ChatGPTã®ãããªçæAIããŒã«ã¯ãããžãã¹ã«ããŸããŸãªäŸ¡å€ããããããŠããŸããçæAIããŒã«ã¯ãã³ã³ãã³ããæžãããšãã§ããæèãæŽçããããšãã§ããå·çã®ã¹ã¿ã€ã«ãããŒã³ãæš¡å£ããããšãã§ããŸãã ããããããæ»æè ããããã®æ©èœãæªçšããŠãããªã説åŸåã®ãããçãçµã£ãèªåãã£ãã·ã³ã°ã¡ãã»ãŒãžãåºç¯å²ã«å±éãããã©ããªãã§ããããïŒ
èããå¿ èŠã¯ãããŸãããå®éã«èµ·ãã£ãŠããããã§ããChatGPTã®ç»å Žããã»ã©ãªãããŠãåå°åã®èšèªãçšããããžãã¹ã¡ãŒã«è©æ¬ºïŒBECïŒæ»æãäžçäžã§åºãŸããŸããããã«ãŒããã€ã³ãã«ãã2024 State of the Phishã¬ããŒãã«ãããšãBECã¡ãŒã«ã¯ããŸããŸãªåœã§ããããŒãœãã©ã€ãºããã説åŸåã®ãããã®ã«ãªã£ãŠããŸããæ¥æ¬ã§ã¯ãåå¹Žãšæ¯ã¹BECæ»æã35%äžæããŸããããŸããéåœã§ã¯31%ãUAEã§ã¯29%ãšããã¡ããå¢å ããŠããŸããã©ããããçæAIã¯ãµã€ããŒç¯çœªè ã®çç£æ§ãé«ããŠããããã§ããæ»æè ã¯ãããããªåŽåã§é«ãå©çãèŠèŸŒããæ»ææ¹æ³ãåžžã«æ¢ããŠããŸããçæAIã¯ããŸãã«ããã§ããæ»æè ã¯ãçæAIã®ã¹ããŒããšæ¡åŒµæ§ã掻ãããŠãæ»æã«åœ¹ç«ã€ããŒã¿ãè¿ éã«ãç°¡åã«ã倧éã«æãåœãŠãããšã«ããããœãŒã·ã£ã« ãšã³ãžãã¢ãªã³ã°ã®èŠæš¡ãæ¡ããåšåãé«ããŠããŸãã

æªæã®ããã¡ãŒã«è åšã¯ãŸããŸãå·§åŠã«ãªãããã®é »åºŠãå¢ããŠããäžã§ããã«ãŒããã€ã³ãã¯ããŠãŒã¶ãŒã®åä¿¡ãã¬ã€ã«å±ãåã«ãããããæ»æã黿¢ãã¹ãã€ãããŒã·ã§ã³ã«åãçµãã§ããŸãããã®ããã°èšäºã§ã¯ãçæAIã«ããã¡ãŒã«è åšãšã¯ã©ã®ãããªãã®ãããããŠãã«ãŒããã€ã³ãã®æå³è§£æã«ãã£ãŠã©ã黿¢ã§ããããã玹ä»ããŸãã
çæAIã«ããã¡ãŒã«è
åšãéåžžã«å±éºã§ããçç±
Verizonã®Data Breach Investigations ReportïŒ2023幎ããŒã¿äŸµå®³èª¿æ»ã¬ããŒãïŒã«ããã°ãããŒã¿äŸµå®³ã®4åã®3ïŒ74%ïŒã«ã¯äººçèŠå ããããã§ããŸãããªã³ã©ã€ã³è©æ¬ºãã©ã³ãµã ãŠã§ã¢æ»æãèªèšŒæ å ±ã®çªåãMFAïŒå€èŠçŽ èªèšŒïŒåé¿ããã®ä»ã®æªæã®ããã¢ã¯ãã£ããã£ã®æ ¹æ¬åå ãåæããŠã¿ãã°ããã®æ°åã¯ãã£ãšé«ããªãã§ãããã ãŸãã2013幎10æãã2022幎12æã«ãããŠãBECè©æ¬ºã«ãã被害é¡ã¯7å 8000ååïŒ500åãã«ïŒãè¶ ããŠããŸããããã¯ãçŸåšèµ·ãã£ãŠãããœãŒã·ã£ã« ãšã³ãžãã¢ãªã³ã°ã®äžéšã§ãããããŸããã
