Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

AI-based tools attacking critical infrastructure

Critical infrastructure can also be damaged without AI integration, for instance, when AI-based tools are used indirectly to aid actions such as in coordinated power outages caused by large-scale user manipulation [159].

Source: MIT AI Risk Repositorymit1170

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit1170

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.2 > Cyberattacks, weapon development or use, and mass harm

Mitigation strategy

1. Segment Operational Technology (OT) Networks and Restrict External Exposure Implement deep network segmentation to logically separate Operational Technology (OT) environments from enterprise IT networks. Furthermore, critical infrastructure entities must remove all non-essential connections to the public internet and leverage unidirectional information flows where data transfer is necessary, thereby minimizing the attack surface accessible to malicious actors utilizing AI-based reconnaissance or coordination tools. 2. Enforce Multi-Factor and Least-Privilege Access Controls Adopt a comprehensive Zero-Trust security model, mandating Multi-Factor Authentication (MFA) for all remote access and administrative accounts, particularly those interacting with OT systems. Utilize Privileged Access Management (PAM) to strictly control and monitor the actions of privileged human entities, thereby mitigating the risk of intentional misuse or credential compromise facilitating a mass harm event. 3. Deploy Continuous Anomaly Detection and Audit Trails Establish a continuous monitoring program utilizing User and Entity Behavior Analytics (UEBA) and detailed audit logging across all critical systems. This system should be designed to track security posture in real-time to rapidly identify anomalous network traffic, unusual command sequences, or subtle deviations in operational behavior indicative of a calculated attack or large-scale user manipulation coordinated by an adversary.