AI Turns Cybercrime into a Smart, Scalable Business Model
- Anthropic reports cybercriminals using its Claude AI for extortion, ransomware, and identity fraud in 8 case studies. - North Korean hackers exploited Claude to create fake identities and infiltrate tech firms through remote IT jobs. - New AI-powered ransomware "PromptLock" dynamically generates cross-platform malware via OpenAI's GPT model. - AI-enhanced attacks demonstrate increased automation, evasion capabilities, and organizational infiltration risks.
Anthropic, the San Francisco-based artificial intelligence company, has reported the emergence of novel cyber threats that leverage its LLM, Claude, for extortion and ransomware activities. In a report published on August 27, 2025, the firm detailed eight case studies, revealing that bad actors are employing Claude to execute a range of malicious cyber operations. The report notes that while many of these attempts were detected and mitigated before execution, the trend highlights the increasing sophistication of AI-driven attacks [3].
One of the most alarming findings from the report is the use of Claude to automate large-scale data theft and extortion campaigns. A cybercriminal group reportedly used the AI model to craft customized ransom demands and make real-time tactical decisions, significantly streamlining the extortion process. According to the report, this particular campaign targeted more than 17 organizations, demonstrating the scalability and efficiency that AI can bring to malicious operations [3].
The report also details a concerning case involving North Korean threat actors who exploited Claude to create realistic fake identities and pass technical interviews, enabling them to secure fraudulent remote IT jobs at legitimate technology firms. This strategy, which appears to be a state-sponsored initiative, aims to generate financial support for the North Korean regime. The use of generative AI in this manner underscores the expanding scope of AI's role in cybercrime, where it is not only used to launch direct attacks but also to infiltrate organizations under the guise of legitimate employment [3].
Another notable example is the development of ransomware variants using Claude. The report outlines how a cybercriminal used the LLM to refine and distribute multiple ransomware strains, each equipped with advanced evasion techniques, strong encryption, and anti-recovery mechanisms. These AI-enhanced ransomware tools pose significant challenges for cybersecurity professionals, as they are designed to bypass traditional detection methods and resist data recovery attempts [3].
In parallel to these developments, ESET researchers have identified a new AI-powered ransomware named PromptLock, currently in the proof-of-concept stage. According to a report published on August 26, PromptLock is the first known ransomware to utilize a generative AI model for attack execution. The malware employs OpenAI’s gpt-oss:20b model, accessed through the Ollama API, to dynamically generate malicious Lua scripts. These scripts, which are cross-platform and can run on Windows, Linux, and macOS, perform tasks such as file system enumeration, data exfiltration, and encryption [3].
PromptLock is written in Golang and has been observed in both Windows and Linux variants submitted to VirusTotal. The researchers noted that the malware does not yet include a data destruction feature and appears to be a work in progress. However, the discovery of AI-powered ransomware in any stage of development is a cause for concern among cybersecurity experts. The approach used by PromptLock aligns with the ‘Internal Proxy’ technique, which involves establishing a tunnel from a compromised network to a remote server hosting the AI model. This tactic is increasingly common in contemporary cyberattacks, offering attackers a means of evading detection while maintaining persistence [3].
The emergence of AI-powered ransomware and the broader use of LLMs for malicious purposes signal a growing threat landscape in which cybercriminals are rapidly adapting to new technologies. As AI continues to advance, it is likely that attackers will continue to exploit these tools for more sophisticated and automated cyber operations. Organizations must remain vigilant and invest in robust cybersecurity measures to mitigate the risks posed by these emerging threats [3].
Source:

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
China Weighs Yuan Stablecoins Amid Fear of Dollar's Shadow
- China maintains strict caution over stablecoins, prioritizing regulation to prevent systemic risks and protect its efficient retail payment systems. - Former PBOC Governor Zhou Xiaochuan warned against stablecoin speculation risks, emphasizing existing infrastructure advantages and regulatory gaps in major markets. - China explores yuan-backed stablecoins to counter dollar dominance, leveraging Hong Kong's pilot framework for controlled experimentation. - Global dollar stablecoin expansion pressures Chin

Why Livepeer's LPT Price Breakout Signals a High-Probability Bull Case for AI-Driven DePINs
- Livepeer's LPT token surged 26% to $7.61, breaking a 76-day resistance amid strong technical and on-chain signals. - Bullish indicators include a 425% volume spike, positive Bull Bear Power reversal, and a -31.17% MVRV ratio suggesting undervaluation. - The AI-driven DePIN revolution positions LPT as a key player, with 55% of fees now from AI Subnet processing and expanding decentralized GPU use cases. - Strategic entry near $6.61 with a $10.41 target reflects confidence in Livepeer's role as a scalable,

Arctic Pablo vs BlockDAG: Meme Momentum or Sustainable Growth?
- Arctic Pablo (APC) and BlockDAG (BDAG) represent contrasting crypto strategies: meme-driven hype vs. utility-focused infrastructure. - APC’s viral presale and speculative ROI (up to 10,769.56%) rely on social media momentum and token burns, but lacks real-world utility. - BDAG’s hybrid DAG-PoW architecture, 15,000 TPS scalability, and 2.5M users via X1 app prioritize long-term adoption and institutional credibility. - While APC targets short-term gains with high volatility, BDAG’s ecosystem-driven incent

Qubic's AI-Driven 51% Attack Strategy and the Vulnerabilities of PoW Chains
- Qubic AI's uPoW model exploits hashpower commodification, destabilizing Monero and Dogecoin through dual-coin mining incentives. - 42% hash rate redirection caused 60 orphaned blocks, prompting Kraken to impose 720-block confirmations amid AI-driven mining volatility. - Monero's 20% price drop and Dogecoin's vulnerability highlight PoW's structural risks as hashpower becomes a tradable asset. - Investors face paradigm shift: PoS chains like Ethereum offer superior security against AI-optimized hashpower

Trending news
MoreCrypto prices
More








