Automatically translated.View original post

Hackers use AI-generated Slopoly malware

Hackers used AI-generated Slopoly malware to participate in the group's ransomware operation.

Content created by artificial intelligence or AI-Generated Content may be common in modern times, but another story of AI products that should not be common, is that AI-created malware is starting to cause more and more problems today, such as this news.

According to a report by The Hacker News website, a new campaign of Hive0163 hackers, a group of ransom malware users, or Ransomware to plow money from companies, usually using a variety of tools on their campaigns, such as NodeSnake, Interlock RAT, JunkFiction Loader and Interlock Ransomware, has been detected. But the current campaign is more advanced because Slopoly has introduced AI-generated malware to help them embed ransomware on the victim's machine, which explores the internal elements of the malware code. Variables, Logging, Comments make it possible to confirm that the malware is built with the AI Large Language Model (LLM or Large Language Model), although it is not known to be an LLM implementation of any developer at this time.

This malware will be used after hackers have successfully accessed the victim's system (Compromise) to create persistence within the system, allowing the malware to run at any time (Persistence). This malware will start with the PowerShell script to embed the malware into the "C: ProgramDataMicrosoftWindowsRuntime" folder and then manage to set the timer (Task Scheduled) under the name "Runtime Broker." This malware will serve as the system's backdoor. Hackers can access the system at any time the malware is embedded, as well as as as as a signaller or Beacon to contact the C2 or control server. Command and Control) every 30 seconds and send an additional request every 50 seconds. The received command will take the maran through "cmd.exe" and then send the results back to the server after the command is completed.

For this campaign, a research team from IBM X-Force, a subsidiary of IBM, a giant IT company, explained that the campaign would start by tricking victims into fake websites and using fake notifications to trick victims into installing malware or ClickFix to install the first malware NodeSnake by running a PowerShell script. The malware would then download a remote access trojan called Interlock RAT. This malware would lead to the installation of the same-named ransomware, Slopoly malware, and a tool. Others, based on in-depth investigations, found that this campaign framework has a variety of scripts, such as PowerShell, PHP, C / C + +, Java, and JavaScript, to run on both Windows and Linux operating systems.

# Trending # Lemon 8 Howtoo # lemon 8 diary # freedomhack # Slopoly

4/4 Edited to

... Read moreการใช้ AI สร้างมัลแวร์อย่าง Slopoly กำลังเป็นความท้าทายใหม่สำหรับระบบความปลอดภัยไซเบอร์ โดย Slopoly ทำหน้าที่เป็นประตูหลัง (Backdoor) ให้แฮกเกอร์สามารถเข้าควบคุมระบบของเหยื่อได้ตลอดเวลา นอกจากนี้ยังมีฟังก์ชัน Beacon ที่ส่งสัญญาณติดต่อเซิร์ฟเวอร์ควบคุมทุก 30 วินาที เพื่อรับคำสั่งต่าง ๆ และรันผ่าน cmd.exe ซึ่งแสดงถึงความอันตรายและความซับซ้อนของมัลแวร์ที่สร้างด้วยโมเดลภาษาขนาดใหญ่ (LLM) ที่ไม่ใช่มนุษย์เขียนโค้ดโดยตรง จากประสบการณ์ส่วนตัวที่ติดตามข่าวเทคโนโลยีและความปลอดภัยไซเบอร์ พบว่าแฮกเกอร์ในยุคนี้ไม่ได้จำกัดแค่การใช้โค้ดแบบเดิม ๆ แต่ยังนำ AI เข้ามาช่วยสร้างโค้ดมัลแวร์ ทำให้โค้ดมีความซับซ้อนและยากต่อการตรวจจับมากขึ้น โดยมัลแวร์ Slopoly ถูกฝังผ่านสคริปต์ PowerShell ลงในโฟลเดอร์เฉพาะบน Windows และตั้งงาน Task Scheduler ชื่อ Runtime Broker เพื่ออำพรางการทำงานแอปพลิเคชันระบบที่ดูเหมือนปกติ ทั้งนี้แคมเปญของ Hive0163 เริ่มจากการล่อให้เหยื่อเข้าเว็บไซต์ปลอมและหลอกติดตั้งมัลแวร์ผ่าน ClickFix จากนั้นมัลแวร์จะดาวน์โหลด NodeSnake ซึ่งเป็นมัลแวร์คุมเครื่องระยะไกล (RAT) เพื่อเข้าสู่ขั้นตอนการติดตั้งแรนซัมแวร์ Interlock และ Slopoly ซึ่งนอกจากเป็นภัยต่อองค์กรต่าง ๆ แล้ว ยังแสดงให้เห็นว่าการใช้สคริปต์หลายภาษา เช่น PowerShell, PHP, C/C++, Java และ JavaScript เพื่อให้มัลแวร์ทำงานได้ทั้งบน Windows และ Linux เป็นความพยายามอย่างสูงสุดของแฮกเกอร์ในการทำให้มัลแวร์มีความยืดหยุ่นและแพร่กระจายได้ง่าย สำหรับผู้ใช้งานทั่วไป การรู้จักและระวังการคลิกลิงก์ที่ไม่น่าเชื่อถือ รวมถึงการอัปเดตระบบปฏิบัติการและโปรแกรมป้องกันไวรัสอยู่เสมอ เป็นวิธีลดความเสี่ยงที่ได้ผลอย่างมาก แม้แฮกเกอร์จะใช้ AI สร้างมัลแวร์ก็ตาม เพราะความปลอดภัยไซเบอร์นั้นเริ่มต้นจากการตระหนักรู้และระมัดระวังในพฤติกรรมการใช้งานอินเทอร์เน็ตของเราเอง

Related posts

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

107 likes

SIEGEX is all CHEATERS & HACKERS😭
Why is this game full of cheaters and hackers and bugs🤷‍♀️ #siege #rainbowsixsiege #gaming #streamer #foryou
Phasma

Phasma

35 likes

Do you like hackers?
#hacker #hackers #tricked #fyp
Lil Conscious

Lil Conscious

38 likes

A laptop with a cloudy sky wallpaper and a white cup with a red logo. Text overlay reads: 'Free Websites That Saved My GPA AND MY SANITY Sharing So You Don't Struggle Too'.
A laptop screen displays Yahoo search results for 'Quizlet'. An overlay describes Quizlet as a free flashcard tool for memorizing terms, definitions, and formulas, making studying feel like a game.
A laptop screen displays Yahoo search results for 'Unriddle.ai'. An overlay describes Unriddle.ai as a free tool that breaks down notes, articles, or assignments to aid understanding of long readings.
Websites You NEED to Pass Your College Courses
Y’all college is hard enough without trying to figure everything out on your own 😩 So here’s my list of websites that actually helped me pass my classes like, these were in my survival kit. I’m not gatekeeping 🫶🏽 Quizlet When I needed to memorize terms FAST. I used it for flashcards, and the matc
Beauty

Beauty

280 likes

I wanted a real project I could actually show, not just talk about. So I used Atoms ⚛️ Check it out here: https://tinyurl.com/3xzc8xbe It feels like having a whole AI team helping me: 🔍 they do the deep research first 🏁 then Race Mode builds different versions so I can compare 👥 I just pick
emilie.studygram

emilie.studygram

19 likes

4 In demand Certificates You Need in 2025
Hey Career Girl, I know you want to start off the New Year on the right foot and a certificate is just the thing. Certificates can open the doors to new pathways in the career world that wouldn't have been opened before! Love this type of content? Follow and share! Need Interview P
Lauren|Career Girl

Lauren|Career Girl

164 likes

BIG Holiday Costco Shop & Haul | Anchorage, Alaska
vanditsv

vanditsv

2 likes

A message to Minecraft hackers…
You should join the server #minecraft #gaming #fyp
BendersMC

BendersMC

13 likes

A monitor displays the Martin AI assistant dashboard with sections for to-dos, reminders, calendar, and chat, set on a desk with a keyboard and plant, illustrating the phrase "Say what you need, it gets it done."
The Martin AI assistant dashboard is shown, featuring to-dos, reminders, calendar, inbox, and a chat interface for sending schedules, emphasizing its ability to use voice commands for tasks like texting and setting reminders.
The Martin AI assistant dashboard displays to-dos, reminders, calendar, and an inbox with emails, highlighting its function to remember and track information across various platforms without repetition.
Your to-do list just got a personal manager
You know when you have too many tabs open in your brain? This app is like closing all of them... at once. Martin is your Al assistant that actually works like a real one. Need to text someone, forward notes, set reminders, or manage your day? Just tell Martin. It connects with your inbox,
Reverelia

Reverelia

363 likes

Ban Hackers
Vinicius Jr 🇧🇷 #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

1 like

scammers and hackers beware
Hudson
cercofhell

cercofhell

28 likes

⚠️ The Hidden Dangers of Public Wi-Fi Free Wi-Fi feels convenient, but it can be a trap. Hackers can create what’s called an “evil twin” network—a fake hotspot that looks legitimate. The moment you connect, they can access your data, passwords, banking info, and private messages. Listen
Dannah Eve

Dannah Eve

82 likes

PSA PSA PSA ‼️ #fyp #hackers #facebook #scammers #viral
Kay’s House ✨

Kay’s House ✨

2 likes

Have Gamer Kids Who Love Ramen? 👀 Take Them Here!
Have gamer children who love to eat ramen noodles like mine? 👀 Gone and take them to The Forks USA in Suwanee and let them have a ball ! 📍The Forks USA Self Ramen & PC Cafe 💰: $8.99 for ramen plus add on items (chicken, rice cakes, crab, etc.) & $6.99 per hour for each person who plans
Call Me Pooh ✨

Call Me Pooh ✨

84 likes

A stylized AI-generated portrait of a person with vibrant red hair, striking blue eyes, and long eyelashes. The image includes text overlays 'AI-generated content, for entertainment only' and 'Lemon8 @cynthgir'.
I think I may have been hacked🥺😕🫣
I keep getting notifications on comments I have made on posts? I can't see the comments and access the mean/hateful comments that are in question. Please excuse me as I figure this out 🥺😕🙏 I don't rage-bait or click bait on social media. I apologize for any NASTY/Mean things that hackers ha
Cynthgirrl777

Cynthgirrl777

7 likes

#yungblud
watch4hackers

watch4hackers

6 likes

WARNING TO 2.5B GMAIL USERS. Hackers are continuing to target you. Here’s what to do Follow @cybersecuritygirl for more tips #google #gmail #tips #news #techtips
Cybersecurity Girl

Cybersecurity Girl

507 likes

Taco Tuesday 🤯 Admin Abuse ⁉️ #stealabrainrot #robloxstealabrainrot #roblox #neoskittles
NeoSkittles

NeoSkittles

6 likes

WARZONE HACKERS
Warzone is full hackers and call of duty does not care #warzone #hacker #memesdaily #memes🤣 #gaming
DUSTINMYRQ ™

DUSTINMYRQ ™

4 likes

Don’t fall for these scams in London 🇬🇧❌
3 scams to avoid when visiting London 🇬🇧❌ 📍Fake Wifi hotspots Something else I do when traveling to avoid hackers from public Wifi networks is use a VPN that can protect your personal information and online identity. I’d still avoid connecting to any public Wifi when you don’t need to, thou
Iisa Hero

