Skip to main content
Live update
DispatchEditorial feature

Weaponizing AI: How Adversaries Leverage Generative Models to Scale Attacks

Large language models have made sophisticated cyberattacks accessible to actors with minimal expertise. Nation-states are automating reconnaissance. Cybercriminals are generating convincing phishing at scale. The barrier to entry has collapsed.

Weaponizing AI: How Adversaries Leverage Generative Models to Scale Attacks
AI-Powered Cyber Threats / 14 min readBlog index
Analysis

Artificial intelligence has long served as a defensive capability in cybersecurity: signature generation, anomaly detection, behavioral analysis. But the threat landscape shifted dramatically beginning in 2023 when large language models became capable enough to be weaponized offensively. The question is no longer whether threat actors will use AI — they already do. The question is how fast capabilities are developing and whether defensive AI can keep pace with adversaries who operate without constraints.

The ChatGPT launch in November 2022 fundamentally changed the economics of social engineering. Within weeks of launch, security researchers demonstrated that LLMs could draft convincing phishing emails, generate pretexts for vishing calls, and create fake personas for social media manipulation at scale, at near-zero marginal cost. OpenAI's safety guardrails prevented the most egregious abuse cases, but the jailbreaking community found workarounds within days. More importantly, the demonstration of what was possible accelerated the development of purpose-built malicious alternatives with no safety guardrails whatsoever.

The strongest signal is not a single event. It is the pattern that keeps appearing across institutions.

Reporting Note

WormGPT emerged in July 2023, described on hacker forums as 'the biggest enemy of the well-known ChatGPT.' Offered as a subscription service through underground marketplaces, WormGPT was built on an open-source LLM — believed to be a modified version of GPT-J, a 6-billion parameter model — with all safety guardrails stripped. Users reported that WormGPT could generate convincing Business Email Compromise lures, malware code, and step-by-step attack instructions without refusal. The security firm SlashNext published findings in July 2023 showing the model producing sophisticated BEC emails indistinguishable in quality from those crafted by experienced human social engineers. FraudGPT, a similar service, advertised capabilities including creating phishing pages, writing malicious code, and generating scam content across multiple languages — all available to subscribers for a monthly fee.

Advertisement

The industrialization of AI-generated phishing is the most consequential near-term threat. Traditional phishing campaigns relied on generic lures distributed at scale. Spear phishing, which personalized messages to specific targets, required human intelligence-gathering time that limited volume. Generative AI collapses this distinction. A threat actor can now harvest a target's LinkedIn profile, recent company press releases, industry news, and public regulatory filings in minutes using automated OSINT tools, feed this context to an LLM, and generate dozens of highly personalized spear phishing variants — each slightly different to evade email filters. SlashNext's 2023 Phishing Intelligence Report found a 1,265% increase in phishing emails since Q4 2022, with a significant portion attributed to AI-assisted content generation.

Polymorphic malware generation is the capability that most alarms endpoint security vendors. Signature-based antivirus works by matching file hashes or byte sequences against databases of known malware. AI accelerates the traditional obfuscation process from hours to seconds. Researchers at Hyas demonstrated in 2023 that GPT-4 could generate functional polymorphic malware code that rewrote itself at each execution to evade signature detection while maintaining the core payload. The HYAS Blackmamba proof-of-concept used a large language model called at runtime to dynamically synthesize Python keystroke logging malware that was never static long enough to be reliably fingerprinted. The keylogger logic changed with every execution while command-and-control communication remained stable. CrowdStrike's 2024 Global Threat Report noted that 34% of intrusions observed used some form of AI-assisted tooling.

Deepfakes have moved from political disinformation into direct financial fraud. In February 2024, a finance worker at a multinational firm in Hong Kong was tricked into transferring HK$200 million — approximately $25.6 million USD — to fraudsters after attending a video call in which all other participants, including what appeared to be the company's CFO, were AI-generated deepfakes. The victim initially suspected a phishing email but was reassured by seeing 'real' colleagues on the call. Hong Kong police confirmed this case, which represents one of the first publicly documented large-scale deepfake video call financial frauds. Voice deepfakes require as little as three seconds of recorded speech to generate convincing synthetic audio. In 2019, a UK energy firm CEO was defrauded of €220,000 after receiving a phone call from what he believed was his parent company's CEO — the voice was entirely synthetic.

Automated reconnaissance represents the most asymmetric AI advantage attackers have gained. Human red teamers and threat actors have always conducted reconnaissance manually — browsing LinkedIn for organizational charts, scanning Shodan for exposed services, reading regulatory filings for technology disclosures. AI agents can now orchestrate these tasks simultaneously at machine speed. Security researchers at WithSecure demonstrated in 2023 that an LLM-orchestrated agent could autonomously conduct multi-step reconnaissance — identifying employees from LinkedIn, finding email formats, searching for leaked credentials, querying Shodan for exposed infrastructure, correlating findings, and generating a detailed attack plan — with minimal human direction. The preparation time that once measured in weeks compressed to hours.

LLM-assisted vulnerability research is enabling less-skilled actors to find and weaponize security flaws. Vulnerability discovery has historically required deep expertise in specific technologies. LLMs can serve as on-demand tutors and code reviewers. Researchers at the University of Illinois Urbana-Champaign published work in April 2024 demonstrating that GPT-4, provided with CVE descriptions, could autonomously exploit real-world vulnerabilities at a success rate of 87% for one-day vulnerabilities — without being given exploit code, only the CVE description and access to a live vulnerable system. This research suggests the gap between vulnerability disclosure and active exploitation is narrowing as AI capability improves and actors adopt these workflows.

