{"id":61465,"date":"2025-11-11T01:54:15","date_gmt":"2025-11-11T00:54:15","guid":{"rendered":"https:\/\/virtual-routes.org\/?page_id=61465"},"modified":"2025-11-17T23:01:13","modified_gmt":"2025-11-17T22:01:13","slug":"ai-w-cyberprzestepczosci","status":"publish","type":"page","link":"https:\/\/virtual-routes.org\/pl\/sztuczna-inteligencja-w-zestawie-narzedzi-cyberbezpieczenstwa\/ai-w-cyberprzestepczosci\/","title":{"rendered":"AI w cyberprzest\u0119pstwie"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"61465\" class=\"elementor elementor-61465\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd3475c e-flex e-con-boxed e-con e-parent\" data-id=\"cd3475c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b8e312b e-con-full e-flex e-con e-child\" data-id=\"b8e312b\" data-element_type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#0E093A\" class=\"elementor-element elementor-element-d308a14 elementor-widget elementor-widget-heading\" data-id=\"d308a14\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">AI w cyberprzest\u0119pczo\u015bci<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28d5968 elementor-widget elementor-widget-text-editor\" data-id=\"28d5968\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jak AI zmienia \u0142a\u0144cuch cyberzab\u00f3jc\u00f3w<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a22df6 elementor-absolute dce_masking-none elementor-invisible elementor-widget elementor-widget-image\" data-id=\"4a22df6\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img alt=\"\" loading=\"lazy\" decoding=\"async\" width=\"767\" height=\"773\" src=\"https:\/\/virtual-routes.org\/wp-content\/uploads\/2024\/11\/white-stair.svg\" class=\"attachment-full size-full wp-image-10938\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5623314 e-flex e-con-boxed e-con e-parent\" data-id=\"5623314\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-e2d9d41 e-con-full e-flex e-con e-child\" data-id=\"e2d9d41\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/pl\/sztuczna-inteligencja-w-zestawie-narzedzi-cyberbezpieczenstwa\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2cc5d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5d2cc5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Strona g\u0142\u00f3wna<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-946b325 e-con-full e-flex e-con e-child\" data-id=\"946b325\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/pl\/sztuczna-inteligencja-w-zestawie-narzedzi-cyberbezpieczenstwa\/sztuczna-inteligencja-w-cyberobronie\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe1f36 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7fe1f36\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI w cyberobronie<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-b9b3aea e-con-full e-flex e-con e-child\" data-id=\"b9b3aea\" data-element_type=\"container\" href=\"https:\/\/virtual-routes.org\/pl\/sztuczna-inteligencja-w-zestawie-narzedzi-cyberbezpieczenstwa\/ai-w-cyberprzestepczosci\/\">\n\t\t\t\t<div class=\"elementor-element elementor-element-974b42a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"974b42a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">AI w cyberprzest\u0119pczo\u015bci<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b71c35f pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"b71c35f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24b2a66 elementor-widget elementor-widget-text-editor\" data-id=\"24b2a66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ofensywne operacje cybernetyczne to celowe dzia\u0142ania prowadzone w cyberprzestrzeni w celu infiltracji, zak\u0142\u00f3cania lub niszczenia system\u00f3w przeciwnika w d\u0105\u017ceniu do osi\u0105gni\u0119cia cel\u00f3w strategicznych. S\u0105 one powszechnie okre\u015blane jako <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\">Cyber Kill Chain<\/a>, struktura pierwotnie opracowana przez Lockheed Martin. Ramy te dziel\u0105 atak na uporz\u0105dkowan\u0105 sekwencj\u0119 faz, \u015bledz\u0105c post\u0119py przeciwnika od pocz\u0105tkowego rozpoznania do ostatecznych dzia\u0142a\u0144 podj\u0119tych w celu osi\u0105gni\u0119cia cel\u00f3w (np. eksfiltracji lub zniszczenia danych).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e291fba e-flex e-con-boxed e-con e-parent\" data-id=\"e291fba\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5478c95 e-con-full e-flex e-con e-child\" data-id=\"5478c95\" data-element_type=\"container\">\n\t\t<a class=\"elementor-element elementor-element-4051d4d e-con-full reconnaissance clickable-dark e-flex e-con e-child\" data-id=\"4051d4d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4d7b78e e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"4d7b78e\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc0a058 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"bc0a058\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f5cbf elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"93f5cbf\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0b9ef1 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"a0b9ef1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rozpoznanie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff13cb9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ff13cb9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zbieranie adres\u00f3w e-mail, informacji o konferencjach itp.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-a490117 e-con-full e-flex e-con e-child\" data-id=\"a490117\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-521c000 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"521c000\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a97a2cb elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"a97a2cb\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6f6e01 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f6f6e01\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fde48b e-con-full e-flex e-con e-child\" data-id=\"0fde48b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b37efcb e-con-full e-flex e-con e-child\" data-id=\"b37efcb\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d19a8f0 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"d19a8f0\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e57db50 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"e57db50\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9fbfb3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"a9fbfb3\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a7f2ca e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"1a7f2ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f091e08 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"f091e08\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-548a777 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"548a777\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f139cdd e-con-full weaponisation clickable-dark e-flex e-con e-child\" data-id=\"f139cdd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-241064a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"241064a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Uzbrojenie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d8587b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0d8587b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u0141\u0105czenie exploita z backdoorem w dostarczalny \u0142adunek<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22c3eb7 e-con-full e-flex e-con e-child\" data-id=\"22c3eb7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-266e8c3 e-con-full delivery clickable-dark e-flex e-con e-child\" data-id=\"266e8c3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd1ee7b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"cd1ee7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dostawa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2265759 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2265759\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dostarczanie uzbrojonego pakietu do ofiary za po\u015brednictwem poczty e-mail, Internetu, USB itp.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0f1525 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"c0f1525\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51cf4d6 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"51cf4d6\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd8f3eb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cd8f3eb\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c6f362 e-con-full e-flex e-con e-child\" data-id=\"3c6f362\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-046f14f e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"046f14f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9160f0 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"b9160f0\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dbf064 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9dbf064\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7190e1b e-con-full e-flex e-con e-child\" data-id=\"7190e1b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a418990 e-con-full e-flex e-con e-child\" data-id=\"a418990\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dda60ad e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"dda60ad\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ecb5ae elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"0ecb5ae\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e51bfb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0e51bfb\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8da279 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"c8da279\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb64ec5 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"eb64ec5\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea0a199 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ea0a199\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e8b3fb e-con-full exploitation clickable-dark e-flex e-con e-child\" data-id=\"1e8b3fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c00d03 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8c00d03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eksploatacja<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9e26d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"fb9e26d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wykorzystanie luki w zabezpieczeniach w celu wykonania kodu w systemie ofiary<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb54ba3 e-con-full e-flex e-con e-child\" data-id=\"eb54ba3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d3f7623 e-con-full installation clickable-dark e-flex e-con e-child\" data-id=\"d3f7623\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc61083 