AI, Machine Learning to Be Used by Hackers in 2018: Symantec

Advertisement
By Indo-Asian News Service | Updated: 7 December 2017 18:26 IST

Cybercriminals will use Artificial Intelligence (AI) and Machine Learning (ML) to explore victims' networks in 2018, global cyber-security leader Symantec said on Thursday.

Furthermore, the Internet of Things (IoT) devices will be hijacked and used in Distributed Denial of Service (DDoS) attacks, warned Tarun Kaura, Director, Product Management, APJ, Symantec.

"2018 is the first year where we will see AI versus AI in a cyber-security context. Cybercriminals will use AI to attack and explore victims' networks, which is typically the most labour-intensive part of compromise after an incursion," Kaura said in a statement.

Advertisement

In 2017, we saw massive DDoS attacks using hundreds of thousands of compromised IoT devices in people's homes and workplaces to generate traffic.

Advertisement

"This is not expected to change with cybercriminals looking to exploit the poor security settings and management of home IoT devices," Kaura added.

The inputs and sensors of these IoT devices will also be hijacked, with attackers feeding audio, visual or other faked inputs to make these devices do what they want rather than what users expect them to do.

Advertisement

Beyond DDoS attacks and ransomware, home IoT devices will be compromised by cybercriminals to provide persistent access to a victim's network.

"Home users generally do not consider the cyber-security implications of their home IoT devices, leaving default settings and not vigilantly updating them like they do with their computers," Kaura said.

Advertisement

Persistent access means that no matter how many times a victim cleans their machine or protects their computer, the attacker will always have a backdoor into victims' network and the systems that they connect to.

When it comes to Blockchain technology, instead of attacking Blockchain technology itself, cybercriminals will focus on compromising coin-exchanges and users' coin-wallets since these are the easiest targets, and provide high returns.

Supply chain attacks have been a mainstay of the classical espionage and signals-intelligence operators, compromising upstream contractors/systems/companies and suppliers.

"They are proven to have a high-level of effectiveness, with nation-state actors using a mix of human intelligence to compromise the weakest link in the chain," Symantec said.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Here's When the Poco C85x 5G Will be Launched in India
  2. OnePlus 15T Key Specifications Confirmed Ahead of Launch in China
  3. Realme C83 5G Debuts in India With a 7,000mAh Battery at This Price
  4. The Upcoming Poco X8 Pro Series Could be Launched Globally on This Date
  5. OTT Releases This Week: Gandhi Talks, Subedaar, War Machine, Hello Bachhon, and More
  6. OpenAI's GPT-5.4 AI Model Is Here, and It Can Use Your Computer
  7. This AI Device Claims to Stop Microphones From Recording Your Voice
  8. OnePlus 15T Display Size Teased; Geekbench Listing Suggests Chipset
  9. Vivo X300 Max With Zeiss Cameras Spied at MWC 2026, Could Launch Soon
  1. Vivo X300 Max With Zeiss Cameras and Android 16 Spotted at MWC 2026, Could Launch Soon
  2. WhatsApp Update Introduces Support for Discovering Stickers While Typing Emoji: How It Works
  3. This AI-Powered Portable Device Claims to Detect Microphones and Jam Audio Recordings
  4. Poco X8 Pro Series Global Launch Date Leaked Ahead of Anticipated Debut: Expected Price, Specifications
  5. MacBook Neo Geekbench Scores Indicate It Performs on Par With iPhone 16 Pro Max
  6. Xiaomi Testing Experimental AI Agent Miclaw, Can Perform Complex Tasks Across Devices
  7. Dear Radhi OTT Release: Where to Watch the Tamil Thriller Online?
  8. With Love Now Streaming on Netflix: Know Everything About Plot, Cast, and More
  9. Kaattaan OTT Release Date Confirmed: When and Where to Watch Vijay Sethupathi Starrer Online?
  10. OnePlus 15T Display Size, Ultrasonic Fingerprint Sensor Confirmed; Geekbench Listing Hints at Chip, Memory
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.