WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Passthrough – (TLP:CLEAR) MS-ISAC Report on How GenAI can be Coerced into a Malicious Response
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Passthrough – (TLP:CLEAR) MS-ISAC Report on How GenAI can be Coerced into a Malicious Response

Author: Chase Snow

Created: Tuesday, May 21, 2024 - 18:28

Categories: Cybersecurity, Security Preparedness

MS-ISAC, in coordination with the Elections Infrastructure ISAC (EI-ISAC), recently released a cyber threat intelligence (CTI) report titled: An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms. The report covers the testing conducted by the Center for Internet Security’s (CIS) Cyber Threat Intelligence team to understand how threat actors can leverage GenAI platforms, circumvent usage policies, and generate elections-focused phishing emails. It digs deep into threat actor methodologies, three GenAI platforms – ChatGPT, Gemini, and CoPilot – and covers threat actor use of voice cloning and deep fakes.

Key Findings from the Report Include:

  • Threat actors can circumvent GenAI platform usage policies and are highly likely to continuously test and develop methods to leverage them for malicious purposes. While individual results vary between platforms, with some providing higher quality content than others, the output represents a starting point that CTAs can modify and incorporate into their campaigns.
  • Attackers are likely to use these platforms to enhance existing methods of attack rather than deploy new and novel attacks. This includes developing content for phishing campaigns and audio/visual content for malign influence operations.
  • Threat actors using GenAI for voice cloning and deepfakes will likely pose a unique challenge as GenAI improves and detection methods remain limited.

While the role GenAI will play in cybersecurity remains fluid, understanding how threat actors can leverage these platforms is essential for improving defensive capabilities. Members are encouraged to review the report as it assesses the ease at which attackers can leverage AI technology for adversarial purposes.

Access the full report below:

Attached Files:

TLP--CLEAR GenAI Impacts to Network Defenders and CTAs

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar