- 80% of ransomware attacks are now fueled by artificial intelligence tools
- AI allows the creation of malicious software, phishing campaigns and social engineering attacks focused on perfares
- LLMS helps cracking the password, generation of automated code and bypasscha
The AI is increasingly used to create malware, phishing campaigns and social engineering focused on perfares, such as false customer service calls.
According to new Sloan and safe security research, examining 2,800 ransomware attacks, 80% of these attacks were fueled by artificial intelligence.
Great languages can now allow password crack, bypass Captcha and automated code generation, showing how IA tools reshaped the landscape of threats.
The asymmetrical cybersecurity challenge
Experts warn that AI allows attackers to operate at an unprecedented speed and scale, creating challenges for traditional malware suppression techniques.
Michael Siegel, principal researcher at Cams, notes “that the attacker only needs an entry and exploitation point while the defender must stop all the entry points and be resilient to all farms”.
This imbalance is aggravated because AI accelerates both the methods of attack and defense.
The familiar forms of cyber attacks, including ransomware and phishing, evolve in more advanced variants fueled by AI.
Organizations must consider that although defenses can adapt, attackers using AI have an advantage in the exploitation of weaknesses faster than human teams cannot respond.
The fight against Ransomware focused on AI requires more than tools fueled by Ai alone.
Researchers recommend a proactive and multilayer approach combining human surveillance, governance executives, AI -based simulations and real -time information sharing.
The first pillar implies automated safety hygiene, including self-healing code, self-fixing systems, zero-frust architectures and continuous monitoring of the attack surface.
The second focuses on autonomous and deceptive defense systems, which use analysis, automatic learning and real -time data to anticipate and counter threats.
Techniques such as the automated defense of mobile target and misleading information allows security teams to act proactively.
The third is surveillance and increased reports, giving managers real -time information on emerging threats to guide decisions and responses.
Drawing on the three defense pillars, organizations can take concrete measures to strengthen the protection of ransomware.
While the AI is more and more integrated into cyber attacks, the proportion of ransomware fueled by AI should increase more in 2025.




