Malicious use of AI
Just as AI can be used in many different fields, it is unfortunately also helpful in perpetrating digital crimes. AI-supported malware and hacking are already a reality.
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
2 - Post-deployment
Risk ID
mit95
Domain lineage
4. Malicious Actors & Misuse
4.0 > Malicious use
Mitigation strategy
1. Implement strict technical and operational access controls, such as limiting dangerous AI model interactions to controlled cloud services with rigorous know-your-customer (KYC) screening, to mitigate unauthorized repurposing. 2. Establish and enforce a strict legal liability regime for developers of general-purpose AI systems, ensuring accountability for potential misuse and failures to encourage demonstrably safer development practices. 3. Mandate the integration of dual-use considerations into AI research and development norms, promoting a safety-oriented organizational culture and proactive technical defenses, including adversarial robustness and anomaly detection, against emerging AI-enabled threats.