{"id":78700,"date":"2023-05-31T10:00:41","date_gmt":"2023-05-31T17:00:41","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=78700"},"modified":"2025-04-16T09:52:40","modified_gmt":"2025-04-16T13:52:40","slug":"ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/","title":{"rendered":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices \u2013 the Time to Prepare Is Now"},"content":{"rendered":"<p style=\"font-weight: 400;\">Malicious code is not difficult to find these days, even for OT, IoT and other embedded and unmanaged devices. <a href=\"https:\/\/github.com\/Aiminsun\/CVE-2021-36260\" target=\"_blank\" rel=\"noopener\">Public exploit<\/a> proofs-of-concept (PoCs) for IP camera vulnerabilities are routinely used by <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-279a\" target=\"_blank\" rel=\"noopener\">Chinese APTs<\/a>, popular <a href=\"https:\/\/download.schneider-electric.com\/files?p_Doc_Ref=SESB-2023-01&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SESB-2023-01.pdf\" target=\"_blank\" rel=\"noopener\">building automation devices<\/a> are targeted by hacktivists and <a href=\"https:\/\/github.com\/artkond\/cisco-snmp-rce\" target=\"_blank\" rel=\"noopener\">unpatched routers<\/a> used for <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-108\" target=\"_blank\" rel=\"noopener\">Russian espionage<\/a>.<\/p>\n<p style=\"font-weight: 400;\">Threat actors typically port these PoCs into something more useful or less detectable by adding payloads, packaging them into a malware module or rewriting them to run in other execution environments They may also change them slightly to hide from detection tools that rely on signatures such as hashes, API functions, program modules and libraries.<\/p>\n<p style=\"font-weight: 400;\">This porting process increases the versatility and potentially the damage of existing malicious code. However, it still takes some time and effort from threat actors.<\/p>\n<p style=\"font-weight: 400;\">Enter artificial intelligence (AI).<\/p>\n<p style=\"font-weight: 400;\">One of the latest developments in AI is large language models (LLMs), such as <a href=\"https:\/\/openai.com\/blog\/chatgpt\" target=\"_blank\" rel=\"noopener\">OpenAI\u2019s ChatGPT<\/a> and <a href=\"https:\/\/blog.google\/technology\/ai\/google-palm-2-ai-large-language-model\/\" target=\"_blank\" rel=\"noopener\">Google\u2019s PaLM 2<\/a>. These well-publicized tools are remarkable for the variety of questions they can answer and tasks they can perform based on simple user input (\u201cprompts\u201d). Some of these tasks include generating and converting computer code into different programming languages.<\/p>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/securityreviewmag.com\/?p=25185\" target=\"_blank\" rel=\"noopener\">Malicious actors<\/a>, <a href=\"https:\/\/arxiv.org\/abs\/2106.15764\" target=\"_blank\" rel=\"noopener\">academic researchers<\/a> and <a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/security-implications-of-chatgpt\/\" target=\"_blank\" rel=\"noopener\">industry researchers<\/a> are all trying to understand how the recent popularity of LLMs will affect cybersecurity. Some of the main offensive use cases include exploit development, social engineering and information gathering. Defensive use cases include creating code for threat hunting, explaining reverse engineered code in natural language and extracting information from threat intelligence reports.<\/p>\n<p style=\"font-weight: 400;\">There has been much research into automatic exploit generation and its integration with <a href=\"https:\/\/www.usenix.org\/system\/files\/sec20-nosco.pdf\" target=\"_blank\" rel=\"noopener\">human vulnerability finding<\/a>. Those tools required very specialized knowledge. Recent AI tools take simple natural language as input.<\/p>\n<p style=\"font-weight: 400;\">As a result, companies have already started to observe the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ai-create-malware-withsecure\/\" target=\"_blank\" rel=\"noopener\">first malware samples<\/a> created with ChatGPT\u2019s assistance. We have not yet seen this capability used for OT attacks, but that\u2019s just a matter of time.<\/p>\n<p style=\"font-weight: 400;\">Using ChatGPT\u2019s code conversion capability to port an existing OT exploit to another language is easy, and that has huge implications for the future of cyber offensive and defensive capabilities.<\/p>\n<h2>Experimental setup to create an AI-assisted cyberattack<\/h2>\n<p style=\"font-weight: 400;\">Our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT. This would allow it to run faster on Windows and run easily on a variety of embedded devices \u2013 or become a module in a ransomware developed in a coding language that is <a href=\"https:\/\/www.zdnet.com\/article\/go-malware-is-now-common-having-been-adopted-by-both-apts-and-e-crime-groups\/\" target=\"_blank\" rel=\"noopener\">gaining popularity<\/a>. For the existing exploit we used one we created for our <a href=\"\/research-labs\/r4iot\/\">R4IoT PoC<\/a> to demonstrate ransomware moving between IT and IoT\/OT environments.