{"id":4391,"date":"2025-07-03T10:06:19","date_gmt":"2025-07-03T16:06:19","guid":{"rendered":"https:\/\/carrillolaw.com\/?p=4391"},"modified":"2025-08-29T16:22:58","modified_gmt":"2025-08-29T22:22:58","slug":"ciberdelincuencia-con-inteligencia-artificial","status":"publish","type":"post","link":"https:\/\/carrillolaw.com\/en\/2025\/07\/03\/ciberdelincuencia-con-inteligencia-artificial\/","title":{"rendered":"Cybercrime Aided by Artificial Intelligence"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4391\" class=\"elementor elementor-4391\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da6e095 e-flex e-con-boxed e-con e-parent\" data-id=\"da6e095\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d566a8 elementor-widget elementor-widget-image\" data-id=\"8d566a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02.jpg\" class=\"attachment-large size-large wp-image-4392\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02.jpg 2500w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-300x200.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-1024x683.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-768x512.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-1536x1024.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-2048x1366.jpg 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/07\/Julio-02-18x12.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed5db61 e-flex e-con-boxed e-con e-parent\" data-id=\"ed5db61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-876ed82 elementor-widget elementor-widget-text-editor\" data-id=\"876ed82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\">When Alfred Nobel invented dynamite in 1867, he imagined that his breakthrough would help humans in construction or mining tasks. Not that it would become a weapon of war. The same happens with technology that has made great contributions to the development of humanity, but in the wrong hands it ends up becoming a threat.<\/p><p style=\"text-align: justify;\">Kaspersky, <a href=\"https:\/\/forbes.com.mx\/ciberataques-en-2024-aumentan-14-a-nivel-mundial\/\">the cybersecurity firm,<\/a> published that on average in 2024, there were 467,000 cyberattacks detected per day worldwide, which represents an increase of 14% compared to 2023.\u00a0<\/p><p style=\"text-align: justify;\">In <a href=\"https:\/\/www.prensalibre.com\/economia\/4-de-cada-10-ataques-ciberneticos-en-guatemala-han-sido-contra-empresas-en-2023\/\">Guatemala<\/a>, there is a growing concern for cybersecurity. According to a report by Check Point Research, in 2023, 6,316 cyberattacks were registered in the country. Of these, 2,635 were directed at companies, especially in the banking and finance sectors. It is important to note that 92% of these attacks originated through malicious emails. \u00a0<\/p><p style=\"text-align: justify;\">The public sector has also received attacks that have made the news, such as those suffered by the <a href=\"https:\/\/lahora.gt\/nacionales\/hloarca\/2024\/02\/01\/ministerio-de-finanzas-investiga-lo-ocurrido-con-el-ciberataque-en-sus-sistemas\/\">Ministry of Public Finance<\/a> between November 26, 2023, and January of 2024, which paralyzed the systems of State Contracting and Procurement (Guatecompras) and the Integrated Accounting System (Sicoin). Another one took place on September 2022, which sought to illegally access the databases of the <a href=\"https:\/\/epinvestiga.com\/actualidad\/embajada-de-ee-uu-en-guatemala-atribuye-ciberataque-al-minex-en-2022-a-espionaje-chino\/\">Ministry of Foreign Affairs<\/a>.\u00a0<\/p><p style=\"text-align: justify;\">In response, at least three <a href=\"https:\/\/www.prensalibre.com\/guatemala\/guatemala-no-se-detiene\/una-agencia-para-defenderse-de-ataques-digitales-y-3-propuestas-mas-de-ciberseguridad\/\">bills<\/a> are being discussed in Congress that seek to regulate cybercrimes. However, these are still awaiting the opinion of the corresponding Commissions to start the approval process on the floor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82883b4 e-flex e-con-boxed e-con e-parent\" data-id=\"82883b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4ee2c9 elementor-widget elementor-widget-text-editor\" data-id=\"e4ee2c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"text-align: justify;\"><strong>AI Used for Crime\u00a0<\/strong><\/h5><p style=\"text-align: justify;\">It is estimated that more than 25% of cyberattacks in 2025 already use some form of artificial intelligence (AI) to evade traditional security controls. According to <a href=\"https:\/\/www.straitstimes.com\/singapore\/malicious-bots-behind-nearly-half-of-web-traffic-in-spore-study\">The Straits Times<\/a>, humans have lost control of the internet to AI-powered bots. Thus, more than half of the traffic on the web are bots and most of these are malicious in nature. And cybercriminals are taking advantage of these advances to boost:<\/p><ul style=\"text-align: justify;\"><li><strong>Advanced phishing: <\/strong>create more realistic phishing emails capable of fooling even trained users.\u00a0<\/li><\/ul><ul style=\"text-align: justify;\"><li><strong>Smart malware: <\/strong>automating attacks that crack weak passwords in seconds.\u00a0<\/li><\/ul><ul style=\"text-align: justify;\"><li><strong>Deepfakes and Deepvoice: <\/strong>clone voices or faces for personalized scams.\u00a0<\/li><\/ul><ul style=\"text-align: justify;\"><li><strong>Cloud attacks: <\/strong>identifying security breaches in this type of system through automated analysis.\u00a0<\/li><\/ul><p>\u00a0<\/p><p style=\"text-align: justify;\">On the positive side, AI is also being used to prevent and strengthen security systems. According to IBM, organizations that have implemented AI have reduced costs associated with data breaches by up to US$3 million.