Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Hackers Leveraging Artificial Intelligence to Amplify Cyber Attacks: A Growing Threat Landscape




Artificial intelligence is increasingly being used by hackers to power their cyber attacks, with malicious actors leveraging generative AI tools to amplify their impact. Threat actors are using AI for a wide range of tasks, including reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity. Microsoft has warned that these threats are becoming more sophisticated and require organizations to take action to protect themselves.



  • Microsoft warns about the increased use of artificial intelligence (AI) by hackers in cyber attacks.
  • Threat actors are using generative AI tools for various tasks, including reconnaissance, phishing, and malware creation.
  • Ai-generated malware is being used to dynamically generate scripts or modify behavior at runtime.
  • Agentic AI is being experimented with to perform tasks autonomously, but currently used primarily for decision-making.
  • Microsoft advises organizations to treat AI-abused access as insider risks and focus on detecting abnormal credential use and securing AI systems.



  • Microsoft has issued a warning about the increasing use of artificial intelligence (AI) by hackers in their cyber attacks, as part of an effort to accelerate attacks, scale malicious activity, and reduce technical barriers. The threat actor's primary motivation is to exploit human vulnerabilities, thereby reducing reliance on sophisticated AI techniques.

    Threat actors are using generative AI tools for a wide range of tasks, including reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity. These activities are often carried out by individuals or small groups with limited technical capabilities, who can utilize these tools to amplify their impact. The use of generative AI in cyber attacks has been observed across multiple threat actors, including those associated with North Korea.

    One such group, known as Jasper Sleet, leverages generative AI platforms to streamline the development of fraudulent digital personas. For example, Jasper Sleet actors have prompted AI platforms to generate culturally appropriate name lists and email address formats to match specific identity profiles. Similarly, Coral Sleet uses AI to review job postings for software development and IT-related roles on professional platforms, prompting the tools to extract and summarize required skills.

    Threat actors are also using generative AI to assist with malware development and infrastructure creation. In some cases, these attacks show signs of AI-enabled malware that dynamically generate scripts or modify behavior at runtime. Microsoft researchers have observed Coral Sleet using AI to quickly generate fake company sites, provision infrastructure, and test and troubleshoot their deployments.

    In addition to generative AI use, threat actors are experimenting with agentic AI to perform tasks autonomously and adapt to results. However, AI is currently used primarily for decision-making rather than for autonomous attacks.

    Microsoft advises organizations to treat these schemes and similar activity as insider risks, as they often rely on the abuse of legitimate access. Defenders should focus on detecting abnormal credential use, hardening identity systems against phishing, and securing AI systems that may become targets in future attacks.

    The growing use of AI in cyber attacks highlights the evolving nature of threat actor tactics and the need for organizations to stay vigilant. By understanding how these tools are being used, defenders can better prepare themselves to counter the increasing sophistication of threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Hackers-Leveraging-Artificial-Intelligence-to-Amplify-Cyber-Attacks-A-Growing-Threat-Landscape-ehn.shtml

  • Published: Sat Mar 7 09:38:21 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us