rubio-artificial-intelligence-impersonation-1b3cc78464404b54e63f4eba9dd4f5a9\" rel=\"nofollow noopener\" target=\"_blank\">generate digital clones of senior government officials<\/a>.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">Government cyber operations often aim to obtain classified information, undermine supply chains, <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/cybersecurity-trump-china-russia-iran-north-korea-9eceaf30ddc984ed482f067db5dee405\" rel=\"nofollow noopener\" target=\"_blank\">disrupt critical public services<\/a> or spread disinformation. Cyber criminals on the other hand work for profit by stealing corporate secrets or using ransomware to extort payments from their victims. These gangs are responsible for the wide majority of cyberattacks in the world and in some cases have <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/microsoft-russia-china-iran-israel-cyberespionage-cyber-d3a22dd2dcea32615ac15ed4fb951541\" rel=\"nofollow noopener\" target=\"_blank\">built partnerships<\/a> with countries like Russia. <\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">Increasingly, these attackers are using AI to target governments, businesses and critical systems like hospitals and transportation networks, according to Amy Hogan-Burney, Microsoft&#8217;s vice president for customer security and trust, who oversaw the report. Many U.S. companies and organizations, meanwhile, are getting by with outdated cyber defenses, even as Americans expand their networks with new digital connections. <\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">Companies, governments, organizations and individuals must take the threat seriously if they are to protect themselves amid escalating digital threats, she said.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">\u201cWe see this as a pivotal moment where innovation is going so fast,&#8221; Hogan-Burney said. &#8220;This is the year when you absolutely must invest in your cybersecurity basics,\u201d <\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">The U.S. is the top target for cyberattacks, with criminals and foreign adversaries targeting companies, governments and organizations in the U.S. more than any other country. Israel and <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/russia-ukraine-technology-europe-media-social-media-123c7975a879b89b85c06877f1f12908\" rel=\"nofollow noopener\" target=\"_blank\">Ukraine<\/a> were the second and third most popular targets, showing how military conflicts involving those two nations have spilled over into the digital realm.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">Russia, <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/china-disinformation-fake-news-russia-3085f10d6edca36f6415d6410e5ef874\" rel=\"nofollow noopener\" target=\"_blank\">China<\/a> and Iran have denied that they use cyber operations for espionage, disruption and <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/dangers-of-digital-conspiracy-theories-ec21024be1ed377a35fb235d9fa2af36\" rel=\"nofollow noopener\" target=\"_blank\">disinformation<\/a>. China, for instance, says the U.S. is trying to \u201c <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/china-cyber-integrity-sanctions-534d16a4a9c37a46dd7046cc4fe0f751\" rel=\"nofollow noopener\" target=\"_blank\">smear<\/a> \u201d Beijing while <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/us-china-cyberattack-asian-games-7ac151184a7037eac0ed1fc1ef43c831\" rel=\"nofollow noopener\" target=\"_blank\">conducting its own cyberattacks<\/a>.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \"><a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/north-korea-hacker-military-intelligence-hospitals-b3153dc0ad16652a80a9263856d63444\" rel=\"nofollow noopener\" target=\"_blank\">North Korea<\/a> has pioneered a scheme in which it uses <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/ap-top-news-elections-artificial-intelligence-social-platforms-us-news-7c9fd798212cac63925d205142e811ea\" rel=\"nofollow noopener\" target=\"_blank\">AI personas<\/a> to create American identities allowing them to apply for remote tech jobs. North Korea&#8217;s authoritarian government pockets the salaries, while the hackers use their access to steal secrets or install malware. <\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC TjIXL aGjvy \">It&#8217;s the kind of digital threat that will face more American organizations in the years to come as sophisticated AI programs make it easier for bad actors to deceive, according to Nicole Jiang, CEO of Fable, a San Francisco-based security company that uses AI to sniff out fake employees. AI is not only a tool for hackers, but also a <a class=\"zZygg UbGlr iFzkS qdXbA WCDhQ DbOXS tqUtK GpWVU iJYzE \" data-testid=\"prism-linkbase\" href=\"https:\/\/apnews.com\/article\/artificial-intelligence-deepfake-trump-espionage-hack-scammers-da90ad1e5298a9ce50c997458d6aa610\" rel=\"nofollow noopener\" target=\"_blank\">critical defense against digital attackers<\/a>, Jiang said.<\/p>\n<p class=\"EkqkG IGXmU nlgHS yuUao lqtkC eTIW sUzSN \">\u201cCyber is a cat-and-mouse game,\u201d she said. \u201cAccess, data, information, money: That&#8217;s what they&#8217;re after.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"WASHINGTON &#8212; WASHINGTON (AP) \u2014 Russia, China, Iran and North Korea have sharply increased their use of artificial&hellip;\n","protected":false},"author":2,"featured_media":126241,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[76484,291,584,289,290,79,715,24934,18,3334,7243,19,21713,17,76483,790,82,4077],"class_list":{"0":"post-126240","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-76484","9":"tag-ai","10":"tag-article","11":"tag-artificial-intelligence","12":"tag-artificialintelligence","13":"tag-business","14":"tag-crime","15":"tag-cybercrime","16":"tag-eire","17":"tag-general-news","18":"tag-hacking","19":"tag-ie","20":"tag-information-security","21":"tag-ireland","22":"tag-organized-crime","23":"tag-politics","24":"tag-technology","25":"tag-u-s-news"},"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/126240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=126240"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/126240\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/126241"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=126240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=126240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=126240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}