{"id":4695,"date":"2026-03-03T20:41:06","date_gmt":"2026-03-03T20:41:06","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2026\/03\/03\/ai-and-deepfakes-supercharge-sophisticated-cyber-attacks-says-cloudflare\/"},"modified":"2026-03-03T20:41:06","modified_gmt":"2026-03-03T20:41:06","slug":"ai-and-deepfakes-supercharge-sophisticated-cyber-attacks-says-cloudflare","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/03\/03\/ai-and-deepfakes-supercharge-sophisticated-cyber-attacks-says-cloudflare\/","title":{"rendered":"AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/01\/localimages\/cb531640-ce34-4e47-96c8-4a9f811ec92a.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Danny  Palmer \" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Easy access to large language models (LLMs) and other AI tools has significantly lowered the barrier to entry for cybercriminals to conduct effective cyber-attacks rapidly and at scale, a new threat intelligence report by Cloudflare has warned.<\/p>\n<p>The <em>2026 Cloudflare Threat Report<\/em>\u00a0 draws on research and analysis by the company\u2019s Cloudforce One threat research team and details how AI has become a \u201cforce multiplier\u201d for cybercriminals, lowering the effort required to carry out campaigns, while also making those campaigns more impactful.<\/p>\n<p>\u201cAn actor who previously lacked the skills to craft a convincing phishing email or write custom malware can now leverage an LLM to generate them rapidly and at scale, significantly lowering the barrier to entry for highly effective operations,\u201d said Cloudflare.<\/p>\n<p>According to the report, LLMs and AI have been adopted by a wide range of threat actors, including state-sponsored hacking groups, financially motivated cybercriminal gangs and hacktivist collectives.<\/p>\n<p>The ways in which malicious hackers are exploiting these tools include using LLMs to write more convincing phishing emails, especially if they\u2019re not being written in their native language.<\/p>\n<p>Attackers are also taking advantage of AI tools to help with writing malware and conduct campaigns, in a way which is lowering the technical barrier to entry for launching attacks. For example, according to the report, attackers are using LLMs to map networks in real-time.<\/p>\n<p>\u201cCloudforce\u00a0One tracked a threat actor who\u00a0leveraged\u00a0AI to help\u00a0identify\u00a0the\u00a0location of high-value data. This allowed the actor to compromise hundreds of corporate tenants\u2026 in one\u00a0of the most impactful supply chain attacks seen,\u201d said researchers.<\/p>\n<h2><strong>AI Deepfakes: The New Insider Threat <\/strong><\/h2>\n<p>Corporate identities have become a prime focus of cyber-attacks, with user accounts highly coveted by the attackers as they look to leverage access to cloud architecture to covertly conduct campaigns while remaining under the radar.<\/p>\n<p>But sometimes, using account identity isn\u2019t enough. Researchers warn that AI-generated deepfakes and fraudulent IDs are being generated to bypass hiring filters to embed threat actors directly inside target organizations as employees. In particular, North Korea is known to exploit this attack vector.<\/p>\n<p>\u201cThis infiltration turns the remote workforce into an attack vector, placing malicious insiders within the organization\u2019s most trusted administrative and financial systems,\u201d said the report.<\/p>\n<p>Cloudflare has warned that the proliferation of AI-based tools lowering the barrier to entry for technical, sophisticated campaigns amounts to the \u201ctotal industrialization of cyber threats\u201d \u2013 and that organizations must be prepared for rapid evolution of cyber-attacks.<\/p>\n<p>\u201cThreat actors are constantly changing tactics, finding new vulnerabilities to exploit and ways to overwhelm their victims. To avoid being caught off guard, organizations must shift from a reactive posture to one fueled by real-time actionable intelligence,\u201d said Blake\u00a0Darch\u00e9, head of threat intelligence, Cloudforce\u00a0One at\u00a0Cloudflare.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Easy access to large language models (LLMs) and other AI tools has significantly lowered the barrier to entry for cybercriminals to conduct effective cyber-attacks rapidly and at scale, a new threat intelligence report by Cloudflare has warned. The 2026 Cloudflare Threat Report\u00a0 draws on research and analysis by the company\u2019s Cloudforce One threat research team<\/p>\n","protected":false},"author":2,"featured_media":4696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4695-8dd83cd4-2260-49ce-8ee7-d67dcb164b5e-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4695"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4695\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4696"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}