Iisa Hero

34 likes

The image shows a keyboard with a fingerprint icon, overlaid with "OUTSMART HACKERS" and "Secrets they don't want you to know," serving as the title for a guide on cybersecurity.
This image explains hackers use software to guess passwords and advises creating long passwords with a random mix of letters, numbers, and symbols to defend against such attacks.
The image warns that hackers try common passwords and advises users to defend themselves by avoiding easy words/phrases and not reusing passwords across different sites.
SECRETS Hackers DON’T Want You to Know!
After hackers got into my Facebook account and completely erased it, I dusted myself off and started a deep dive to understand why and how hackers work. The best way to protect yourself is to outsmart them. Here are 5 secrets Hackers DON'T want you to know! Share this with everyone! #lemon8pa
techgirljen

techgirljen

425 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

This is the newest way people are getting hacked and if you use AI to answer your questions and give you advice, you need to watch this.Thanks to Huntress for reporting this Follow for more
Cybersecurity Girl

Cybersecurity Girl

15 likes

You shouldn’t be worried about the hackers, you should be worried about your settings. Check out ThreatLocker DAC today #ad #cybersecurity
Cybersecurity Girl

Cybersecurity Girl

28 likes

when ur attorney is on a roll
darkangel1984666

darkangel1984666

1 like

Just An FYI This Is How So Many People are Getting Hacked!!! Plz Don’t Fall For Message Like These!!! it’s A Fake Account!!! #fakeaccount #hackers
MaryBell

MaryBell

2 likes

Bigfoot Super Hackers.
#manthoughts #hackers #laughoutloud #bigfootvlog #lifetips
Alien Hayes

Alien Hayes

11 likes

Look world just locked my new Facebook account right now cause I'm showing complaints and legal paperwork I'm filling right now Look world at 2:00 am am Jamie Winfield and Tracy Winfield and Dre Washington and Randy Tappin and Christopher Thirdkill and IT drinking and smoking and using drug
glentrump359

glentrump359

0 likes

Attention Instagram users! A data leak exposed 17.5 million users' info. Find out what happened and learn how to keep your account secure. #news #technews #instagramdataleak
Cybersecurity Girl

Cybersecurity Girl

10 likes

me rocking the shades yesterday at my day group ☺️
Øg Hackers Dèmøn

Øg Hackers Dèmøn

1 like

Hackers
How call of duty has me #call of duty #hacker #warzone
Stevie_Wonders

Stevie_Wonders

1 like

Hackers are using tricks & steal financial info.🌸🍋
SECURITY TIPS: Be careful from hackers they use multiple different types of software and tricks to steal data from computers, cell phones or other devices to steal your data, financial information and personal details. When they hack via computer systems Showing they are from Microsoft Security Ale
Mujahid Bakht

Mujahid Bakht

6 likes

Look world I just made this new Facebook account a minute ago Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg just locked and suspended it cause I'm sharing my legal paperwork and federal complaints I'm filling
glentrump359

glentrump359

0 likes

A list titled 'Top Cybersecurity GitHub Projects' created by Dan Nanni, updated 2026/1. It displays 25 GitHub projects with their star counts, repository names, and brief descriptions, covering tools for hacking, pentesting, reverse engineering, proxies, and security scanning.
Top cybersecurity-related GitHub projects
My top GitHub list for cybersecurity projects is updated for this month 😎👆 Explore top-ranked FOSS projects spanning both the defensive and offensive sides of cybersecurity. Find a high-res pdf book with all my cybersecurity related infographics from https://study-notes.org #cybersecurity
Dan Nanni

Dan Nanni

34 likes

A list titled 'Top Cybersecurity GitHub Projects' created by Dan Nanni at study-notes.org, updated 2025/9. It features various GitHub repositories with their star counts and brief descriptions, covering cybersecurity resources, hacking tools, reverse engineering, and pentesting.
Top cybersecurity-related GitHub projects
GitHub is home to many open-source cybersecurity projects, providing security professionals with a rich toolkit for research, defense, and response Here are a list of the most popular #github repositories related to cybersecurity 😎👆 #infosec #informationsecurity #pentest Find a high-
Dan Nanni

