- 80% of ransomware attacks are now driven by artificial intelligence tools
- Ai allows the creation of malware, phishing campaigns and Deepfake Social Engineering attacks
- LLMS Help Help of password cracking, automated code generation and captcha bypass
The AI is increasingly used to create malware, phishing and social engineering campaigns promoted by Deepfake, as false calls for customer service.
According to new Mit Sloan research and safe security, examining 2,800 ransomware attacks, 80% of these attacks were driven by artificial intelligence.
Large language models can now enable password cracking, captcha bypass and automated code generation, which shows how AI tools are remodeling the threat panorama.
The asymmetric challenge of cybersecurity
Experts warn that AI allows attackers to operate at an unprecedented speed and scale, creating challenges for traditional malware elimination techniques.
Michael Siegel, main scientist of Cams research, points out “that the attacker only needs an entry and exploitation point, while the defender must stop all the entrance points and be resistant to all farms.”
This imbalance worsens as the attack and defense methods accelerate.
The family forms of cyber attack, including ransomware and phishing, are evolving variants with the most advanced.
Organizations should consider that, although defenses can be adapted, attackers who use AI have an advantage in exploiting weak points faster than human teams can answer.
The combination of ransomware driven by AI requires more than tools with AI alone.
Researchers recommend a proactive and several layers approach that combines human supervision, governance frames, the simulations promoted by AI and the exchange of intelligence in real time.
The first pillar implies automated safety hygiene, which includes self -care code, self -complication systems, zero trusted architectures and monitoring of the continuous attack surface.
The second focuses on autonomous and deceptive defense systems, which use analysis of analysis, automatic learning and real -time data to anticipate and counteract threats.
Techniques such as automated defense of mobile objectives and deceptive information allow security equipment to act proactively.
The third is the supervision and increased reports, which provides executives real -time information about emerging threats to guide decisions and responses.
On the basis of the three defense pillars, organizations can take concrete measures to strengthen ransomware protection.
As IA is increasingly integrated into cyber attacks, the proportion of ransomware fueled by AI is expected to increase even more in 2025.