**Russian Defence Firms Targeted by Hackers Using AI, Other Tactics: Report**
Russian defence firms have been targeted by sophisticated hackers using advanced artificial intelligence (AI) tactics, according to a recent report. The report highlights the increasing threat posed by state-sponsored hackers and cyber attackers.
According to a study by the Cybereason cybersecurity firm, Russian defence contractors have been hit by a series of high-profile cyber attacks in recent years. These attacks used advanced AI-powered tools to breach security systems and steal sensitive information.
The report noted that the hackers employed various tactics, including "living off the land" (LOTL) techniques, which involve using existing software and tools on a victim's computer to evade detection. The attackers also used machine learning algorithms to tailor their attacks to specific victims and evade security measures.
One of the most striking aspects of these attacks is the use of AI-powered malware. This type of malware can learn and adapt to evade security systems, making it increasingly difficult for defenders to detect and respond to threats in a timely manner.
Cybereason's report also highlighted the role of state-sponsored hackers in targeting Russian defence firms. The researchers noted that these attackers often use advanced tactics and tools, including AI-powered malware, to achieve their goals.
The study concluded that the attacks on Russian defence firms are part of a larger trend of increasing cyber threats against critical infrastructure. It emphasized the need for defence contractors and other organisations to invest in robust cybersecurity measures, including AI-powered detection and response systems, to protect themselves from these threats.
**Key Takeaways:**
* Russian defence firms have been targeted by sophisticated hackers using advanced AI tactics * The attacks employed various techniques, including LOTL and machine learning algorithms * AI-powered malware was used in some of the attacks, making them increasingly difficult to detect and respond to * State-sponsored hackers are suspected to be behind many of these attacks
**Sources:**
* Cybereason cybersecurity firm report