{"id":14463,"date":"2025-07-18T08:04:19","date_gmt":"2025-07-18T08:04:19","guid":{"rendered":"https:\/\/newestek.com\/?p=14463"},"modified":"2025-07-18T08:04:19","modified_gmt":"2025-07-18T08:04:19","slug":"clement-domingo-we-are-not-using-ai-correctly-to-defend-ourselves","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14463","title":{"rendered":"Cl\u00e9ment Domingo: \u201cWe are not using AI correctly to defend ourselves\u201d"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Following <a href=\"https:\/\/www.computerworld.es\/article\/4015477\/kaspersky-analiza-las-ultimas-tendencias-y-el-futuro-de-la-ciberseguridad-en-horizons.html\">Kaspersky Horizon<\/a> on 1 July in Madrid, Cl\u00e9ment Domingo, ethical hacker and cybersecurity evangelist, explains the cybercrime landscape now looks like the legitimate startup world: structured organizations with affiliates and even team-building culture.<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-a-criminal-startup-works\">How a criminal startup works<\/h2>\n<p>\u201cA cybercrime startup is similar to a classic<em> <\/em>startup, but dedicated to cybercrime in a very efficient way,\u201d Domingo tells via email. \u201cMost have what we call affiliates, which allows them to operate worldwide and attack any organization or entity. In most cases, the startup keeps 20% of the ransom and the accomplice takes 80%.\u201d<\/p>\n<p>These are companies that, as he details, offer all the necessary tools and procedures to commit cybercrime, such as stealing employee credentials, the best markets on the <a href=\"https:\/\/www.csoonline.com\/article\/566577\/10-things-you-should-know-about-dark-web-websites.html\">dark web<\/a>, people in charge of human resources, finance, negotiation and much more.<\/p>\n<p>\u201cTo give you an idea,\u201d Domingo says, \u201cthey operate almost like any other company: they have offices, good equipment and even do <em>team building<\/em> activities\u2026If you think about it\u2026 it\u2019s crazy! Their infrastructure depends on the degree of maturity of the <em>ransomware <\/em>group. Some are very advanced. For example, many in the cybercrime ecosystem operate behind a bulletproof host (BHP), so their infrastructure, even if they provide malware, command and control or any other malicious element, is hard to take down because it\u2019s something that doesn\u2019t matter to the vendors behind it, as they get paid in cryptocurrencies. Talking about the cybercrime infrastructure can be overwhelming; you realize that they really know how to operate and hide\u2026.That\u2019s why sometimes, sometimes law enforcement has such a hard time dismantling those infrastructures.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-cybercrime-pool\">The cybercrime \u201cpool\u201d<\/h2>\n<p>As Domingo acknowledges, cybercrime is increasingly precocious, and he provides a shocking and sobering fact: \u201cI can testify that they are getting younger and younger\u2026 the average is 13 years old!\u201d<\/p>\n<p>Then, to face a process of \u201cmaturating\u201d thanks to other activity partners. A training phrase to find out how far they are capable of going.<\/p>\n<p>But the key revelation is that, in more than a few cases \u2014 and therein lies the danger according to Domingo \u2014 is that \u201csome of them don\u2019t do it for the money, but for the glory, to be able to say: \u201cLook what a company I was able to hack into!\u201d But the damage is enormous.\u201d<\/p>\n<p>Once they have discovered the world of cybercrime and, above all, that many companies, especially smaller ones, are willing to pay a few dollars or thousands of dollars, \u201cthey already start to take this activity seriously, which leads them to dedicate themselves to it professionally\u201d. At this point, \u201cglory and money appeal to some, but for others it is simply a matter of ideology. As far as I\u2019ve seen in all the conflicts around the world, many cyberattacks are carried out to protest or claim something,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-to-deter-this-quarry\">How to deter this \u201cquarry\u201d<\/h2>\n<p>\u201cThis is a very complicated question,\u201d acknowledges Domingo. In his opinion, there are many ways to enter this world: through video game cheat codes or programming, not to mention spending hours on some Discord or Telegram channels; \u201cwhich, by the way, is the new dark web,\u201d he notes.<\/p>\n<p>\u201cFrom the many infiltrations I do, I can say that some people join the groups because they want to learn how to program or simply because they\u2019re curious. Then, little by little, they receive approaches that, over time, crystallize into proposals to download a particular program, or if they\u2019d be willing to do another one. It\u2019s that simple how they enter this world.