PostHole
Compose Login
You are browsing eu.zone1 in read-only mode. Log in to participate.
rss-bridge 2026-02-12T11:00:47+00:00

Malicious Campaigns Using AI-generated Malware in 2026

In this blog post I am collecting the campaigns that show evidence of being AI-generated, or make use of AI tools to increase their impact. As always I will continue to update the list as soon as new campaigns emerge.


  • Post published:February 12, 2026
  • Reading time:1 min read

Views: 5,048

Last modified: February 26, 2026

[View Paolo Passeri's LinkedIn profile]

Connect on Linkedin

Follow me on X

Follow me on Bluesky

[View Paolo Passeri's Mastdon profile]

Connect on Mastodon

In this blog post I am collecting the campaigns that show evidence of being AI-generated, or make use of AI tools to increase their impact. As always I will continue to update the list as soon as new campaigns emerge.

Motivations - AI Generated Campaigns **

HACKMAGEDDON.COM

No Data Found

Targets - AI Generated Campaigns **

HACKMAGEDDON.COM

No Data Found

AI Purpose - AI Generated Campaigns **

HACKMAGEDDON.COM

No Data Found

Check out the interactive charts and the statistics, immediately after the infographic. And please support my work, sharing the content, and of course connect on Linkedin, or even follow @paulsparrows on X (formerly Twitter), psparrows.bsky.social on Bluesky, or @ppasseri@Infosec.exchange on Mastodon for the latest updates.

IDDate ReportedDate OccurredDate DiscoveredAuthorTargetDescriptionAttackTarget ClassAttack ClassCountryLinkAI Used For...
113/01/2026Since at least December 2025During December 2025Chinese-affiliated developersCloud-based Linux systemsResearchers at Check Point uncover "VoidLink," a cloud-native malware framework leveraging serverless computing and legitimate cloud services for command-and-control.MalwareInformation/CommunicationCyber CrimeGlobalMalware coding
221/01/2026Late 2025 through January 2026 (ongoing at discovery)Late 2025 through January 2026 (ongoing at discovery)Unknown threat actor (Malware family: Android.Phantom)Android mobile device usersResearchers at Doctor Web discover the Android.Phantom trojan, which employs TensorFlow.js machine learning to automate ad-fraud. It spreads through modified popular apps and games on Xiaomi’s GetApps, Telegram, and Discord, mimicking authentic user behavior.MalwareIndividualCyber CrimeGlobalRunning models in browsers or on servers using Node.js.
322/01/2026During January 2026During January 2026Konni (linked to North Korean state-sponsored activity).Blockchain and software engineersResearchers at Check Point reveal that the Konni group is targeting blockchain engineers via LinkedIn, using AI-generated malware disguised as technical coding assessments. By tricking victims into downloading malicious repositories, the attackers deploy a remote access trojan (RAT) to steal sensitive information and credentials from developers in the cryptocurrency and fintech sectors.MalwareFintechCyber CrimeGlobalPowerShell malware Coding
429/01/2026Late January 2026Late January 2026RedKitten (suspected Iranian state-sponsored group)Iranian protesters, activists, and human rights organizationsResearchers at HarfangLab identified "RedKitten," an AI-accelerated campaign targeting Iranian protesters. Attackers use AI-generated personas and deepfake videos on social media to build trust before deploying modular Python malware via "secure" communication tools.MalwareOther ServiceCyber EspionageIRMalicious VBA macro coding
503/02/202628/11/202528/11/2025UnknownUndisclosed OrganizationResearchers at Sysdig disclose the details of an AI-assisted cloud intrusion that escalated from initial access to full administrator privileges in just eight minutes, leveraging LLMs to analyze misconfigurations and automate exploitation.Account TakeoverUnknownCyber CrimeUnspecifiedAutomate reconnaissance, generate malicious code, and make real-time decisions.
605/02/2026UnspecifiedUnspecifiedUnknwonIndividuals including victims of previous Crypto scamsResearchers at Sygnia uncover a live network of 150 cloned, scam websites supposedly belonging to law firms.ScamFintechCyber CrimeGlobalGenerating Phishing Lures
709/02/2026'Recently''Recently'UNC1069 (affiliated with North Korean state-sponsored clusters)Undisclosed FinTech entityResearchers at Google Mandiant identify UNC1069, a North Korean-linked actor, using AI-generated personas and professional networking platforms to target cryptocurrency firms, leading to the delivery of the customized malware.MalwareFintechCyber CrimeUnknownGenerating personas for social engineering
810/02/2026Since at least 2019, not necessarily using VoidLinkDuring September 2025UAT-9921 (Chinese-speaking threat actor)Technology and financial services sectorsResearchers at Cisco Talos observe a previously unknown threat actor tracked as UAT-9921 leveraging the new AI-generated modular framework called VoidLink in its campaigns targeting the technology and financial services sectors.MalwareMultiple IndustriesCyber EspionageGlobalMalware coding
910/02/2026'Recently''Recently'Unspecified threat group suspected to be linked to Russian intelligence servicesMultiple Organizations in UkraineResearchers at Google Threat Intelligence Group (GTIG) a previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with a malware known as CANFAIL and using LLMs to overcome some technical limitations.MalwareMultiple IndustriesCyber EspionageUAConduct reconnaissance, create lures for social engineering, seek answers to basic technical questions for post-compromise activity and C2 infrastructure setup.

| 10 | 12/02/2026 | Unknown | Unknown | Threat actors from China (APT31, Temp.HEX), Iran (APT42), North Korea (UNC2970), and Russia | Multiple organizations | The Google Threat Intelligence Group (GTIG) reveals that state-backed threat actors are using Google's Gemini AI model to support all stages of an attack, from reconnaissance to post-compromise actions. | Account Takeover
Malware | Multiple Industries | Cyber Espionage | Global | | Conduct reconnaissance and open-source intelligence, generating phishing lures, translating text, coding, vulnerability testing, and troubleshooting |

1117/02/2026During 2025During 2025UnknownUnnamed organization(s)Researchers at Palo Alto Networks’ share findings about a low-skilled actor who used an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics.UnknownUnknownCyber CrimeUnknownScript a professional extortion strategy

[...]


Original source

Reply