AI-powered technology leverages large language models and deep learning architecture to detect and prevent generative AI-based email threats. Credit: Andrey_Popov/Shutterstock Threat prevention company Perception Point has unveiled a new detection model to counter generative AI-based email threats. The AI-powered technology leverages large language models (LLMs) and deep learning architecture to detect and prevent business email compromise (BEC) attacks, currently undergoing a significant shift due to the rise of generative AI technologies, the vendor said. The method harnesses transformers, AI models capable of understanding the semantic context of text, mirroring the technology behind popular LLMs like OpenAI's ChatGPT and Google's Bard, according to Perception Point. Malicious actors can use generative AI to enhance their attack toolsets, with email-based social engineering no exception. In January, a study from WithSecure demonstrated how attackers can use generative AI platform ChatGPT to significantly enhance phishing/BEC scams and launch more effective, harder-to-detect campaigns. Researchers showed that not only can attackers generate unique variations of the same phishing lure with grammatically correct and human-like written text, but they can build entire email chains to make their emails more convincing and can even generate messages using the writing style of real people based on provided samples of their communications. Meanwhile, the Verizon 2023 Data Breach Investigations Report revealed that BEC attacks have almost doubled this year, now accounting for over 50% of incidents involving social engineering. Method identifies unique patterns in LLM-generated text to detect email threats The new approach allows Perception Point's solution to identify the unique patterns in LLM-generated text, a key factor in detecting and thwarting generation AI-based threats, the firm said in a press release. The model processes incoming emails at an average of 0.06 seconds, aligning with Perception Point's ability to scan content in near real-time, it added. It has initially been trained on hundreds of thousands of malicious samples caught by Perception Point and is continuously updated with new data to maximize its effectiveness, the vendor claimed. "There is an urgent need for cutting-edge defenses against generative AI-powered threats," said Tal Zamir, CTO of Perception Point. "We're being challenged as an industry with yet another avenue that bad actors have come to exploit in their ever-expanding range of attacks." Approach keeps false positives to a minimum via three-phase architecture The method has also been designed with false positives in mind, Perception point noted. To minimize the detection of false positives that result from the widespread use of generative AI for crafting legitimate emails, the new method uses a three-phase architecture. In the first phase, the model assigns a score representing the probability of the content being AI-generated, Perception Point wrote in a blog. Following this, it categorizes the content using advanced Transformers and a refined clustering algorithm. Categories include BEC, spam, and phishing, with a probability score assigned for each. In the final phase, the model integrates insights from the previous steps with additional numeric data, like the sender reputation and authentication protocols information (SPF, DKIM, DMARC). Based on these factors, it predicts if the content is AI-generated, and whether it's malicious, spam, or clean. Related content brandpost Shifting security left: DevSecOps meets virtualization By Anthony Ricco, CMO of Corellium. 01 Jul 2023 4 mins Security news analysis Attackers add hacked servers to commercial proxy networks for profit Proxyjacking allows attackers to sell unknowing victims' unused network bandwidth. By Lucian Constantin 30 Jun 2023 4 mins Cybercrime news Command-and-control framework PhonyC2 attributed to Iran’s Muddywater group PhonyC2 was used to exploit the log4j vulnerability in the Israeli software SysAid, the attack against Israel’s Technion institute, and the ongoing attack against the PaperCut print management software. By Apurva Venkat 30 Jun 2023 4 mins Advanced Persistent Threats Cyberattacks Vulnerabilities news First state-sponsored cyberattack against UK government revealed two decades later Rare insight marks the 20th anniversary of a state-backed malware attack on a UK government department. By Michael Hill 30 Jun 2023 3 mins Cyberattacks Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe