The rise of AI-powered cybercrime and defence

Issue 2 2025 Information Security, News & Events, AI & Data Analytics


Lotem Finkelstein.

Check Point Software Technologies launched its inaugural AI Security Report. This report offers an in-depth exploration of how cyber criminals are weaponising artificial intelligence (AI), alongside strategic insights for defenders to stay ahead.

As AI reshapes industries, it has also erased the lines between truth and deception in the digital world. Cybercriminals now wield generative AI and large language models (LLMs) to obliterate trust in digital identity. In today’s landscape, what you see, hear, or read online, can no longer be believed at face value. AI-powered impersonation bypasses even the most sophisticated identity verification systems, making anyone a potential victim of deception on a scale.

"The swift adoption of AI by cybercriminals is already reshaping the threat landscape,” said Lotem Finkelstein, director of Check Point Research. “While some underground services have become more advanced, all signs point toward an imminent shift – the rise of digital twins. These are not just lookalikes or soundalikes, but AI-driven replicas capable of mimicking human thought and behaviour. It is not a distant future – it is just around the corner.”

Key threat insights from the AI Security Report

AI’s ability to convincingly impersonate and manipulate digital identities is at the heart of these developments, dissolving the boundary between authentic and fake. The report uncovers four core areas where this erosion of trust is most visible:

• AI-enhanced impersonation and social engineering: Threat actors use AI to generate realistic, real-time phishing emails, audio impersonations, and deepfake videos. Notably, attackers recently mimicked Italy’s defence minister using AI-generated audio, demonstrating that no voice, face, or written word online is safe from fabrication.

• LLM data poisoning and disinformation: Malicious actors manipulate AI training data to skew outputs. A case involving Russia’s Pravda showed AI chatbots repeating false narratives 33% of the time, underscoring the need for robust data integrity in AI systems.

• AI-created malware and data mining: Cybercriminals harness AI to craft and optimise malware, automate DDoS campaigns, and refine stolen credentials. Services like Gabbers Shop use AI to validate and clean stolen data, enhancing its resale value and targeting efficiency.

• Weaponisation and hijacking of AI models: From stolen LLM accounts to custom-built Dark LLMs like FraudGPT and WormGPT, attackers are bypassing safety mechanisms and commercialising AI as a tool for hacking and fraud on the dark web.

Defensive

The report emphasises that defenders must now assume AI is embedded within adversarial campaigns. To counter this, organisations should adopt AI-aware cybersecurity frameworks, including:

• AI-assisted detection and threat hunting: Leverage AI to detect AI-generated threats and artefacts, such as synthetic phishing content and deepfakes.

• Enhanced identity verification: Move beyond traditional methods and implement multi-layered identity checks that account for AI-powered impersonation across text, voice, and video, recognising that trust in digital identity is no longer guaranteed.

• Threat intelligence with AI context: Equip security teams with the tools to recognise and respond to AI-driven tactics.

"In this AI-driven era, cybersecurity teams need to match the pace of attackers by integrating AI into their defences," added Finkelstein. "This report highlights the risks and provides the roadmap for securing AI environments safely and responsibly."

The full AI Security Report 2025 is available for download here.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Firexpo 2025 ignites interest in fire safety
Fire & Safety News & Events
Firexpo 2025 showcased fire detection, suppression, and safety tech, drawing professionals eager to explore innovations, gain insights, and connect with suppliers.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.