{"id":25746,"date":"2025-02-04T08:10:04","date_gmt":"2025-02-04T16:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/02\/04\/news-19469\/"},"modified":"2025-02-04T08:10:04","modified_gmt":"2025-02-04T16:10:04","slug":"news-19469","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2025\/02\/04\/news-19469\/","title":{"rendered":"New AI &#8220;agents&#8221; could hold people for ransom in 2025"},"content":{"rendered":"\n<p>A paradigm shift in technology is hurtling towards us, and it could change everything we know about cybersecurity.<\/p>\n<p>Uhh, again, that is.<\/p>\n<p>When ChatGPT was unveiled to the public in late 2022, security experts looked on with cautious optimism, excited about the new technology but concerned about its use in cyberattacks. But two years on, much of what ChatGPT and other generative AI chat tools offer attackers is a way to improve what already works, not new ways to deliver attacks themselves.<\/p>\n<p>And yet, if artificial intelligence achieves what is called an \u201cagentic\u201d model in 2025, novel and boundless attacks could be within reach, as AI tools take on the roles of \u201cagents\u201d that independently discover vulnerabilities, steal logins, and pry into accounts.<\/p>\n<p>These agents could even hold people for ransom by matching stolen data online with publicly known email addresses or social media accounts, composing messages and holding entire conversations with victims who believe a human hacker out there has access to their Social Security Number, physical address, credit card info, and more. And if the model works for individuals, there\u2019s little reason it wouldn\u2019t work for individual business owners.<\/p>\n<p>This warning comes from our 2025 State of Malware report, which compiled a year\u2019s worth of intelligence to identify the most pressing cyberattacks on the horizon. Though the report\u2019s guidance serves IT teams, its threats will impact individuals and small businesses everywhere. Remember that just last year a widespread IT outage grounded flights globally, cementing the relationship between companies, cybersecurity, and everyday people.<\/p>\n<p>In 2025, agentic AI may further reveal just how closely tied everyone is in the battle for cybersecurity. Here\u2019s what we might expect.<\/p>\n<p><a href=\"https:\/\/www.threatdown.com\/dl-state-of-malware-2025\/\">You can find the full 2025 State of Malware report here<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-generative-ai-non-revolution\"><strong>The generative AI non-revolution<\/strong><\/h2>\n<p>The November 2022 launch of ChatGPT ushered forth a new relationship with our computers. No longer would we need to use our laptops, smartphones, and tablets to record or assist our creative work. Now, we could make those same machines complete the creative work for us.<\/p>\n<p>AI image tools like Midjourney and DALL-E can create images when given simple text prompts. They can even mimic the styles of famous artists, like Van Gogh, Rembrandt, and Picasso. AI chat tools like ChatGPT, Google Gemini, and Claude\u2014from OpenAI competitor Anthropic\u2014can brainstorm ideas for marketing materials, write book reports, compose poems, and even review human-written text for legibility. These tools can also answer an endless array of factual questions, much like the separate AI tool Perplexity, which advertises itself not as a \u201csearch engine,\u201d but as the world\u2019s first \u201canswer engine.\u201d<\/p>\n<p>This is the potential of \u201cgenerative AI,\u201d a term used to describe AI tools that can generate text, images, movies, summaries, and more, limited only by our imagination.<\/p>\n<p>But where has that imagination brought us?<\/p>\n<p>For unimaginative users, generative AI has made it easier to <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2024\/08\/another-year-ai-college-cheating\/679502\/?utm_source=reddit&amp;utm_medium=social&amp;utm_campaign=the-atlantic&amp;utm_content=edit-promo\">cheat in college classes<\/a> and to <a href=\"https:\/\/www.malwarebytes.com\/blog\/podcast\/2024\/12\/is-nowhere-safe-from-ai-slop-lock-and-code-s05e27\" target=\"_blank\" rel=\"noreferrer noopener\">abuse social media engagement algorithms to gain brief virality<\/a>\u2014hardly inspiring. And for malicious users, hackers, and scammers, generative AI has delivered oil-slick efficiency to proven attack methods.<\/p>\n<p>Generative AI tools can more convincingly write phishing emails so that the tell-tale signs of a scam\u2014like misspellings and clumsy grammar\u2014are all but gone. The same is true for all text-based social engineering tricks, as AI chat tools can write alluring direct messages for romance scams and craft urgent-sounding texts that can fool people into clicking on links that carry malware.<\/p>\n<p>Importantly, the attack methods here are not new. Instead, they\u2019ve simply become easier to scale with the use of AI. But sometimes the AI pushes back.<\/p>\n<p>With limitless, advertised potential, even tools like ChatGPT have boundaries, often precluding users from producing materials that could cause harm. In 2023, Malwarebytes Labs subverted these boundaries to successfully get <a href=\"https:\/\/www.threatdown.com\/blog\/chatgpt-happy-to-write-ransomware-just-really-bad-at-it\/\">ChatGPT to write ransomware<\/a>\u2014<a href=\"https:\/\/www.threatdown.com\/blog\/will-chatgpt-write-ransomware-yes\/\">twice<\/a>.<\/p>\n<p>Because of these prohibitive rules, a set of malicious copycat AI tools can now be found online that will produce text and images that often break the law. One example is in the creation of \u201cdeepfake nudes,\u201d which utilize AI technology to digitally stitch the face of one person onto another person\u2019s nude body, creating fake nude \u201cphotographs.