Artificial Intelligence (AI) technology is evolving into a 'weapon' used by malicious actors to carry out cyber attacks.
In the cybersecurity threat forecast for 2024, the FortiGuard Labs security research group (USA) highlighted that Artificial Intelligence (AI) is becoming a 'weapon' used by cyber attackers. The application of AI in cyber attacks includes bypassing security algorithms and creating deepfake videos to simulate behavior and voice to deceive users. It is expected that hackers will creatively leverage AI in the near future, posing a significant challenge to security systems.

One of the hacker's tactics is using artificial intelligence to create fake personal profiles. Instead of using information from social media platforms and public websites to create fake profiles, hackers use AI to combine information in a unique way, creating highly authentic fake profiles. This increases the likelihood of success in fraudulent activities, posing a challenge for identifying and handling 'virtual individuals' online.
Securing passwords also becomes more challenging with AI intervention. Traditional password scanning methods rely on predicting and testing various character strings, but the advent of machine learning helps AI analyze patterns of passwords frequently used by humans, significantly reducing the time needed for this process.
AI can also overcome password detection measures, including blocking access after multiple incorrect attempts. Thanks to recognizing the security system's patterns, artificial intelligence can regulate the password scanning speed to avoid detection. Some AI models are even trained to autonomously handle captchas, the tool distinguishing between robots and users during login.

However, according to the assessment by FortiGuard Labs, AI can also be applied to counteract cyber attacks. In a recent report, the research team at Fortinet has successfully utilized AutoGPT, an AI system based on the GPT-4 model, to enhance security for network systems. AutoGPT receives tasks from humans and autonomously performs security-enhancing steps without human intervention, from analysis to decision-making and searching for necessary security tools.