\u201d<\/p>\n<p>There is a key tool to combat this unprecedented increase in young people attracted to cybercrime: cyber education. \u201cIt\u2019s very important. If these kids had seen earlier that interesting things can be done in cyberspace, perhaps they wouldn\u2019t have rebelled in the first place. But to do that, our governments and schools must have programs to train them and places where they can learn while having fun, because cybernetics and artificial intelligence are fun when you know all their potential for doing good.\u201d<\/p>\n<p>\u201cIn my daily work as an ethical hacker, I go to many schools and also meet with young people to tell them about my background and try to awaken in them the desire to become ethical hackers,\u201d he adds.<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-impact-of-ai-on-cybercrime\">The impact of AI on cybercrime<\/h2>\n<p>AI is reshaping our entire ecosystem, our world, \u201cand cybercriminals know that.\u201d<\/p>\n<p>Domingo acknowledges that they are increasingly using AI in their attacks and in the way they interact with their targets. It\u2019s very easy to host or create your own dark evil \u2014 whatever you want, whatever you can think of \u2014 an AI that will be the brains of your cybercrime. When I look at what\u2019s happening right now, I must confess that we\u2019re not using AI properly to defend ourselves because it\u2019s too early, and then we\u2019ll complain or regret it when it\u2019s too late. All the big companies competing in the AI ecosystem are obsessed with being the first to launch this new version of LLM\/AI that can clone voices, faces, or whatever in seconds\u2026without protecting it! What do cybercriminals do? The logical thing: use it against us.<\/p>\n<p>But companies also need to take some of this into account. \u201cMany people think AI is magic, so they can implement new AI-powered applications without securing the basics. So, once again, it\u2019s easy for cybercriminals to abuse it. Recently, we\u2019ve seen how some companies, like McDonald\u2019s, used an AI that was hacked with the password 123456 and gave access to 64 million job applications worldwide.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-cybercriminals-set-financial-demands\">How cybercriminals set financial demands<\/h2>\n<p>\u201cMost of the time, there\u2019s a \u201cpolite cyber agreement\u201d in the cybercrime ecosystem. What does that mean? If a company is attacked, they\u2019ll be asked for between 1 and 10% of their annual revenue. However, they can also rely on what they read, hear, or see in the media, which leads them to hack a company and demand a ransom.\u201d<\/p>\n<p>Cl\u00e9ment Domingo also notes that the number of SMEs being attacked has increased in recent months because, in his opinion, \u201csome low-level cybercriminals have realized that it is more interesting to attack these companies and ask for a low amount than to attack a large one and ask for a high amount.\u201d<\/p>\n<p>So is it possible to stay one step ahead of them? \u201cOf course it\u2019s possible!\u201d he answers, categorically. And he argues: \u201cIt\u2019s what we call CTI (Cyber Threat Intelligence): the ability to detect all illegal signals and analyze many parameters that occur in a specific domain and also allow us to understand the geopolitical ecosystem and stay one step ahead.\u201d<\/p>\n<p>So here is his advice: \u201cTo defend our industries, our internet freedom and defeat these cybercriminals, you need to think like an attacker. But, to be honest, they are much better than us because we don\u2019t fight with the same cyber weapons. The field of cybersecurity is very backward, and in some parts of the world, its complexity can be so great that it even complicates cyber defense. Hence the need to conclude by saying that people don\u2019t understand anything about cybersecurity because many professionals rely on the technical aspects. And, unfortunately, if my grandmother doesn\u2019t understand what the movie is about, it\u2019s very difficult to prepare for what might come. Therefore, we must change the way we talk about cybersecurity because it is important for the future.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Following Kaspersky Horizon on 1 July in Madrid, Cl\u00e9ment Domingo, ethical hacker and cybersecurity evangelist, explains the cybercrime landscape now looks like the legitimate startup world: structured organizations with affiliates and even team-building culture. How a criminal startup works \u201cA cybercrime startup is similar to a classic startup, but dedicated to cybercrime in a very efficient way,\u201d Domingo tells via email. \u201cMost have what we&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14463\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14463","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14463"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14463\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}