Black Hat 2025: ChatGPT, Copilot, DeepSeek now create malware

Share This Post


Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now


Russia’s APT28 is actively deploying LLM-powered malware against Ukraine, while underground platforms are selling the same capabilities to anyone for $250 per month.

Last month, Ukraine’s CERT-UA documented LAMEHUG, the first confirmed deployment of LLM-powered malware in the wild. The malware, attributed to APT28, utilizes stolen Hugging Face API tokens to query AI models, enabling real-time attacks while displaying distracting content to victims.

Cato Networks’ researcher, Vitaly Simonovich, told VentureBeat in a recent interview that these aren’t isolated occurrences, and that Russia’s APT28 is using this attack tradecraft to probe Ukrainian cyber defenses. Simonovich is quick to draw parallels between the threats Ukraine faces daily and what every enterprise is experiencing today, and will likely see more of in the future.

Most startling was how Simonovich demonstrated to VentureBeat how any enterprise AI tool can be transformed into a malware development platform in under six hours. His proof-of-concept successfully converted OpenAI, Microsoft, DeepSeek-V3 and DeepSeek-R1 LLMs into functional password stealers using a technique that bypasses all current safety controls.


AI Scaling Hits Its Limits

Power caps, rising token costs, and inference delays are reshaping enterprise AI. Join our exclusive salon to discover how top teams are:

  • Turning energy into a strategic advantage
  • Architecting efficient inference for real throughput gains
  • Unlocking competitive ROI with sustainable AI systems

Secure your spot to stay ahead: https://bit.ly/4mwGngO


The rapid convergence of nation-state actors deploying AI-powered malware, while researchers continue to prove the vulnerability of enterprise AI tools, arrives as the 2025 Cato CTRL Threat Report reveals explosive AI adoption across over 3,000 enterprises. Cato’s researchers observe in the report, “most notably, Copilot, ChatGPT, Gemini (Google), Perplexity and Claude (Anthropic) all increased in adoption by organizations from Q1, 2024 to Q4 2024 at 34%, 36%, 58%, 115% and 111%, respectively.”

APT28’s LAMEHUG is the new anatomy of AI warfare

Researchers at Cato Networks and others tell VentureBeat that LAMEHUG operates with exceptional efficiency. The most common delivery mechanism for the malware is via phishing emails impersonating Ukrainian ministry officials, containing ZIP archives with PyInstaller-compiled executables. Once the malware is executed, it connects to Hugging Face’s API using approximately 270 stolen tokens to query the Qwen2.5-Coder-32B-Instruct model.

The legitimate-looking Ukrainian government document (Додаток.pdf) that victims see while LAMEHUG executes in the background. This official-looking PDF about cybersecurity measures from the Security Service of Ukraine serves as a decoy while the malware performs its reconnaissance operations. Source: Cato CTRL Threat Research

APT28’s approach to deceiving Ukrainian victims is based on a unique, dual-purpose design that is core to their tradecraft. While victims view legitimate-looking PDFs about cybersecurity best practices, LAMEHUG executes AI-generated commands for system reconnaissance and document harvesting. A second variant displays AI-generated images of “curly naked women” as a distraction during data exfiltration to servers.

The provocative image generation prompts used by APT28’s image.py variant, including ‘Curvy naked woman sitting, long beautiful legs, front view, full body view, visible face’, are designed to occupy victims’ attention during document theft. Source: Cato CTRL Threat Research

“Russia used Ukraine as their testing battlefield for cyber weapons,” explained Simonovich, who was born in Ukraine and has lived in Israel for 34 years. “This is the first in the wild that was captured.”

A quick, lethal six-hour path from zero to functional malware

Simonovich’s Black Hat demonstration to VentureBeat reveals why APT28’s deployment should concern every enterprise security leader. Using a narrative engineering technique, he calls “Immersive World,” he successfully transformed consumer AI tools into malware factories with no prior malware coding experience, as highlighted in the 2025 Cato CTRL Threat Report.

