Breaking
April 3, 2025

5 sneaky ways hackers are utilizing generative AI | usagoldmines.com

Artificial Intelligence (AI) can be a force for good in our future, that much is obvious from the fact that it’s being utilized to advance things like medical research. But what about it being a force for bad?

The thought that somewhere out there, there’s a James Bond-like villain in an armchair stroking a cat and using generative AI to hack your PC may seem like fantasy but, quite frankly, it’s not. Cyber security experts are already scrambling to thwart millions of threats by hackers that have used generative AI to hack PCs, steal money, credentials, and data, and, with the rapid proliferation of new and improved AI tools, it’s only going to get worse.

The type of cyberattacks hackers are using aren’t necessarily new. They’re just more prolific, sophisticated, and effective now that they have weaponized AI. Here’s what to look out for…

AI-generated malware

Next time you see a pop-up, you may want to hit Ctrl-Alt-Delete real quick! Why? Because hackers are using AI tools to write malware like there’s no tomorrow and it’s showing up in browsers.

Security experts can tell when malware has been written by generative AI by looking at its code. Malware written by AI tools is quicker to make, can be better targeted against victims, and more effective at bypassing security platforms than code written by hand, according to a paper in the journal Artificial Intelligence Review.

One example is malware discovered by HP’s threat research team which it highlights in its September 2024 Threats Insights Report. The company said it discovered malicious code hidden in an extension that hackers used to take over browser sessions and direct users to websites flogging fake PDF tools.

The team also found SVG images to be harboring malicious code which could launch infostealer malware. The malware in question had code featuring “native language and variables that were consistent with an AI generative tool,” which is a clear indicator of its AI origin.

Evading security systems

It’s one thing to write malware with AI tools, it’s quite another thing to keep it effective at bypassing security. Hackers know that cyber security companies move quickly to detect and block new malware, hence why they’re using Large Language Models (LLMs) to obfuscate or slightly change it.

AI can be used to blend code into known malware or create whole new variants that security detection systems won’t recognize. Doing this is most effective against security software that recognizes known patterns of malicious activity, cybersecurity professionals say. In fact, it’s actually quicker to do this than create malware from scratch, according to Palo Alto Networks Unit 42 researchers.

The Unit 42 researchers demonstrated how this is possible. They used LLMs to rewrite 10,000 malicious JavaScript code variants of known malware that had the same functionality as the original code.

These variants were highly successful at avoiding detection by LM detection algorithms like Innocent Until Proven Guilty (IUPG), the researchers found. They concluded that with enough code transformations it was possible for hackers to “degrade the performance of malware classification systems” enough to avoid detection.

Two other kinds of malware that hackers are using to evade detection are possibly even more alarming because of their smart capabilities.

Dubbed “adaptive malware” and “dynamic malware payloads” these types are able to evade security systems by learning and adjusting their coding, encryption, and behavior in real time to bypass security systems, cybersecurity experts say.

While these types predate LLMs and AI, generative AI is making them more responsive to their environments and therefore more effective, they explain.

Stealing data and credentials

AI software and algorithms are also being used to more successfully steal user passwords and logins and unlawfully access their accounts, according to cybersecurity firms.

Cybercriminals generally use three techniques to do this: credential stuffing, password spraying, and brute force attacks, and AI tools are useful for all of these techniques, they say.

Predictive biometric algorithms are making it easier for hackers to spy on users typing passwords and therefore making it easier to hack into large databases containing user information.

Additionally, scanning and analyzing algorithms are deployed by hackers to quickly scan and map networks, identify hosts, open ports, and identify the software in operation to discover user vulnerabilities.

Brute force attacks have been a favorite method of cyberattack for amateur hackers. This attack type involves the trial-and-error bombarding of a large number of companies or individuals with cyber-attacks in the hope that just a few will be penetrated.

Traditionally, only one in 10,000 attacks is successful thanks to the effectiveness of security software. But this software is becoming less effective due to the rise of password algorithms that can quickly analyze large data sets of leaked passwords and more effectively direct brute force attacks.

Algorithms can also automate hacking attempts across multiple websites or platforms at once, cybersecurity experts warn.

More effective social engineering and phishing

Conventional generative AI tools like Gemini and ChatGPT as well as their dark web counterparts like WormGPT and FraudGPT, are being used by hackers to mimic the language, tone, and writing styles of individuals to make social engineering and phishing attacks more personalized to victims.

Hackers are also using AI algorithms and chatbots to harvest data from user social media profiles, search engines, and other websites (and directly from the victims themselves) to create dynamic phishing pitches based on an individual’s location, interests, or their responses.

With AI modelling, hackers can even predict the likelihood their hacks and scams will be successful.

Again, this is another area where hackers are also deploying smart bots that can learn from attacks and change their behavior to make attacks more likely to succeed.

Phishing emails generated by hackers using AI software are more successful at fooling people, research shows. One reason is that they tend to involve fewer red flags like grammatical errors or spelling mistakes that give them away.

Singapore’s Government Technology Agency (GovTech) demonstrated this at the Black Hat USA cybersecurity convention in 2021. At the convention, it reported on an experiment in which spear phishing emails generated by OpenAI’s ChatGPT 3 and ones written by hand were sent to participants.

The experiment found the participants were much more likely to click on the ChatGPT-created emails than the hand-generated ones.

Science fiction-like impersonation

The use of generative AI for impersonation gets a little science-fictiony when you start talking about deep-fake videos and the use of voice-clones.

Even so, hackers are using AI tools to copy the likenesses and voices (known as voice phishing or vishing) of people known to victims in videos and recordings in order to pull off their swindles.

One high-profile case happened back in 2024 when a finance worker was conned into paying out $25m to hackers who used deep-fake video technology to pose as the company’s chief financial officer and other colleagues.

These aren’t the only AI impersonation techniques, though. In our article “AI impersonators will wreak havoc in 2025. Here’s what to watch out for,” we cover eight ways AI impersonators are trying to scam you, so be sure to check it out for a deeper dive on the topic.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

How to Play Original Switch Games on the Switch 2 Michelle Ehrhardt | usagoldmines.com

Google unveils end-to-end messages for Gmail. Only thing is: It’s not true E2EE. Dan Goodin | usagol...

I use Windows Task Manager daily. Here are 9 tips I wish I’d known sooner | usagoldmines.com

I ditched Google Search. Now I’m saving the planet with Ecosia instead | usagoldmines.com

Best PDF editors 2025: Our top picks | usagoldmines.com

Best laptops for video editing 2025: Work faster with these expert picks | usagoldmines.com

Google Says Magic Editor Will Properly Save Photo Edits After Fix Kellen | usagoldmines.com

The Garmin Instinct 2 Solar Smartwatch Is $170 Off Daniel Oropeza | usagoldmines.com

Watch out - those PDFs lurking in your inbox could be a major security risk | usagoldmines.com

Latest Android Auto update could turn your car’s cameras into a free dash cam hamish.hector@futurene...

Nvidia confirms the Switch 2 supports DLSS, G-Sync, and ray-tracing Andrew Cunningham | usagoldmines...

Bonobos’ calls may be the closest thing to animal language we’ve seen Jacek Krywko | usagoldmines.co...

The 50 Best '80s Movies You Can Stream Right Now Ross Johnson | usagoldmines.com

Nine Ways to Make Your DIY Paint Job Look Professional Jeff Somers | usagoldmines.com

Apple's Latest Update May Be Installing Previously Deleted Apps on iPhones Jake Peterson | usagoldmi...

The Nintendo Switch 2 Might Be Compatible With the Webcam You Already Own Pranay Parab | usagoldmine...

Businesses still haven’t stopped using weak passwords, and it’s getting super risky benedict.collins...

I tried the latest update to NotebookLM and it’s never been easier to make an AI podcast out of othe...