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"fc61083\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Instalacja<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb018e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5eb018e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Instalowanie z\u0142o\u015bliwego oprogramowania na zasobie<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b57827 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"9b57827\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d00bfd elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"2d00bfd\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab455b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6ab455b\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cea69d5 e-con-full e-flex e-con e-child\" data-id=\"cea69d5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-da0d75e e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"da0d75e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b2b68 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"52b2b68\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1333e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7c1333e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-114a689 e-con-full e-flex e-con e-child\" data-id=\"114a689\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-72e6d56 e-con-full e-flex e-con e-child\" data-id=\"72e6d56\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dbe50ae e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"dbe50ae\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a92878 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"6a92878\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3413010 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"3413010\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-940ba19 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"940ba19\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b65b5b elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"7b65b5b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b7dbae elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9b7dbae\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07e9823 e-con-full command-control clickable-dark e-flex e-con e-child\" data-id=\"07e9823\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f59dcf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3f59dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dowodzenie i kontrola (C2)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99e3f54 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"99e3f54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kana\u0142 polece\u0144 do zdalnej manipulacji ofiar\u0105<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0caa49e e-con-full e-flex e-con e-child\" data-id=\"0caa49e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-68ddc2b e-con-full action-objectives clickable-dark e-flex e-con e-child\" data-id=\"68ddc2b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8338aa8 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"8338aa8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dzia\u0142ania dotycz\u0105ce cel\u00f3w<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f916562 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f916562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dzi\u0119ki dost\u0119powi \"Hands on Keyboard\" intruzi osi\u0105gaj\u0105 swoje pierwotne cele<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73d4aa1 e-con-full elementor-hidden-mobile no-change e-flex e-con e-child\" data-id=\"73d4aa1\" data-element_type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b7deb elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"d6b7deb\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2c5a5 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8a2c5a5\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f36f1e2 e-con-full e-flex e-con e-child\" data-id=\"f36f1e2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e33ebb5 e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"e33ebb5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a182956 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"a182956\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0df5f49 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0df5f49\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4b9d8c e-flex e-con-boxed e-con e-parent\" data-id=\"b4b9d8c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd68367 elementor-widget elementor-widget-html\" data-id=\"dd68367\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\n\/\/ Script to handle click simulation based on class-to-ID matching\ndocument.addEventListener('DOMContentLoaded', function() {\n    \/\/ Add click event listener to the document (event delegation)\n    document.addEventListener('click', function(event) {\n        let currentElement = event.target;\n        \n        \/\/ Traverse up the DOM tree to find an element with a class matching an ID\n        while (currentElement && currentElement !== document.body) {\n            \/\/ Get all classes from the current element\n            const classes = currentElement.classList;\n            \n            \/\/ Check each class to see if there's a matching ID element\n            for (let className of classes) {\n                \/\/ Check if an element exists with an ID matching this class\n                const matchingElement = document.getElementById(className);\n                \n                if (matchingElement) {\n                    \/\/ Find the tab-activator container\n                    const tabActivator = document.getElementById('tab-activator');\n                    \n                    if (tabActivator) {\n                        \/\/ Scroll to the tab-activator container smoothly\n                        tabActivator.scrollIntoView({ \n                            behavior: 'smooth', \n                            block: 'start' \n                        });\n                        \n                        \/\/ Wait a bit for scroll to complete, then simulate click\n                        setTimeout(function() {\n                            \/\/ Simulate click on the element with ID matching the class\n                            if (matchingElement) {\n                                matchingElement.click();\n                            }\n                        }, 300); \/\/ Small delay to allow scroll to complete\n                    } else {\n                        \/\/ If tab-activator doesn't exist, just click the matching element\n                        matchingElement.click();\n                    }\n                    \n                    \/\/ Only process the first matching class to avoid multiple clicks\n                    return;\n                }\n            }\n            \n            \/\/ Move up to the parent element\n            currentElement = currentElement.parentElement;\n        }\n    });\n});\n\n\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e16f543 pt-0 pb-0 e-flex e-con-boxed e-con e-child\" data-id=\"e16f543\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed398cb elementor-widget elementor-widget-text-editor\" data-id=\"ed398cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W ostatnich latach ofensywne operacje cybernetyczne nasili\u0142y si\u0119 zar\u00f3wno pod wzgl\u0119dem ilo\u015bci, jak i z\u0142o\u017cono\u015bci. <a href=\"https:\/\/www.consilium.europa.eu\/en\/policies\/top-cyber-threats\/\">Globalne cyberataki nie tylko gwa\u0142townie rosn\u0105, ale tak\u017ce r\u00f3\u017cnicuj\u0105 si\u0119 pod wzgl\u0119dem rodzaju<\/a>w 2022 roku, <a href=\"https:\/\/secure-iss.com\/wp-content\/uploads\/2023\/02\/IBM-Security-X-Force-Threat-Intelligence-Index-2023.pdf\">27% globalnych cyberatak\u00f3w by\u0142o opartych na wymuszeniach, 21% obejmowa\u0142o backdoory, a 17% ransomware.<\/a>. Sztuczna inteligencja (AI) odgrywa g\u0142\u00f3wn\u0105 rol\u0119 w tej eskalacji i dywersyfikacji, umo\u017cliwiaj\u0105c nowe formy atak\u00f3w, takie jak deepfake lub swarm malware, jednocze\u015bnie wzmacniaj\u0105c tradycyjne wektory, takie jak phishing lub wykorzystywanie luk w zabezpieczeniach. Wed\u0142ug <a href=\"https:\/\/www.cfo.com\/news\/cybersecurity-attacks-generative-ai-security-ransom\/692176\/\">Globalne badanie dyrektor\u00f3w finansowych<\/a>85% specjalist\u00f3w ds. cyberbezpiecze\u0144stwa przypisuje wzrost liczby atak\u00f3w uzbrojeniu generatywnego AI. W indyjskim mie\u015bcie Bengaluru <a href=\"https:\/\/timesofindia.indiatimes.com\/city\/bengaluru\/rs-938-crore-lost-to-cybercrooks-since-jan\/articleshow\/122075324.cms\">raport pa\u0144stwowy<\/a> potwierdzi\u0142 ten trend: na pocz\u0105tku 2025 r. 80% wiadomo\u015bci phishingowych zosta\u0142o wygenerowanych przez AI.<\/p><p>AI przekszta\u0142ca sam \u0142a\u0144cuch cyberzab\u00f3jc\u00f3w i ma nast\u0119puj\u0105ce mo\u017cliwo\u015bci <a href=\"https:\/\/cset.georgetown.edu\/publication\/a-national-security-research-agenda-for-cybersecurity-and-artificial-intelligence\/\">potencja\u0142 do do\u0142adowania ka\u017cdego etapu ofensywnych kampanii cybernetycznych<\/a>. Szybko\u015b\u0107 i skala, z jak\u0105 AI przekszta\u0142ca ten \u0142a\u0144cuch, sta\u0142a si\u0119 piln\u0105 kwesti\u0105 bezpiecze\u0144stwa narodowego.<\/p><p>Ten zestaw narz\u0119dzi koncentruje si\u0119 w szczeg\u00f3lno\u015bci na AI jako czynniku umo\u017cliwiaj\u0105cym atak, badaj\u0105c, w jaki spos\u00f3b przekszta\u0142ca on r\u00f3\u017cne etapy \u0142a\u0144cucha cyberzab\u00f3jc\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ada6a6 e-flex e-con-boxed e-con e-parent\" data-id=\"2ada6a6\" data-element_type=\"container\" id=\"tab-activator\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-dce-background-color=\"#FFFFFF00\" class=\"elementor-element elementor-element-65c1cb4f e-con-full e-flex e-con e-child\" data-id=\"65c1cb4f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bbf7813 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"4bbf7813\" data-element_type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"1270839315\" aria-label=\"Karty. Otwieraj elementy za pomoc\u0105 Enter lub Spacji, zamykaj za pomoc\u0105 Escape i nawiguj za pomoc\u0105 klawiszy strza\u0142ek.