Google Goes After Scammers Abusing Its Bard AI ChatbotGoogle Goes After Scammers Abusing Its Bard AI Chatbot
A pair of lawsuits are part of a wider strategy to establish guardrails preventing AI-powered scams, frauds, and harassment, Google's general counsel says.
November 13, 2023
Google is flexing its legal heft with two lawsuits aimed at shutting down abuse of Google's AI chatbot, Bard, to run cyber scams.
The first filing is aimed at cybercriminals who reportedly ran social media ads directing users to download Google's AI tools.
"The fraudsters created social media pages and ran ads that encouraged people to 'download' Bard, our freely available generative AI tool that does not need to be downloaded," Google general counsel Halimah DeLaine Prado explained in a Nov. 13 blog post about the legal actions. Instead, victims were served up malware to compromise their social media accounts, the post added.
Google reported more than 300 takedowns related to this specific cybercriminal group since April.
The second suit accuses malicious actors of using Google's AI tools to set up dozens of Google accounts, used to file fake copyright complaints in high volumes against competing businesses.
"These fraudulent claims resulted in removal of over 100,000 businesses' websites, costing them millions of dollars and thousands of hours in lost employee time," Prado wrote.
In addition to bringing more widespread awareness of these scams to the public, Prado explained that he hopes to showcase that emerging AI tools require the establishment of guardrails.
"Clear rules against frauds, scams, and harassment are important — no matter how novel the setting — and we're committed to doing our part to protect the people who use the internet from abuse," Prado wrote. "Just as AI fraudsters and copyright scammers hope to fly under the radar — we believe that appropriate legal action and working with government officials puts scammers squarely in the crosshairs of justice, promoting a safer internet for everyone."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
2022 Insurance Industry Cyber Threat Landscape Report