{"id":352926,"date":"2025-08-18T00:45:19","date_gmt":"2025-08-18T00:45:19","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/352926\/"},"modified":"2025-08-18T00:45:19","modified_gmt":"2025-08-18T00:45:19","slug":"the-era-of-ai-hacking-has-arrived","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/352926\/","title":{"rendered":"The era of AI hacking has arrived"},"content":{"rendered":"<p id=\"anchor-45976a\" class=\"body-graf\">This summer, Russia\u2019s hackers put a new twist on the barrage of phishing emails sent to Ukrainians.<\/p>\n<p id=\"anchor-dce2b0\" class=\"body-graf\">The hackers included an attachment containing an artificial intelligence program. If installed, it would automatically search the victims\u2019 computers for sensitive files to send back to Moscow.<\/p>\n<p id=\"anchor-87177c\" class=\"body-graf\">That campaign, detailed in July in technical reports from <a href=\"https:\/\/cert.gov.ua\/article\/6284730\" target=\"_blank\" rel=\"noopener\">the Ukrainian government<\/a> and several <a href=\"https:\/\/www.logpoint.com\/en\/blog\/apt28s-new-arsenal-lamehug-the-first-ai-powered-malware\/\" target=\"_blank\" rel=\"noopener\">cybersecurity companies<\/a>, is the first known instance of Russian intelligence being caught building malicious code with large language models (LLMs), the type of AI chatbots that have become ubiquitous in corporate culture.<\/p>\n<p id=\"anchor-1a53fe\" class=\"body-graf\">Those Russian spies are not alone. In recent months, hackers of seemingly every stripe \u2014 cybercriminals, spies, researchers and corporate defenders alike \u2014 have started including AI tools into their work.<\/p>\n<p id=\"anchor-b4c3b0\" class=\"body-graf\">LLMs, like ChatGPT, are still error-prone. But they have become remarkably adept at processing language instructions and at translating plain language into computer code, or identifying and summarizing documents.<\/p>\n<p id=\"anchor-838ffc\" class=\"body-graf\">The technology has so far not revolutionized hacking by turning complete novices into experts, nor has it allowed would-be cyberterrorists to shut down the electric grid. But it\u2019s making skilled hackers better and faster. Cybersecurity firms and researchers are using AI now, too \u2014 feeding into an escalating cat-and-mouse game between offensive hackers who find and exploit software flaws and the defenders who try to fix them first.<\/p>\n<p id=\"anchor-ffc9a2\" class=\"body-graf\">\u201cIt\u2019s the beginning of the beginning. Maybe moving towards the middle of the beginning,\u201d said Heather Adkins, Google\u2019s vice president of security engineering.<\/p>\n<p id=\"anchor-5c02b3\" class=\"body-graf\">In 2024, Adkins\u2019 team started on a project to use Google\u2019s LLM, Gemini, to hunt for important software vulnerabilities, or bugs, before criminal hackers could find them. Earlier this month, Adkins announced that her team had so far discovered <a href=\"https:\/\/issuetracker.google.com\/issues?q=componentid:1836411&amp;s=type:desc&amp;s=issue_id:desc\" target=\"_blank\" rel=\"noopener\">at least 20 important overlooked bugs<\/a> in commonly used software and alerted companies so they can fix them. That process is ongoing. <\/p>\n<p id=\"anchor-150395\" class=\"body-graf\">None of the vulnerabilities have been shocking or something only a machine could have discovered, she said. But the process is simply faster with an AI. \u201cI haven\u2019t seen anybody find something novel,\u201d she said. \u201cIt\u2019s just kind of doing what we already know how to do. But that will advance.\u201d<\/p>\n<p id=\"anchor-232e0f\" class=\"body-graf\">Adam Meyers, a senior vice president at the cybersecurity company CrowdStrike, said that not only is his company using AI to help people who think they\u2019ve been hacked, he sees increasing evidence of its use from the Chinese, Russian, Iranian and criminal hackers that his company tracks.<\/p>\n<p id=\"anchor-3ef903\" class=\"body-graf\">\u201cThe more advanced adversaries are using it to their advantage,\u201d he said. \u201cWe\u2019re seeing more and more of it every single day,\u201d he told NBC News.<\/p>\n<p id=\"anchor-a8fe31\" class=\"body-graf\">The shift is only starting to catch up with hype that has permeated the cybersecurity and AI industries for years, especially since ChatGPT was introduced to the public in 2022. Those tools haven\u2019t always proved effective, and some cybersecurity researchers have complained about would-be hackers falling for <a href=\"http:\/\/arstechnica.com\/gadgets\/2025\/05\/open-source-project-curl-is-sick-of-users-submitting-ai-slop-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">fake vulnerability findings generated with AI<\/a>.<\/p>\n<p id=\"anchor-20d0bc\" class=\"body-graf\">Scammers and social engineers \u2014 the people in hacking operations who pretend to be someone else, or who write convincing phishing emails \u2014<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/nsa-hacker-ai-bot-chat-chatgpt-bard-english-google-openai-rcna133086\" target=\"_blank\" rel=\"noopener\"> have been using LLMs to seem more convincing since at least 2024<\/a>.