By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Why LLM-powered AI tools can be a double-edged sword for businesses
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Why LLM-powered AI tools can be a double-edged sword for businesses
CybersecuritySoftware

Why LLM-powered AI tools can be a double-edged sword for businesses

Ai Lei Tao
Last updated: November 3, 2023 at 2:35 PM
Ai Lei Tao
Published: November 3, 2023
4 Min Read
SHARE
PHOTO: Photo by Google DeepMind on Pexels

Large language models (LLMs) that power AI conversational chatbots like ChatGPT, are a new attack surface that will likely evolve to make some attacks more cost-effective or persistent, according to tech giant IBM.

Attackers can use AI-generated text with ChatGPT, for example, to easily construct convincing phishing e-mails that are very authentic-sounding, eliminating many indicators that it is a suspicious e-mail.

Such LLM-powered tools can make phishing campaigns easier to execute globally, even if the attacker doesn’t speak the language, said Chris Hockings, chief technology officer for cybersecurity at IBM Asia-Pacific.

“There is a massive time deficit on the defender side, and there is no need for the attacker’s side to get more speed and scale,” said Hockings. 

He said that LLMs can be manipulated or ‘hypnotised’ to provide potentially dangerous responses and recommendations. 

Earlier this year, IBM had attempted to ‘hypnotise’ popular LLMs to test how easy it is for threat actors to get LLMs to offer poor advice to users without carrying out a massive data poisoning attack. It successfully ‘hypnotised’ five LLMs with the English language and without using any programming language. 

As a result, the LLMs leaked confidential financial information about other users, created vulnerable and malicious code, and provided weak security recommendations. 

Hockings said that this means attackers can exploit LLMs by tricking it into giving the opposite advice as requested by the user, by creating a “simulation game” where the user gets responses they are not looking for.

Additionally, LLMs are vulnerable to data poisoning, where an attacker manipulates the training data or introduces vulnerabilities, backdoors, or biases that could compromise the security or effectiveness of the LLM.

“There are backdoors available to attackers for sale on the Dark Web. Imagine a backdoor that has access to a database – an attacker could sell that backdoor to somebody who then poisons the data set that trains the LLM,” said Hockings. 

Solutions for protection

To counter malicious attacks, organisations need to develop a mindset around zero-trust to protect themselves and their networks from these phishing campaigns, according to IBM.

Data protection encompasses the training of data and having the appropriate controls around the authorised sharing of data to the right recipients. Threat detection is also essential as the scale and sophistication of cyber attacks grow. 

Key here is the integrity of software solutions. To ensure clean and safe code, organisations should focus on protecting open-source verification processes, source code control systems, with solutions like identity access management and role-based access, says IBM.

Testing, it adds, also plays a significant role in ensuring expected outputs across various use cases.

“Attackers can easily access repositories and insert malicious code, making it essential to ensure data security and compliance with regulatory and governance requirements,” said Hockings.

As organisations start to dabble in these LLM models, they may not have security built in to their systems and processes.

“Enterprises should prioritise cybersecurity elements as a core function, with a risk mitigation strategy,” said Hockings.“Cybersecurity must be included from the beginning to ensure the integrity and trustworthiness of systems.” 

Revolv smart home hubs to be bricked
Bigger always better? Not true for AI language models
Samsung smart watch needs to change habits
Hands on: Samsung Galaxy Note 4 and Note Edge
Online merchants on Stripe can now sell to China using Alipay, WeChat Pay
TAGGED:AIcybersecuritydark WebLLMtraining data

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAi Lei Tao
Ai Lei is a writer who has covered the technology scene for more than 20 years. She was previously the editor of Asia Computer Weekly (ACW), the only regional IT weekly in Asia. She has also written for TechTarget's ComputerWeekly, and was editor of CMPnetAsia and Associate Editor at Computerworld Singapore.
Previous Article NetApp moves towards intelligent data infrastructure, enabling GenAI features
Next Article Review: Nikon Zf is a modern camera in old clothes
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?