Tuesday, November 12, 2024
HomeArtificial IntelligenceChinese Hackers Using AI Tools To Influence Upcoming Elections

Chinese Hackers Using AI Tools To Influence Upcoming Elections

Published on

Malware protection

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in election campaigns.

Large language models (LLMs) can also enable them to produce realistic but misleading content at scale, thereby exacerbating division and fake news on social media.

Recently, cybersecurity analysts at Microsoft discovered that Chinese hackers are actively exploiting AI tools to influence the upcoming elections.

- Advertisement - SIEM as a Service

State-sponsored actors leverage evolving tactics to advance geopolitical agendas. Beijing employs fake social media accounts and AI-generated content to sow discord and influence U.S. elections.

AI Tools To Influence Elections

Besides this, North Korea has increased the pace of cryptocurrency theft and supply chain attacks with AI to fund military expansion.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The most recent Microsoft East Asia threat report highlights these facts as further evidence that nation-state threats are ever-evolving.

The coordinated Chinese campaign on social media to influence the U.S. elections is going, with fake accounts pretending to be voters and making louder content about climate change, immigration, and race via original as well as recycled posts.

Chinese sockpuppets solicit opinions on political topics (Source – Microsoft)

In recent times, “polling” has been employed to establish voter opinion on controversial matters that could allow for customization of information operations during peak seasons associated with the presidential election cycle. 

China’s IO in the US exploited events to serve strategic interests by casting a bad light on America.

They alleged that the U.S. intentionally started Maui wildfires, insinuated that the U.S. may have caused a Kentucky train derailment, and accused the U.S. of water poisoning for power sustenance. 

Such methods also included calling into question Japan’s wastewater disposal system as part of efforts to undermine IAEA findings.

AI-Generated Memes (Source – Microsoft)

The 2024 Taiwanese presidential election marked the first known instance of AI-generated content being used in foreign influence operations by China-affiliated Storm-1376. 

Videos published by Storm-1376 used AI-generated voice recordings of Terry Gou (Source – Microsoft)

They uploaded what appeared to be computer-generated audio of former candidate Terry Gou supporting someone else, which was quickly removed from YouTube.

The first-ever country that has employed AI in interfering with elections seems to be China.

Storm-1376 increased AI-generated memes mocking Taiwanese officials and dissidents, including AI news anchors, since early 2023.

North Korea prioritized crypto theft and supply chain attacks against adversaries to fund weapons, stealing over $3 billion since 2017, $600 million-$1 billion in 2023 alone.

Timeline of AI influence in Taiwan election (Source – Microsoft)

Used AI tools by Emerald Sleet group to enhance operations against the U.S.-Japan-South Korea alliance before Microsoft and OpenAI disrupted their activities.

Major elections in 2024 risk China amplifying AI-generated content to serve its interests, though the impact remains limited for now. 

However, China’s AI meme/video/audio augmentation experiments persist.

Expect North Korea’s crypto heists and supply chain attacks on the defense sector to fund weapons programs.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Maximizing Agent Productivity And Security With Workforce Management Software In Contact Centers

In the bustling world of customer service, the stakes are perpetually high—every missed call...

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as "penetration testing"...

APT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware...