The rise of AI-powered cybercrime and defence

Issue 2 2025 Information Security, News & Events, AI & Data Analytics


Lotem Finkelstein.

Check Point Software Technologies launched its inaugural AI Security Report. This report offers an in-depth exploration of how cyber criminals are weaponising artificial intelligence (AI), alongside strategic insights for defenders to stay ahead.

As AI reshapes industries, it has also erased the lines between truth and deception in the digital world. Cybercriminals now wield generative AI and large language models (LLMs) to obliterate trust in digital identity. In today’s landscape, what you see, hear, or read online, can no longer be believed at face value. AI-powered impersonation bypasses even the most sophisticated identity verification systems, making anyone a potential victim of deception on a scale.

"The swift adoption of AI by cybercriminals is already reshaping the threat landscape,” said Lotem Finkelstein, director of Check Point Research. “While some underground services have become more advanced, all signs point toward an imminent shift – the rise of digital twins. These are not just lookalikes or soundalikes, but AI-driven replicas capable of mimicking human thought and behaviour. It is not a distant future – it is just around the corner.”

Key threat insights from the AI Security Report

AI’s ability to convincingly impersonate and manipulate digital identities is at the heart of these developments, dissolving the boundary between authentic and fake. The report uncovers four core areas where this erosion of trust is most visible:

• AI-enhanced impersonation and social engineering: Threat actors use AI to generate realistic, real-time phishing emails, audio impersonations, and deepfake videos. Notably, attackers recently mimicked Italy’s defence minister using AI-generated audio, demonstrating that no voice, face, or written word online is safe from fabrication.

• LLM data poisoning and disinformation: Malicious actors manipulate AI training data to skew outputs. A case involving Russia’s Pravda showed AI chatbots repeating false narratives 33% of the time, underscoring the need for robust data integrity in AI systems.

• AI-created malware and data mining: Cybercriminals harness AI to craft and optimise malware, automate DDoS campaigns, and refine stolen credentials. Services like Gabbers Shop use AI to validate and clean stolen data, enhancing its resale value and targeting efficiency.

• Weaponisation and hijacking of AI models: From stolen LLM accounts to custom-built Dark LLMs like FraudGPT and WormGPT, attackers are bypassing safety mechanisms and commercialising AI as a tool for hacking and fraud on the dark web.

Defensive

The report emphasises that defenders must now assume AI is embedded within adversarial campaigns. To counter this, organisations should adopt AI-aware cybersecurity frameworks, including:

• AI-assisted detection and threat hunting: Leverage AI to detect AI-generated threats and artefacts, such as synthetic phishing content and deepfakes.

• Enhanced identity verification: Move beyond traditional methods and implement multi-layered identity checks that account for AI-powered impersonation across text, voice, and video, recognising that trust in digital identity is no longer guaranteed.

• Threat intelligence with AI context: Equip security teams with the tools to recognise and respond to AI-driven tactics.

"In this AI-driven era, cybersecurity teams need to match the pace of attackers by integrating AI into their defences," added Finkelstein. "This report highlights the risks and provides the roadmap for securing AI environments safely and responsibly."

The full AI Security Report 2025 is available for download here.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...