www.helpnetsecurity.com Open in urlscan Pro
34.212.63.86  Public Scan

URL: https://www.helpnetsecurity.com/2024/07/11/ai-dark-web/
Submission: On July 12 via api from TR — Scanned from US

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1720750481"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Gareth Owenson, CTO, Searchlight Cyber
July 11, 2024
Share


HOW AI HELPS DECODE CYBERCRIMINAL STRATEGIES



With terms like “AI washing” making their way into mainstream business
consciousness, the hype surrounding AI is making it harder to differentiate
between the true applications and empty promises of the technology.



The quest for tangible business benefits is in full swing, and in cybersecurity
as much as any industry, it’s important to distinguish the deployment of AI
technologies simply for the sake of it, as opposed to identifying the use cases
where AI will make a real difference. Lauding AI as the solution to every
problem muddies the waters and could lead to missed opportunities.

In the field of threat intelligence, however, there are specific ways in which
AI tools are showing huge promise for cybersecurity teams, including in lifting
the lid on dark web threats. The dark web is a hugely complex landscape,
well-known for the promise of anonymity, and a domain where cybercriminals
organize and plan their attacks against organizations. There is a role for AI in
gathering data from the dark web, applying structure to it, and ultimately
turning it into intelligence that organizations can use to inform their security
strategy.


THE DARK WEB IS A PERFECT USE CASE FOR AI

The dark web represents a classic case of unstructured, disparate, and
difficult-to-analyze data. From forum discussions, marketplace listings, and
ransomware group communications, often scattered across various platforms and
languages – making sense of the dark web and navigating this vast, evolving
terrain can be daunting, even for experienced cyber analysts.

The biggest use case for AI is its ability to process, analyze, and interpret
natural language communication efficiently. AI algorithms can quickly identify
patterns, correlations, and anomalies within massive datasets, providing
cybersecurity professionals with actionable insights. This capability not only
enhances the speed and accuracy of threat detection but also enables a more
proactive and comprehensive approach to securing organizations against dark
web-originated threats. This is vital in an environment where the difference
between detecting a threat early in the cyber kill chain vs once the attacker
has achieved their objective can be hundreds of thousands of dollars.


THE ROLE OF AI IN OVERCOMING LANGUAGE BARRIERS

A great way to illustrate this use case is through language translation. The
dark web is a global space with cybercriminals operating in various languages
and using complex and dark-web-specific slang. Our data shows us that the top 10
languages used on the dark web are English, Russian, German, French, Spanish,
Bulgarian, Indonesian, Turkish, Italian, Dutch, and standard Chinese. After
English, Russian is the most used language on the dark web, accounting for 66
percent of non-English language content. 

But it’s often not textbook Russian. Just as English-speaking hackers have their
own slang terms, acronyms, and code words, so do their Russian counterparts.
Historically, this has created a challenge for gathering intelligence from the
dark web, because once security professionals capture a conversation between
potential adversaries, they must “decode” it.

Traditional translation tools, naturally, are not equipped to accurately
translate the slang used by Russian hackers. But, by training a model on the
slang terms used on the dark web, custom-built AI-powered translation tools can
help to break down this multilingual complexity and identify hidden threats. 

This AI-based approach also has the potential to improve efficiency of security
teams and the accuracy of intelligence by removing the manual and error-prone
process involved copying and pasting large quantities of content or searching
through dark web data with poorly translated terms. Advanced AI models, such as
transformers, can also produce a better understanding of the semantic meaning of
translations rather than merely translating word-for-word. By using context to
derive meaning, AI improves translation accuracy, allowing analysts to interpret
threats that might otherwise remain hidden.


UNDERSTANDING THE NATURE OF THE THREAT

Another potential use case of AI is in quickly identifying and alerting specific
threats relating to an organization, helping with the prioritization of
intelligence. One thing an AI could look for in data is intention – to assess
whether an actor is planning an attack, is asking for advice, is looking to buy
or to sell access or tooling. Each of these indicates a different level of risk
for the organization, which can inform security operations.

Take, for example, posts by initial access brokers, i.e., advertisements
cybercriminals post on the dark web to sell access to an organization’s network.
Monitoring for such posts is a time-consuming and manual task for a human
analyst, as it requires them to read through dark web forums day-in, day-out and
spot relevant posts through a lot of noise. But an AI model can be trained to
identify and extract key components of an initial access broker post as well as
identify the possible target, providing that company advanced warning and
allowing them to review their security protocols, heighten their alert status
and begin proactively hunting for signs of access.


ENHANCING THREAT INTELLIGENCE THROUGH AI

AI is not going to be a cure-all in cybersecurity, but there’s a role it can
play in areas where inefficiencies are created by vast amounts of unstructured
data. There is an ever growing source of threat feeds and data sources for
security teams to monitor, making extraction of relevant intelligence
increasingly difficult. AI can support security analysts by quickly and
efficiently finding the most serious threats. Time is critical in security and
there is a real power in making threat intelligence faster, more accurate, and
therefore more actionable. 

Moreover, as AI innovations make gathering intelligence easier and less
resource-intensive, there is a high likelihood that it will enable smaller
cybersecurity teams to undertake more sophisticated threat intelligence
activities such as actively monitoring the dark web for potential threats
against their organization. It could allow more companies to adopt a proactive
cybersecurity stance. As technological advancements continue, the integration of
AI in threat intelligence will become standard. Looking beyond the hype, AI
could prove to be a major catalyst in bringing proactive dark web monitoring
into the mainstream.





More about
 * artificial intelligence
 * cybercriminals
 * cybersecurity
 * dark web
 * opinion
 * Searchlight Cyber
 * threat
 * threat intelligence

Share


FEATURED NEWS

 * Using Authy? Beware of impending phishing attempts
 * How AI helps decode cybercriminal strategies
 * Strengthening cybersecurity preparedness with defense in depth

eBook: CISO guide to password security



SPONSORED

 * eBook: Cloud security skills
 * Download: The Ultimate Guide to the CISSP
 * eBook: Do you have what it takes to lead in cybersecurity?




DON'T MISS

 * Using Authy? Beware of impending phishing attempts
 * How AI helps decode cybercriminal strategies
 * Strengthening cybersecurity preparedness with defense in depth
 * Travel scams exposed: How to recognize and avoid them
 * Valuable insights for making the right cybersecurity decisions




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×