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"reconnaissance\" data-tab-title-id=\"e-n-tab-title-12708393151\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-12708393151\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tRozpoznanie\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"weaponisation\" data-tab-title-id=\"e-n-tab-title-12708393152\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393152\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUzbrojenie\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"delivery\" data-tab-title-id=\"e-n-tab-title-12708393153\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393153\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDostawa\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"exploitation\" data-tab-title-id=\"e-n-tab-title-12708393154\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393154\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEksploatacja\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"installation\" data-tab-title-id=\"e-n-tab-title-12708393155\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393155\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tInstalacja\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"command-control\" data-tab-title-id=\"e-n-tab-title-12708393156\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393156\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDowodzenie i kontrola\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"action-objectives\" data-tab-title-id=\"e-n-tab-title-12708393157\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393157\" style=\"--n-tabs-title-order: 7;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDzia\u0142ania zwi\u0105zane z celami\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-12708393158\" data-tab-title-id=\"e-n-tab-title-12708393158\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393158\" style=\"--n-tabs-title-order: 8;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPytania do dyskusji\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-12708393159\" data-tab-title-id=\"e-n-tab-title-12708393159\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-12708393159\" style=\"--n-tabs-title-order: 9;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBibliografia\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-12708393151\" role=\"tabpanel\" aria-labelledby=\"reconnaissance\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-2d27c8ca e-con-full e-flex e-con e-child\" data-id=\"2d27c8ca\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5baa7993 e-con-full e-flex e-con e-child\" data-id=\"5baa7993\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-560ac75e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"560ac75e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rozpoznanie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57c87746 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"57c87746\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16ddacd7 elementor-widget elementor-widget-text-editor\" data-id=\"16ddacd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy zbiera informacje o celu, takie jak dane pracownik\u00f3w, e-maile lub dane systemowe, aby zaplanowa\u0107 atak.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5f8c33 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1e5f8c33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia rekonesans: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71790fb7 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"71790fb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>AI automatyzuje i przyspiesza gromadzenie danych wywiadowczych o otwartym kodzie \u017ar\u00f3d\u0142owym poprzez przetwarzanie du\u017cych ilo\u015bci danych publicznych (media spo\u0142eczno\u015bciowe, strony korporacyjne, wycieki danych) oraz wyodr\u0119bnianie ustrukturyzowanych artefakt\u00f3w, takich jak subdomeny, prawdopodobne zakresy IP i profile pracownik\u00f3w. Obni\u017ca r\u00f3wnie\u017c barier\u0119 umiej\u0119tno\u015bci dla ukierunkowanej in\u017cynierii spo\u0142ecznej, tworz\u0105c zwi\u0119z\u0142e profile ofiar odpowiednie do spear-phishingu.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-474c6e15 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"474c6e15\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres wp\u0142ywu: Wysoki. Zautomatyzowany OSINT znacznie skraca czas i ogranicza wymagan\u0105 wiedz\u0119 specjalistyczn\u0105.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-61463a86 e-con-full e-flex e-con e-child\" data-id=\"61463a86\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-339af12c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"339af12c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniony przypadek: ChatGPT jako asystent rozpoznania<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36e47179 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"36e47179\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2307.06391\">badacz cyberbezpiecze\u0144stwa Sheetal Tamara<\/a> opublikowa\u0142a artyku\u0142 pokazuj\u0105cy, w jaki spos\u00f3b du\u017ce modele j\u0119zykowe, takie jak ChatGPT, mog\u0105 znacznie przyspieszy\u0107 faz\u0119 rozpoznawcz\u0105 ataku. Zamiast sp\u0119dza\u0107 godziny na pisaniu skrypt\u00f3w i r\u0119cznym zbieraniu danych wywiadowczych z otwartego \u017ar\u00f3d\u0142a, badacz wykorzysta\u0142 kr\u00f3tk\u0105 seri\u0119 podpowiedzi konwersacyjnych, na przyk\u0142ad: \"Wymie\u0144 wszystkie subdomeny, kt\u00f3re mo\u017cesz znale\u017a\u0107 dla examplecompany.com\", \"Podsumuj topologi\u0119 sieci firmy na podstawie publicznie dost\u0119pnych informacji\" oraz \"Okre\u015bl, jakie systemy operacyjne i us\u0142ugi s\u0105 najprawdopodobniej uruchomione na tych serwerach\".<\/p><p>W ci\u0105gu kilku minut model wygenerowa\u0142 przydatne materia\u0142y rozpoznawcze, w tym:<\/p><ul><li>lista domen i subdomen powi\u0105zanych z firm\u0105 docelow\u0105<\/li><li>prawdopodobne zakresy adres\u00f3w IP<\/li><li>uwagi dotycz\u0105ce konfiguracji SSL\/TLS, potencjalnych otwartych port\u00f3w i popularnych us\u0142ug<\/li><li>publiczne informacje o pracownikach (z LinkedIn i komunikat\u00f3w prasowych), kt\u00f3re mog\u0142yby zosta\u0107 wykorzystane do spear-phishingu.<\/li><\/ul><p>Tam, gdzie zbieranie OSINT normalnie wymaga\u0142oby godzin lub dni r\u0119cznej pracy, eksperyment ograniczy\u0142 zadanie do konwersacyjnego przep\u0142ywu pracy, kt\u00f3ry wymaga\u0142 znacznie mniejszej wiedzy technicznej. Badanie podkre\u015bla zatem, w jaki spos\u00f3b modele generatywne mog\u0105 obni\u017cy\u0107 barier\u0119 dla zautomatyzowanego rozpoznania, z wyra\u017anymi implikacjami dla praktyki obronnej i modelowania zagro\u017ce\u0144.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26ac9bf e-con-full e-flex e-con e-child\" data-id=\"26ac9bf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b14c2b elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"9b14c2b\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"9b14c2b\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-9b14c2b\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-9b794e4 e-con-full e-flex e-con e-child\" data-id=\"9b794e4\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-9b14c2b\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-b0d0a56 e-con-full e-flex e-con e-child\" data-id=\"b0d0a56\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8553f0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a8553f0\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zautomatyzowane narz\u0119dzia skanuj\u0105ce - <a href=\"https:\/\/doi.org\/10.1145\/3726122.3726164\">\"Weaponizing AI in Cyberattacks A Comparative Study of AI powered Tools for Offensive Security\" (Annis &amp; Hamoudeh 2025).<\/a><br> Badanie por\u00f3wnawcze pokazuje, jak zautomatyzowane narz\u0119dzia (np. WebCopilot, Sublist3r, RustScan+Nmap) przyspieszaj\u0105 skanowanie sieci i wyliczanie subdomen. Wyniki podkre\u015blaj\u0105, w jaki spos\u00f3b AI mo\u017ce dalej automatyzowa\u0107 zadania ofensywne, takie jak symulowanie scenariuszy atak\u00f3w i dynamiczne dostosowywanie si\u0119 do obrony, toruj\u0105c drog\u0119 do w pe\u0142ni zautomatyzowanych ofensywnych operacji bezpiecze\u0144stwa.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Narz\u0119dzia AI do rozpoznania - <a href=\"https:\/\/doi.org\/10.1016\/j.cose.2022.103006\">\"Zagro\u017cenie dla organizacji ze strony ofensywnego AI\" (Mirsky et al. 2023)<\/a><br> W badaniu wyr\u00f3\u017cniono 32 ofensywne narz\u0119dzia AI wykorzystuj\u0105ce g\u0142\u0119bokie uczenie, uczenie ze wzmocnieniem i NLP do automatyzacji wykrywania punkt\u00f3w wej\u015bcia, budowania persony i wyboru celu. Narz\u0119dzia te poprawiaj\u0105 OSINT, umo\u017cliwiaj\u0105 realistyczne podrabianie phishingu i pozwalaj\u0105 nawet niedo\u015bwiadczonym atakuj\u0105cym planowa\u0107 i uruchamia\u0107 bardziej skuteczne kampanie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zbieranie informacji i automatyczne wykorzystywanie - <a href=\"https:\/\/doi.org\/10.1016\/j.jisa.2020.102722\">\"Uzbrojony AI do cyberatak\u00f3w\" (Yamin et al. 2021)<\/a><br> W badaniu przeanalizowano niedawne cyberataki wykorzystuj\u0105ce techniki oparte na AI i zidentyfikowano odpowiednie strategie \u0142agodzenia skutk\u00f3w. Podkre\u015bla r\u00f3\u017cne narz\u0119dzia AI (np. GyoiThon, Deep Exploit), kt\u00f3re mog\u0105 pom\u00f3c w gromadzeniu danych o systemie, mo\u017cliwych celach i \u015brodkach obrony.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393152\" role=\"tabpanel\" aria-labelledby=\"weaponisation\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-44a1fe92 e-con-full e-flex e-con e-child\" data-id=\"44a1fe92\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3278110 e-con-full e-flex e-con e-child\" data-id=\"3278110\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39e25539 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"39e25539\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Uzbrojenie<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bb599ab elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6bb599ab\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d2ae45 elementor-widget elementor-widget-text-editor\" data-id=\"1d2ae45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy wykorzystuje informacje odkryte podczas rekonesansu, aby zbudowa\u0107 lub dostosowa\u0107 z\u0142o\u015bliwy \u0142adunek (np. z\u0142o\u015bliwe oprogramowanie lub exploity) i wykorzysta\u0107 s\u0142abo\u015bci celu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72aa9443 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"72aa9443\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia uzbrojenie: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92d733a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"92d733a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI usprawnia tworzenie i dostrajanie z\u0142o\u015bliwych \u0142adunk\u00f3w poprzez generowanie lub modyfikowanie kodu oraz testowanie wariant\u00f3w pod k\u0105tem modeli wykrywania. W ten spos\u00f3b mo\u017cna tworzy\u0107 bardziej dyskretne, adaptacyjne i ukierunkowane \u0142adunki, w tym warianty polimorficzne, kt\u00f3re zmieniaj\u0105 sw\u00f3j wygl\u0105d przy ka\u017cdym wykonaniu. Testy kontradyktoryjno\u015bci mog\u0105 by\u0107 wykorzystywane do udoskonalania \u0142adunk\u00f3w przed ich wdro\u017ceniem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-13802cf2 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"13802cf2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres wp\u0142ywu: Wysoki. Automatyzacja przyspiesza i skaluje rozw\u00f3j \u0142adunku.