{"id":142051,"date":"2025-09-08T16:46:08","date_gmt":"2025-09-08T16:46:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/142051\/"},"modified":"2025-09-08T16:46:08","modified_gmt":"2025-09-08T16:46:08","slug":"80-of-ransomware-attacks-now-use-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/142051\/","title":{"rendered":"80% of ransomware attacks now use artificial intelligence"},"content":{"rendered":"<p>    open share links<br \/>\n    close share links<\/p>\n<p>What you\u2019ll learn:<\/p>\n<p>AI has transformed cyberthreats: 80% of ransomware attacks examined in new MIT research used artificial intelligence, from deepfakes to AI-generated phishing campaigns.Three pillars for AI defense: Effective defense combines automated security hygiene, autonomous defensive systems, and augmented executive oversight with real-time intelligence.+++  <\/p>\n<p>New research from <a href=\"https:\/\/cams.mit.edu\/\" target=\"_blank\" rel=\"nofollow noopener\">Cybersecurity at MIT Sloan<\/a> and <a href=\"https:\/\/safe.security\/\" target=\"_blank\" rel=\"nofollow noopener\">Safe Security<\/a> examined 2,800 ransomware attacks and found that 80% of them were powered by artificial intelligence. AI is being used to create malware, phishing campaigns, and <a href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/deepfakes-explained\" target=\"_blank\" rel=\"nofollow noopener\">deepfake-driven<\/a> social engineering, such as fake customer service calls. Large language models are being employed to generate code and phishing content. There is also AI-enabled password cracking, CAPTCHA bypass, and more.<\/p>\n<p>Perhaps you\u2019re thinking that the answer is to fight fire with fire by building AI-powered defenses. But that\u2019s only part of what\u2019s needed, according to the researchers.<\/p>\n<p>\u201cAI-powered cybersecurity tools alone will not suffice,\u201d they write. \u201cA proactive, multi-layered approach \u2014 integrating human oversight, governance frameworks, AI-driven threat simulations, and real-time intelligence sharing \u2014 is critical.\u201d<\/p>\n<p>            <a class=\"pdf_link--text_link\" aria-label=\"Read the Report\" title=\"Opens in new window\" target=\"_blank\" href=\"https:\/\/cams.mit.edu\/wp-content\/uploads\/Safe-CAMS-MIT-Article-Final-4-7-2025-Working-Paper.pdf\" rel=\"nofollow noopener\"><\/p>\n<p class=\"pdf_link--text\">\n                Rethinking the Cybersecurity Arms Race\n            <\/p>\n<p>                                                                                Read the Report [PDF]<br \/>\n                <\/a><\/p>\n<p>The 3 AI defense pillars every organization needs<\/p>\n<p>The researchers argue that a comprehensive approach to combating AI-enabled threats consists of three types of defense, all of which are essential:<\/p>\n<p>Automated security hygiene, such as self-healing software code, self-patching systems, continuous attack surface management, zero-trust-based architecture, and self-driving trustworthy networks. Automating these routine tasks reduces manual workloads while strengthening protection against attacks that target core system vulnerabilities.Autonomous and deceptive defense systems, which use analytics, machine learning, and real-time data collection to learn from, identify, and counteract threats. Examples include simultaneously automated moving-target defense, and deceptive tactics and information. Both types of systems enable teams to take a proactive approach to defense, rather than getting stuck in reactive mode.Augmented oversight and reporting, which give executives real-time data-driven insights. For example, automated risk analysis uses AI to spot emerging threats and predict how they might impact an organization.What this means for cybersecurity today<\/p>\n<p>Cybersecurity professionals should look at the history of successful cyberdefenses \u2014 protections against phishing, social engineering, and malware attacks, for example \u2014 and consider how familiar forms of attack could evolve with the addition of AI.\u00a0<\/p>\n<p>At the MIT Computer Science and Artificial Intelligence Laboratory, for example, researchers have developed a method of defense called <a href=\"https:\/\/news.mit.edu\/2025\/3-questions-una-may-o-reilly-modeling-adversarial-intelligence-0129\" target=\"_blank\" rel=\"nofollow noopener\">artificial adversarial intelligence<\/a>, which mimics attackers to test network defenses before real attacks happen.\u00a0<\/p>\n<p>\u200b\u200b\u201cThe autonomous nature of things has caused there to be a reexamination of the way in which we defend ourselves and the way in which we have to look at both old- and new-style attacks,\u201d said <a href=\"https:\/\/mitsloan.mit.edu\/faculty\/directory\/michael-d-siegel\" target=\"_blank\" rel=\"nofollow noopener\">Michael Siegel<\/a>, the principal research scientist and director at CAMS, and an author of the report.\u00a0<\/p>\n<p>But it\u2019s yet to be seen how the eternal game of whack-a-mole for security teams will change with AI both deployed regularly in attacks and employed in defense.\u00a0<\/p>\n<p>\u201cCan we crack the asymmetric warfare nature of cybersecurity?\u201d Siegel asked. \u201cRemember that the attacker only needs one point of entry and exploitation while the defender must stop all entry points and be resilient to all exploitations.<\/p>\n<p>\u201cFor cybersecurity, there are tremendous opportunities for things to go wrong,\u201d he said. \u201cProtecting in this new environment that is moving at light speed is challenging, but we can learn from our previous work. Many researchers and products are already addressing management, prevention, detection, response, and resilience issues.\u201d<\/p>\n<p>One example of that work: Siegel and colleagues from MIT Sloan are investigating the role generative AI is playing in <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10838831\" target=\"_blank\" rel=\"nofollow noopener\">both attacks on and the defense of industrial control systems<\/a>.\u00a0\u00a0<\/p>\n<p>Read the full report<\/p>\n<p>The research, \u201c<a href=\"https:\/\/cams.mit.edu\/wp-content\/uploads\/Safe-CAMS-MIT-Article-Final-4-7-2025-Working-Paper.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Rethinking the Cybersecurity Arms Race<\/a>,\u201d was conducted by Siegel; Sander Zeijlemaker, a CAMS research affiliate; Vidit Baxi, co-founder and chief information security officer at Safe Security; and Sharavanan Raajah, a threat researcher at Safe Security.<\/p>\n<p>The report provides more details on preparing a practical and comprehensive response to AI-powered cyberattacks. It also details emerging attack methods and includes a list of the top 10 AI-generated ransomware threat actors.<\/p>\n<p>Learn more about <a href=\"https:\/\/cams.mit.edu\/\" target=\"_blank\" rel=\"nofollow noopener\">Cybersecurity at MIT Sloan<\/a>, including membership opportunities.<\/p>\n<p>Michael Siegel is a principal research scientist at MIT Sloan. His primary research interest lies in cybersecurity management of information systems. He is the founding co-director of Cybersecurity at MIT Sloan.<\/p>\n","protected":false},"excerpt":{"rendered":"open share links close share links What you\u2019ll learn: AI has transformed cyberthreats: 80% of ransomware attacks examined&hellip;\n","protected":false},"author":2,"featured_media":142052,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[182,181,507,74],"class_list":{"0":"post-142051","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/142051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=142051"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/142051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/142052"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=142051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=142051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=142051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}