<\/p>\n<p style=\"font-weight: 400;\">The R4IoT exploit, shown redacted below, has two parts: a network scanner that finds vulnerable devices, such as building automation controllers and PLCs, running the <a href=\"\/research-labs\/nucleus-13\/\">Nucleus FTP server<\/a> on port 21 (based on a tool <a href=\"https:\/\/github.com\/Forescout\/project-memoria-detector\" target=\"_blank\" rel=\"noopener\">we open-sourced<\/a> in the past); and a payload exploiting <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886\" target=\"_blank\" rel=\"noopener\">CVE-2021-31886<\/a> to crash the targets found.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78702\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg\" alt=\"\" width=\"1000\" height=\"793\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg 1000w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot-300x238.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot-768x609.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"font-weight: 400;\">Even though we had <em>no previous experience with Go<\/em>, with carefully chosen prompts, we were able to rewrite the exploit in less than 15 minutes <em>without activating the <\/em><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/chatgpt-europol-malware\" target=\"_blank\" rel=\"noopener\"><em>malware creation safeguards<\/em><\/a><em> in ChatGPT<\/em>.<\/p>\n<h2>Prompting ChatGPT to port an exploit<\/h2>\n<p style=\"font-weight: 400;\">We wanted to create a minimal version of this code that skips phase 1 \u2013 scanning for vulnerable devices \u2013 and goes directly to phase 2: attack a given IP address with the payload.<\/p>\n<p style=\"font-weight: 400;\">The prompts couldn\u2019t say that we are creating a malware code, but rather focus on the technical goals, which are:<\/p>\n<ul>\n<li>Ping an IP address to verify that it is online.<\/li>\n<li>Send a payload on an FTP socket to that IP address.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The initial prompt we used is shown below.<\/p>\n<p>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78704\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot2.jpg\" alt=\"\" width=\"800\" height=\"166\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot2.jpg 800w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot2-300x62.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot2-768x159.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78705\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot3.jpg\" alt=\"\" width=\"900\" height=\"742\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot3.jpg 900w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot3-300x247.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot3-768x633.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p style=\"font-weight: 400;\">The code provided by ChatGPT needed some fixing, and (a very courteous) ChatGPT itself was instrumental in doing so. Below, we show how we used the tool to fix a missing package and a logic mistake in the code. We omitted other prompts for fixing compatibility issues of the needed packages and some build errors, but, as mentioned above, the whole process took 15 minutes for someone with zero knowledge of the target language.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78706\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot4.jpg\" alt=\"\" width=\"900\" height=\"788\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot4.jpg 900w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot4-300x263.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot4-768x672.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78710\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot5-1.jpg\" alt=\"\" width=\"900\" height=\"665\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot5-1.jpg 900w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot5-1-300x222.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot5-1-768x567.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p style=\"font-weight: 400;\">Here is the final working Go code that was created and refined with the help of ChatGPT, with the payload redacted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78711\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6.jpg\" alt=\"\" width=\"897\" height=\"1911\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6.jpg 897w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6-141x300.jpg 141w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6-481x1024.jpg 481w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6-768x1636.