Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Ai-Powered Threats: How North Korea's Hackers Are Leveraging Commercial Tools to Steal Millions


A new study by Expel has revealed a sophisticated state-sponsored cybercrime operation carried out by North Korean hackers using commercial AI tools worth an estimated $12 million in just three months. The group, dubbed "HexagonalRodent," leveraged AI-powered web design tools and malware-stealing software to carry out a lucrative cryptocurrency heist. This highlights the growing threat of AI-powered hacking and underscores the need for increased vigilance and robust cybersecurity measures.

  • North Korean hackers, known as "HexagonalRodent," carried out a $12 million cryptocurrency heist using commercial AI tools from top US-based companies.
  • AI tools are enabling amateur hackers to carry out sophisticated attacks, contrary to the popular narrative of super-intelligent machines breaching secure systems.
  • The group tricked crypto developers with fraudulent job offers, creating fake companies that asked victims to download malware-infected coding assignments.
  • The operation highlights the growing threat of AI-powered hacking and the need for increased vigilance in cybersecurity measures.
  • State-sponsored actors are leveraging AI tools to carry out sophisticated attacks, including North Korea and Iran.
  • Cybersecurity experts must adapt their strategies to keep pace with rapidly evolving threats from AI-powered hacking.



  • In a shocking revelation that highlights the growing threat of AI-powered hacking, a recent investigation by cybersecurity firm Expel has uncovered a sophisticated state-sponsored cybercrime operation carried out by North Korean hackers. The group, dubbed "HexagonalRodent," utilized commercial AI tools from top US-based companies, including OpenAI, Cursor, and Anima, to carry out a lucrative cryptocurrency heist worth an estimated $12 million in just three months.

    According to Marcus Hutchins, the security researcher who discovered the group, these operators don't have the skills to write code or set up infrastructure. AI tools are actually enabling them to do things that they otherwise just would not be able to do. This is a stark contrast to the popular narrative surrounding AI-powered hacking, which often focuses on hypothetical scenarios of super-intelligent machines breaching even the most secure systems.

    The HexagonalRodent operation was centered around tricking crypto developers with fraudulent job offers at tech firms. These fake companies were created using AI web design tools and would eventually ask victims to download and complete a coding assignment as a test, which was infected with malware that infiltrated their machine and stole credentials, including those that in some cases could grant access to the keys that controlled their crypto wallets.

    However, this operation also had its share of mistakes. The hackers left parts of their own infrastructure unsecured, leaking prompts they used to write their malware with tools such as OpenAI's ChatGPT and Cursor. This allowed Expel to estimate the total amount of cryptocurrency stolen by the group and pinpoint potential targets for future operations.

    The use of AI-powered tools in this operation is a game-changer in the world of cybersecurity. It highlights how these technologies can be leveraged for malicious purposes, even by relatively unsophisticated hackers. This raises concerns about the ability of state-sponsored actors to carry out sophisticated attacks using readily available commercial tools.

    North Korea has been accused of using AI as a force multiplier in their hacking operations, and it's clear that this is the case with HexagonalRodent. The group was able to build resumes, websites, and exploits at speed and scale, leveraging AI-powered tools to move faster and more effectively than they would have otherwise.

    The advent of AI hacking tools has raised fears about a near future in which anyone can use automated tools to dig up exploitable vulnerabilities in any piece of software. However, the HexagonalRodent operation suggests that these technologies are already being used by mediocre hackers to carry out broad and effective malware campaigns.

    Experts say that this is a wake-up call for developers who have long made security an afterthought. The emergence of AI-powered tools like Claude Mythos, which was recently discovered by Anthropic and has been dubbed as the "superweapon" in the hacking community, is forcing cybersecurity to take center stage.

    In response to this growing threat, major data vendors such as Mozilla are investigating a security incident that impacted Mercor, a leading data vendor. This incident could have exposed key data about how they train AI models, highlighting the need for increased vigilance and robust cybersecurity measures.

    The US government has also warned of Iranian attempts to sabotage US energy and water infrastructure using hacking tools. These attacks pose a significant threat to national security, and it's clear that both North Korea and Iran are leveraging AI-powered tools to carry out sophisticated operations.

    As the use of AI in hacking continues to grow, cybersecurity experts will need to adapt their strategies to keep pace with these rapidly evolving threats. The HexagonalRodent operation is just one example of how commercial AI tools can be leveraged for malicious purposes, and it's a sobering reminder that even mediocre hackers can become highly effective using the right tools.

    In conclusion, the HexagonalRodent operation highlights the growing threat of AI-powered hacking, particularly from state-sponsored actors. It also underscores the need for increased vigilance and robust cybersecurity measures to protect against these threats. As the use of AI in hacking continues to grow, it's clear that cybersecurity will need to take center stage if we're going to stay ahead of these rapidly evolving threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Ai-Powered-Threats-How-North-Koreas-Hackers-Are-Leveraging-Commercial-Tools-to-Steal-Millions-ehn.shtml

  • https://www.wired.com/story/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions/

  • https://aidailypost.com/news/ai-tools-aid-north-korean-hackers-targeting-victims-without-security

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://attack.mitre.org/groups/


  • Published: Wed Apr 22 12:34:55 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us