|
Nation-State Threat Actors Weaponize U.S. Political Tensions to Launch AI-powered Phishing Campaigns
Thursday, August 8, 2024
Bolster research finds new phishing scams, fueled by AI, have doubled compared to 2023 and launched via email, text message, social media and more, raising the threat of data and identity theft, financial loss, or voter fraud
SANTA CLARA, Calif., July 31, 2024 /PRNewswire/ -- Highlighting growth of phishing and digital scam campaigns targeting United States citizens, Bolster, a leader in multi-channel phishing protection, today released new research, "Phishing in Focus: A 2024 Mid-year Report on AI, Disinformation, Election and Identity Fraud," identifying 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the U.S. to interfere with the 2024 presidential elections.
"We know the frequency of phishing attacks is increasing, as hackers utilize AI to execute more scams than ever before. In fact, phishing scams are being hosted in the U.S. at a rate of nearly double, compared to 2023. The trend is only accelerating. In May alone, we logged a daily average of more than 45K malicious phishing sites," said Abhilash Garimella, vice president of Research at Bolster. "More troubling, our researchers identified packages of voter data stolen over the past decade, for sale on the dark web and used by threat actors to create fake identification cards, potentially leading to identity theft or voter fraud."
Nation State Threat Groups Actively Target the 2024 Election Attackers are leveraging AI to automate mass spam campaigns, and to reply in real-time. This targeting and interactivity at scale increases their chances of gaining access to more sensitive data. The influx of election-themed spam is a significant cyber threat, causing widespread confusion among citizens and undermining trust in legitimate election communications. Attackers aim to capture sensitive financial information, login credentials, or personal data from unsuspecting individuals by exploiting their trust in familiar communication channels and creating a false sense of urgency by sending messages through multiple channels.
China, Russia and Iran are Most Active Of the 24 threat actor groups targeting the U.S. election, 75% came from either China, Russia or Iran. Data breaches have exposed voter information, giving threat actors access to databases of personal identifiable information (PII), making fraud and identity theft easier to perpetrate. Bolster has also identified databases of voter data with more than 100,000 data points from state-level breaches dating back to 2015 for sale on the dark web.
Multiple threat actors are also capitalizing on this stolen data by providing fully editable PSD templates with complete Know Your Customer (KYC) details for identification cards, potentially leading to identity theft and voter fraud at scale. These templates enable individuals to build counterfeit IDs including personal information obtained through phishing or data breaches.
Unfortunately, not even the U.S. military and government are immune from being targeted through .mil and .gov email addresses. The report found that threat actors are breaching accounts and selling access to them on the dark web. Criminals then exploit the credibility associated with a U.S. government email account to deceive users into believing requests are legitimate, and resulting in disclosure of confidential data, for example, using counterfeit Emergency Data Requests (EDRs).
To learn more, or to download a copy of "Phishing in Focus: A 2024 Mid-year Report on AI, Disinformation, Election and Identity Fraud," please visit http://bolster.ai/2024-mid-year-phishing-report.
About Bolster Bolster's mission is to make the internet a safer place by detecting, taking down, and monitoring phishing, fraud, and scam activity across the web, social media, app stores, and the dark web. Within milliseconds, Bolster renders a verdict using LLMs and the largest structured phishing dataset in the industry - delivering multi-channel phishing protection with near-perfect precision and at scale. To learn more, go to www.bolster.ai.
View original content to download multimedia:https://www.prnewswire.com/news-releases/nation-state-threat-actors-weaponize-us-political-tensions-to-launch-ai-powered-phishing-campaigns-302210613.html
SOURCE Bolster
|
|
|
|
ReasonLabs Announces Partnership With Virus Bulletin For Its Annual Security Conference VB2024 | Sep 17, 2024
|
|
Cloudera Launches Private Link Network for Secure, Internet-Free Cloud Connectivity | Sep 17, 2024
|
|
Pango welcomes Jay Schiavo as General Manager | Sep 17, 2024
|
|
Brother Continues to Deliver Reliability and Efficiency to Consumers and Businesses with Expanded Portfolio of Monochrome Laser Printers | Sep 17, 2024
|
|
Scandia Consulting Launches AI-Powered Spam Filter for Umbraco Forms | Sep 17, 2024
|
|
PortfolioPilot.com Unveils Continuous Tax Optimization for Self-Directed Investors | Sep 13, 2024
|
|
SlashNext Launches Zero-Trust Stealth Mode Browsers for Preemptive URL Threat Hunting and Live Scan Analysis | Sep 13, 2024
|
|
Pentera's Third Annual XPOSURE Summit Returns: The Premier Virtual Event for Continuous Threat Exposure Management (CTEM) | Sep 12, 2024
|
|
Multi-million-dollar Deepfake Campaigns Blocked by Gen | Sep 12, 2024
|
|
Perception Point Reports 24% Increase in Cyber Attacks Per Employee in H1 2024, With Business and Vendor Email Compromise Attacks Soaring at 44% and 66% Respectively | Sep 12, 2024
|
|
|
|