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-2e12c99b e-con-full e-flex e-con e-child\" data-id=\"2e12c99b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39c13f1b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"39c13f1b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniony przypadek: Z\u0142o\u015bliwe oprogramowanie typu dropper generowane przez AI na wolno\u015bci<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5464f8f9 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"5464f8f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r, <a href=\"https:\/\/www.securityweek.com\/ai-generated-malware-found-in-the-wild\/\">analitycy cyberbezpiecze\u0144stwa<\/a> zidentyfikowa\u0142a kampani\u0119 phishingow\u0105, kt\u00f3ra pocz\u0105tkowo wydawa\u0142a si\u0119 rutynowa: seria wiadomo\u015bci e-mail dystrybuuj\u0105cych konwencjonalny \u0142adunek z\u0142o\u015bliwego oprogramowania. Jednak bli\u017csza inspekcja droppera (tj. ma\u0142ego programu odpowiedzialnego za instalacj\u0119 i aktywacj\u0119 g\u0142\u00f3wnego z\u0142o\u015bliwego oprogramowania) ujawni\u0142a niezwyk\u0142\u0105 cech\u0119.<\/p><p>Struktura i sk\u0142adnia droppera wskazywa\u0142y, \u017ce zosta\u0142 on wygenerowany przez du\u017cy model j\u0119zykowy, a nie napisany przez ludzkiego programist\u0119. Chocia\u017c dzia\u0142a\u0142 jako prosty wrapper, dropper wyprodukowany przez AI by\u0142 zar\u00f3wno dopracowany, jak i skuteczny, demonstruj\u0105c zdolno\u015b\u0107 do unikania tradycyjnych metod wykrywania. Z powodzeniem omija\u0142 podstawowe sygnatury antywirusowe i dostarcza\u0142 z\u0142o\u015bliwe oprogramowanie zgodnie z przeznaczeniem.<\/p><p>Odkrycie to by\u0142o godne uwagi jako jeden z pierwszych potwierdzonych przypadk\u00f3w wdro\u017cenia na wolno\u015bci z\u0142o\u015bliwego kodu wygenerowanego przez AI. Chocia\u017c z\u0142o\u015bliwe oprogramowanie nie by\u0142o nowo\u015bci\u0105, outsourcing cz\u0119\u015bci procesu uzbrojenia do AI oznacza\u0142 znacz\u0105cy rozw\u00f3j. Pokaza\u0142o to, w jaki spos\u00f3b atakuj\u0105cy mog\u0105 skalowa\u0107 operacje, zmniejsza\u0107 koszty rozwoju i szybciej si\u0119 dostosowywa\u0107, jednocze\u015bnie komplikuj\u0105c wykrywanie i reagowanie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89461aa e-con-full e-flex e-con e-child\" data-id=\"89461aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82605aa elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"82605aa\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"82605aa\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-82605aa\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-a304515 e-con-full e-flex e-con e-child\" data-id=\"a304515\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-82605aa\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-bf93a33 e-con-full e-flex e-con e-child\" data-id=\"bf93a33\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-413326b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"413326b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Z\u0142o\u015bliwe oprogramowanie polimorficzne z rozszerzeniem AI - <a href=\"https:\/\/cardinalops.com\/blog\/polymorphic-ai-malware-detection\/\">\"Polimorficzne z\u0142o\u015bliwe oprogramowanie AI: A Real-World POC and Detection Walkthrough\" (Itkin 2025)<\/a><br> W artykule zaproponowano dow\u00f3d koncepcji polimorficznego z\u0142o\u015bliwego oprogramowania opartego na AI, dynamicznie przepisuj\u0105cego sw\u00f3j kod w czasie wykonywania, aby unikn\u0105\u0107 wykrycia, zbudowanego jako keylogger, kt\u00f3ry generuje zaciemnione \u0142adunki na wykonanie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Du\u017ce modele j\u0119zykowe do generowania kodu - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2503.01245\">\"Du\u017ce modele j\u0119zykowe do generowania kodu: A Comprehensive Survey of Challenges, Techniques, Evaluation, and Applications\" (Huynh &amp; Lin 2025)<\/a><br> Badanie pokazuje, w jaki spos\u00f3b LLM (np. CodeLlama, Copilot) mog\u0105 automatycznie generowa\u0107 kod wykonywalny z j\u0119zyka naturalnego, obni\u017caj\u0105c barier\u0119 dla tworzenia z\u0142o\u015bliwego oprogramowania, rozwoju exploit\u00f3w i adaptacji \u0142adunk\u00f3w przez atakuj\u0105cych.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Nowe techniki zaciemniania wygenerowane przez AI - <a href=\"https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534016\">\"ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator\" (Sewak et al. 2021)<\/a><br> Artyku\u0142 przedstawia ADVERSARIALuscator, AI, kt\u00f3ry mo\u017ce automatycznie przepisywa\u0107 kod z\u0142o\u015bliwego oprogramowania, aby tworzy\u0107 wiele wersji i za ka\u017cdym razem wygl\u0105da\u0107 inaczej, aby unikn\u0105\u0107 wykrycia przez systemy bezpiecze\u0144stwa. W testach oko\u0142o jedna trzecia tych wariant\u00f3w by\u0142a w stanie omin\u0105\u0107 zaawansowane systemy bezpiecze\u0144stwa.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Z\u0142o\u015bliwe oprogramowanie \"koduj\u0105ce wibracje\" oparte na AI - <a href=\"https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware\">\"Hakerzy wykorzystuj\u0105 AI do analizowania raport\u00f3w wywiadowczych dotycz\u0105cych zagro\u017ce\u0144 i z\u0142o\u015bliwego oprogramowania typu 'vibe code'\" (Kelly 2025)<\/a><br> W tym artykule badacze bezpiecze\u0144stwa poinformowali, \u017ce hakerzy u\u017cywaj\u0105 generatywnego AI do czytania i interpretowania raport\u00f3w wywiadowczych dotycz\u0105cych zagro\u017ce\u0144, a nast\u0119pnie automatycznie tworz\u0105 dzia\u0142aj\u0105ce z\u0142o\u015bliwe oprogramowanie. Technika ta, nazwana \"kodowaniem wibracyjnym\", przek\u0142ada analizy czytelne dla cz\u0142owieka na kod, umo\u017cliwiaj\u0105c przeciwnikom szybkie wykorzystanie publicznych bada\u0144 nad cyberbezpiecze\u0144stwem w exploitach.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393153\" role=\"tabpanel\" aria-labelledby=\"delivery\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-4560a88 e-con-full e-flex e-con e-child\" data-id=\"4560a88\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-daeb10d e-con-full e-flex e-con e-child\" data-id=\"daeb10d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7483ed68 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7483ed68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dostawa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-324ad489 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"324ad489\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-738150b7 elementor-widget elementor-widget-text-editor\" data-id=\"738150b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy przeprowadza atak, przesy\u0142aj\u0105c z\u0142o\u015bliwy \u0142adunek do celu, cz\u0119sto za po\u015brednictwem wiadomo\u015bci phishingowych, fa\u0142szywych stron internetowych lub niezabezpieczonych sieci.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44da5f2f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"44da5f2f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia dostaw\u0119: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f09cc5c elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1f09cc5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI dostosowuje i synchronizuje mechanizmy dostarczania, aby zmaksymalizowa\u0107 sukces. Automatyzuje generowanie przekonuj\u0105cych tre\u015bci phishingowych, deepfake'\u00f3w w czasie rzeczywistym, adaptacyjnych interakcji na czacie i realistycznych fa\u0142szywych stron internetowych, a tak\u017ce wykorzystuje dane rozpoznawcze, aby wybra\u0107 optymalny moment i kana\u0142 dostawy. Zmniejsza to zapotrzebowanie na ludzkie umiej\u0119tno\u015bci w realizacji kampanii.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-54532f31 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"54532f31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres wp\u0142ywu: Wysoki. AI znacznie zwi\u0119ksza perswazyjno\u015b\u0107 i automatyzacj\u0119 dostarczania.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-17b62d02 e-con-full e-flex e-con e-child\" data-id=\"17b62d02\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6ae149 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5b6ae149\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniona sprawa: Oszustwo Deepfake CEO w firmie Arup<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7db17db2 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7db17db2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r. pracownicy <a href=\"https:\/\/www.thetimes.com\/business-money\/technology\/article\/deepfake-fraudsters-impersonate-ftse-chief-executives-z9vvnz93l\">Brytyjska firma in\u017cynieryjna Arup<\/a> otrzyma\u0142 po\u0142\u0105czenie wideo, kt\u00f3re wygl\u0105da\u0142o na legalne, od regionalnego dyrektora generalnego. Dyrektor pilnie za\u017c\u0105da\u0142 przelewu \u015brodk\u00f3w w zwi\u0105zku z poufn\u0105 transakcj\u0105. Osoba na ekranie odwzorowywa\u0142a wygl\u0105d, g\u0142os i maniery dyrektora generalnego z niezwyk\u0142\u0105 dok\u0142adno\u015bci\u0105.<\/p><p>W rzeczywisto\u015bci dzwoni\u0105cy nie by\u0142 dyrektorem, ale fa\u0142szyw\u0105 osob\u0105 wygenerowan\u0105 przez AI, zaprojektowan\u0105 do na\u015bladowania go w czasie rzeczywistym. Przekonani o autentyczno\u015bci interakcji, pracownicy autoryzowali sekwencj\u0119 przelew\u00f3w na kwot\u0119 prawie 25 milion\u00f3w dolar\u00f3w.<\/p><p>Incydent ten jest jednym z najwi\u0119kszych zg\u0142oszonych przypadk\u00f3w in\u017cynierii spo\u0142ecznej z wykorzystaniem AI podczas fazy dostarczania cyberataku. Pokazuje on, \u017ce phishing nie musi ju\u017c polega\u0107 na \u017ale spreparowanych wiadomo\u015bciach e-mail lub w\u0105tpliwych linkach. Zamiast tego, AI umo\u017cliwia teraz wdra\u017canie wysoce realistycznych podr\u00f3bek audio i wideo, kt\u00f3re omijaj\u0105 nie tylko kontrole techniczne, ale tak\u017ce ludzk\u0105 ocen\u0119 i zaufanie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20b7d9b e-con-full e-flex e-con e-child\" data-id=\"20b7d9b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cfb8f7 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"9cfb8f7\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"9cfb8f7\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-9cfb8f7\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-c57bc4f e-con-full e-flex e-con e-child\" data-id=\"c57bc4f\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-9cfb8f7\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-0ba0c4a e-con-full e-flex e-con e-child\" data-id=\"0ba0c4a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4115e1 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c4115e1\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">LLM dla in\u017cynierii spo\u0142ecznej i phishingu na du\u017c\u0105 skal\u0119 - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2409.07587\">\"Badanie LLM pod k\u0105tem wykrywania z\u0142o\u015bliwego oprogramowania: Przegl\u0105d, projektowanie ram i podej\u015bcia do \u015brodk\u00f3w zaradczych\" (Al-Karaki &amp; Khan 2024)<\/a><br> W artykule opisano, w jaki spos\u00f3b LLM mog\u0105 by\u0107 wykorzystywane do automatyzacji tre\u015bci phishingowych, generowania polimorficznego z\u0142o\u015bliwego oprogramowania i tworzenia danych wej\u015bciowych przeciwnik\u00f3w.