To What Extent Can Threat Actors Benefit from Generative AI?

To What Extent Can Threat Actors Benefit from Generative AI?


This IDC Perspective explores the potential and present use of AI as a resource for bad actors in cybersecurity, identifies the main types of risks raised by AI-powered attacks, and explains what enterprises should do in response. From the perspective of threat actors, generative AI (GenAI) opens some new doors and possibilities. But the extent to which GenAI tools and services can speed up attacks or make them harder to detect and block is, overall, limited. Apart from the realm of phishing and fraud, where GenAI does pose serious new risks by making it possible to create convincing types of malicious content at a large scale, GenAI will not likely lead to a major increase in the frequency, intensity, or effectiveness of cyberattacks.Nonetheless, enterprises should continue to invest in defense-in-depth strategies that minimize their risk of falling victim to attacks of all types. In some cases, they may also need to enhance their protections so that they can deal with higher volumes of attacks, particularly in the case of phishing and fraud. Certain new types of defenses may also be necessary, again in the realm of phishing and fraud. But in general, the ability of threat actors to leverage GenAI does not change the fundamentals of enterprise security."Although GenAI's overall impact on the enterprise threat landscape is likely to be limited, there are steps cybersecurity leaders should take to mitigate the new types of risks that have emerged in the age of GenAI," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP).


Executive Snapshot

Situation Overview

How GenAI Benefits Threat Actors

The State of GenAI-Enabled Cyberattacks

How Much Risk Do GenAI Attacks Pose?

Advanced Attacks Still Require Advanced Skills

Legitimate AI Services Attempt to Restrict Malicious Usage

AI Does Not Enable Fundamentally New Types of Attacks

The Varying Impact of GenAI-Enabled Attacks

Advice for the Technology Buyer

Learn More

Related Research

Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings