{"id":4581,"date":"2026-02-21T18:38:06","date_gmt":"2026-02-21T18:38:06","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2026\/02\/21\/low-skilled-cybercriminals-use-ai-to-perform-vibe-extortion-attacks\/"},"modified":"2026-02-21T18:38:06","modified_gmt":"2026-02-21T18:38:06","slug":"low-skilled-cybercriminals-use-ai-to-perform-vibe-extortion-attacks","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/02\/21\/low-skilled-cybercriminals-use-ai-to-perform-vibe-extortion-attacks\/","title":{"rendered":"Low-Skilled Cybercriminals Use AI to Perform &#8220;Vibe Extortion&#8221; Attacks"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Unsophisticated cyber threat actors have started delegating key steps of extortion campaigns to large language model (LLM)-powered AI assistants.<\/p>\n<p>In a report published on February 17, Unit 42, Palo Alto Networks\u2019 research team, shared findings about a low-skilled actor who used an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics.<\/p>\n<p>This technique has been dubbed by the researchers as \u201cvibe extortion.\u201d<\/p>\n<p>In one incident investigated by Unit 42, the cybercriminal recorded a threat video from their bed while visibly intoxicated, reading the AI-generated script word-for-word from a screen.<\/p>\n<p>While the threat lacked technical depth and seriousness, Unit 42 researchers argued that the LLM \u201csupplied the coherence\u201d and could open the door to more serious ways of using AI for low-skilled actors.<\/p>\n<p>\u201cAI didn\u2019t make the attacker smarter; it just made them look professional enough to be dangerous,\u201d they added.<\/p>\n<h2><strong>AI, A \u201cForce Multiplier\u201d For Cybercriminals<\/strong><\/h2>\n<p>This case was just one of many examples identified by Unit 42 researchers of cyber threat actors using AI in a novel way to help them achieve their cyber extortion goals.<\/p>\n<p>In the report, the researchers argued that AI, and especially generative AI (GenAI), has now become a \u201cforce multiplier for attackers.\u201d<\/p>\n<p>\u201cIn 2025, threat actors moved from experimentation to routine operational use. AI is not an attacker\u2019s \u2018easy button,\u2019 but it is a massive friction reducer,\u201d they wrote.<\/p>\n<p>Unit 42 observations showed that the cybercrime ecosystem is well beyond the \u201cphishing with better grammar\u201d phase. Attackers are now using GenAI in novel ways to help them scale or speed up the attack lifecycle, iterate more frequently, operate with fewer human constraints or lower the barrier to entry for cybercriminals.<\/p>\n<p>These include:<\/p>\n<ul>\n<li><strong>Scanning vulnerabilities faster for rapid exploitation<\/strong>: Unit 42 researchers found that attackers start scanning for newly discovered vulnerabilities within 15 minutes of a CVE being announced, with some exploitation attempts beginning before many security teams have even finished reading the vulnerability advisory<\/li>\n<li><strong>Parallelized targeting<\/strong> with reconnaissance and initial access attempts across hundreds of targets at once<\/li>\n<li><strong>Delegating and automating key ransomware tasks<\/strong>, such as script generation, templating and extortion<\/li>\n<li><strong>Crafting hyper-personalized social engineering<\/strong> (e.g. automating open-source intelligence collection, including professional and organizational context to craft lures that match the target\u2019s role and relationships)<\/li>\n<li><strong>Creating synthetic identities<\/strong>: threat actors like Scattered Spider (tracked by Palo Alto as Muddled Libra) and North Korean IT workers increasingly use deepfake techniques to steal credentials and pass remote hiring workflows<\/li>\n<li><strong>Developing malware<\/strong>: in the Shai-Hulud campaign, Unit 42 assessed that attackers used an LLM to generate malicious scripts<\/li>\n<li><strong>Turning an AI platform into a weapon<\/strong>: threat actors use valid credentials to misuse enterprise AI platforms. For example, recent Unit 42 research on Google Vertex AI demonstrated how attackers could misuse custom job permissions to escalate privileges and use a malicious model as a Trojan horse to exfiltrate proprietary data<\/li>\n<\/ul>\n<p>Speaking to <em>Infosecurity<\/em>, Chris George, managing director at Unit 42, said he is especially impressed by how AI can help scale and speed up reconnaissance.<\/p>\n<p>\u201cNow that threat actors are fully using AI to fix phishing emails\u2019 grammar and make them more compelling, throwing product names or system names in the mix that were collected through reconnaissance and will sound familiar and specific to the victim adds a level of realism that makes phishing more efficient,\u201d he explained.<\/p>\n<p>\u201cWe even use AI for reconnaissance internally, within Unit 42, to support our assessments.\u201d he added<span>.<\/span><\/p>\n<p>Haider Pasha, VP and CSO for EMEA at Palo Alto Networks, told <em>Infosecurity<\/em> that he is particularly concerned by how AI has helped shrink the time to infiltrate networks and exfiltrate data.<\/p>\n<p>\u201cWhat used to take on average three to four weeks has now dropped down, in certain cases, to under 25 minutes. This is a record time that we didn&#8217;t anticipate and that would have been impossible without AI,\u201d he said.<\/p>\n<h2><strong>Recommendations to Mitigate AI Threats and Threats to AI<\/strong><\/h2>\n<p>In their report, Unit 42 researchers provided recommendations to mitigate AI threats in three domains: countering the AI-accelerated attack speed, defending against improved tradecraft and protecting the AI attack surface.<\/p>\n<p>Recommendations for countering the AI-accelerated attack speed include:<\/p>\n<ul>\n<li>Automating external patching: Mandate automated patching for critical CVEs on internet-facing assets to close the 24-hour exploitation window<\/li>\n<li>Autonomous containment: Deploying AI-driven response to drive down mean time to detect\/respond (MTTD\/MTTR) and isolate threats before they can automate lateral movement<\/li>\n<\/ul>\n<p>Recommendations for defending against improved tradecraft include:<\/p>\n<ul>\n<li>Behavioral email security: Transitioning from signature-based filters to engines that identify anomalies in communication patterns<\/li>\n<li>Intent-based awareness: Moving beyond simply training employees to spot typos. Shift to out-of-band (OOB) verification for all sensitive requests (e.g., wire transfers, credential resets or remote hiring)<\/li>\n<\/ul>\n<p>Recommendations for protecting the AI attack surface include:<\/p>\n<ul>\n<li>Monitoring model telemetry: Correlate unusual AI API calls or scripts sourced from model outputs with known evasion techniques<\/li>\n<li>Improving prompt visibility: Alert on sensitive queries to internal LLMs (e.g. \u2018find all passwords\u2019) and enforce strict permission boundaries for tokens and service accounts<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Unsophisticated cyber threat actors have started delegating key steps of extortion campaigns to large language model (LLM)-powered AI assistants. In a report published on February 17, Unit 42, Palo Alto Networks\u2019 research team, shared findings about a low-skilled actor who used an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics.<\/p>\n","protected":false},"author":2,"featured_media":4582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/02\/4581-0af9af2b-db82-4c42-9365-42a25bb75093-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4581"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4581\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4582"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}