Monkeys are better yodelers than humans, study finds Jennifer Ouellette | usagoldmines.com

Microsoft releases its own AI search engine, called Copilot Search | usagoldmines.com

Thursday Question: It’s Been a While, Still Using Your Pixel’s Built-in Thermometer? Tim | usagoldmi...

Garmin's Paid-Tier AI Doesn't Seem to Be Doing Much Beth Skwarecki | usagoldmines.com

JetKVM is an exciting, tiny open source KVM over IP module that sold almost 100,000 units and it eve...

Samsung is being weirdly cagey about supporting Netflix's big HDR upgrade that's basically custom-ma...

Bill Gates just published the ‘coolest code’ he ever wrote for Microsoft | usagoldmines.com

Microsoft’s revamped Copilot app for Windows goes truly native | usagoldmines.com

Report: Pixel 10 Cameras Get Downgrade in Exchange for New Telephoto Lens Tim | usagoldmines.com

My Favorite Amazon Deal of the Day: These Bose QuietComfort Ultra Earbuds Daniel Oropeza | usagoldmi...

Video: Choosing the Best Mac For You Juli Clover | usagoldmines.com

The Nintendo Switch 2 will feature DLSS and ray tracing, but we don't know which games support it |...

Why you should replace your Kaspersky antivirus benedict.collins@futurenet.com (Benedict Collins) | ...

SpaceX just took a big step toward reusing Starship’s Super Heavy booster Stephen Clark | usagoldmin...

Critics suspect Trump’s weird tariff math came from chatbots Ashley Belanger | usagoldmines.com

Foxit PDF Editor 13 review: Ready for business | usagoldmines.com

This mini PC is stacked with 32GB RAM and a 1TB SSD for under $330 | usagoldmines.com

Verizon Commits to 3-Year Price Lock, But Only on myPlan Plans Kellen | usagoldmines.com

Google Will Reduce Battery Capacity for the Pixel 9a, and There’s Nothing You Can Do About It Khamos...

You Can Now Get Visual Intelligence on iPhone 15 Pro – Here's How Tim Hardwick | usagoldmines.com

Apple Updates iWork Apps With New iOS 18.4 and macOS 15.4 Features Joe Rossignol | usagoldmines.com

Everything new on Prime Video in April 2025, including Oscar winner Conclave and nominee Nickel Boys...

Google Keep could get a fresh redesign soon – including two features that’ll make it much easier to ...

The Nintendo Switch 2 is backward compatible but a ton of original Switch games have 'start up' and ...

This unique bi-copter drone could actually disrupt DJI's drone dominance – and now we know its tempt...

Do I really need antivirus for Windows 11? benedict.collins@futurenet.com (Benedict Collins) | usago...

Dodgy Android smartphones are being preloaded with Triada malware | usagoldmines.com

Tuta Mail could soon be your default iOS mail app – but only after filing a complaint against Apple ...

Apple patents motion-predicting technology that can count reps and identify exercises during a worko...

How automakers like Ford, VW, Stellantis are reacting to Trump’s 25% tariff Jonathan M. Gitlin | usa...

Google gives NotebookLM a “Discover” button to search the web Ryan Whitwam | usagoldmines.com

Homey smart home hubs gain energy monitoring features | usagoldmines.com

Asus’ 3K OLED laptop with killer battery life is $400 off right now | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Need a new ergonomic desk chair? Get this one at Staples for 48% off | usagoldmines.com

Get ready for summer with the Beats Pill portable speaker, now 33% off | usagoldmines.com

MLB.TV is how all baseball streaming should work | usagoldmines.com

Lenovo spills the beans on RTX 5060 and 5060 Ti cards ‘coming soon’ | usagoldmines.com

Get this excellent Acer Swift laptop with 16GB RAM for just $549 | usagoldmines.com

All the Gardening Tasks to Tackle in April Amanda Blum | usagoldmines.com

These Bose Ultra Open Earbuds Are $179 Right Now Pradershika Sharma | usagoldmines.com

Samsung Introduces Discounts on Popular Monitors, TVs, Smartphones, and More in Spring Sale Mitchel ...

iOS 18.4: Stop Your Recent Searches Showing in New Safari Tabs Tim Hardwick | usagoldmines.com

Amazon adds new benefit to Prime subscription that gives members a better chance of buying an Nvidia...

