Artificial Intelligence Assisted Cyber Attacks
- robertlesko2
- Mar 18
- 3 min read
Artificial intelligence has become a key technology in every corporate IT toolkit - and a weapon for cybercriminals. Attackers are able to automate, accelerate or enhance different stages of the attack phase. This includes identifying vulnerabilities, launching campaigns along identified attack vectors, evolving attack routes, creating backdoors within systems, leaking or tampering with data, and disrupting system operations. Like all AI algorithms, the algorithms used by AI-based cyber attacks can learn and evolve over time. This means that AI-based cyber attacks can adapt to avoid detection or create an attack pattern that the security system cannot detect.
There are many places where the algorithm can be used in an attack, and we would like to present a few of them:
1. Deepfake AI:
Created to mimic human likenesses, deepfakes are commonly used for promotional purposes, where celebrities, politicians or other prestigious figures are used to promote a brand or project. Deepfakes use existing video footage, photographs and audio recordings to create artificial intelligence-generated video and audio clips. Using facial expressions and facial manipulation, the AI can mimic the victim's facial movements and create seemingly legitimate videos to fool people.
2. Malicious code generated by AI
AI can be used to create polymorphic malicious software that adapts and mutates its source code to avoid detection and security protocols. This is difficult for traditional antivirus systems using signature-based identification to defend against. While most platforms are trying to curb malware created using artificial intelligence, many dark web forums still offer to create AI-based malware.

3. Social engineering
A social engineering attack is any cyber attack that aims to manipulate human behaviour to achieve a goal, such as sharing sensitive data, transferring ownership of money or high-value items, or gaining access to a system, application, database or device.
In an AI-driven social engineering attack, an algorithm can be used to: 3.1 Find the right target, including both the company and a person inside who can give access to the IT system. 3.2 Create a believable online identity to talk to the target. 3.3 Come up with a realistic story that will catch the target's attention. 3.4 Write personal messages or make simple audio or video content to engage with the target.
4. Phishing
Another common AI hacking threat is increased phishing. These attacks rely on deceiving employees or individuals into believing that correspondence comes from a legitimate source. AI has streamlined the capabilities of phishing attacks by generating automated and efficient phishing emails that are more personalised - increasing their legitimacy. This is because AI can observe and pattern phishing scams based on deep analysis. Automating phishing with LLMs also reduces the cost of attacks by more than 95% while achieving the same or higher success rates - making it the most attractive option for threat actors.

The question is how to defend against cyberattacks driven by artificial intelligence.
Artificial intelligence technology has the potential to make it easier and faster for cybercriminals to carry out cyberattacks, effectively lowering the barrier to entry for some actors and increasing the level of sophistication of their attacks.Complex solutions are needed to prevent attacks, and the following can significantly reduce the chances of becoming a victim:
1. Deploy comprehensive cybersecurity solutions that offer continuous monitoring, intrusion detection and endpoint protection. 2. Analyse systems for abnormal user activity or unexpected changes within the environment that could indicate an attack. 3. Provide a solution to monitor user habits or normal operation of systems that detect abnormal activity. 4. Develop an incident response document outlining the organisation's procedures, steps and responsibilities in the event of a cyber attack. 5. Increase employee awareness of the online space. 6. Against AI-based attacks, implement AI-based defensive solutions.