The ransomware period generated by AI entered
While such activity does not appear to be normative throughout the ecosystem, these findings show a strong warning.
“There are certainly some groups that use artificial intelligence to help develop ransom and malware modules, but as far as the recorded future can say, Most “Where we see more artificial intelligence is being used, it is initial access,” says Allan Liska, an analyst who specializes the future in ransomware.
Separately, researchers at the Cyber Security Company ESET this week claimed to have discovered “the first known ransomware of AI-Power”. Researchers say the malware, which largely operates locally on a device and uses an open source AI model of Openai, can “produce LUA malicious scripts in flight” and uses to inspect cases where hackers may target, steal and encrypt data. ESET believes that this code is a conceptual proof that has not been established against victims, but researchers insist that cybercriminals begin to use LLMs as part of their tools.
“Using ransomware with the help of AI, it offers certain challenges, primarily due to the large size of artificial intelligence models and their high computational requirements. However, cybercriminals may find ways to bypass these restrictions.” “In the case of development, it is almost certain that threat actors are seriously examining the area, and we are likely to see more efforts to create advanced threats.”
Although no promptlock has been used in the real world, Anthropic findings emphasize the speed that cybercriminals move towards the construction of LLMs in their operations and infrastructure. Artificial Intelligence also saw another criminal group that follows it as GTG-2002, using Claude code to automatically find attack targets, access to victims’ networks, develop malware and then overseas data, analyze what has been stolen, and develop a Ransom note.
Last month, the attack influenced at least 17 organizations in the government, health care, emergency services and religious institutions, without any naming any organizations. Anthropological researchers wrote in their report: “This operation reflects the evolution of AI cybercrime.”