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">In\u017cynieria spo\u0142eczna oparta na AI - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2407.15912\">\"Cie\u0144 oszustwa: Pojawiaj\u0105ce si\u0119 niebezpiecze\u0144stwo in\u017cynierii spo\u0142ecznej opartej na AI i jej mo\u017cliwe lekarstwo\" (Yu et al. 2024)<\/a><br> Badanie pokazuje, w jaki spos\u00f3b modele dyfuzji i LLM sprawiaj\u0105, \u017ce phishing i podszywanie si\u0119 s\u0105 bardziej spersonalizowane i przekonuj\u0105ce. Kategoryzuje in\u017cynieri\u0119 spo\u0142eczn\u0105 opart\u0105 na AI na \"fazy 3E\" (Enlarging, Enriching, Emerging), podkre\u015blaj\u0105c, w jaki spos\u00f3b atakuj\u0105cy mog\u0105 skalowa\u0107 kampanie, wprowadza\u0107 nowe wektory i wykorzystywa\u0107 nowe zagro\u017cenia, zwi\u0119kszaj\u0105c skuteczno\u015b\u0107 dostarczania z\u0142o\u015bliwych \u0142adunk\u00f3w.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Oszustwa g\u0142osowe \/ phishing generowane przez AI - <a href=\"https:\/\/www.businessinsider.com\/bank-account-scam-deepfakes-ai-voice-generator-crime-fraud-2025-5\">\"Oszuka\u0142em sw\u00f3j bank\" (Hoover 2025)<\/a><br> Eksperyment dziennikarski, kt\u00f3ry ujawnia wygenerowany przez AI fa\u0142szywy g\u0142os u\u017cywany do wy\u0142udzania kont bankowych.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393154\" role=\"tabpanel\" aria-labelledby=\"exploitation\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-1fe6dd33 e-con-full e-flex e-con e-child\" data-id=\"1fe6dd33\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-58088b81 e-con-full e-flex e-con e-child\" data-id=\"58088b81\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7202206e elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7202206e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eksploatacja<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-364919c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"364919c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a28d96b elementor-widget elementor-widget-text-editor\" data-id=\"6a28d96b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy uruchamia \u0142adunek w celu wykorzystania luki w zabezpieczeniach i uzyskania nieautoryzowanego dost\u0119pu do systemu docelowego. Po infiltracji organizacji atakuj\u0105cy wykorzystuje ten dost\u0119p do przemieszczania si\u0119 mi\u0119dzy systemami w celu znalezienia odpowiednich informacji (np. wra\u017cliwych danych, dodatkowych luk w zabezpieczeniach, serwer\u00f3w poczty e-mail itp.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50a656da elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"50a656da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia wykorzystanie: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3841535f elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3841535f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI pomaga atakuj\u0105cym w identyfikacji, zrozumieniu i wykorzystaniu s\u0142abo\u015bci systemu poprzez automatyzacj\u0119 wykrywania luk (na przyk\u0142ad inteligentny fuzzing i skanowanie sterowane), konstruowanie drzew atak\u00f3w i proponowanie \u015bcie\u017cek eksploatacji. Mo\u017ce r\u00f3wnie\u017c generowa\u0107 przeciwne dane wej\u015bciowe, kt\u00f3re omijaj\u0105 narz\u0119dzia bezpiecze\u0144stwa lub wykorzystuj\u0105 mechanizmy obronne.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-219b8b7 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"219b8b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres wp\u0142ywu: \u015aredni. AI poprawia szybko\u015b\u0107 i skuteczno\u015b\u0107 wykrywania, zw\u0142aszcza w przypadku z\u0142o\u017conych system\u00f3w.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-4a020351 e-con-full e-flex e-con e-child\" data-id=\"4a020351\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d3c9708 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3d3c9708\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniony przypadek: Robak Morris II AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c8400e4 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7c8400e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2403.02817\">badacze<\/a> zademonstrowa\u0142 now\u0105 form\u0119 samorozprzestrzeniaj\u0105cego si\u0119 robaka, kt\u00f3ry nie polega\u0142 na wykorzystywaniu konwencjonalnych luk w oprogramowaniu. Zamiast tego atakowa\u0142 on same systemy generacyjne AI.<\/p><p>Nazwany <em>Morris II<\/em> W nawi\u0105zaniu do os\u0142awionego robaka Morrisa z 1988 roku, ten sprawdzony atak wykorzystywa\u0142 podpowiedzi przeciwnik\u00f3w do manipulowania modelami AI w celu powielania i rozpowszechniania z\u0142o\u015bliwych instrukcji. Po \"zainfekowaniu\" systemu robak m\u00f3g\u0142 autonomicznie generowa\u0107 dalsze podpowiedzi, kt\u00f3re sk\u0142ania\u0142y AI do powielenia ataku i przekazania go innym modelom.<\/p><p>W przeciwie\u0144stwie do tradycyjnych robak\u00f3w, kt\u00f3re zazwyczaj wykorzystuj\u0105 niezaktualizowany kod, <em>Morris II<\/em> poprzez wykorzystanie otwarto\u015bci i nieprzewidywalno\u015bci generatywnego zachowania AI. Demonstracja podkre\u015bli\u0142a, \u017ce w miar\u0119 jak organizacje coraz cz\u0119\u015bciej osadzaj\u0105 generatywny AI w operacyjnych przep\u0142ywach pracy, mog\u0105 one ujawnia\u0107 nowe powierzchnie ataku, w kt\u00f3rych podatno\u015b\u0107 na ataki nie le\u017cy w kodzie \u017ar\u00f3d\u0142owym, ale w danych szkoleniowych i odpowiedziach modelu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a4daae e-con-full e-flex e-con e-child\" data-id=\"6a4daae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-826da44 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"826da44\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"826da44\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-826da44\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-3ac993a e-con-full e-flex e-con e-child\" data-id=\"3ac993a\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-826da44\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-19642f4 e-con-full e-flex e-con e-child\" data-id=\"19642f4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-758fc8a elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"758fc8a\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sprzeczne i ofensywne AI - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2506.12519\">\"Wykorzystywanie AI do atak\u00f3w: On the Interplay between Adversarial AI and Offensive AI\" (Shr\u00f6er &amp; Pajola 2025)<\/a><br> W badaniu przedstawiono, w jaki spos\u00f3b atakuj\u0105cy mog\u0105 wykorzystywa\u0107 luki w systemach AI za pomoc\u0105 danych wej\u015bciowych przeciwnika lub uzbroi\u0107 sam AI, aby uruchomi\u0107 bardziej skuteczne exploity przeciwko tradycyjnym celom, podkre\u015blaj\u0105c podw\u00f3jn\u0105 rol\u0119 AI zar\u00f3wno jako narz\u0119dzia, jak i celu cyberatak\u00f3w.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pliki binarne z\u0142o\u015bliwego oprogramowania - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.1803.04173\">\"Adversarial Malware Binaries: Unikanie g\u0142\u0119bokiego uczenia w celu wykrywania z\u0142o\u015bliwego oprogramowania w plikach wykonywalnych\" (Kolosnjarski et al. 2018)<\/a><br> Badanie pokazuje ataki oparte na gradiencie, kt\u00f3re modyfikuj\u0105 mniej ni\u017c 1% bajt\u00f3w w plikach wykonywalnych przy jednoczesnym zachowaniu funkcjonalno\u015bci, skutecznie omijaj\u0105c g\u0142\u0119boko ucz\u0105ce si\u0119 wykrywacze z\u0142o\u015bliwego oprogramowania wyszkolone na surowych bajtach.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393155\" role=\"tabpanel\" aria-labelledby=\"installation\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-2c90b1ab e-con-full e-flex e-con e-child\" data-id=\"2c90b1ab\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6fd93ff2 e-con-full e-flex e-con e-child\" data-id=\"6fd93ff2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d214575 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2d214575\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Instalacja<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f00d68 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8f00d68\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737642f6 elementor-widget elementor-widget-text-editor\" data-id=\"737642f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy instaluje z\u0142o\u015bliwe oprogramowanie lub backdoory, aby utrzyma\u0107 (ukryty) sta\u0142y dost\u0119p i kontrol\u0119 w systemie docelowym.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c771ef elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"66c771ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia instalacj\u0119: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a16f72a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4a16f72a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI mo\u017ce tworzy\u0107 adaptacyjne techniki trwa\u0142o\u015bci i sugerowa\u0107 najskuteczniejsze wektory instalacji poprzez analiz\u0119 danych z poprzednich etap\u00f3w, ale pe\u0142na automatyzacja niuansowej, wymagaj\u0105cej podejmowania decyzji fazy instalacji pozostaje ograniczona. Tam, gdzie jest stosowany, AI umo\u017cliwia z\u0142o\u015bliwemu oprogramowaniu modyfikowanie zachowania w celu unikni\u0119cia wykrycia i wybrania optymalnego czasu i punkt\u00f3w wej\u015bcia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-7636ef22 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"7636ef22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres oddzia\u0142ywania: \u015aredni. AI poprawia wytrwa\u0142o\u015b\u0107 i ukrycie, ale pe\u0142na automatyzacja pozostaje ograniczona, poniewa\u017c instalacja wymaga decyzji kontekstowych.