ã¡ãŒã«ã¯æå€§ã®è åšçµè·¯ã§ããã調æ»çµæããããè£ä»ããŠããŸããæ»æè ã¯ãã¡ãŒã«ã䜿çšããŠäººãæšçã«ããããšã§å€§ããªææãäžããŠããŸãããä»åŸãæ»æè ã«ããçæAIã®äœ¿çšãæ¡å€§ããŠããã°ãã¡ãŒã«ã«ããæ»æã¯ãŸããŸãå·§åŠã«ãªã£ãŠããã§ãããã
ãããŸã§ãç§ãã¡ã¯ææ³äžã®èª€ããããããªãã©ã³ããäžç¹å®å€æ°åãã®æšæ¶æãªã©ãæããã«èŠæãå¿ èŠãªäžå¯©ãªã¡ãã»ãŒãžãç®ã«ããŠããŸãããããããçæAIã«ããç¶æ³ã¯å€§ããå€ãããŸãããæ»æè ã¯çæAIã«ã誰ãã®æžãæ¹ãæš¡å£ãããææ³çã«å®ç§ãªã¡ãã»ãŒãžãããããå€èšèªã§æžãããããšãã§ããŸãããã®ãããäžçäžã®äŒæ¥ã§ãèŠç Žãããšãéåžžã«é£ããåœã¡ãŒã«ã倧éã«éãã€ããããŠããŸãã
ããã黿¢ããã«ã¯ã©ãããã°ããã®ã§ããããïŒãŸãã¯ãã¡ãã»ãŒãžã®æå³ãç¥ãããšã§ãã
æå³è§£æã«ããè
åšãåä¿¡åã«é»æ¢ãã
ãã«ãŒããã€ã³ãã¯ãæå³è§£æã«ããã¡ãã»ãŒãžã®æå³ãå¯ç¥ãããæ¥çåãšãªãè åšæ€ç¥ãšã³ãžã³ãéçºããŸãããæå³è§£æãšã¯ãç¹å®ã®æèã«ãããŠåèªãæãäœãæå³ãããã調ã¹ãããã»ã¹ã§ããããã¹ãããŒã¿ãããããã«æœãæå³ãæå³ãæœåºããããšãç®çãšããŠããŸãã
ãã«ãŒããã€ã³ãã®æå³è§£æã¯ãå€§èŠæš¡èšèªã¢ãã«ïŒLLMïŒãšã³ãžã³ã掻çšããMicrosoft 365ããã³Google Workspaceã«ãããŠãŠãŒã¶ãŒã®åä¿¡ãã¬ã€ã«å±ãåã«é«åºŠãªã¡ãŒã«è åšã黿¢ããŸãã
ã©ã®ãããªåèªã䜿ãããŠããŠããã©ã®èšèªã§æžãããŠããŠãããããã¯æŠåšåããããã€ããŒãïŒURLãQRã³ãŒããæ·»ä»ãã¡ã€ã«ãªã©ïŒãã¡ãŒã«ã«å«ãŸããŠããããšããŸããšã黿¢ããŸãããã«ãŒããã€ã³ãã®æå³è§£æã«ãããè åšæ€ç¥ãšã³ãžã³ã¯ãã¡ãã»ãŒãžã®æå³ã𿻿è ã®ç®çãå¯ç¥ã§ããŸãã

ãã«ãŒããã€ã³ãã®æå³è§£æã®åœ¹å²
ä»çµã¿
Proofpoint Threat Protectionã®è åšæ€ç¥èœåãããã«é«ãããããæå³è§£ææ©èœãå ãããŸãããã¡ãŒã«ã¯ãMLããŒã¹ã®è åšæ€ç¥ãšã³ãžã³ã«ããããã詳现ã«åæãããŸããããã¯ã¡ãŒã«ããŠãŒã¶ãŒã«å±ãåã«è¡ãããŸãããã®ä»çµã¿ã詳ããèŠãŠãããŸãããã
ã¹ããã1
æå³è§£æã®ç®çã¯ãããã¹ãããŒã¿ãããããã«æœãæå³ãæå³ãæœåºããããšã§ããããŸããŸãªæ¹æ³ãæè¡ã䜿çšããŠãããå®çŸã§ããŸãããã«ãŒããã€ã³ãã§ã¯ãLLMããã¹ã ãšã³ããã£ã³ã°ãããã»ã¹ã«äœ¿çšããŠããŸãã
ãã«ãŒããã€ã³ãã®è åšã¢ããªã¹ãã«ãã£ãŠå®çŸ©ãããåé¡ã«åŸã£ãŠæå³ãæ€ç¥ãããããã¢ãã«ã調æŽããŠããŸãããã®ã¢ãããŒãã«ãããæå³äžã®é¡äŒŒæ§ããšãããããšãã§ãããããã¡ãŒã«å ã§äœ¿çšãããŠããèšèã®æå³ãããããçè§£ããããšãã§ããŸãã
LLMããŒã¹æå³è§£æææ³ã«ããããã«ãŒããã€ã³ãã¯ã匷åãªè¡šçŸåŠç¿ã䜿çšããŠãã¡ãŒã«å ã®ããã¹ãã®æå³ãããããçè§£ããåæããããšãã§ããŸãããããã«ç°ãªãæç« ãç°ãªãèšèªã§ãã£ãŠãåé¡ãªããè€éãªæå³äžã®é¢ä¿ãæèçãªå·®ç°ããšãããããšãã§ãããããåªããããã¹ãåé¡ãæååæãå¯èœã§ãã
以äžã®äžå¯©ã¡ãŒã«ã®äŸã§ãæå³ãé²åããããã¬ãŒãºãèŠãŠãããŸããããããã¯ãç·æ¥æ§ãããã£ãŠæ¯èŸŒå ã倿Žãããããšããã¡ãŒã«ã§ãã

ãã«ãŒããã€ã³ãã®æå³è§£æã¯ä»¥äžã®ãšããã§ãã
ãã«ãŒããã€ã³ãã®æå³è§£æã«ããããã®ã¡ãã»ãŒãžã®æå³ã¯ãéè¡è©æ¬ºãã§ãããšå€å®ãããŸããã

æå³è§£æã®èª¬æå¯èœæ§ã®äŸ
ã¹ããã2
ãã«ãŒããã€ã³ãã¯ãæ¯ãèãAIæ€ç¥ãšã³ãžã³ã䜿çšããŠã以äžã®ãããªã¡ãŒã«äž»èŠå±æ§ãããç°åžžã®å åãèŠã€ããŸãã
- éä¿¡è
- åä¿¡è
- ããããŒ
- ã¡ãã»ãŒãžç¹æ§
- ç»å
- URLãªã³ã¯
- æ·»ä»ãã¡ã€ã«
- ãã®ä»å€æ°
ãã®ã¢ãããŒãã«ããããã«ãŒããã€ã³ãã§ã¯æ¯ææ°åäžã®é«åºŠãªã¡ãŒã«è åšãæ€ç¥ãããããã¯ããããšãã§ããŸããå ·äœçã«ã¯ã50äžäººãè¶ ããé¡§å®¢ã§æ€ç¥ããããããžãã¹ã¡ãŒã«è©æ¬ºïŒBECïŒãé»è©±ãçšããæ»æå®è¡ïŒTOADïŒããã«ããã¡ã¯ã¿èªèšŒïŒMFAïŒåé¿æ»æãªã©ã§ãããŸãããããã®ã¡ãŒã«ããŠãŒã¶ãŒã®åä¿¡ãã¬ã€ã«å±ãåã«ãããã¯ããŸãã
ç¶ç¶çãªã€ãããŒã·ã§ã³ãžã®åãçµã¿
æšä»ã®ã¡ãŒã«è åšç¶æ³ã¯ãå·§åŠãªæ»æãæ¥ã ç¡æ°ã«çŸããŠããããšããããã©ã°ã¡ã³ãåãç¹åŸŽãšãªã£ãŠããŸãããã£ãã·ã³ã°è©æ¬ºããã©ã³ãµã ãŠã§ã¢æ»æã«ããããŸã§ãæ»æè ã¯çµ¶ãããã®æŠè¡ãé²åãããŠãããã¡ãŒã«ã·ã¹ãã ã人ã®è¡åã«ãããè匱æ§ã«ã€ãããã§ããŸããããããè åšã«å¯Ÿæããã«ã¯ãå®å šãã€å æ¬çãªã¢ãããŒããéèŠã§ããã¡ãŒã«é ä¿¡ãã§ãŒã³ã«ãããŠïŒåä¿¡åããåä¿¡åŸãã¯ãªãã¯æã«ããããŸã§ïŒç¶ç¶çãªè åšæ€ç¥ãšåæãæäŸããææ°ã®ã¢ãããŒãã«ãããçµç¹ã¯ãçæAIã®ãããªæ°ããè åšã«å¯ŸããŠããé ã ãŸã§ä¿è·ãå®çŸããããšãã§ããŸãã
