On Thursday, Microsoft revealed four people who, according to him, became the Azure Enterprise abuse scheme, which involves the use of unauthorized access to generative artificial intelligence (Genai) to create offensive and harmful content.
The company called LLMJacking has sent various AI offers, including Microsoft Azure Openai services. The technical giant tracks the cybercrime network as a Storm-2139. People named –
- Arian Yadegarnia Aka “Fiz” Iran,
- Alan Crisius, Aka “Drag” of the United Kingdom,
- Ricky Jen, Aka “CG-DOT” from Hong Kong, China, and
- PHUNG PHUNG TAN AKA “Osacu” from Vietnam
“Storm-2139 members exploit customer powers exposed from public sources to illegally access accounts with some AI generative services, Stephen Masad, Assistant General Lawyer Microsoft (DCU), – Note.
“Then they changed the possibilities of these services and restore access to other malicious subjects, giving detailed instructions how to create harmful and illegal content, including the inconsots of intimate images of celebrities and other sexual content.”
Redmond added Redmond, Redmond added.
A Augmented complaint comes a little over a month after Microsoft – Note This is engaged in legal actions against the subjects of threat for participation in the systematic theft of key API by several customers, including several US companies, and then monetization of this access to other subjects.
He also received a ruling of the court for confiscation of the web -resort (“Aitism (.) Pure”), which is believed to have been a decisive part of the group’s criminal operation.
Storm-2139 consists of three broad categories of people: creators who have developed illegal instruments that allow you to abuse the II services; Suppliers who change and supply these tools to customers at different prices; and the end users who use them to create synthetic content that violates the acceptable Microsoft and Code of Conduct.
Microsoft said she also identified two other actors located in the United States in Illinois and Floria. Their identity was retained to avoid obstacles with potential criminal investigations.
Other unnamed accomplices, vendors and end users are below –
- John Doy (DOE 2) who probably resides in the USA
- John Doy (DOE 3), who probably resides in Austria and uses alias “Sekrit”
- A person who probably resides in the US and uses alias “Pepsi”
- A person who probably resides in the US and uses alias “galc”
- A person who probably resides in the United Kingdom and uses the nickname “Dazz”
- A person who probably resides in the US and uses the pseudonym “Jorge”
- A person who probably resides in Turkey and uses the nickname “Jawajawaable”
- A person who probably resides in Russia and uses alias “1phlgm”
- John Doy (DOE 8) who probably resides in Argentina
- John Doy (DOE 9) who probably resides in Paraguay
- John Doy (DOE 10) who probably resides in Denmark
“Going for malicious subjects requires perseverance and constant vigilance,” Masada said. “By revealing these people and covering their malicious activities, Microsoft seeks to create a precedent in the fight against AI technology.”