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-10ffcb38 e-con-full e-flex e-con e-child\" data-id=\"10ffcb38\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2962cf elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2962cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniony przypadek: Ransomware, kt\u00f3re uczy si\u0119 ukrywa\u0107<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24cb8f40 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"24cb8f40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r, <a href=\"https:\/\/doi.org\/10.1109\/LCN58197.2023.10223320\">badacze<\/a> wprowadzi\u0142 system znany jako <em>EGAN<\/em>model AI opracowany w celu zbadania, w jaki spos\u00f3b oprogramowanie ransomware mo\u017ce wykorzystywa\u0107 strategie uczenia si\u0119 w celu unikni\u0119cia wykrycia. W przeciwie\u0144stwie do tradycyjnego statycznego z\u0142o\u015bliwego oprogramowania, kt\u00f3re jest albo identyfikowane, albo pomijane, <em>EGAN<\/em> obs\u0142ugiwane przez iteracyjne eksperymenty.<\/p><p>System wielokrotnie modyfikowa\u0142 kod ransomware, testuj\u0105c kolejne warianty, a\u017c stworzy\u0142 taki, kt\u00f3ry m\u00f3g\u0142 omin\u0105\u0107 zabezpieczenia antywirusowe, zachowuj\u0105c pe\u0142n\u0105 funkcjonalno\u015b\u0107. W efekcie z\u0142o\u015bliwe oprogramowanie \"nauczy\u0142o si\u0119\", jak omija\u0107 mechanizmy wykrywania anomalii, kt\u00f3re zwykle skutecznie identyfikuj\u0105 podejrzane zachowania.<\/p><p>Chocia\u017c stworzone w \u015brodowisku badawczym, <em>EGAN<\/em> zademonstrowa\u0142, w jaki spos\u00f3b mechanizmy trwa\u0142o\u015bci oparte na AI mog\u0105 sprawi\u0107, \u017ce oprogramowanie ransomware b\u0119dzie znacznie trudniejsze do wykrycia i wyeliminowania po wdro\u017ceniu. Zamiast polega\u0107 na predefiniowanych technikach unikania, z\u0142o\u015bliwe oprogramowanie dostosowywa\u0142o si\u0119 dynamicznie, podnosz\u0105c perspektyw\u0119 niemal \"niemo\u017cliwego do zabicia\" z\u0142o\u015bliwego oprogramowania.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9857ded e-con-full e-flex e-con e-child\" data-id=\"9857ded\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00dff06 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"00dff06\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"00dff06\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-00dff06\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-6a4687e e-con-full e-flex e-con e-child\" data-id=\"6a4687e\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-00dff06\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-4d98524 e-con-full e-flex e-con e-child\" data-id=\"4d98524\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b746c7 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1b746c7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Unikanie z\u0142o\u015bliwego oprogramowania oparte na RL - <a href=\"https:\/\/doi.org\/10.48550\/arXiv.1801.08917\">\"Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning\" (Anderson i in. 2018)<\/a><br> Badanie pokazuje, w jaki spos\u00f3b agenci ucz\u0105cy si\u0119 ze wzmocnieniem mog\u0105 iteracyjnie modyfikowa\u0107 z\u0142o\u015bliwe oprogramowanie Windows PE za pomoc\u0105 zmian zachowuj\u0105cych funkcjonalno\u015b\u0107, aby unikn\u0105\u0107 statycznych wykrywaczy z\u0142o\u015bliwego oprogramowania ucz\u0105cych si\u0119 maszynowo, umo\u017cliwiaj\u0105c w pe\u0142ni czarn\u0105 skrzynk\u0119, adaptacyjn\u0105 instalacj\u0119 trwa\u0142ego z\u0142o\u015bliwego oprogramowania.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393156\" role=\"tabpanel\" aria-labelledby=\"command-control\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-6662cff9 e-con-full e-flex e-con e-child\" data-id=\"6662cff9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-694a2f5 e-con-full e-flex e-con e-child\" data-id=\"694a2f5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4477c8e5 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4477c8e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dowodzenie i kontrola<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb87b1c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2eb87b1c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35519003 elementor-widget elementor-widget-text-editor\" data-id=\"35519003\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Po przej\u0119ciu kontroli nad wieloma systemami, atakuj\u0105cy tworzy centrum kontroli w celu ich zdalnego wykorzystania. Atakuj\u0105cy nawi\u0105zuje zdaln\u0105 komunikacj\u0119 z zaatakowanym systemem za po\u015brednictwem r\u00f3\u017cnych kana\u0142\u00f3w (np. WWW, DNS lub e-mail), aby kontrolowa\u0107 operacje i unikn\u0105\u0107 wykrycia. Atakuj\u0105cy wykorzystuje r\u00f3\u017cne techniki, takie jak zaciemnianie, aby zatrze\u0107 \u015blady i unikn\u0105\u0107 wykrycia, lub ataki typu \"odmowa us\u0142ugi\" (DoS), aby odwr\u00f3ci\u0107 uwag\u0119 specjalist\u00f3w ds. bezpiecze\u0144stwa od swoich prawdziwych cel\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43c5bb2c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"43c5bb2c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia dowodzenie i kontrol\u0119 (C2): <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af9a732 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"6af9a732\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI umo\u017cliwia bardziej ukryt\u0105 komunikacj\u0119 C2 poprzez generowanie ruchu, kt\u00f3ry na\u015bladuje legaln\u0105 aktywno\u015b\u0107, projektowanie unikalnych algorytm\u00f3w generowania domen i organizowanie zdecentralizowanych, adaptacyjnych botnet\u00f3w. Mo\u017ce r\u00f3wnie\u017c dostosowywa\u0107 zachowanie C2 w celu unikni\u0119cia wykrywaczy anomalii.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-6c51d41 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"6c51d41\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres oddzia\u0142ywania: \u015aredni. AI zwi\u0119ksza wyrafinowanie i odporno\u015b\u0107 C2, ale ograniczenia operacyjne ograniczaj\u0105 powszechne przyj\u0119cie.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-120f33eb e-con-full e-flex e-con e-child\" data-id=\"120f33eb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45aaa304 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"45aaa304\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cnione przypadki: Skoordynowane botnety AI, roje z w\u0142asnym umys\u0142em<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73081ded elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"73081ded\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2023 r, <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2304.03669\">badacze<\/a> zademonstrowa\u0142a now\u0105 form\u0119 botnetu zasilanego przez AI. Konwencjonalne botnety zazwyczaj opieraj\u0105 si\u0119 na centralnym serwerze dowodzenia i kontroli (C2), za po\u015brednictwem kt\u00f3rego pojedyncze centrum wydaje instrukcje, kt\u00f3re nast\u0119pnie wykonuj\u0105 zainfekowane maszyny lub \"boty\". Architektur\u0119 t\u0119 mo\u017cna jednak cz\u0119sto zak\u0142\u00f3ci\u0107, gdy obro\u0144cy zidentyfikuj\u0105 i wy\u0142\u0105cz\u0105 centralny serwer.<\/p><p>Botnet obs\u0142uguj\u0105cy AI przyj\u0105\u0142 inny model. Ka\u017cdy w\u0119ze\u0142 w sieci stosowa\u0142 uczenie ze wzmocnieniem, aby autonomicznie okre\u015bli\u0107, kiedy zainicjowa\u0107 ataki, kt\u00f3re cele realizowa\u0107 i jak dostosowa\u0107 taktyk\u0119 w odpowiedzi na \u015brodki obronne. Zamiast czeka\u0107 na scentralizowane instrukcje, boty wsp\u00f3\u0142pracowa\u0142y w spos\u00f3b zdecentralizowany, funkcjonuj\u0105c jako forma samoorganizuj\u0105cego si\u0119 roju.<\/p><p>Taka konstrukcja sprawia\u0142a, \u017ce botnet by\u0142 bardziej odporny i trudniejszy do wykrycia. Nawet je\u015bli niekt\u00f3re w\u0119z\u0142y zosta\u0142y zneutralizowane, pozosta\u0142e mog\u0142y si\u0119 dostosowa\u0107 i kontynuowa\u0107 dzia\u0142anie. Dla obro\u0144c\u00f3w zadanie nie ogranicza\u0142o si\u0119 ju\u017c do zak\u0142\u00f3cania pracy pojedynczego serwera, ale wymaga\u0142o przeciwdzia\u0142ania rozproszonemu, adaptacyjnemu rojowi zainfekowanych maszyn.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28402c5 e-con-full e-flex e-con e-child\" data-id=\"28402c5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f65a6ad elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"f65a6ad\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"f65a6ad\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-f65a6ad\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-7271655 e-con-full e-flex e-con e-child\" data-id=\"7271655\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-f65a6ad\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-1a63973 e-con-full e-flex e-con e-child\" data-id=\"1a63973\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-766c383 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"766c383\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ukrycie \u015blad\u00f3w i manipulacja logami w oparciu o AI - <a href=\"https:\/\/www.hackthebox.com\/blog\/anti-forensics-techniques\">\"5 technik anty-forensics do oszukiwania \u015bledczych (+ przyk\u0142ady i wskaz\u00f3wki dotycz\u0105ce wykrywania)\" (CyberJunkie 2023)<\/a><br> Raporty z lat 2024-2025 opisywa\u0142y, w jaki spos\u00f3b AI mo\u017ce by\u0107 wykorzystywany do usuwania lub zmieniania cyfrowych dziennik\u00f3w w celu ukrycia atak\u00f3w przed \u015bledczymi, chocia\u017c pe\u0142ne przyk\u0142ady w \u015bwiecie rzeczywistym s\u0105 nadal rzadkie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Obej\u015bcie sieciowych system\u00f3w wykrywania w\u0142ama\u0144 opartych na GAN - <a href=\"https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020\">\"NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion\" (Piplai et al. 2020)<\/a><br> Badanie pokazuje, w jaki spos\u00f3b ataki przeciwnik\u00f3w mog\u0105 skutecznie omija\u0107 systemy wykrywania w\u0142ama\u0144 wyszkolone przez GAN, umo\u017cliwiaj\u0105c atakuj\u0105cym ukrywanie ruchu C2 jako normalnej aktywno\u015bci sieciowej.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393157\" role=\"tabpanel\" aria-labelledby=\"action-objectives\" data-tab-index=\"7\" style=\"--n-tabs-title-order: 7;\" class=\"elementor-element elementor-element-31db6098 e-con-full e-flex e-con e-child\" data-id=\"31db6098\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-48f13215 e-con-full e-flex e-con e-child\" data-id=\"48f13215\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a164973 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"6a164973\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dzia\u0142ania zwi\u0105zane z celami<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8d028b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c8d028b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6c5949 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7d6c5949\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Atakuj\u0105cy realizuje sw\u00f3j ostateczny cel, taki jak eksfiltracja danych, szyfrowanie danych lub zniszczenie danych.