Furious fans hijack Nintendo Treehouse: Live stream with demands to 'drop the price' | usagoldmines...

Upcoming Nintendo Switch 2 exclusives - release schedule for confirmed games including The Duskblood...

Microsoft adds hotpatching support for Windows 11 enterprise users as it looks to end unnecessary do...

GenAI bots could well be scraping your web apps, researchers warn | usagoldmines.com

A bonus from the shingles vaccine: Dementia protection? John Timmer | usagoldmines.com

Survey: Americans fear AI will hurt them. Experts expect the opposite. Ashley Belanger | usagoldmine...

Get ready for summer with the Beats Pill portable speaker, now 33% off | usagoldmines.com

This App Can Search Maps and Addresses Right From the Menu Bar Justin Pot | usagoldmines.com

The Nintendo Switch 2 Is Boring, and That’s OK Michelle Ehrhardt | usagoldmines.com

The Switch 2's Mouse Controls Are Nintendo at Its Most Playful Michelle Ehrhardt | usagoldmines.com

'Yassou' Makes Veggie-Forward Greek Cooking Accessible Allie Chanthorn Reinmann | usagoldmines.com

These Are The Biggest Skywatching Events in April Emily Long | usagoldmines.com

Kuo: Apple Can Reduce Impact of Trump's Massive Tariffs in Five Ways Joe Rossignol | usagoldmines.co...

CNBC+ Now Available on Apple TV Joe Rossignol | usagoldmines.com

RollerCoaster Tycoon and More Games Now Available on Apple Arcade Joe Rossignol | usagoldmines.com

Royal Mail investigating possible data breach after supplier targeted | usagoldmines.com

Nintendo confirms the Nintendo Switch 2 Joy-Con controllers have been 'designed from the ground up' ...

Verizon security flaw could allow hackers to view entire call history | usagoldmines.com

Five Nights at Freddy's 2 gets December 2025 release date and first teaser, but you won't be able to...

Apple's first iOS 18.5 beta makes it easier to get the old-style Apple Mail back jamie.richards@futu...

NYT Connections hints and answers for Friday, April 4 (game #663) | usagoldmines.com

Quordle hints and answers for Friday, April 4 (game #1166) | usagoldmines.com

NYT Strands hints and answers for Friday, April 4 (game #397) | usagoldmines.com

Old Stripe APIs are being hijacked for credit card skimmer attacks | usagoldmines.com

Explaining MicroSD Express cards and why you should care about them Andrew Cunningham | usagoldmines...

Royal Mail investigating possible data breach after supplier targeted | usagoldmines.com

Hands-on with the Switch 2: It’s the Switch, too Kyle Orland | usagoldmines.com

Samsung turns to China to boost its ailing semiconductor division Financial Times | usagoldmines.com

Everything You Need to Know About Magento 2 Language Translation Extensions Anuradha Sinha | usagold...

Best antivirus software 2025: Keep your PC safe from malware, spyware, and more | usagoldmines.com

Best 4K monitors 2024: HDR, 144Hz, budget, and best overall | usagoldmines.com

Dual boot vs. Virtualization: Which is best for running multiple operating systems? | usagoldmines....

You Should Grow Snacking Peppers Instead of Bell Peppers Amanda Blum | usagoldmines.com

iPhone 17 Pro: New 48MP Telephoto Lens May Change How Zoom Works Tim Hardwick | usagoldmines.com

Intel is discontinuing an app you’ve never heard of – but sadly, that alternative to Windows 11’s Ph...

Okay, the AirPods Max USB-C lossless audio update is now available, for real this time – here's how ...

It looks like Nintendo Switch 2 pre-orders are live at some retailers with some fans securing their ...

The Sonos Era 100 and Ray’s new lower price are a welcome move from a company that wants to win your...

Leave a Reply