The method exploits a fundamental weakness in LLM safety controls. While every LLM is designed to block direct malicious requests, few if any are designed to withstand sustained storytelling. Simonovich created a fictional world where malware development is an art form, assigned the AI a character role, then gradually steered conversations toward producing functional attack code.

“I slowly walked him throughout my goal,” Simonovich explained to VentureBeat. “First, ‘Dax hides a secret in Windows 10.’ Then, ‘Dax has this secret in Windows 10, inside the Google Chrome Password Manager.’”

Six hours later, after iterative debugging sessions where ChatGPT refined error-prone code, Simonovich had a functional Chrome password stealer. The AI never realized it was creating malware. It thought it was helping write a cybersecurity novel.

Welcome to the $250 monthly malware-as-a-service economy

During his research, Simonovich uncovered multiple underground platforms offering unrestricted AI capabilities, providing ample evidence that the infrastructure for AI-powered attacks already exists. He mentioned and demonstrated Xanthrox AI, priced at $250 per month, which provides ChatGPT-identical interfaces without safety controls or guardrails.

To explain just how far beyond current AI model guardrails Xanthrox AI is, Simonovich typed a request for nuclear weapon instructions. The platform immediately began web searches and provided detailed guidance in response to his query. This would never happen on a model with guardrails and compliance requirements in place.

Another platform, Nytheon AI, revealed even less operational security. “I convinced them to give me a trial. They didn’t care about OpSec,” Simonovich said, uncovering their architecture: “Llama 3.2 from Meta, fine-tuned to be uncensored.”

These aren’t proof-of-concepts. They’re operational businesses with payment processing, customer support and regular model updates. They even offer “Claude Code” clones, which are complete development environments optimized for malware creation.

Enterprise AI adoption fuels an expanding attack surface

Cato Networks’ recent analysis of 1.46 trillion network flows reveals that AI adoption patterns need to be on the radar of security leaders. The entertainment sector usage increased 58% from Q1 to Q2 2024. Hospitality grew 43%. Transportation rose 37%. These aren’t pilot programs; they’re production deployments processing sensitive data. CISOs and security leaders in these industries are facing attacks that use tradecraft that didn’t exist twelve to eighteen months ago.

Simonovich told VentureBeat that vendors’ responses to Cato’s disclosure so far have been inconsistent and lack a unified sense of urgency. The lack of response from the world’s largest AI companies reveals a troubling gap. While enterprises deploy AI tools at unprecedented speed, relying on AI companies to support them, the companies building AI apps and platforms show a startling lack of security readiness.

When Cato disclosed the Immersive World technique to major AI companies, the responses ranged from weeks-long remediation to complete silence:

  • DeepSeek never responded
  • Google declined to review the code for the Chrome infostealer due to similar samples
  • Microsoft acknowledged the issue and implemented Copilot fixes, acknowledging Simonovich for his work
  • OpenAI acknowledged receipt but didn’t engage further

Six Hours and $250 is the new entry-level price for a nation-state attack

APT28’s LAMEHUG deployment against Ukraine isn’t a warning; it’s proof that Simonovich’s research is now an operational reality. The expertise barrier that many organizations hope exists is gone.

The metrics are stark—270 stolen API tokens are used to power nation-state attacks. Underground platforms offer identical capabilities for $250 per month. Simonovich proved that six hours of storytelling transforms any enterprise AI tool into functional malware with no coding required.

Enterprise AI adoption grew 34% in Q1 2024 to 115% in Q4 2024 per Cato’s 2025 CTRL Threat Report. Each deployment creates dual-use technology, as productivity tools can become weapons through conversational manipulation. Current security tools are unable to detect these techniques.

Simonovich’s journey from Air Force mechanic to electrical technician in the Israeli Air Force, to security researcher through self-education, lends more significance to his findings. He deceived AI models into developing malware while the AI believed it was writing fiction. Traditional assumptions about technical expertise no longer exist, and organizations need to realize it’s an entirely new world when it comes to threatcraft.

Today’s adversaries need only creativity and $250 monthly to execute nation-state attacks using AI tools that enterprises deployed for productivity. The weapons are already inside every organization, and today they’re called productivity tools.



Source link

Related Posts

Voyager Technologies Acquires ExoTerra Resources

SAN FRANCISCO — Voyager Technologies announced the acquisition...

AMD is rebadging 2022 Ryzen processors as ‘new’ chips

If you’re in the market for a new...

Access Denied

Access Denied You don't have permission to access...

Apple may bring vapor chamber cooling to future iPad Pro models

Apple could be gearing up for a major...
- Advertisement -spot_img
cara pemain cerdas menang stabil di mahjong wayscara pemain mahjong ways 3 dapat scatter tanpa ribetpola ampuh pahami trik kuasai rtp agar menang
SV388SV388JUDI BOLA ONLINESBOBET88sabung ayam onlinejudi bola onlinelive casino onlinejudi bola onlinesabung ayam onlinelive casino onlineungkap pola misterius mahjong ways jarwo dikasih menang rp.221.330.110 cuma spin manual x10trik nekat modal 55 ribu login mahjong ways 2 stella menang rp.110.500.300 saldo langsung cair via danawahanabet ungkap trik dapat cuan besar disemua game online hingga bocoran pola & rtp tinggistrategi ampuh candy pops sweet bonanza kombinasi pola & rtp 98.21% trik ledakan bom x1000 auto cuanhokimu tiba hari ini budi main wild bandito hanya modal 100 ribu abaikan rtp cukup pakai trik ini 15x putaran langsung wedepola klasik gates of olympus trik jitu yang satu ini gak ada matinya depo 45 ribu masih worth it brosabung ayam onlinesabung ayam onlinesabung ayam onlineSBOBET88sabung ayam onlineindopromaxindopromaxindopromaxindopromaxindopromaxindopromaxindopromaxindopromaxSabung Ayam OnlineSabung Ayam OnlineSabung Ayam Onlinejudi bola onlinejudi bolajudi bolasabung ayam onlinesabung ayam onlinesabung ayam onlinelive casino online sabung ayam slot mahjong judi bola SV388jUDI BOLASBOBET88SBOBET88WS168LIVE CASINO ONLINESBOBET88SV388SEXYGAMINGINDOBALI88SABA SPORTSV388LIVE CASINOSV388Mahjong WaysSABUNG AYAM ONLINELive Casino OnlineSabung Ayam onlinemahjong ways 2sabung ayam onlinejudi bola onlinelive casino onlineslot gacor mahjongslot gacor mahjongslot gacor mahjongslot gacor mahjongLIVE CASINO ONLINESBOBETSABUNG AYAM ONLINESABUNG AYAM ONLINECASINO ONLINECASINO ONLINELIVE CASINO ONLINEJUDI BOLALIVE CASINO ONLINEMAHJONGSABUNG AYAM ONLINESITUS JUDI BOLASABUNG AYAM ONLINELIVE CASINO ONLINESLOT MAHJONGlive casinomix parlaymix parlaysabung ayam onlinelive casinomix parlaysabung ayam onlinesabung ayam onlinemix parlaysabung ayam onlinemix parlaysabung ayam onlinemix parlayparlaysitus live casinojudi bolaSabung Ayam OnlineSabung Ayam OnlineSabung Ayam OnlineSABUNG AYAMJUDI BOLALIVE CASINOSLOT MAHJONGMAHJONG WAYSJUDI BOLA ONLINESABUNG AYAM ONLINESWEET BONANZASLOT ZEUSSV388JUDI BOLA ONLINEJUDI BOLA ONLINEJUDI BOLA ONLINESABUNG AYAM ONLINELIVE CASINO ONLINESITUS SLOT ONLINEPRAGMATIC PLAYMAHJONG WAYSJudi BolaLive Casino OnlineSabung Ayam onlinemahjong ways 2Judi Bolamahjong ways 2mahjong wins 3gates of olympussweet bonanzastarlight princesssbobetsv388agen baccaratsabung ayam onlinejudi bola onlinejudi bola onlinesabung ayam onlinemahjong ways 2mahjong wins 3lucky nekosweet bonanzastarlight princessjudi bola onlinesabung ayam onlineagen casino onlinecasino onlinejudi bola onlinesabung ayam onlinecasino onlinejudi bola onlinejudi bola onlinesabung ayam onlinecasino onlineslot gacor mahjonglive casino onlinesabung ayam onlinesabung ayam onlinecasino onlineslot gacor mahjongsabung ayam onlinejudi bola onlinejudi bolasabung ayam onlineindobit88live casino onlinesv388sabung ayam onlineCasino Onlinesabung ayam onlineMix Parlaycasino onlineMahjong Wayssabung ayam onlinejudi bola onlinesabung ayam onlinemix parlay
analisis pola spin mahjong ways untuk menang konsistenwild mahjong ways 3 ajarkan cara hadapi tantangan hidupputaran maxwin mahjong ways 2mengenal pola sukses mahjong wins 3strategi maxwin pemain mahjong wayspola campuran gate of olympusmenang pragmatic play pakai pola indojawa88strategi ammar menang mahjong ways 2bangkit dari kerugian berkat mahjong wins 3strategi Jackpot main clover goldJUDI BOLA ONLINESABUNG AYAM ONLINELIVE CASINO ONLINESLOT MAHJONGMAHJONG WAYS 2judi bola onlinejudi bola onlineslot mahjong wayssv388sbobet88live baccarat onlinesbobet mix parlaycara spin mahjong ways ala admin wahanabet tips mantul cuan tipis tapi lancar tanpa hambatanmenang rp.142.250.331 pakai kombinasi duo maut denny spill trik dapat cuan dari treasures of aztec modal bet cuma 400 perakSabung Ayam Onlinejudi bola onlinemahjong wayssabung ayam onlinesabung ayam onlinesabung ayam onlinesabung ayam onlinejudi bolaslot mahjongsv388judi bolasabung ayam onlineungkap rahasia scatter mahjong wayskiat sukses pemain gates of olympustrik dan strategi kuasai rtp mahjong winspola lonceng emas queen of bountystrategi scatter hitam mahjong ways 2maxwin scatter hitam indojawa88
slot mahjong wayssabung ayam onlinejudi bola onlinesabung ayam onlinelive casino onlinejudi bola onlinesabung ayam onlinelive casino onlineSABUNG AYAM ONLINESBOBET88LIVE CASINO ONLINEMAHJONG WAYS 2JUDI BOLA ONLINESBOBET88SBOBETsv388sbobet88ws168sbobet mobilemahjong waysmodal nekat cuan dahsyat pakai pola ini spin sweet bonanza bisa menang puluhan jutajangan salah langkah main mahjong ways pakai trik ini scatter hitam pasti pecah terusSabung Ayam OnlineSabung Ayam OnlineSabung Ayam OnlineSabung Ayam OnlineSabung Ayam OnlineLAB Official Work PageGalleria Pallesi Official SitePITAC Official ContactSOBER ICT Official Contactsabung ayam onlinesabung ayam onlinesabung ayam onlinesabung ayam onlinesabung ayam onlinesabung ayam onlineSBOBETLIVE CASINO ONLINESBOBET88LIVE CASINO ONLINEJUDI BOLASABUNG AYAM ONLINESLOT MAHJONGLIVE CASINO ONLINESABUNG AYAM ONLINEMIX PARLAYCASINO ONLINESLOT MAHJONGSABUNG AYAM ONLINESBOBET88SABUNG AYAM ONLINELIVE CASINO ONLINELIVE CASINO ONLINESABUNG AYAM ONLINESABUNG AYAM ONLINELIVE CASINO ONLINELIVE CASINO ONLINEAGEN JUDI BOLACASINO ONLINESLOT MAHJONGsabung ayam onlinemix parlaymix parlaymix parlaysabung