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661b3117 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"661b3117\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak AI zmienia dzia\u0142ania w zakresie cel\u00f3w: <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c2e30b3 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"2c2e30b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI przyspiesza i udoskonala ko\u0144cowe zadania ataku: zautomatyzowan\u0105 eksfiltracj\u0119 danych, priorytetyzacj\u0119 zasob\u00f3w o wysokiej warto\u015bci, dostosowane wiadomo\u015bci wymuszaj\u0105ce i generowanie tre\u015bci na du\u017c\u0105 skal\u0119 w celu dezinformacji lub zak\u0142\u00f3ce\u0144. Ostateczne decyzje strategiczne cz\u0119sto nadal wymagaj\u0105 ludzkiego os\u0105du, ale AI skraca drog\u0119 do ich podj\u0119cia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-text-color=\"#E8EEFF\" class=\"elementor-element elementor-element-12ffc0a0 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"12ffc0a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Zakres wp\u0142ywu: \u015aredni. AI przyspiesza i skaluje dzia\u0142ania zorientowane na cel, ale nie zast\u0119puje ca\u0142kowicie ludzkich intencji.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-eebb40a e-con-full e-flex e-con e-child\" data-id=\"eebb40a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-532b1aea elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"532b1aea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wyr\u00f3\u017cniony przypadek: PromptLocker, orkiestracja ransomware oparta na AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1af21cf6 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1af21cf6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W 2024 r, <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes\">naukowcy z Uniwersytetu Nowojorskiego przedstawili <em>PromptLocker<\/em><\/a>to sprawdzony system ransomware kontrolowany przez du\u017cy model j\u0119zykowy. W przeciwie\u0144stwie do konwencjonalnego oprogramowania ransomware, kt\u00f3re pod\u0105\u017ca za predefiniowanymi zachowaniami, <em>PromptLocker<\/em> podejmowa\u0142 decyzje w czasie rzeczywistym i automatyzowa\u0142 wiele etap\u00f3w cyklu \u017cycia ataku. Podczas demonstracji model dzia\u0142a\u0142 autonomicznie:<\/p><ul><li>wybra\u0142 najbardziej warto\u015bciowe cele w zaatakowanym systemie,<\/li><li>eksfiltrowa\u0142 poufne dane przed zaszyfrowaniem, zwi\u0119kszaj\u0105c przewag\u0119 nad ofiarami,<\/li><li>zaszyfrowane woluminy i pliki w celu odmowy dost\u0119pu<\/li><li>generowa\u0142 dostosowane noty okupu, dostosowuj\u0105c ton i \u017c\u0105dania do profilu ofiary (na przyk\u0142ad mo\u017cliwo\u015bci finansowych i sektora).<\/li><\/ul><p>Chocia\u017c praca zosta\u0142a przeprowadzona w kontrolowanym \u015brodowisku badawczym, <em>PromptLocker<\/em> zilustrowa\u0142, w jaki spos\u00f3b generatywny AI mo\u017ce zautomatyzowa\u0107 i skalowa\u0107 zadania, kt\u00f3re wcze\u015bniej wymaga\u0142y ludzkiego planowania, przyspieszaj\u0105c w ten spos\u00f3b zdolno\u015b\u0107 atakuj\u0105cych do osi\u0105gania swoich cel\u00f3w i dostosowywania si\u0119 do zmieniaj\u0105cych si\u0119 okoliczno\u015bci.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8112707 e-con-full e-flex e-con e-child\" data-id=\"8112707\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eff1db0 elementor-widget elementor-widget-marcs-collapsible-content\" data-id=\"eff1db0\" data-element_type=\"widget\" data-widget_type=\"marcs-collapsible-content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"marcs-collapsible-wrapper\" data-widget-id=\"eff1db0\" data-default-state=\"closed\" data-animation-duration=\"300\">\n\t\t\t<div class=\"marcs-collapsible-heading-wrapper\">\n\t\t\t\t<div class=\"marcs-collapsible-heading\">\n\t\t\t\t\tWi\u0119cej informacji\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"marcs-collapsible-content-eff1db0\">\n\t\t\t\t\t\t<span class=\"marcs-collapsible-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-closed\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"marcs-collapsible-icon-opened\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<!-- First nested container: Content Area -->\n\t\t\t<div class=\"marcs-collapsible-content-area elementor-element elementor-element-b3c5f7b e-con-full e-flex e-con e-child\" data-id=\"b3c5f7b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\n\t\t\t<!-- Second nested container: Collapsible Content -->\n\t\t\t<div id=\"marcs-collapsible-content-eff1db0\" class=\"marcs-collapsible-content-wrapper marcs-collapsible-hidden elementor-element elementor-element-cc562f2 e-con-full e-flex e-con e-child\" data-id=\"cc562f2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-256dbcb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"256dbcb\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dezinformacja generowana przez AI na du\u017c\u0105 skal\u0119 - <a href=\"https:\/\/www.wired.com\/story\/pro-russia-disinformation-campaign-free-ai-tools\/\">\"Prorosyjska kampania dezinformacyjna wykorzystuje darmowe narz\u0119dzia AI do nap\u0119dzania eksplozji tre\u015bci\" (Gilbert 2025)<\/a><br> W artykule wyja\u015bniono, w jaki spos\u00f3b powi\u0105zana z Rosj\u0105 kampania Operation Overload (2023-2025) wykorzystuje narz\u0119dzia AI do masowej produkcji fa\u0142szywych zdj\u0119\u0107, film\u00f3w i sklonowanych g\u0142os\u00f3w os\u00f3b publicznych. Materia\u0142y te s\u0105 szeroko rozpowszechniane za po\u015brednictwem sieci bot\u00f3w w mediach spo\u0142eczno\u015bciowych w celu promowania dziel\u0105cych narracji.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fa\u0142szywe profile spo\u0142eczno\u015bciowe stworzone przez AI w celu wzmocnienia - <a href=\"https:\/\/doi.org\/10.54501\/jots.v2i4.197\">\"Charakterystyka i rozpowszechnienie fa\u0142szywych profili w mediach spo\u0142eczno\u015bciowych z twarzami wygenerowanymi przez AI\" (Yang et al. 2024)<\/a><br> Dochodzenie wykaza\u0142o ponad 1400 kont na Twitterze korzystaj\u0105cych ze zdj\u0119\u0107 profilowych wygenerowanych przez AI, zorganizowanych w sieci w celu promowania oszustw i wiadomo\u015bci o charakterze politycznym, z tysi\u0105cami takich kont aktywnych codziennie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Stworzone przez AI fa\u0142szywe dokumenty i serwisy informacyjne (psyops) - <a href=\"https:\/\/www.foreignaffairs.com\/united-states\/lies-russia-tells-itself\">\"K\u0142amstwa, kt\u00f3re wmawia sobie Rosja Propagandy\u015bci tego kraju celuj\u0105 w Zach\u00f3d, ale wprowadzaj\u0105 w b\u0142\u0105d r\u00f3wnie\u017c Kreml\" (Rid 2024)<\/a><br> Artyku\u0142 wyja\u015bnia, w jaki spos\u00f3b trwaj\u0105ca kampania Doppelg\u00e4nger tworzy przekonuj\u0105ce fa\u0142szywe wersje legalnych witryn informacyjnych i publikuje artyku\u0142y wygenerowane przez AI w celu promowania prorosyjskich narracji na Zachodzie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393158\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-12708393158\" data-tab-index=\"8\" style=\"--n-tabs-title-order: 8;\" class=\"elementor-element elementor-element-b4ce08a e-flex e-con-boxed e-con e-child\" data-id=\"b4ce08a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83a6060 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"83a6060\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pytania do dyskusji<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c35b6f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c35b6f4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26bb7a0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"26bb7a0\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Kt\u00f3ry etap \u0142a\u0144cucha cyberzab\u00f3jc\u00f3w mo\u017ce zosta\u0107 najbardziej przekszta\u0142cony przez AI w przysz\u0142o\u015bci i dlaczego? A obecnie, na kt\u00f3rym etapie AI zapewnia najbardziej obiecuj\u0105ce wyniki dla atakuj\u0105cych? Na kt\u00f3rym etapie wdro\u017cenie AI wydaje si\u0119 mniej skuteczne i obiecuj\u0105ce? <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Czy AI przechyla przewag\u0119 w cyberprzestrzeni bardziej w stron\u0119 atakuj\u0105cych czy obro\u0144c\u00f3w?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Czy powszechny dost\u0119p do AI wyr\u00f3wna szanse amator\u00f3w, czy te\u017c wzmocni pozycj\u0119 dobrze wyposa\u017conych przeciwnik\u00f3w?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">W jaki spos\u00f3b zdolno\u015b\u0107 AI do automatyzacji i przyspieszenia \u0142a\u0144cucha cyberzab\u00f3jc\u00f3w zmienia charakter cyberatak\u00f3w?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Czy AI mo\u017ce sprawi\u0107, \u017ce ataki b\u0119d\u0105 tak szybkie i adaptacyjne, \u017ce tradycyjne ramy obronne stan\u0105 si\u0119 przestarza\u0142e?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Kto ponosi odpowiedzialno\u015b\u0107, gdy modele AI s\u0105 niew\u0142a\u015bciwie wykorzystywane do cyberatak\u00f3w: deweloperzy, wdro\u017ceniowcy czy atakuj\u0105cy?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">W jaki spos\u00f3b decydenci mog\u0105 regulowa\u0107 ofensywny AI bez t\u0142umienia innowacji w zastosowaniach obronnych lub cywilnych?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Czy AI popchnie cyberkonflikt w kierunku bardziej autonomicznych dzia\u0142a\u0144 wojennych \"maszyna na maszynie\"?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Czy AI mo\u017ce zasadniczo zmieni\u0107 model cybernetycznego \u0142a\u0144cucha zab\u00f3jstw w co\u015b nieliniowego i stale adaptacyjnego?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-12708393159\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-12708393159\" data-tab-index=\"9\" style=\"--n-tabs-title-order: 9;\" class=\"elementor-element elementor-element-90d1350 e-flex e-con-boxed e-con e-child\" data-id=\"90d1350\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b71da80 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"b71da80\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bibliografia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d053a6e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d053a6e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c752cfb elementor-widget elementor-widget-text-editor\" data-id=\"c752cfb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Prorosyjska kampania dezinformacyjna wykorzystuje bezp\u0142atne narz\u0119dzia AI do nap\u0119dzania \"eksplozji tre\u015bci\" | WIRED\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.wired.com\/story\/pro-russia-disinformation-campaign-free-ai-tools\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"AI-Powered PromptLocker Ransomware Is Just an NYU Research Project - the Code Worked as a Typical Ransomware, Selecting Targets, Exfiltrating Selected Data and Encrypting Volumes | Tom's Hardware\". Dost\u0119p 19 wrze\u015bnia 2025 r. https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/ai-powered-promptlocker-ransomware-is-just-an-nyu-research-project-the-code-worked-as-a-typical-ransomware-selecting-targets-exfiltrating-selected-data-and-encrypting-volumes.