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot6-721x1536.jpg 721w\" sizes=\"auto, (max-width: 897px) 100vw, 897px\" \/><\/p>\n<h2>The future of AI-assisted attacks<\/h2>\n<p style=\"font-weight: 400;\">We had already shown with <a href=\"\/research-labs\/ot-icefall\/\">OT:ICEFALL<\/a> that offensive OT cyber capabilities are easier to develop than suspected just by using traditional reverse engineering and domain knowledge. However, it is clear from this experiment that using AI to enhance offensive capabilities is <em>even easier and more<\/em> <em>effective<\/em>. Consider, for instance, that we used the same exploit as part of the <a href=\"\/blog\/deep-lateral-movement-in-ot-networks-when-is-a-perimeter-not-a-perimeter\/\">Deep Lateral Movement<\/a> attack, which means this is the fourth time we used a slight variation of the same exploit. Having an AI tool to help with the porting greatly accelerates development.<\/p>\n<p style=\"font-weight: 400;\">AI will soon play an important role in helping researchers and attackers find vulnerabilities directly in source code or via patch diffing, write exploits from scratch and even craft queries to find vulnerable devices online to be exploited.<\/p>\n<p style=\"font-weight: 400;\">We have witnessed an <a href=\"https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/the-evolving-cve-landscape\" target=\"_blank\" rel=\"noopener\">exponential increase<\/a> in the number of vulnerabilities, especially given the number and types of devices connected to computer networks increasing at a similarly high rate. This has been accompanied by threat actors keen to <a href=\"\/blog\/vmware-esxi-servers-a-major-attack-vector-for-ransomware\/\">attack devices with fewer security protections<\/a>. The use of AI to find and exploit vulnerabilities in unmanaged devices will likely accelerate these trends dramatically.<\/p>\n<p style=\"font-weight: 400;\">Ultimately, AI and automation for different parts of the cyber kill chain can allow threat actors to go further faster, by greatly accelerating steps such as reconnaissance, initial access, lateral movement, and command and control that are still heavily reliant on human input \u2013 especially in lesser-known domains such as <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-265a\" target=\"_blank\" rel=\"noopener\">OT\/ICS<\/a>. Imagine a threat actor using AI-assisted versions of common penetration testing tools such as nmap, Metasploit, BloodHound or Cobalt Strike. AI could potentially:<\/p>\n<ul>\n<li>Explain their output in a much easier way for an attacker who is unfamiliar with a specific environment<\/li>\n<li>Describe which assets in a network are most valuable to attack or most likely to lead to critical damage<\/li>\n<li>Provide hints for next steps to take in an attack<\/li>\n<li>Link these outputs in a way that automates much of the intrusion process<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Besides exploiting common software vulnerabilities, AI will enable new types of attacks. LLMs are part of a wave of generative AI that includes image, audio and video generation techniques. Some of these techniques have been used to <a href=\"https:\/\/arxiv.org\/abs\/1901.03597\" target=\"_blank\" rel=\"noopener\">tamper with medical images<\/a>, and to generate deepfake <a href=\"https:\/\/www.euronews.com\/next\/2023\/03\/25\/audio-deepfake-scams-criminals-are-using-ai-to-sound-like-family-and-people-are-falling-fo\" target=\"_blank\" rel=\"noopener\">audio<\/a> and <a href=\"https:\/\/www.reuters.com\/technology\/deepfake-scam-china-fans-worries-over-ai-driven-fraud-2023-05-22\/\" target=\"_blank\" rel=\"noopener\">video<\/a> for financial scams.<\/p>\n<h2>How can you prepare for AI-assisted cyberattacks?<\/h2>\n<p style=\"font-weight: 400;\">AI-assisted attacks are about to become much more common, affecting devices, data and people in potentially unexpected ways. Every organization must focus on ensuring that it has the basic cybersecurity in place to withstand these future attacks.<\/p>\n<p style=\"font-weight: 400;\">The good news is that best practices remain unchanged. Security principles such as cyber hygiene, defense-in-depth, least privilege, network segmentation and zero trust all remain valid. The attacks may become more frequent because it will be easier for bad actors to generate malware, but the defenses do not change. It is just more urgent than ever to enforce them dynamically and effectively.<\/p>\n<p style=\"font-weight: 400;\">As ransomware and other threats <a href=\"\/blog\/ttps-how-to-prevent-and-detect-ransomware-attacks\/\">continue to evolve<\/a>, cybersecurity basics remain the same:<\/p>\n<ul>\n<li>Maintain a <a href=\"\/solutions\/asset-inventory\/\">complete inventory<\/a> of <em>every<\/em> asset on the network, including OT and unmanaged devices<\/li>\n<li>Understand their <a href=\"https:\/\/www.forescout.com\/solutions\/multifactor-risk-scoring\/\">risk, exposure<\/a> and <a href=\"\/solutions\/device-compliance\/\">compliance<\/a> state<\/li>\n<li>Be able to automatically <a href=\"\/products\/threat-detection-and-response-xdr\/\">detect and respond to advanced threats<\/a> targeting these assets<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">These three pillars go a long way toward preparing your organization for the future.