ayam onlinemix parlaymix parlaysabung ayam onlinelive casinoSV388SBOBET88CASINO ONLINEPG SOFTSLOT GACORJUDI BOLA ONLINESITUS JUDI BOLASITUS JUDI BOLASABUNG AYAM ONLINEJUDI BOLA ONLINECASINO ONLINESLOT MAXWINSLOT GACORSBOBETSLOT MAHJONG WAYSSLOT KAKEK ZEUSSLOT SPACEMANBANDAR BOLAJUDI BOLASABUNG AYAMMEGA WHEELSLOT 4DSV388MAHJONG WAYSsabung ayam onlinejudi bola onlinelive casino onlineslot mahjonglive casino onlineslot mahjongsabung ayam onlinejudi bola onlinelive casino onlineslot mahjongJudi BolaLive Casino OnlineSabung Ayam onlineSlot Mahjong Gacorjudi bolaslot mahjonglive casinoindobit88slot onlineagen judi bolasabung ayam onlinejudi bolatogel onlinesbobet88sbobet88Mix Parlaycasino onlineMix ParlaySV388Judi Bola OnlineMahjong WaysSabung Ayam Onlinesabung ayam onlinejudi bola onlinemahjong ways 2slot mahjong waysmahjong ways 2mahjong wins 3lucky nekosweet bonanzastarlight princesssbobetsabung ayam onlineagen casinosabung ayam onlinejudi bola onlinesabung ayam onlinejudi bola onlinemahjong ways 2mahjong wins 3starlight princesssweet bonanzagates of olympussabung ayam onlinesbobetagen casinoSLOT ZEUSSABUNG AYAM ONLINESABUNG AYAM ONLINELIVE CASINOSLOT MAHJONGcasino onlineslot zeusjudi bola onlinesabung ayam onlinesabung ayam onlinecasino onlineMIX PARLAYSV388INDOBALI88SABUNG AYAM ONLINESBOBET88WS168CASINO ONLINESBOBET88MIX PARLAYJUDI BOLAMAHJONG WAYS 2MAHJONG WAYSMAHJONG WINS 3POLA MAHJONG WAYSSITUS MAHJONG WAYS 2
Nusa Islands Bali Official PackagesTrinidad and Tobago Pilots’ Association Official About Pagemaxwin mahjong wins 3strategi main gates of olympuskuasai pola rtp pragmatic playlangkah mendapatkan scatter emaspola rtp pg soft indojawa88Green Gold Mountain Official SiteKomite SMKN 1 Tanjung Jabung Barat Official Sitetutorial maxwin mahjong waysstrategi rtp mahjong waysEIKON Official Policieskontak situs pecinta ayamNusa Islands Bali Official ContactCitraLand Surabaya Official NewsLenterakita About PageVinayak Group Official SiteI Think An Idea Official SitePITAC Official SitePortfolioSitez Official SiteMedical LTD Official SiteCapworks Official SiteMartino & Luth Official SiteTech With Mike First Official SiteSahabat Tiopan Official SiteE-Sekolah CBT Official SiteBDF Ventura Official SiteOcean E Soft Official SiteArab DMC Official SiteBBC Noun Official SiteCang Vu Hai Phong Official SiteThe Flat Official SiteThe Black Sheep Official SiteCEM Argentina Official SiteSlot MahjongTop Dawg Tavern Official SiteKelas Nesfatin Official SiteDuhoc Interlink Official SiteKarunia Inda Med Mandiri Official SiteJFV Pulm Official SiteRatiohead Official SiteAskona Official SiteMAN Surabaya E-Learning Official SiteShaker Group Official SiteTakaKawa Shoten Official SiteBrydan Solutions Official SiteConcursos Rodin Official SiteEHOB Official SiteConmou Official SiteCareer Wings Official SiteMontero Espinosa Official SiteBDF Ventura Official SiteDesa Sangginora Official SiteBDF Ventura Official SiteTaruna Akademia Official SiteAkura Official SiteMUI Ciamis Official SiteNamulanda Technical Institute Official Site