Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers abusing AI at every stage of cyberattacks
    Cybersecurity

    Hackers abusing AI at every stage of cyberattacks

    adminBy adminMarch 7, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Malicious AI
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Malicious AI

    Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.

    According to a new Microsoft Threat Intelligence report, attackers are using generative AI tools for a wide range of tasks, including reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

    In many cases, AI is used to draft phishing emails, translate content, summarize stolen data, debug malware, and assist with scripting or infrastructure configuration.

    “Microsoft Threat Intelligence has observed that most malicious use of AI today centers on using language models for producing text, code, or media. Threat actors use generative AI to draft phishing lures, translate content, summarize stolen data, generate or debug malware, and scaffold scripts or infrastructure,” warns Microsoft.

    “For these uses, AI functions as a force multiplier that reduces technical friction and accelerates execution, while human operators retain control over objectives, targeting, and deployment decisions.”

    Threat actor use of AI across the cyberattack lifecycle
    Threat actor use of AI across the cyberattack lifecycle
    Source: Microsoft

    AI used to power cyberattacks

    Microsoft has observed multiple threat groups incorporating AI into their cyberattacks, including North Korean actors tracked as Jasper Sleet (Storm-0287) and Coral Sleet (Storm-1877), who use the technology as part of remote IT worker schemes.

    In these operations, AI tools help generate realistic identities, resumes, and communications to gain employment at Western companies and maintain access once hired.

    Jasper Sleet leverages generative AI platforms to streamline the development of fraudulent digital personas. For example, Jasper Sleet actors have prompted AI platforms to generate culturally appropriate name lists and email address formats to match specific identity profiles. For example, threat actors might use the following types of prompts to leverage AI in this scenario:

    Example prompt 1: “Create a list of 100 Greek names.”

    Example prompt 2: “Create a list of email address formats using the name Jane Doe.“

    Jasper Sleet also uses generative AI to review job postings for software development and IT-related roles on professional platforms, prompting the tools to extract and summarize required skills. These outputs are then used to tailor fake identities to specific roles.

    ❖ Microsoft Threat Intelligence

    The report also describes how AI is being used to assist with malware development and infrastructure creation, with threat actors using AI coding tools to generate and refine malicious code, troubleshoot errors, or port malware components to different programming languages.

    Some malware experiments show signs of AI-enabled malware that dynamically generate scripts or modify behavior at runtime.

    Microsoft also observed Coral Sleet using AI to quickly generate fake company sites, provision infrastructure, and test and troubleshoot their deployments.

    When AI safeguards attempt to prevent the use of AI in these tasks, Microsoft says threat actors are using jailbreaking techniques to trick LLMs into generating malicious code or content.

    In addition to generative AI use, Microsoft researchers have begun to see threat actors experiment with agentic AI to perform tasks autonomously and adapt to results.

    However, Microsoft says AI is currently used primarily for decision-making rather than for autonomous attacks.

    Because many IT worker campaigns rely on the abuse of legitimate access, Microsoft advises organizations to treat these schemes and similar activity as insider risks.

    Furthermore, as these AI-powered attacks mirror conventional cyberattacks, defenders should focus on detecting abnormal credential use, hardening identity systems against phishing, and securing AI systems that may become targets in future attacks.

    Microsoft is not alone in seeing threat actors increasingly using artificial intelligence to power attacks and lower barriers to entry.

    Google recently reported that threat actors are abusing Gemini AI across all stages of cyberattacks, mirroring what Amazon observed in this campaign.

    Amazon and the Cyber and Ramen security blog also recently reported on a threat actor using multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Abusing Cyberattacks hackers stage
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI self-hosted everything for a year, and these are the services I couldn’t self-host forever
    Next Article Soundpeats Cove Pro review: a fantastic feature set and comfortable build make these the cheap headphones to beat
    admin
    • Website

    Related Posts

    China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

    March 8, 2026

    OpenAI’s GPT-5.4 doubles down on safety as competition heats up

    March 7, 2026

    US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

    March 8, 2026

    Google’s Liz Reid Says LLMs Unlock Audio And Video Indexing

    March 7, 2026

    I used the TCL NXTPAPER 70 Pro’s e-paper display, and I can’t wait for the US launch next month

    March 7, 2026

    OpenAI’s GPT-5.4 doubles down on safety as competition heats up

    March 7, 2026
    Categories
    • Blogging (34)
    • Cybersecurity (662)
    • Privacy & Online Earning (93)
    • SEO & Digital Marketing (416)
    • Tech Tools & Mobile / Apps (806)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

    March 8, 2026

    Google’s Liz Reid Says LLMs Unlock Audio And Video Indexing

    March 7, 2026

    I used the TCL NXTPAPER 70 Pro’s e-paper display, and I can’t wait for the US launch next month

    March 7, 2026
    Most Popular
    • China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
    • Google’s Liz Reid Says LLMs Unlock Audio And Video Indexing
    • I used the TCL NXTPAPER 70 Pro’s e-paper display, and I can’t wait for the US launch next month
    • OpenAI’s GPT-5.4 doubles down on safety as competition heats up
    • Soundpeats Cove Pro review: a fantastic feature set and comfortable build make these the cheap headphones to beat
    • Hackers abusing AI at every stage of cyberattacks
    • I self-hosted everything for a year, and these are the services I couldn’t self-host forever
    • US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.