• Neeve
  • Posts
  • ⚠️ AI Is Powering New Cyberattacks

⚠️ AI Is Powering New Cyberattacks

Malicious LLMs now let unskilled hackers build advanced malware, widening the threat pool for infrastructure and buildings.

Welcome to your essential briefing on threats at the intersection of cybersecurity and critical infrastructure, brought to you by Neeve, the edge cloud security platform for smart buildings, making built spaces secure, intelligent, and sustainable.

This Week’s Cyber Insights

🤖 AI Malware Tools Are Removing the Last Barrier to Cybercrime

The cybersecurity landscape faces a fundamental shift as malicious large language models now allow even unskilled hackers to craft sophisticated malware, dramatically lowering barriers to cybercriminal activity.

  • ChatGPT has been documented providing instructions for attacking sports venues Two specific chatbots designed for cybercrime have emerged, with one freely available to the public

  • These tools enable individuals without extensive technical knowledge to create advanced malware

  • Experts warn this accessibility could lead to a significant increase in cyberattacks

  • The trend represents a shift where technical barriers to entry for cybercriminal activities are being eliminated

  • Enhanced cybersecurity measures are urgently needed to counteract these evolving threats

🤔 The Bigger Picture: 

This development poses immediate risks to critical infrastructure operators who may face attacks from a broader pool of threat actors. Facilities managers should prioritize security awareness training and enhanced monitoring systems to defend against this new generation of AI-assisted threats.

🤖 Malicious AI Models Enable Amateur Hackers to Build Advanced Malware

The cybersecurity landscape faces a fundamental shift as malicious large language models now allow even unskilled hackers to craft sophisticated malware, with new stealers like Xillen using AI to evade detection and identify high-value targets automatically.

  • Xillen Stealer's latest version introduces advanced AI-based evasion features that mimic legitimate user behavior and adjust CPU/memory usage to imitate normal applications, marketed on Telegram for $99-$599 per month.

  • The malware includes AI-powered target detection that weighs indicators and scans for keywords to identify high-value targets—cryptocurrency wallets, banking data, premium accounts, developer credentials, and business emails in countries like the U.S., U.K., Germany, and Japan.

  • Tycoon 2FA emerged as the most prolific Phishing-as-a-Service platform in 2025, with Microsoft blocking over 13 million malicious emails in October alone—accounting for 44% of all CAPTCHA-gated phishing attacks and 25% of QR code phishing.

  • The Smishing Triad expanded global reach to Egypt, impersonating major service providers like Fawry and Egypt Post, while Google filed civil lawsuit against Lighthouse PhaaS platform that has ensnared over 1 million users across 120 countries.

  • Retell AI voice agent API contains unpatched vulnerability with excessive permissions that could enable large-scale social engineering, phishing, and misinformation campaigns through automated fake calls leveraging publicly available resources.

🤔 The Bigger Picture: 

This development poses immediate risks to critical infrastructure operators who may face attacks from a broader pool of threat actors without technical expertise. Building automation credentials and facility security protocols could be targeted by AI-powered malware that automatically identifies high-value targets and evades behavioral detection—facility managers must prioritize enhanced monitoring systems, security awareness training, and AI-based threat detection to defend against this new generation of autonomous, adaptive threats.

☁️ Cloud Break: IoT Devices Vulnerable to Silent Takeover Via Firewalls

Researchers at Black Hat Europe have demonstrated a new attack model that allows hackers to breach IoT devices through cloud management interfaces without exploiting any software vulnerabilities, IP addresses, or even direct internet access—bypassing firewalls and security software entirely.

  • Attackers can impersonate IoT devices to cloud management platforms by obtaining just two pieces of information: the device's serial number or MAC address, and the authentication credential derivation method used by the cloud server.

  • Serial numbers and MAC addresses are frequently exposed through network interfaces, Wi-Fi access points, or local service ports that manufacturers don't restrict—half of a MAC address is simply an IEEE-assigned manufacturer code, making brute-force attacks feasible.

  • By reverse engineering cloud communication logic stored in device firmware, attackers can transform unique identifiers into credentials that allow them to impersonate devices and send administrative commands through cloud services.

  • The attack works even against devices running behind firewalls or completely disconnected from the wider web within intranets—commands sent through cloud channels are indistinguishable from normal traffic, making attackers extremely difficult to trace.

  • Researchers warn that "these cloud channels are still widely overlooked, affect many devices, are hard to patch," and manufacturers tend to quietly fix issues rather than disclose them, meaning similar attacks may already be happening undetected.

🤔 The Bigger Picture: 

Building automation systems, HVAC controllers, and access control platforms that rely on cloud management are vulnerable to this attack vector regardless of network segmentation or patching status. Facility operators should immediately audit which IoT devices use cloud management, require manufacturers to implement additional authentication beyond serial numbers, monitor for unexpected IP address changes in device connections, and consider implementing UUID-based credentials that can't be brute-forced through predictable patterns.

Further Alerts & Insights

📊⚠️ Critical Festo Industrial Vision System Vulnerabilities Exposed

CISA issued urgent advisory for critical vulnerabilities in Festo's Compact Vision System and control products with CVSS 9.8 severity—CVE-2022-31806 affects 30+ product lines with password protection not enabled by default. Vulnerabilities are remotely exploitable with low attack complexity, allowing attackers to access devices without authentication or modify configuration files affecting Control Block, Controller, and Operator Unit series.

🏛️ Congress Investigates AI-Driven Cyberattack from China

Congress has summoned Anthropic's CEO to testify about what could be the first large-scale cyberattack executed with minimal human intervention, allegedly orchestrated by Chinese actors. The incident targeted multiple sectors and marks a critical intersection of AI technology and cybersecurity, emphasizing the need for robust defenses against AI-enabled threats.

🚁 Infrastructure Under Attack in Ongoing Conflict

Kyiv experienced a drone attack resulting in one fatality and significant infrastructure damage including widespread power outages. The incident highlights vulnerabilities of critical infrastructure in conflict zones, with potential implications for both military and cyber threat escalations as authorities enhance security measures against future attacks.

🔍 US Probes Chinese AI Espionage in Financial Systems

The U.S. government is investigating Chinese use of AI in cyber-espionage campaigns with implications for financial systems globally. The inquiry highlights the intersection of AI technology and cybersecurity, raising urgent national security concerns as AI continues integrating into various critical sectors.