Common Information
Type Value
Value
Artificial Intelligence - T1588.007
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI)
Details Published Attributes CTI Title
Details Website 2024-11-14 1 Сrimeware and financial cyberthreats in 2025
Details Website 2024-11-14 1 Crimeware and financial predictions for 2025
Details Website 2024-11-14 0 Mastering SAST vs. DAST: An In-Depth Guide to Application Security Testing
Details Website 2024-11-14 0 Staying Secure in the AI-powered Cyberworld
Details Website 2024-11-14 0 Top IT Services in UAE, Australia, USA, UK
Details Website 2024-11-14 0 The AI Revolution in Intrusion Detection and Prevention Systems: Transforming Cybersecurity for a…
Details Website 2024-11-14 0 The Wild World of Cybersecurity in 2024: What You Need to Know
Details Website 2024-11-14 2 Best 7 Compliance Risk Assessment Tools for 2024
Details Website 2024-11-14 0 AI for Advancing Cybersecurity
Details Website 2024-11-14 0 Emerging Threats: Cybersecurity Forecast 2025 | Google Cloud Blog
Details Website 2024-11-13 0 🌐 Google AI Platform Bugs Expose Enterprise LLMs: Why Wire Tor Pentest Services Are Essential for…
Details Website 2024-11-13 3 OpenText Cybersecurity Unveils 2024's Nastiest Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-13 0 The Rise of AI in Everyday Life: How Artificial Intelligence is Transforming Our Daily Experiences
Details Website 2024-11-13 0 Cybersecurity in 2025: How Companies Are Battling Next-Gen Cyberattacks
Details Website 2024-11-13 0 Fool me once, fool me twice
Details Website 2024-11-13 0 A Security-First Approach to 6G
Details Website 2024-11-13 0 The Dark Side of AI: Challenges of Using Deep Learning in Cybersecurity
Details Website 2024-11-13 1 Leading account and intent-based sales and marketing providers and technology solutions for the tech industry
Details Website 2024-11-13 0 The Road Ahead: 2025 Cybersecurity Predictions - ReliaQuest
Details Website 2024-11-13 0 Broadcom introduces VeloRAIN platform for optimized edge networking
Details Website 2024-11-13 3 Top challenges for implementing multi-domain correlation in the cloud
Details Website 2024-11-13 0 2024’s Most Common Cyber Threats and How to Defend Against Them
Details Website 2024-11-13 0 How to Protect Yourself and Your Business from Cyber Attacks in 2025
Details Website 2024-11-13 0 Critical Infrastructure in Australia Faces Heightened Threats in 2024, Says Annual Risk Review
Details Website 2024-11-13 0 The Top 5 Cybersecurity Threats in 2024 — And How to Defend Against Them