As part of the Biden administration's efforts to combat mounting cybersecurity threats from artificial intelligence, the Cybersecurity and Infrastructure Security Agency's Joint Cyber Defense Collaborative oversaw the first-ever tabletop exercise for the emerging technology conducted alongside dozens of AI experts and international cyber defense agencies, according to CyberScoop.
Tackled in the four-hour exercise were the elements of AI-enabled and AI-related cybersecurity incidents, as well as necessary information sharing techniques, and improved industry-government coordination in such threats, according to JCDC Associate Director Clayton Romans, who added that the exercise will be included in CISA's AI security incident collaboration playbook that is expected to be unveiled by the end of the year.
"We are using this exercise now to lay that groundwork for how we're going to collaborate together across these key companies, likely future key companies, and our very close and significant U.S. government partners who all have a role to play in this space," said Romans.
TAG-112 may be a subgroup of Chinese advanced persistent threat group Evasive Panda, also known as TAG-102 and StormBamboo, due to significant similarities in attack tactics, techniques, and procedures, an analysis from Recorded Future's Insikt Group revealed.
After engaging in cyberespionage attacks that involved the distribution of RAR archive lures to deploy the IronWind downloader and Havoc post-exploitation framework, WIRTE proceeded to target numerous Israeli entities with the updated SameCoin Wiper malware in a phishing campaign impersonating an Israeli partner of cybersecurity firm ESET.