  {"id":765,"date":"2025-11-14T08:00:39","date_gmt":"2025-11-14T13:00:39","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=765"},"modified":"2025-11-11T15:08:24","modified_gmt":"2025-11-11T20:08:24","slug":"attack-of-the-clones-ai","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/11\/14\/attack-of-the-clones-ai\/","title":{"rendered":"Attack of the Clones: When AI Imitates to Manipulate"},"content":{"rendered":"<p data-start=\"404\" data-end=\"685\">Artificial Intelligence is transforming how we learn, work, and communicate \u2014 but it\u2019s also becoming a powerful tool in the wrong hands. From convincing phishing scams to manipulated images, AI misuse can have real consequences for students, staff, and the entire campus community.<\/p>\n<h2 data-start=\"687\" data-end=\"716\"><strong data-start=\"691\" data-end=\"716\">How AI Can Be Misused<\/strong><\/h2>\n<p data-start=\"718\" data-end=\"764\">Attackers and bad actors are leveraging AI to:<\/p>\n<ul data-start=\"765\" data-end=\"1284\">\n<li data-start=\"765\" data-end=\"870\">\n<p data-start=\"767\" data-end=\"870\"><strong data-start=\"767\" data-end=\"818\">Generate convincing phishing emails or messages<\/strong> using natural language models to mimic real people.<\/p>\n<ul data-start=\"765\" data-end=\"1284\">\n<li data-start=\"765\" data-end=\"870\">Sometimes they can spoof email addresses or compromise an actual account.<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"871\" data-end=\"965\">\n<p data-start=\"873\" data-end=\"965\"><strong data-start=\"873\" data-end=\"917\">Create fake images or videos (deepfakes)<\/strong> to impersonate others or spread misinformation.<\/p>\n<\/li>\n<li data-start=\"966\" data-end=\"1052\">\n<p data-start=\"968\" data-end=\"1052\"><strong data-start=\"968\" data-end=\"995\">Automate scams at scale<\/strong> using bots to respond, target, and lure victims quickly.<\/p>\n<\/li>\n<li data-start=\"1053\" data-end=\"1161\">\n<p data-start=\"1055\" data-end=\"1161\"><strong data-start=\"1055\" data-end=\"1095\">Harvest and manipulate personal data<\/strong>, especially from public social media profiles, to tailor attacks.<\/p>\n<\/li>\n<li data-start=\"1162\" data-end=\"1284\">\n<p data-start=\"1164\" data-end=\"1284\"><strong data-start=\"1164\" data-end=\"1191\">Bypass security filters<\/strong> by subtly rewording malicious messages so they appear harmless to spam or malware detectors.<\/p>\n<\/li>\n<\/ul>\n<hr \/>\n<h2 data-start=\"1286\" data-end=\"1322\"><strong data-start=\"1290\" data-end=\"1322\">Real-World Impact on Victims<\/strong><\/h2>\n<p data-start=\"1324\" data-end=\"1347\">AI-powered attacks can:<\/p>\n<ul data-start=\"1348\" data-end=\"1798\">\n<li data-start=\"1348\" data-end=\"1437\">\n<p data-start=\"1350\" data-end=\"1437\"><strong data-start=\"1350\" data-end=\"1395\">Steal login credentials or financial data<\/strong> through fake websites or malicious forms.<\/p>\n<ul data-start=\"1348\" data-end=\"1798\">\n<li data-start=\"1348\" data-end=\"1437\">Never give away your login credentials or your Duo MFA codes.<\/li>\n<li data-start=\"1348\" data-end=\"1437\">ÌÇÐÄvlog will never ask you for your login credentials and Duo MFA codes.<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1438\" data-end=\"1501\">\n<p data-start=\"1440\" data-end=\"1501\"><strong data-start=\"1440\" data-end=\"1462\">Damage reputations<\/strong> if manipulated content spreads online.<\/p>\n<\/li>\n<li data-start=\"1502\" data-end=\"1587\">\n<p data-start=\"1504\" data-end=\"1587\"><strong data-start=\"1504\" data-end=\"1535\">Expose personal information<\/strong>, especially if AI scrapes data from public sources.<\/p>\n<\/li>\n<li data-start=\"1588\" data-end=\"1693\">\n<p data-start=\"1590\" data-end=\"1693\"><strong data-start=\"1590\" data-end=\"1607\">Exploit trust<\/strong>, such as mimicking a professor\u2019s tone or using university branding to trick students.<\/p>\n<\/li>\n<li data-start=\"1694\" data-end=\"1798\">\n<p data-start=\"1696\" data-end=\"1798\"><strong data-start=\"1696\" data-end=\"1728\">Undermine academic integrity<\/strong>, with tools used to generate fake research or impersonate authorship.