\u201d Deepfake nudes have caused <a href=\"https:\/\/www.malwarebytes.com\/blog\/podcast\/2024\/09\/san-franciscos-fight-against-deepfake-porn-with-city-attorney-david-chiu-lock-and-code-s05e20\">multiple crises across high schools in America<\/a>, serving as a new type of ammunition for old weaponry: Blackmail.<\/p>\n<p>The ability to create false text, images, and even audio has also allowed cybercriminals to create more believable threats when fraudulently posing as CEOs or executives to convince employees to, say, sign a bogus contract or hand over a set of important account credentials.<\/p>\n<p>These are real threats, but they are not novel. As we wrote in the 2025 State of Malware report:<\/p>\n<p>\u201cThe limited impact of AI on malware stems from its current capabilities. Although there are notable exceptions, generative AIs tend to provide efficiency rather than brand new capabilities. Cybercrime is a very mature field that relies on a set of well-established tools, such as phishing, information stealers, and ransomware that are already feature complete.\u201d<\/p>\n<p>That could change in 2025.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-agentic-ai-and-a-new-landscape-of-attacks\"><strong>\u201cAgentic\u201d AI and a new landscape of attacks<\/strong><\/h2>\n<p>Agentic AI is the next big thing in artificial intelligence, even if you\u2019ve never heard about it before.<\/p>\n<p><a href=\"https:\/\/venturebeat.com\/ai\/google-cloud-launches-ai-agent-space-amid-rising-competition\/\">Google<\/a>, <a href=\"https:\/\/aws.amazon.com\/blogs\/aws\/introducing-multi-agent-collaboration-capability-for-amazon-bedrock\/\">Amazon<\/a>, <a href=\"https:\/\/www.axios.com\/2024\/11\/19\/meta-new-ai-tools-businesses?utm_source=www.buildingaiagents.ai&amp;utm_medium=newsletter&amp;utm_campaign=meta-joins-the-business-agent-race\">Meta<\/a>, <a href=\"https:\/\/www.techradar.com\/pro\/microsoft-unveils-a-whole-host-of-new-ai-agents-to-solve-even-your-trickiest-business-problems\">Microsoft<\/a>, and <a href=\"https:\/\/venturebeat.com\/ai\/salesforce-launches-agentforce-testing-center-to-put-agents-through-paces\/\">more<\/a> have all begun experimenting with the technology, which promises to take AI out of its current chatbot silo and into a new landscape where individualized AI \u201cagents\u201d can help with specific tasks. These agents could, for example, more effectively respond to simple customer support questions, help patients find in-network providers with their health insurance, and even suggest strategy based on a company\u2019s most recent performance. Microsoft, for its part, has already teased its AI agent that answers employee questions around HR policies, holiday schedules, and more. Salesforce, too, is investing heavily in agentic AI, positioning the technology as a personal assistant for everyone.<\/p>\n<p>As we wrote in the 2025 State of Malware report:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIf agentic AIs arrive in 2025, they won\u2019t just answer questions, they will be able to think and act, transforming AI from an assistant that responds to prompts, into a peer, or even an expert that can plan out tasks, interact with the world, and solve the problems it encounters.\u201d<\/p>\n<\/blockquote>\n<p>The implications for cyberattacks are enormous. If put into the wrong hands, malicious attackers could ask AI agents to:<\/p>\n<ul class=\"wp-block-list\">\n<li>Search vast troves of stolen data to match leaked Social Security numbers with leaked email addresses, composing and sending phishing emails that threaten more data exposure unless a ransom is paid.<\/li>\n<li>Scrape public social media feeds for baby photos that are delivered to other AI agents that create fake profiles that weaponize those baby photos as empty threats against a child\u2019s safety.<\/li>\n<li>Scour LinkedIn to create a database of potentially viable email addresses from countless companies by deducing the email address format\u2014first name, last name; first initial, last name; etc.\u2014from publicly listed email addresses, and then mirroring that format to write and send bogus requests from executives to their direct reports.<\/li>\n<li>Comb through public divorce records across multiple states and countries to identify targets for romance scams, who receive messages and who can carry on with whole conversations composed and controlled by another AI agent.<\/li>\n<\/ul>\n<p>These attacks threaten not only individuals but small businesses, too, as a vulnerability in a person\u2019s device can become a malware attack on a network. The same is true in reverse\u2014if attacks on companies become more accessible, then the data that people give these companies becomes more vulnerable to exposure.<\/p>\n<p>Thankfully, where agentic AI poses a risk, it also poses a boon, as individual AI agents could be tasked with finding a company\u2019s vulnerabilities, responding to suspicious activity on its network, and even guiding everyday people into safely posting online, searching the web, and buying from unknown retailers.<\/p>\n<p>The truth is that AI is here to stay. There is already too much investment from the largest developers and companies for that to reverse course any time soon. So, if the threat is that attackers might harness this AI, then the foreseeable future will involve a lot of defenders and everyday people harnessing it, too.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/02\/new-ai-agents-could-hold-people-for-ransom-in-2025\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> &#8220;Agentic&#8221; AI could arrive in 2025, and it may allow hackers to send individual, AI-powered agents to do their dirty work.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,32],"class_list":["post-25746","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25746"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25746\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25746"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}