Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

February 28, 2026

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

February 28, 2026

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

February 28, 2026
Facebook X (Twitter) Instagram
Saturday, February 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI-powered Cyber-Attacks Up Significantly, Warns CrowdStrike
News

AI-powered Cyber-Attacks Up Significantly, Warns CrowdStrike

Team-CWDBy Team-CWDFebruary 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The number of AI-enabled cyber-attacks has nearly doubled during the last year, CrowdStrike has warned, as threat actors deployed machine learning and Large Language Models (LLMs) to help optimize attack techniques and hacking campaigns.

According to the CrowdStrike Global Threat Report 2026, there was an 89% increase in attacks by “AI-enabled adversaries” in 2025 when compared with the previous year.

Attackers deployed AI to aid with social engineering, malware development, disinformation campaigns and more.

Researchers noted that when attackers use AI, it is to help optimize existing attack methods, rather than leveraging AI to help create novel new attack vectors.  

For example, threat actors have deployed LLMs to help write phishing emails to make them appear more convincing – even in multiple languages – while also reducing the amount of time needed to create the campaigns.

The report detailed several examples of this, including a campaign attributed to the Chinese intelligence service which leveraged AI to help create credible looking consulting firms to target former US government employees on recruitment and social media platforms, with the aim of intelligence gathering.

Meanwhile, a Russian-based cyber-criminal operation – which CrowdStrike has dubbed Renaissance Spider – has been detected using AI-based tools to help increase the credibility of phishing emails used to deliver ClickFix campaigns to Ukrainian-speaking targets.

Outside these two examples, CrowdStrike warned that a range of threat actors have deployed AI-related tools to help develop, organize and scale phishing operations.

“These tools allow threat actors to plan and accelerate reconnaissance operations, create convincing phishing messages and landing pages, conduct spamming activity, and bypass restricted AI tool safeguards to produce illicit content,” said the report. 

AI Used to Develop Malware

The report has also detailed how certain threat actors have started to experiment with using AI to aid the development of malware. This includes a campaign by Russian state-backed hacking and espionage operation Fancy Bear, which CrowdStrike analysts observed embedding LLM prompting directly into malware to perform operational tasks.

Dubbed LameHug, the espionage campaign against Ukraine incorporated a LLM into the malware to support reconnaissance and document collection prior to exfiltration

While researchers noted that LameHug “did not demonstrate a meaningful increase in effectiveness or sophistication compared to traditional malware,” they said the campaign showcased “continued exploration of AI as a development aid.”

“This is another area where AI can enable the threat actor and we expect to see more of this,” said Adam Meyers, head of counter adversary operations at CrowdStrike said during a media briefing ahead of the report’s publication.

CrowdStrike concluded with a warning that attackers will continue to leverage AI for a range of malicious activities.

“To defend against AI-enabled threats, organizations should develop clear incident response responsibilities and business continuity plans,” said CrowdStrike.

The company recommended that organizations can help protect employees, clients and customers from AI-enabled attacks with strong identity verification procedures, AI-focused security awareness training, and threat intelligence monitoring.

“This is an AI arms race,” said Meyers.  “Security teams must operate faster than the adversary to win.”

Image Credit: PJ McDonnell / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleInfostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
Next Article AI Accelerates Attacker Breakout Time to Just Four Minutes
Team-CWD
  • Website

Related Posts

News

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

February 28, 2026
News

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

February 28, 2026
News

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

February 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Top IRS scams to look out for in 2026

February 10, 2026

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.