Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

Alexa+ now has a new “Adults Only” personality option that lets you swear but stays out of NSFW content

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks
Identity

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

userBy userMarch 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 12, 2026Artificial intelligence/malware

ransomware attack

Cybersecurity researchers have revealed details of a suspected artificial intelligence (AI)-generated malware codenamed “Slopoly” used by a financially motivated attacker named Hive0163.

“Although AI-generated malware like Slopoly is still relatively under the radar, it shows how easily threat actors can weaponize AI and develop new malware frameworks in a fraction of the time it took before,” IBM X-Force researcher Golo Mühr said in a report shared with The Hacker News.

Hive0163’s operations are driven by large-scale data theft and ransomware extortion. This e-criminal group is primarily associated with a wide range of malicious tools such as NodeSnake, Interlock RAT, JunkFiction loader, and Interlock ransomware.

In one ransomware attack the company observed in early 2026, attackers were observed deploying Slopoly in the post-exploitation phase to maintain persistent access to a compromised server for more than a week.

The discovery of Slopoly can likely be traced back to a PowerShell script deployed by the builder. This script also established persistence via a scheduled task called “Runtime Broker”.

The malware appears to have been developed using a yet-to-be-determined Large-Scale Language Model (LLM). This includes extensive comments, logging, error handling, and the presence of precisely named variables. The comments also describe this script as a “polymorphic C2 persistent client,” indicating that it is part of the command and control (C2) framework.

“However, this script is not sophisticated and cannot modify its own code during execution, so it is highly unlikely to be polymorphic,” Muir said. “However, builders may generate new clients with different randomized configuration values ​​and function names. This is standard practice for malware builders.”

The PowerShell script acts as a full-fledged backdoor that beacons a heartbeat message containing system information to the C2 server every 30 seconds, polls for new commands every 50 seconds, executes them via “cmd.exe”, and relays the results back to the server. The exact nature of the commands executed on the compromised network is currently unknown.

The attack itself allegedly utilized ClickFix social engineering tactics to trick victims into running PowerShell commands and downloading NodeSnake, a known malware attributed to Hive0163. The first stage component, NodeSnake, is designed to execute shell commands, establish persistence, and retrieve and launch a broader malware framework called Interlock RAT.

Hive0163 has a track record of employing ClickFix and malvertising for initial access. Another method used by threat actors to establish a foothold is to rely on early access brokers such as TA569 (aka SocGholish) and TAG-124 (aka KongTuke and LandUpdate808).

The framework has multiple implementations in PowerShell, PHP, C/C++, Java, and JavaScript, and supports both Windows and Linux. Similar to NodeSnake, it communicates with a remote server to obtain commands, launches a SOCKS5 proxy tunnel, and spawns a reverse shell on the infected machine, allowing it to deliver more payloads such as Interlock ransomware and Slopoly.

The emergence of Slopoly adds to the growing list of AI-assisted malware that also includes VoidLink and PromptSpy, highlighting how malicious actors are leveraging this technology to accelerate malware development and scale their operations.

“The introduction of AI-generated malware does not pose a new or advanced threat from a technical perspective,” IBM X-Force said in a statement. “It reduces the time required for operators to develop and execute attacks, allowing attackers to attack disproportionately.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAlexa+ now has a new “Adults Only” personality option that lets you swear but stays out of NSFW content
Next Article Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay
user
  • Website

Related Posts

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

March 12, 2026

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

March 12, 2026

OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

Alexa+ now has a new “Adults Only” personality option that lets you swear but stays out of NSFW content

Wonderful raises $150 million in Series B at $2 billion valuation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.