ãã«ãŒããã€ã³ãã¯20幎ã«ããããAIãæ©æ¢°åŠç¿ïŒãã·ã³ã©ãŒãã³ã°ïŒãæ€ç¥ãšã³ãžã³æè¡ã®é¢ã§ã€ãããŒã·ã§ã³ã«åãçµãã§ããããšãå®èšŒããŠããŸããããã®20幎ã§ã驿°çãª250以äžã®ç¹èš±ãååŸããŠããŸããã·ã³ãã«ãªã¡ãŒã«ã»ãã¥ãªã㣠ããŒã«ã¯ãåäžã¬ã€ã€ãŒã®æ€ç¥ã¹ã¿ãã¯ã䜿çšããŠåä¿¡ã¡ãŒã«ãåæããŠããŸããããããã«ãŒããã€ã³ãã¯ãç¶ç¶çãªæ€ç¥ã¹ã¿ãã¯ã«ãããã€ãããŒã·ã§ã³ã«ãããŠåžå Žã®äžæ©å ãè¡ããŸãã
Proofpoint Threat Protection ã¯ãææ°ã®è åšãé«ç²ŸåºŠã§ç¹å®ãããã«ãã¬ã€ã€ãŒã®æ€ç¥ã¹ã¿ãã¯ãæèŒããŠããŸãã ãã«ãŒããã€ã³ãã¯ãããŸããŸãªæ€ç¥æè¡ã䜿çšããŠããŸããŸãªè åšããšãããŠããŸãããã«ãŒããã€ã³ãã®åºç¯ãªæ€ç¥æè¡ã»ããã«ãããé©åãªæè¡ãé©åãªè åšã«é©çšããããšãã§ããŸãã
æ¯ãèãAIãšå ±ã«æå³è§£æã掻çšããããšã§ããã«ãŒããã€ã³ãã¯ãé«åºŠãªã¡ãŒã«è åšã«å¯Ÿããé«ç²ŸåºŠã®æ€ç¥ãšæå¹æ§ãäŒæ¥ã«æäŸããŸãã
ãã«ãŒããã€ã³ãã¯ã人ããäžå¿ãšããã»ãã¥ãªãã£ãæäŸ
é²åŸ¡åŽã«ãšã£ãŠããŠãŒã¶ãŒãæªæã®ããã¡ãŒã«ããä¿è·ããããã«ãããã¢ã¯ãã£ããªã¢ãããŒããæ¡çšããããšããã€ãŠãªãã»ã©éèŠã«ãªã£ãŠããŸãããã«ãŒããã€ã³ãã«ããåä¿¡åã®æå³è§£æãšæ¯ãèãAIæ€ç¥ã«ãããæªæã®ããã¡ãŒã«ããŠãŒã¶ãŒã®åä¿¡ãã¬ã€ã«å±ãåã«é»æ¢ããããšãã§ããŸãããã«ãã¬ã€ã€ãŒã®æ€ç¥ã¹ã¿ã㯠ã¢ãããŒãã«ãããäŒæ¥ã¯æªæã®ããã¡ãã»ãŒãžãç¶ç¶çã«æ€ç¥ããåæããããšãã§ããŸããããã«ãããæãå·§åŠãªã¡ãŒã«è åšããã§ãããåŸæ¥å¡ãä¿è·ã§ããŸãã
ãã«ãŒããã€ã³ããå æ¥çºè¡šãããæ°ããæå³è§£æLLMæ€ç¥ãšã³ãžã³ã¯ããã¹ãŠã®Proofpoint Threat Protection ã®é¡§å®¢ã«æäŸãããŸãã åŸæ¥å¡ãšäŒæ¥ãä¿è·ããããã«ãFortune 100äŒæ¥ã®87%ããã«ãŒããã€ã³ããå©çšããŠããçç±ã«ã€ããŠã¯ãã¡ãã®ãœãªã¥ãŒã·ã§ã³æŠèŠãã芧ãã ããã