<\/p>\n<\/li>\n<\/ul>\n<hr \/>\n<h2 data-start=\"1800\" data-end=\"1841\"><strong data-start=\"1804\" data-end=\"1841\">How to Stay Safe in the Age of AI<\/strong><\/h2>\n<p data-start=\"1843\" data-end=\"1885\">Here\u2019s how to protect yourself and others:<\/p>\n<ul>\n<li data-start=\"1887\" data-end=\"2043\"><strong data-start=\"1890\" data-end=\"1917\">Verify before you trust<\/strong><br data-start=\"1917\" data-end=\"1920\" \/>If a message or request feels even slightly off, take a moment to confirm through a second channel (call, in person, etc.).<\/li>\n<li data-start=\"2045\" data-end=\"2170\"><strong data-start=\"2048\" data-end=\"2089\">Use multi-factor authentication (MFA)<\/strong><br data-start=\"2089\" data-end=\"2092\" \/>This adds a strong layer of protection even if your password gets compromised.\n<ul>\n<li data-start=\"2045\" data-end=\"2170\">Duo MFA can be used for your personal accounts too!<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2172\" data-end=\"2327\"><strong data-start=\"2175\" data-end=\"2214\">Be skeptical of what you see online<\/strong><br data-start=\"2214\" data-end=\"2217\" \/>Images, videos, and even voices can be faked with AI. Always check sources and look for signs of manipulation.<\/li>\n<li data-start=\"2329\" data-end=\"2441\"><strong data-start=\"2332\" data-end=\"2365\">Limit what you share publicly<\/strong><br data-start=\"2365\" data-end=\"2368\" \/>The less personal data available, the less attackers can use against you.<\/li>\n<li data-start=\"2443\" data-end=\"2574\"><strong data-start=\"2446\" data-end=\"2482\">Learn what AI can (and can\u2019t) do<\/strong><br data-start=\"2482\" data-end=\"2485\" \/>Educating yourself about how AI works \u2014 and how it can be abused \u2014 is a critical defense.<\/li>\n<li data-start=\"2576\" data-end=\"2734\"><strong data-start=\"2579\" data-end=\"2601\">Use AI responsibly<\/strong><br data-start=\"2601\" data-end=\"2604\" \/>When you use generative AI tools for study or work, follow academic integrity policies. Misuse can have disciplinary consequences.<\/li>\n<\/ul>\n<hr data-start=\"2736\" data-end=\"2739\" \/>\n<h2 data-start=\"2741\" data-end=\"2760\"><strong data-start=\"2745\" data-end=\"2760\">Bottom Line<\/strong><\/h2>\n<p data-start=\"2761\" data-end=\"2959\">AI is a powerful tool \u2014 but like any tool, it can be misused. Staying informed and cautious helps protect you and the campus community from becoming a victim of manipulation, fraud, or digital harm.<\/p>\n<blockquote data-start=\"284\" data-end=\"423\"><p><strong>\u201cAI doesn\u2019t need to be evil to cause harm \u2014 it just needs to be used carelessly.\u201d<\/strong><\/p>\n<p>\u2014 Emily Harris JD, CISSP, CIPP\/US<br \/>\nChief Information Security Officer<\/p><\/blockquote>\n<hr \/>\n<h2 data-start=\"553\" data-end=\"653\">Want to Know More?<\/h2>\n<p>Fast Company | <a href=\"https:\/\/www.fastcompany.com\/91369428\/ai-trust-college-students-teachers\">How AI is impacting trust among college students and teachers<\/a><\/p>\n<p>CyberCrime Magazine | <a href=\"https:\/\/cybersecurityventures.com\/the-clear-and-present-danger-of-ai-powered-attacks-and-how-to-defeat-them\/\">The clear and present danger of AI-powered attacks, and how to defeat them<\/a><\/p>\n<p>IBM | <a href=\"https:\/\/www.ibm.com\/think\/insights\/security-roundup-top-ai-stories-in-2024\">Security roundup: Top AI stories in 2024<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial Intelligence is transforming how we learn, work, and communicate \u2014 but it\u2019s also becoming a powerful tool in the wrong hands. From convincing phishing scams to manipulated images, AI misuse can have real consequences for students, staff, and the entire campus community. How AI Can Be Misused Attackers and bad actors are leveraging AI [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":625,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=765"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/765\/revisions"}],"predecessor-version":[{"id":766,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/765\/revisions\/766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/625"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}