<\/p>\n<p id=\"anchor-68aa26\" class=\"body-graf\">But using AI to directly hack targets is only just starting to actually take off, said Will Pearce, the CEO of DreadNode, one of a handful of new security companies that specialize in hacking using LLMs.<\/p>\n<p id=\"anchor-a77923\" class=\"body-graf\">The reason, he said, is simple: The technology has finally started to catch up to expectations.<\/p>\n<p id=\"anchor-2880a7\" class=\"body-graf\">\u201cThe technology and the models are all really good at this point,\u201d he said.<\/p>\n<p id=\"anchor-67f260\" class=\"body-graf\">Less than two years ago, automated AI hacking tools would need significant tinkering to do their job properly, but they are now far more adept, Pearce told NBC News.<\/p>\n<p id=\"anchor-06b9b0\" class=\"body-graf\">Another startup built to hack using AI, Xbow, made history in June by becoming the first AI to climb to the top of the HackerOne U.S. leaderboard, a live scoreboard of hackers around the world that since 2016 has kept tabs on the hackers identifying the most important vulnerabilities and giving them bragging rights. Last week, HackerOne <a href=\"https:\/\/www.hackerone.com\/blog\/hackerone-leaderboard-update-ai-vs-human\" target=\"_blank\" rel=\"noopener\">added a new category<\/a> for groups automating AI hacking tools to distinguish them from individual human researchers. Xbow still leads that.<\/p>\n<p id=\"anchor-2b9236\" class=\"body-graf\">Hackers and cybersecurity professionals have not settled whether AI will ultimately help attackers or defenders more. But at the moment, defense appears to be winning.<\/p>\n<p id=\"anchor-39a822\" class=\"body-graf\">Alexei Bulazel, the senior cyber director at the White House National Security Council, said at a panel at the Def Con hacker conference in Las Vegas last week that the trend will hold, at least as long as the U.S. holds most of the world\u2019s most advanced tech companies.<\/p>\n<p id=\"anchor-6c1400\" class=\"body-graf\">\u201cI very strongly believe that AI will be more advantageous for defenders than offense,\u201d Bulazel said.<\/p>\n<p id=\"anchor-391e2e\" class=\"body-graf\">He noted that hackers finding extremely disruptive flaws in a major U.S. tech company is rare, and that criminals often break into computers by finding small, overlooked flaws in smaller companies that don\u2019t have elite cybersecurity teams. AI is particularly helpful in discovering those bugs before criminals do, he said.<\/p>\n<p id=\"anchor-fe65e8\" class=\"body-graf\">\u201cThe types of things that AI is better at \u2014 identifying vulnerabilities in a low cost, easy way \u2014 really democratizes access to vulnerability information,\u201d Bulazel said.<\/p>\n<p id=\"anchor-15ac51\" class=\"body-graf\">That trend may not hold as the technology evolves, however. One reason is that there is so far no free-to-use automatic hacking tool, or penetration tester, that incorporates AI. Such tools are already widely available online, nominally as programs that test for flaws in practices used by criminal hackers.<\/p>\n<p id=\"anchor-370abb\" class=\"body-graf\">If one incorporates an advanced LLM and it becomes freely available, it likely will mean open season on smaller companies\u2019 programs, Google\u2019s Adkins said.<\/p>\n<p id=\"anchor-b0dc50\" class=\"body-graf\">\u201cI think it\u2019s also reasonable to assume that at some point someone will release [such a tool],\u201d she said. \u201cThat\u2019s the point at which I think it becomes a little dangerous.\u201d<\/p>\n<p id=\"anchor-8db0f7\" class=\"body-graf\">Meyers, of CrowdStrike, said that the rise of agentic AI \u2014 tools that conduct more complex tasks, like both writing and sending emails or executing code that programs \u2014 could prove a major cybersecurity risk.<\/p>\n<p id=\"anchor-67a3b8\" class=\"endmark body-graf\">\u201cAgentic AI is really AI that can take action on your behalf, right? That will become the next insider threat, because, as organizations have these agentic AI deployed, they don\u2019t have built-in guardrails to stop somebody from abusing it,\u201d he said.<\/p>\n","protected":false},"excerpt":{"rendered":"This summer, Russia\u2019s hackers put a new twist on the barrage of phishing emails sent to Ukrainians. The&hellip;\n","protected":false},"author":2,"featured_media":352927,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3163],"tags":[323,1942,53,16,15],"class_list":{"0":"post-352926","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-technology","11":"tag-uk","12":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115047007693253290","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/352926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=352926"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/352926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/352927"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=352926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=352926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=352926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}