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Al-Karaki, Jamal, Muhammad Al-Zafar Khan i Marwan Omar. \"Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches\". arXiv:2409.07587. Wersja 1. Preprint, arXiv, 11 wrze\u015bnia 2024 r. https:\/\/doi.org\/10.48550\/arXiv.2409.07587.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Anderson, Hyrum S., Anant Kharkar, Bobby Filar, David Evans i Phil Roth. \"Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning\". arXiv:1801.08917. Preprint, arXiv, 30 stycznia 2018 r. https:\/\/doi.org\/10.48550\/arXiv.1801.08917.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Anis, Fatima i Mohammad Hammoudeh. \"Weaponizing AI in Cyberattacks A Comparative Study of AI Powered Tools for Offensive Security\". <\/span><i><span style=\"font-weight: 400;\">Materia\u0142y z 8. mi\u0119dzynarodowej konferencji na temat sieci przysz\u0142o\u015bci i system\u00f3w rozproszonych<\/span><\/i><span style=\"font-weight: 400;\">, ACM, 11 grudnia 2024, 283-90. https:\/\/doi.org\/10.1145\/3726122.3726164.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Buchanan, Ben. \"Program bada\u0144 nad bezpiecze\u0144stwem narodowym w zakresie cyberbezpiecze\u0144stwa i sztucznej inteligencji\". <\/span><i><span style=\"font-weight: 400;\">Centrum bezpiecze\u0144stwa i nowych technologii<\/span><\/i><span style=\"font-weight: 400;\">, 2020. https:\/\/cset.georgetown.edu\/publication\/a-national-security-research-agenda-for-cybersecurity-and-artificial-intelligence\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Cohen, Stav, Ron Bitton i Ben Nassi. \"Nadchodzi robak AI: Unleashing Zero-Click Worms That Target GenAI-Powered Applications\". arXiv:2403.02817. Wersja 1. Preprint, arXiv, 5 marca 2024 r. https:\/\/doi.org\/10.48550\/arXiv.2403.02817.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Commey, Daniel, Benjamin Appiah, Bill K. Frimpong, Isaac Osei, Ebenezer N. A. Hammond i Garth V. Crosby. \"EGAN: Evolutional GAN for Ransomware Evasion\". <\/span><i><span style=\"font-weight: 400;\">2023 48. konferencja IEEE na temat lokalnych sieci komputerowych (LCN)<\/span><\/i><span style=\"font-weight: 400;\">, 2 pa\u017adziernika 2023, 1-9. https:\/\/doi.org\/10.1109\/LCN58197.2023.10223320.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Cyber Kill Chain\u00ae | Lockheed Martin\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Zagro\u017cenia cybernetyczne w UE: Fakty i liczby - Consilium\". Dost\u0119p 22 wrze\u015bnia 2025 r. https:\/\/www.consilium.europa.eu\/en\/policies\/top-cyber-threats\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Oszu\u015bci Deepfake podszywaj\u0105 si\u0119 pod dyrektor\u00f3w generalnych FTSE\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.thetimes.com\/business-money\/technology\/article\/deepfake-fraudsters-impersonate-ftse-chief-executives-z9vvnz93l.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Hack The Box. \"5 technik antyforensowych pozwalaj\u0105cych oszuka\u0107 \u015bledczych (+ przyk\u0142ady i wskaz\u00f3wki dotycz\u0105ce wykrywania)\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.hackthebox.com\/blog\/anti-forensics-techniques.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Hakerzy u\u017cywaj\u0105 AI do analizy raport\u00f3w Threat Intelligence i z\u0142o\u015bliwego oprogramowania \"Vibe Code\" | IT Pro\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Hoover, Amanda. \"Nowy sprytny przekr\u0119t, kt\u00f3rego bank nie mo\u017ce powstrzyma\u0107\". Business Insider. Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/www.businessinsider.com\/bank-account-scam-deepfakes-ai-voice-generator-crime-fraud-2025-5.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Huynh, Nam, i Beiyu Lin. \"Du\u017ce modele j\u0119zykowe do generowania kodu: A Comprehensive Survey of Challenges, Techniques, Evaluation, and Applications\". arXiv:2503.01245. Preprint, arXiv, 2 kwietnia 2025 r. https:\/\/doi.org\/10.48550\/arXiv.2503.01245.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><i><span style=\"font-weight: 400;\">IBM Security X-Force Threat Intelligence Index 2023<\/span><\/i><span style=\"font-weight: 400;\">. n.d.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Kolosnjaji, Bojan, Ambra Demontis, Battista Biggio, et al. \"Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables\". arXiv:1803.04173. Preprint, arXiv, 12 marca 2018 r. https:\/\/doi.org\/10.48550\/arXiv.1803.04173.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Li, Haoyuan, Hao Jiang, Tao Jin, et al. \"DATE: Domain Adaptive Product Seeker for E-Commerce\". arXiv:2304.03669. Preprint, arXiv, 7 kwietnia 2023 r. https:\/\/doi.org\/10.48550\/arXiv.2304.03669.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Mirsky, Yisroel, Ambra Demontis, Jaidip Kotak, et al. \"Zagro\u017cenie ofensywnym AI dla organizacji\". <\/span><i><span style=\"font-weight: 400;\">Komputery i bezpiecze\u0144stwo<\/span><\/i><span style=\"font-weight: 400;\"> 124 (stycze\u0144 2023): 103006. https:\/\/doi.org\/10.1016\/j.cose.2022.103006.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Piplai, Aritran, Sai Sree Laya Chukkapalli i Anupam Joshi. 'NAttack! Adversarial Attacks to Bypass a GAN Based Classifier Trained to Detect Network Intrusion\". <\/span><i><span style=\"font-weight: 400;\">2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) oraz IEEE Intl Conference on Intelligent Data and Security (IDS)<\/span><\/i><span style=\"font-weight: 400;\">, maj 2020, 49-54. https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00020.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Polimorficzne z\u0142o\u015bliwe oprogramowanie AI: A Real-World POC and Detection Walkthrough - CardinalOps\". Dost\u0119p 19 wrze\u015bnia 2025. https:\/\/cardinalops.com\/blog\/polymorphic-ai-malware-detection\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Rid, Thomas. \"The Lies Russia Tells Itself\" (\"K\u0142amstwa, kt\u00f3re opowiada sobie Rosja\"). <\/span><i><span style=\"font-weight: 400;\">Sprawy zagraniczne<\/span><\/i><span style=\"font-weight: 400;\">, 30 wrze\u015bnia 2024 r. https:\/\/www.foreignaffairs.com\/united-states\/lies-russia-tells-itself.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">\"Rs 938 Crore Lost to Cybercrooks since Jan | Bengaluru News - Times of India\". Dost\u0119p 22 wrze\u015bnia 2025. https:\/\/timesofindia.indiatimes.com\/city\/bengaluru\/rs-938-crore-lost-to-cybercrooks-since-jan\/articleshow\/122075324.cms.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Schr\u00f6er, Saskia Laura, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese i Mauro Conti. \"Wykorzystywanie AI do atak\u00f3w: On the Interplay between Adversarial AI and Offensive AI\". arXiv:2506.12519. Wersja 1. Preprint, arXiv, 14 czerwca 2025 r. https:\/\/doi.org\/10.48550\/arXiv.2506.12519.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Sewak, Mohit, Sanjay K. Sahay i Hemant Rathore. 'ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator\". <\/span><i><span style=\"font-weight: 400;\">2021 Mi\u0119dzynarodowa wsp\u00f3lna konferencja na temat sieci neuronowych (IJCNN)<\/span><\/i><span style=\"font-weight: 400;\">, 18 lipca 2021, 1-9. https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534016.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Temara, Sheetal. \"Maximizing Penetration Testing Success with Effective Reconnaissance Techniques Using ChatGPT\". arXiv:2307.06391. Preprint, arXiv, 20 marca 2023 r. https:\/\/doi.org\/10.48550\/arXiv.2307.06391.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Townsend, Kevin. \"AI-Generated Malware Found in the Wild\". <\/span><i><span style=\"font-weight: 400;\">SecurityWeek<\/span><\/i><span style=\"font-weight: 400;\">, 24 wrze\u015bnia 2024 r. https:\/\/www.securityweek.com\/ai-generated-malware-found-in-the-wild\/.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yamin, Muhammad Mudassar, Mohib Ullah, Habib Ullah i Basel Katt. \"Uzbrojony AI do cyberatak\u00f3w\". <\/span><i><span style=\"font-weight: 400;\">Journal of Information Security and Applications<\/span><\/i><span style=\"font-weight: 400;\"> 57 (marzec 2021): 102722. https:\/\/doi.org\/10.1016\/j.jisa.2020.102722.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yang, Kai-Cheng, Danishjeet Singh i Filippo Menczer. \"Charakterystyka i rozpowszechnienie fa\u0142szywych profili w mediach spo\u0142eczno\u015bciowych z twarzami wygenerowanymi przez AI\". <\/span><i><span style=\"font-weight: 400;\">Journal of Online Trust and Safety<\/span><\/i><span style=\"font-weight: 400;\"> 2, no. 4 (2024). https:\/\/doi.org\/10.54501\/jots.v2i4.197.\u00a0<\/span><\/a><\/p><p><a href=\"https:\/\/www.zotero.org\/google-docs\/?FRGN5B\"><span style=\"font-weight: 400;\">Yu, Jingru, Yi Yu, Xuhong Wang, et al. \"Cie\u0144 oszustwa: The Emerging Danger of AI-Powered Social Engineering and Its Possible Cure\". arXiv:2407.15912. Preprint, arXiv, 22 lipca 2024 r. https:\/\/doi.org\/10.48550\/arXiv.2407.15912.\u00a0<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>AI w cyberprzest\u0119pczo\u015bci Jak AI zmienia Cyber Kill Chain Strona g\u0142\u00f3wna AI w cyberobronie AI w cyberprzest\u0119pczo\u015bci Ofensywne operacje cybernetyczne to celowe dzia\u0142ania prowadzone w cyberprzestrzeni w celu infiltracji, zak\u0142\u00f3cenia lub zniszczenia system\u00f3w przeciwnika w d\u0105\u017ceniu do osi\u0105gni\u0119cia cel\u00f3w strategicznych. S\u0105 one powszechnie opisywane za pomoc\u0105 Cyber Kill Chain, struktury pierwotnie opracowanej przez [...]<\/p>","protected":false},"author":1,"featured_media":55699,"parent":61455,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"class_list":["post-61465","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/61465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/comments?post=61465"}],"version-history":[{"count":21,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/61465\/revisions"}],"predecessor-version":[{"id":68302,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/61465\/revisions\/68302"}],"up":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/pages\/61455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/media\/55699"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/pl\/wp-json\/wp\/v2\/media?parent=61465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}