DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

HP Wolf Security Uncovers Evidence of Attackers Using AI to Generate Malware

DigitalCIO Bureau by DigitalCIO Bureau
September 28, 2024
in Tech News
0
Inspira Enterprise joins Nozomi Networks’ MSSP Elite Partners’ League
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

At HP Imagine, HP issued its latest Threat Insights Report revealing how attackers are using generative AI to help write malicious code. HP’s threat research team found a large and refined ChromeLoader campaign spread through malvertising that leads to professional-looking rogue PDF tools, and identified cybercriminals embedding malicious code in SVG images.

The report provides an analysis of real-world cyberattacks, helping organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape.  Based on data from millions of endpoints running HP Wolf Security, notable campaigns identified by HP threat researchers include:

  • Generative AI assisting malware development in the wild: Cybercriminals are already using GenAI to create convincing phishing lures but to date there has been limited evidence of threat actors using GenAI tools to write code. The team identified a campaign targeting French-speakers using VBScript and JavaScript believed to have been written with the help of GenAI. The structure of the scripts, comments explaining each line of code, and the choice of native language function names and variables are strong indications that the threat actor used GenAI to create the malware. The attack infects users with the freely available AsyncRAT malware, an easy-to-obtain infostealer which can record victim’s screens and keystrokes. The activity shows how GenAI is lowering the bar for cybercriminals to infect endpoints.
  • Slick malvertising campaigns leading to rogue-but-functional PDF tools: ChromeLoader campaigns are becoming bigger and increasingly polished, relying on malvertising around popular search keywords to direct victims to well-designed websites offering functional tools like PDF readers and converters. These working applications hide malicious code in a MSI file, while valid code-signing certificates bypass Windows security policies and user warnings, increasing the chance of infection. Installing these fake applications allows attackers to take over the victim’s browsers and redirect searches to attacker-controlled sites.
  • This logo is a no-go – hiding malware in Scalable Vector Graphics (SVG) images: some cybercriminals are bucking the trend by shifting from HTML files to vector images for smuggling malware. Vector images, widely used in graphic design, commonly use the XML-based SVG format. As SVGs open automatically in browsers, any embedded JavaScript code is executed as the image is viewed. While victims think they’re viewing an image, they are interacting with a complex file format that leads to multiple types of infostealer malware being installed.

Patrick Schläpfer, Principal Threat Researcher in the HP Security Lab, comments:

“Speculation about AI being used by attackers is rife, but evidence has been scarce, so this finding is significant. Typically, attackers like to obscure their intentions to avoid revealing their methods, so this behavior indicates an AI assistant was used to help write their code. Such capabilities further lower the barrier to entry for threat actors, allowing novices without coding skills to write scripts, develop infection chains, and launch more damaging attacks.”

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 40 billion email attachments, web pages, and downloaded files with no reported breaches.

The report, which examines data from calendar Q2 2024, details how cybercriminals continue to diversify attack methods to bypass security policies and detection tools, such as:

  • At least 12% of email threats identified by HP Sure Click bypassed one or more email gateway scanners, the same as the previous quarter.
  • The top threat vectors were email attachments (61%), downloads from browsers (18%) and other infection vectors, such as removable storage – like USB thumb drives and file shares (21%).
  • Archives were the most popular malware delivery type (39%), 26% of which were ZIP files.

Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc., comments:

“Threat actors are constantly updating their methods, whether it’s using AI to enhance attacks, or creating functioning-but-malicious tools to bypass detection. So, businesses must build resilience, closing off as many common attack routes possible. Adopting a defense-in-depth strategy — including isolating high-risk activities like opening email attachments or web downloads — helps to minimize the attack surface and neutralize the risk of infection.”

HP Wolf Security1 runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.

Tags: AIGenerative AIHP Wolf Security
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

by DigitalCIO Bureau
March 6, 2026
0
NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

LTM, the Business Creativity partner to the world’s largest enterprises, has been recognized as a Leader in the ‘Overall’ market segment in the NelsonHall NEAT Evaluation for GenAI...

Read moreDetails

OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

by DigitalCIO Bureau
March 2, 2026
0
OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

Partnership aims to build intelligent, resilient, and future-ready enterprise ecosystems worldwide New Delhi – March 2, 2026 — OptiValue Tek has announced a strategic alliance with SFJ Business Solutions, to deliver large-scale enterprise...

Read moreDetails

TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

by DigitalCIO Bureau
March 2, 2026
0
TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

TCS Workspace Experience Studio engineered with ZDX (Zscaler Digital Experience) will herald a new era in enterprise digital workspace innovation by integrating zero-trust security, observability, and AI-powered experience...

Read moreDetails

21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

by DigitalCIO Bureau
February 27, 2026
0
21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

TCS sets a new milestone with 146,922 participants, surpassing its 2021 Guinness World Records title to remain the world’s largest coding championship Tata Consultancy Services (TCS) announced the winners...

Read moreDetails

Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

by DigitalCIO Bureau
February 27, 2026
0
Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

Collaboration supports the nation’s “Make in India” initiative and global priority for supply chain diversification Companies’ manufacturing partnership aimed at supporting Indian and global automakers, strengthening supply-chain flexibility...

Read moreDetails
Next Post
Nokia selected by Vodafone Idea as major 4G and 5G partner in India

Nokia selected by Vodafone Idea as major 4G and 5G partner in India

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

NTT DATA Announces Multi Billion Investments To Accelerate India’s Digital Future

NTT DATA Announces Multi Billion Investments To Accelerate India’s Digital Future

March 19, 2025

Apple apologizes for listening to Siri talk, sets new rules

August 29, 2019
Gartner: Worldwide IT Spending to Grow 8% in 2024

Gartner: Worldwide IT Spending to Grow 8% in 2024

October 20, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?