AI-Powered Malware - A Serious Cyber Security Threat

Cyber criminals are using Artificial Intelligence (AI) to build sophisticated and hyper-targeted malware that is hard to detect with traditional cyber security. The integration of AI into malware development is becoming as a serious cyber security threat, which is now a new method of criminal hacking attacks. 

Traditionally, AI was not widely associated with malware, but with the rise of generative AI tools, cyber criminals are increasingly exploiting this technology to enhance their attacks. 

AI-powered cyber attacks are more sophisticated, harder to detect, and capable of by-passing traditional security measures. And despite organisations attempts to minimise hackers’ chances of using their tools for criminal purposes, AI can now be used in malware development in several ways. 

AI can be used to search for exploitable vulnerabilities, and readily available tools like ChatGPT allow even inexperienced hackers to write malicious scripts. AI-powered malware can also adapt to its environment, changing its behaviour and code structure dynamically to evade detection. 

  • According to a report by Cybernews detailing the use of AI by threat actors, one of the earliest groups to take advantage of AI capabilities for malware creation is CyberAv3ngers, an Iranian hacking group targeting critical infrastructure sectors such as water systems, energy, and manufacturing. This group uses AI to improve vulnerability research, automate malware debugging, and craft scripts that manipulate industrial control systems and programmable logic controllers. 
  • Similarly, SweetSpecter, a Chinese state-backed group, leverages OpenAI services to develop AI-driven intelligence collection tools and malware capable of bypassing traditional detection mechanisms. The capability to evade security measures makes their malware particularly potent, allowing it to persist undetected in targeted networks.
  • The Forest Blizzard group, also known as APT28, has used AI to create convincing fake government documents for phishing campaigns. By analysing victim communication patterns, they craft targeted attacks that can harvest sensitive information with great precision.

These groups represent the growing use of AI in cyber attacks, a trend that is expanding amongst both well-organised and less technical hacker groups. 

As AI technology continues to evolve, so will the sophistication of cyber threats. Security solutions will need to adapt to this new landscape to stay ahead of these advanced, AI-driven cyber attacks.

First and foremost, users and employees must be taught how to distinguish threats and act accordingly. Organisations need to be very careful about who has what permissions in their systems. 

Ransomware defences need to be better than ever, and networks need to be segmented to prevent or at least complicate lateral movement for attackers.

Palo Alto Networks  |  Palo Alto Networks   |    CISA   |   I-HLS  |  Cybernews   |   DesignRush  |    Impact  

Image: Sasha85ru

You Might Also Read: 

Securing Valuable Data


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Cyber Crime Cost The US $16 Billion In 2024
TikTok Fined €530M For Breaking EU Rules »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

RedSense

RedSense

RedSense provides industry-leading threat intelligence services, adversary space interaction & monitoring, net flow monitoring and interpretation for our clients.

Trustlink Technologies

Trustlink Technologies

Trustlink Technologies is an information technology company founded with a steadfast vision to fortify the digital landscapes of businesses through a foundation of trust.