GTIG: AI Supercharges Cyberattacks
Google Threat Intelligence Group, alongside Google DeepMind, warns that threat actors have operationalised artificial intelligence at scale. The latest assessment shows AI is less about inventing new attack types and more about magnifying efficiency, precision and reach.
Large language models now compress the journey from idea to intrusion. During reconnaissance, adversaries mine public data to map executives, vendors and technical exposures with remarkable clarity.
For social engineering, AI generates persuasive narratives, emails and identities tailored to individual targets. In parallel, malware authors use generative tools to debug exploits, explore evasion paths and spin up fresh variants rapidly.
Researchers are also tracking code that consults AI services mid-operation. These threats can produce commands dynamically, morph behaviour and streamline exfiltration, weakening traditional detection approaches.

Emerging AI-Integrated Threats
The 2026 report identifies specific malware families that have begun calling AI APIs mid-execution to evade detection and automate data theft.
|
Threat Name |
Type |
Description |
|
HONESTCUE |
Downloader / Launcher |
Utilizes the Gemini API to dynamically generate C# code in memory, facilitating stage-two execution while evading static analysis. |
|
PROMPTFLUX |
VBScript Dropper |
Employs AI to rewrite its own source code on an hourly basis, creating a "recursive cycle of mutation" to remain undetected by signature-based tools. |
|
PROMPTSTEAL |
Infostealer |
Queries LLMs to generate system commands on the fly for data exfiltration, replacing traditional, easily-flagged hard-coded instructions. |
|
COINBAIT |
Phishing Kit |
An AI-generated kit that clones cryptocurrency exchange interfaces to harvest user credentials with high visual fidelity. |
|
Xanthorox |
"Wrapper" Service |
Marketed on the dark web as a custom "offensive AI," it is actually a rebranded wrapper for legitimate commercial LLMs designed to bypass safety filters. |
Activity tied to APT28 and similar operators illustrates how automation supports geopolitical missions through sharper targeting and scalable intelligence preparation.
Another rising concern is model distillation. By flooding systems with structured prompts, attackers try to replicate proprietary reasoning, effectively copying intelligence rather than data.
Google’s advice is unequivocal: treat AI agents as identities, confine privileges tightly and deploy defenses that react at machine tempo. In a battlefield measured in milliseconds, manual security cannot keep up.
AI may power innovation, but it is equally redefining the threat equation.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.



