Connect with us

Hi, what are you looking for?

White Papers

Highly customized, AI-powered attacks could supercharge scams and phishing, influence operations

Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing as standalone cyber risk today.

Trend Micro Incorporated warned that highly customized, AI-powered attacks could supercharge scams and phishing and influence operations in 2025 and beyond.

Ian Felipe, Country Manager at Trend Micro: “As generative AI makes its way ever deeper into enterprises and the societies they serve, we need to be alert to the threats. Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing as standalone cyber risk today. All security risk is ultimately business risk, with the potential to impact future strategy profoundly.”

Trend Micro’s 2025 predictions report warns of the potential for malicious “digital twins,” where breached/leaked personal information (PII) is used to train an LLM to mimic the knowledge, personality, and writing style of a victim/employee. When deployed with deepfake video/audio and compromised biometric data, they could be used to convince identity fraud or “honeytrap” a friend, colleague, or family member.

Deepfakes and AI could also be leveraged in large-scale, hyper-personalized attacks to:

Advertisement. Scroll to continue reading.
  • Enhance business compromise (BEC/BPC) and “fake employee” scams at scale.
  • Identify pig butchering victims.
  • Lure and romance these victims before handing them off to a human operator, who can chat via the “personality filter” of an LLM.
  • Improved open-source intelligence gathering by adversaries.
  • Capability development in pre-attack prep will improve attack success.
  • Create authentic-seeming social media personas at scale to spread mis/disinformation and scams.

Elsewhere, businesses that adopt AI in more significant numbers in 2025 will need to be on the lookout for threats such as:

  • Vulnerability exploitation and hijacking of AI agents to manipulate them into performing harmful or unauthorized actions.
  • Unintended information leakage (from GenAI)
  • Benign or malicious system resource consumption by AI agents, leading to denial of service.

Outside the world of AI threats

The report highlights additional areas for concern in 2025, including:

Vulnerabilities

  • Memory management and memory corruption bugs, vulnerability chains, and exploits targeting APIs
  • More container escapes
  • Older, more straightforward vulnerabilities like cross-site scripting (XSS) and SQL injections
  • The potential for a single vulnerability in a widely adopted system to ripple across multiple models and manufacturers, such as a connected vehicle ECU

Ransomware

Threat actors will respond to advances in endpoint detection and response (EDR) tooling by:

  • Creating kill chains that use locations where most EDR tools aren’t installed (e.g., cloud systems or mobile, edge, and IoT devices)
  • Disabling AV and EDR altogether
  • Using bring your own vulnerable driver (BYOVD) techniques.
  • Hiding shellcodes inside inconspicuous loaders
  • Redirecting Windows subsystem execution to compromise EDR/AV detection.

The result will be faster attacks with fewer steps in the kill chain that are harder to detect.

Time for action

In response to these escalating threats and an expanding corporate attack surface, Trend Micro recommends:

Advertisement. Scroll to continue reading.
  • Implementing a risk-based approach to cybersecurity, enabling centralized identification of diverse assets and effective risk assessment/prioritization/mitigation
  • Harnessing AI to assist with threat intelligence, asset profile management, attack path prediction, and remediation guidance—ideally from a single platform.
  • Updating user training and awareness in line with recent AI advances and how they enable cybercrime.
  • Monitoring and securing AI technology against abuse, including security for input and response validation or actions generated by AI
  • For LLM security: hardening sandbox environments, implementing strict data validation, and deploying multi-layered defenses against prompt injection
  • Understanding the organization’s position within the supply chain, addressing vulnerabilities in public-facing servers, and implementing multi-layered defenses within internal networks
  • Facilitating end-to-end visibility into AI agents
  • Implementing Attack Path Prediction to mitigate cloud threats

To read Trend Micro’s cybersecurity predictions for 2025, The Easy Way In/Out: Securing The Artificial Future, visit: https://www.trendmicro.com/vinfo/ph/security/research-and-analysis/predictions/the-artificial-future-trend-micro-security-predictions-for-2025

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

HEADLINES

GCash, a financial super app and cashless ecosystem, reaffirmed its commitment to trust, security, and collaboration with customers, stakeholders, and law enforcement to ensure...

HEADLINES

Senator Mark Villar recently filed a resolution seeking a senate inquiry on the trade of International Mobile Subscriber Identity (IMSI) catchers, which allow fraudsters...

HEADLINES

Under the DSA, Globe and GoTyme may share with digital bank GoTyme information about mobile numbers potentially used by fraudsters, including names, addresses, and...

HEADLINES

In 2024, Converge blocked a record 183 billion entry attempts to  683,000 URLs / domains it has registered in its system as illegal sites....

HEADLINES

HP threat researchers observed large campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware that leverage the same techniques and loaders, suggesting the use of malware...

Advertisement