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc01639 e-flex e-con-boxed e-con e-parent\" data-id=\"bc01639\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-231c707 elementor-widget elementor-widget-text-editor\" data-id=\"231c707\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"text-align: justify;\"><strong>How to Protect Yourself<\/strong>\u00a0<\/h5><p style=\"text-align: justify;\">Prevention and ongoing team training are key to protecting against cyber threats, as 95% of successful attacks start with human error. But there are other measures that will be critical to protect your data and operations:\u00a0<\/p><ol style=\"text-align: justify;\"><li><strong>Implement multifactor authentication (MFA).<\/strong> A strong password is not enough. Use a second method such as SMS code or an authentication app.\u00a0<\/li><li><strong>Keep your systems and equipment up to date.<\/strong> Apply security patches as soon as they become available to prevent vulnerabilities and update operating systems. Also replace older computer systems and phones.<\/li><li><strong>Establish clear device usage policies.<\/strong> Limit the use of personal devices to access unprotected corporate data.\u00a0<\/li><li><strong>Perform regular backups.<\/strong> In the event of a ransomware attack (a malicious program that hijacks data), having backups can save your critical information.\u00a0<\/li><li><strong>Review and strengthen your incident response plan.<\/strong> Make sure you know how to act if a security breach occurs, because time is money.\u00a0<\/li><\/ol><p>\u00a0<\/p><p style=\"text-align: justify;\">The evolution of AI-enabled cybercrime is not a threat of the future; it is already a reality. Being prepared and taking preventative measures today can make the difference between operational continuity and a costly crisis.\u00a0<\/p><p style=\"text-align: justify;\">If you have any questions about the subject, please do not hesitate to contact us.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e4072 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e3e4072\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c992c9c e-grid e-con-boxed e-con e-parent\" data-id=\"c992c9c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f872677 elementor-widget elementor-widget-image\" data-id=\"f872677\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-1024x1024.png\" class=\"attachment-large size-large wp-image-3697\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-1024x1024.png 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-300x300.png 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-150x150.png 150w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-768x768.png 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-1536x1536.png 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-2048x2048.png 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/08\/Diego-Bran-12x12.png 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70ecce7 elementor-widget elementor-widget-image\" data-id=\"70ecce7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-1024x1024.jpg\" class=\"attachment-large size-large wp-image-4530\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-1024x1024.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-300x300.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-150x150.jpg 150w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-768x768.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-1536x1536.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-2048x2048.jpg 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2025\/08\/Incognito-1-12x12.jpg 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb774ee e-grid e-con-boxed e-con e-parent\" data-id=\"cb774ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1b6a0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c1b6a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/carrillolaw.com\/en\/miembro\/diego-bran\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Diego bran<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e452a2d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e452a2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">H\u00e9ctor cabrera<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-889c6d5 e-grid e-con-boxed e-con e-parent\" data-id=\"889c6d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c126bd4 elementor-widget elementor-widget-text-editor\" data-id=\"c126bd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\">Junior Associate<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4211b85 elementor-widget elementor-widget-text-editor\" data-id=\"4211b85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6 style=\"text-align: center;\">IT Expert<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La empresa de ciberseguridad Kaspersky public\u00f3 que, durante 2024, en promedio cada d\u00eda se identificaron 467 mil ciberataques a nivel mundial, lo que representa un aumento del 14% respecto al 2023. <\/p>","protected":false},"author":9,"featured_media":4392,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26],"tags":[33,300,564,357,426,263,563,301,299],"class_list":["post-4391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-freshstartmonday","tag-freshstartmonday-2","tag-ai","tag-ciberdelincuencia","tag-ciberseguridad","tag-diego-bran","tag-guatemala","tag-hector-cabrera","tag-ia","tag-inteligencia-artificial"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/4391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/comments?post=4391"}],"version-history":[{"count":19,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/4391\/revisions"}],"predecessor-version":[{"id":4536,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/4391\/revisions\/4536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/media\/4392"}],"wp:attachment":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/media?parent=4391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/categories?post=4391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/tags?post=4391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}