Dan Nanni

28 likes

SEPT WRAP UP PT 1.
september had me in a CHOKEHOLD y'all 😮‍💨 i read so much i have to break this into TWO PARTS 😂😂 • 47 books read (don't play with me •) • 19 new authors • multiple favorites that little binge had me blowing right past my 200 book goal, so you know i had to bump it up to 250 from messy d
LEXI 💓

LEXI 💓

33 likes

Replying to @Red what parts or the dark web live in your brain rent free? #scarystories #horror #eductional #darkweb
Liz Cooper🦋

Liz Cooper🦋

42 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

126 likes

Hackers Dream
🕶 Digital Survival Duo "What if the real threat wasn’t in the email… but hidden in the vacation photo you just opened?" Remote Access Terminal (R.A.T.) and Image Hunter are not theory — they’re step-by-step, copy-paste-ready manuals with real, verifiable code. Learn exactly how attackers
Dark Meta

Dark Meta

11 likes

Hackers Be Like:
#fypage
AidenIsMyself

AidenIsMyself

0 likes

Kalebdavis19

Kalebdavis19

1 like

Look world on my new Snapchat right now want let anyone see my stories rejecting all of them Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers everyday all day and night and morning harassing me on all my social media ap
glentrump359

glentrump359

0 likes

If you have the Samsung, you need to watch this and update your phone immediately 
Cybersecurity Girl

Cybersecurity Girl

48 likes

Prayers for Jamaica 🇯🇲 — opening Hacker’s Slumber,
Cousin B

Cousin B

0 likes

Vibe coding is more accessible but it’s not as simple as speaking plain English😡
NO! Vibe coding is NOT as simple as people say! And if done poorly, you can get hacked 😒 45% of the apps built with AI could be vulnerable from day one. We’re talking about: 1. Hardcoded API keys 2. Missing authentication 3. Vulnerable dependencies These are common issues in AI generated c
Learn AI with Rosie Rachel

Learn AI with Rosie Rachel

0 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

152 likes

HACKERS IN THE BETA
Blackops 7 has hackers already…. #hacker #blackops7 #bo7
Goofstha

Goofstha

1 like

Look world on all my Instagram accounts right now for 7 days rejecting all my reels and posts and won't let me share my posts Elon Musk and Donald Trump and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers showing favoritism and discriminate against Glen Nickolas Ak
glentrump359

glentrump359

0 likes

Look world Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg rejecting all my followers on my Snapchat right now these meth heads going crazy frfr
glentrump359

glentrump359

5 likes

10 things I NO LONGER do as a CYBERSECURITY EXPERT 1. Hand out my real birthday, name, phone number etc online 2. Create online accounts I don’t need 3. Post vacation pics while I’m still away 4. Believe free Wi-Fi or apps is actually free 5. Save my logins in Notes or browsers 6. Use my mom’
Cybersecurity Girl

Cybersecurity Girl

6 likes

A screenshot showing a Facebook pop-up notification stating 'Account Disabled' for the email t*****0@gmail.com, advising the user to visit the Help Center.
A screenshot of a login screen for t*****0@gmail.com, displaying 'Continue' and 'Try another way' buttons, with a blurred document visible in the background.
A screenshot showing a Facebook notification that an account named 'Beans Bombs' has been permanently disabled for not following Community Standards, with no option for review after 180 days.
Look world deactivate it now I just made this Facebook account finna to go make some more and go on my others I'm finna to file some more federal complaints and send it to them to Look world just suspended this new Facebook account right now for no reason and won't let my information go thr
glentrump359

glentrump359

0 likes

A smartphone displays a message asking God to unblock it due to hackers. A patterned pad and colorful items are in the hazy background. The image includes Lemon8 branding and a username.
God, please unblock this android, hackers have in
Olga Ledbetter

Olga Ledbetter

37 likes

See more