Advertisement

The asymmetry is stark and difficult to dismiss. Organizations defending against AI-assisted attacks operate under significant constraints: compliance requirements limit aggressive monitoring, legal concerns restrict automated response, organizational approval processes require human oversight, and budget cycles constrain tooling. Attackers operate without these constraints. They experiment freely, fail cheaply, iterate daily, and operate across jurisdictions where enforcement reach is limited. An AI-assisted phishing campaign achieving a 2% click rate on Tuesday is refined by AI analysis and redeployed Wednesday with a 4% rate. Defenders respond in their next morning standup.

Countermeasures are being deployed, though none solve the problem entirely. AI content detection tools from companies like Originality.ai and OpenAI's own classifier attempt to identify synthetically generated text. Accuracy rates in real-world conditions hover around 70-80% in published evaluations — and the arms race means detection techniques must continuously adapt. Email security vendors including Proofpoint, Abnormal Security, and Mimecast have added AI behavioral analysis specifically designed to detect AI-generated phishing that evades signature-based filters. Abnormal Security published data in 2024 showing their behavioral AI caught 68% of AI-generated BEC attempts that bypassed traditional secure email gateways.

Network-level controls and segmentation limit consequences when AI-assisted attacks succeed. If sophisticated AI-generated phishing successfully harvests credentials, the question becomes: what can an attacker do with them? Organizations with strong microsegmentation, privileged access management, and multi-factor authentication make lateral movement significantly harder even after initial compromise. The most effective defense against AI-powered phishing is not better phishing detection — it is assuming some phishing will succeed and ensuring that success does not translate into significant breach. This requires investment in detection and response, not solely in prevention at the perimeter.

User awareness programs are being rethought in the context of AI-generated content. Traditional awareness training focused on observable phishing indicators: misspelled domain names, grammatical errors, generic greetings, suspicious attachments. AI-generated phishing eliminates most of these signals. Modern awareness training is pivoting toward behavioral skepticism — teaching users to distrust urgency and unusual requests regardless of how legitimate communication appears, to use out-of-band verification for sensitive actions, and to treat any request for credentials or financial action as requiring independent verification through a known-good contact method. Proofpoint's 2024 State of the Phish report found organizations with mature phishing resilience programs had 30% lower susceptibility rates than those relying on annual compliance training alone.

The regulatory response to AI-generated threats is taking shape. The EU AI Act, finalized in 2024, includes provisions requiring transparency for AI systems that interact with humans and creates legal obligations around deepfake labeling and AI-generated content disclosure. NIST's AI Risk Management Framework provides guidance for organizations deploying AI systems that may face adversarial manipulation. Several jurisdictions are criminalizing the use of AI-generated deepfakes in fraud contexts. These responses are meaningful signals but lag the threat by years — the technology has outpaced regulatory imagination.

Identity verification is under pressure in ways that extend beyond simple phishing. When an executive calls on the phone, can employees trust it is really them? When a vendor sends an invoice, can finance verify the request is genuine? AI-generated content has degraded the evidentiary value of voice, video, and written communication. Organizations are re-establishing identity verification procedures that do not rely on the communication channel itself: callback procedures to pre-registered numbers, cryptographic document signing, and multi-party approval for high-value transactions. These are friction-inducing controls, but they address a real problem that AI has created.

The most realistic organizational posture is one that accepts AI-powered attacks as a permanent baseline condition rather than a temporary escalation. The threat actors deploying these capabilities — organized cybercrime groups, nation-state units, hacktivists — are not going to abandon them because defenders adapt. They will adapt in turn. Security programs that embrace this reality invest in layered defenses, assume breaches will occur, measure response speed and containment effectiveness, and continuously exercise incident response against scenarios that include AI-assisted attacks. The fundamental security axioms have not changed: defense in depth, least privilege, and rapid detection and response. What has changed is the baseline sophistication of the adversary — and defensive programs must level up accordingly without waiting for the threat to become comfortable.

Background

The forces behind this story have been building across several reporting cycles. What looks sudden on the surface is often the result of delayed investment, weak coordination, and incentives that rewarded short-term efficiency.

Implications

The next phase will be measured less by announcements and more by capacity: who can fund the response, who can execute it, and who absorbs the cost when older assumptions stop working.

Why It Matters

The pressure is moving from headlines into systems.

A single event can be dismissed as noise. Repeated stress across contracts, public agencies, infrastructure, and household decisions becomes a structural story. That is why this analysis tracks both the visible development and the slower institutional response behind it.

What to Watch
01

Whether institutions respond with durable policy or temporary statements.

02

How quickly markets, cities, and public systems adjust to the next visible pressure point.

03

Which signals repeat across multiple regions instead of staying isolated to one event.

Data Notes

Story Type

Analysis

Primary Desk

AI-Powered Cyber Threats

Reader Use

Context and follow-up

Update Path

Related briefings

Advertisement
Bottom Line

The useful question is not only what changed, but who is prepared to operate as if the change is permanent.

AA
Author

Aman Anil

Founder & Polymath

Aman Anil connects research, climate exposure, public policy, technology, and the financial systems responding to scientific change.

More Contact

Have context, a correction, or a follow-up?

Send article notes, correction details, or additional source context to the editorial inbox. Include the article title and only the essential information needed for the inquiry.

Daily Intelligence

Never miss the story beneath the headline.

Support independent reporting to keep deep investigations and weekly strategic analysis flowing.

Support the Project