{"id":30797,"date":"2025-03-15T15:04:46","date_gmt":"2025-03-15T07:04:46","guid":{"rendered":"https:\/\/www.1ai.net\/?p=30797"},"modified":"2025-03-15T15:04:46","modified_gmt":"2025-03-15T07:04:46","slug":"%e7%bd%91%e7%bb%9c%e7%8a%af%e7%bd%aa%e7%9a%84%e6%99%ba%e8%83%bd%e5%b8%ae%e5%87%b6%ef%bc%9aopenai-operator-%e7%ad%89-ai%e6%99%ba%e8%83%bd%e4%bd%93%e6%88%90%e9%bb%91%e5%ae%a2%e6%96%b0","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/30797.html","title":{"rendered":"Cybercrime's \"Intelligent Accomplices\": AI Intelligence, Such as OpenAI Operator, Becomes a New Weapon for Hackers"},"content":{"rendered":"<p>March 15, 2011 - Symantec, a cybersecurity company, published a blog post on March 13, stating that <a href=\"https:\/\/www.1ai.net\/en\/tag\/ai%e6%99%ba%e8%83%bd%e4%bd%93\" title=\"_OTHER ORGANISER\" target=\"_blank\" >AI Agent<\/a>(such as OpenAI's Operator) have broken through the limitations of traditional tools to assist with<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e9%bb%91%e5%ae%a2\" title=\"[Sees articles with [Hacker] labels]\" target=\"_blank\" >hacker<\/a>Launch phishing attacks, build attack infrastructure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-30798\" title=\"157f742fj00st5kyx00t5d000v900hkp\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2025\/03\/157f742fj00st5kyx00t5d000v900hkp.jpg\" alt=\"157f742fj00st5kyx00t5d000v900hkp\" width=\"1125\" height=\"632\" \/><\/p>\n<p>1AI cites a blog post in which the researchers emphasize that<strong>These AI tools are moving from \"passive assistance\" to \"active execution\".<\/strong>, becoming a new threat to cybersecurity.<\/p>\n<p>Symantec found that AI embodiments can execute complex attack chains, including intelligence gathering, malicious code writing, and social engineering attack design. Attackers can bypass AI ethical constraints and manipulate intelligences to accomplish attack tasks through simple prompt engineering.<a href=\"https:\/\/weibo.com\/tv\/show\/1034:5144441862946846?mid=5144442042850356\" target=\"_blank\" rel=\"noopener\"><img id=\"dingyue_3_1742022238699\" \/><\/a><\/p>\n<p>While AI was previously only capable of generating phishing emails or basic code, now it can even automate the attack infrastructure, significantly increasing the efficiency of attacks. stephen Kowski (SlashNext) recommends enhanced email filtering (deploying filtering systems that can detect AI-generated content), enforcing the principle of zero-trust (restricting least-privilege access to both users and AI intelligences), and targeting training for employees to to recognize AI-generated phishing threats.<\/p>","protected":false},"excerpt":{"rendered":"<p>On March 15th, Symantec published an article on March 13, stating that AI ' s intelligence (e.g. Openai ' s Operator) has broken down the functional limitations of traditional tools to assist hackers in launching fishing attacks and building attack infrastructure. 1AI quotes Boven, and researchers emphasize that such AI tools are moving from \u201cpassive support\u201d to \u201cactive implementation\u201d as a new threat to cybersecurity. Symantec found that AI ' s intelligence embodies a complex attack chain that can be executed, including intelligence gathering, malicious code writing and social engineering attack design. The attackers can circumvent AI ethical limits by simply suggesting that they can manipulate their intelligence<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[146],"tags":[786,5983,2566],"collection":[],"class_list":["post-30797","post","type-post","status-publish","format-standard","hentry","category-news","tag-ai","tag-5983","tag-2566"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/30797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=30797"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/30797\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=30797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=30797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=30797"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=30797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}