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious code is not difficult to find these days, even for OT, IoT and other embedded and unmanaged devices. Public exploit proofs-of-concept (PoCs) for IP camera vulnerabilities are routinely used by Chinese APTs, popular building automation devices are targeted by hacktivists and unpatched routers used for Russian espionage. Threat actors typically port these PoCs into [&hellip;]<\/p>\n","protected":false},"author":180,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[747,438],"class_list":["post-78700","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout<\/title>\n<meta name=\"description\" content=\"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout\" \/>\n<meta property=\"og:description\" content=\"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-31T17:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T13:52:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/FS-2023-AI-Assisted-Exploits-Social-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amine Amri, Daniel dos Santos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/FS-2023-AI-Assisted-Exploits-Social-v1-1200x628-1.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\"},\"author\":{\"name\":\"Amine Amri\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334\"},\"headline\":\"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices \u2013 the Time to Prepare Is Now\",\"datePublished\":\"2023-05-31T17:00:41+00:00\",\"dateModified\":\"2025-04-16T13:52:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\"},\"wordCount\":1268,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\",\"name\":\"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg\",\"datePublished\":\"2023-05-31T17:00:41+00:00\",\"dateModified\":\"2025-04-16T13:52:40+00:00\",\"description\":\"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg\",\"width\":1000,\"height\":793},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices \u2013 the Time to Prepare Is Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334\",\"name\":\"Amine Amri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e447c627681d4bf5e7a06ed2177f5428\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g\",\"caption\":\"Amine Amri\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout","description":"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/","og_locale":"en_US","og_type":"article","og_title":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout","og_description":"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.","og_url":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2023-05-31T17:00:41+00:00","article_modified_time":"2025-04-16T13:52:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/FS-2023-AI-Assisted-Exploits-Social-v1-1200x628-1.png","type":"image\/png"}],"author":"Amine Amri, Daniel dos Santos","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/FS-2023-AI-Assisted-Exploits-Social-v1-1200x628-1.png","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/"},"author":{"name":"Amine Amri","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334"},"headline":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices \u2013 the Time to Prepare Is Now","datePublished":"2023-05-31T17:00:41+00:00","dateModified":"2025-04-16T13:52:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/"},"wordCount":1268,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/","url":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/","name":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg","datePublished":"2023-05-31T17:00:41+00:00","dateModified":"2025-04-16T13:52:40+00:00","description":"Generative AI such as ChatGPT can be used to help create malware targeting OT and unmanaged devices. Prepare to defend against more frequent cyberattacks.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/cyber-ai-screenshot.jpg","width":1000,"height":793},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"AI-Assisted Attacks Are Coming to OT and Unmanaged Devices \u2013 the Time to Prepare Is Now"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334","name":"Amine Amri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e447c627681d4bf5e7a06ed2177f5428","url":"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g","caption":"Amine Amri"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/78700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/180"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=78700"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/78700\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=78700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=78700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=78700"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=78700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}