AI-based tools attacking critical infrastructure
Critical infrastructure can also be damaged without AI integration, for instance, when AI-based tools are used indirectly to aid actions such as in coordinated power outages caused by large-scale user manipulation [159].
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
2 - Post-deployment
Risk ID
mit1170
Domain lineage
4. Malicious Actors & Misuse
4.2 > Cyberattacks, weapon development or use, and mass harm
Mitigation strategy
1. Segment Operational Technology (OT) Networks and Restrict External Exposure Implement deep network segmentation to logically separate Operational Technology (OT) environments from enterprise IT networks. Furthermore, critical infrastructure entities must remove all non-essential connections to the public internet and leverage unidirectional information flows where data transfer is necessary, thereby minimizing the attack surface accessible to malicious actors utilizing AI-based reconnaissance or coordination tools. 2. Enforce Multi-Factor and Least-Privilege Access Controls Adopt a comprehensive Zero-Trust security model, mandating Multi-Factor Authentication (MFA) for all remote access and administrative accounts, particularly those interacting with OT systems. Utilize Privileged Access Management (PAM) to strictly control and monitor the actions of privileged human entities, thereby mitigating the risk of intentional misuse or credential compromise facilitating a mass harm event. 3. Deploy Continuous Anomaly Detection and Audit Trails Establish a continuous monitoring program utilizing User and Entity Behavior Analytics (UEBA) and detailed audit logging across all critical systems. This system should be designed to track security posture in real-time to rapidly identify anomalous network traffic, unusual command sequences, or subtle deviations in operational behavior indicative of a calculated attack or large-scale user manipulation coordinated by an adversary.