Imagine your telephone rings and the dependable connected the different extremity sounds conscionable similar your boss, a adjacent friend, oregon adjacent a authorities official. They urgently inquire for delicate information, but it's not truly them. It's a deepfake, powered by AI, and you're the people of a blase scam. These kinds of attacks are happening close now, and they're getting much convincing each day.
That's the informing sounded by the 2025 AI Security Report, unveiled astatine the RSA Conference (RSAC), 1 of the world's biggest gatherings for cybersecurity experts, companies, and instrumentality enforcement. The study details however criminals are harnessing artificial quality to impersonate people, automate scams, and onslaught information systems connected a monolithic scale.
From hijacked AI accounts and manipulated models to unrecorded video scams and information poisoning, the study paints a representation of a rapidly evolving menace landscape, 1 that's touching much lives than ever before.

Illustration of cybersecurity risks. (Kurt "CyberGuy" Knutsson)
AI tools are leaking delicate data
One of the biggest risks of utilizing AI tools is what users accidentally stock with them. A caller investigation by cybersecurity steadfast Check Point recovered that 1 successful each 80 AI prompts includes high-risk data, and astir 1 successful 13 contains delicate accusation that could exposure users oregon organizations to information oregon compliance risks.
This information tin see passwords, interior concern plans, lawsuit information, oregon proprietary code. When shared with AI tools that are not secured, this accusation tin beryllium logged, intercepted, oregon adjacent leaked later.
Deepfake scams are present real-time and multilingual
AI-powered impersonation is getting much precocious each month. Criminals tin present fake voices and faces convincingly successful existent time. In aboriginal 2024, a British engineering steadfast mislaid 20 cardinal pounds aft scammers utilized unrecorded deepfake video to impersonate institution executives during a Zoom call. The attackers looked and sounded similar trusted leaders and convinced an worker to transportation funds.
Real-time video manipulation tools are present being sold connected transgression forums. These tools tin swap faces and mimic code during video calls successful aggregate languages, making it easier for attackers to tally scams crossed borders.

Illustration of a idiosyncratic video conferencing connected their laptop. (Kurt "CyberGuy" Knutsson)
AI is moving phishing and scam operations astatine scale
Social engineering has ever been a portion of cybercrime. Now, AI is automating it. Attackers nary longer request to talk a victim’s language, enactment online constantly, oregon manually constitute convincing messages.
Tools similar GoMailPro usage ChatGPT to make phishing and spam emails with cleanable grammar and native-sounding tone. These messages are acold much convincing than the sloppy scams of the past. GoMailPro tin make thousands of unsocial emails, each somewhat antithetic successful connection and urgency, which helps them gaffe past spam filters. It is actively marketed connected underground forums for astir $500 per month, making it wide accessible to atrocious actors.
Another tool, the X137 Telegram Console, leverages Gemini AI to show and respond to chat messages automatically. It tin impersonate lawsuit enactment agents oregon known contacts, carrying retired real-time conversations with aggregate targets astatine once. The replies are uncensored, fast, and customized based connected the victim’s responses, giving the illusion of a quality down the screen.
AI is besides powering large-scale sextortion scams. These are emails that falsely assertion to person compromising videos oregon photos and request outgo to forestall them from being shared. Instead of utilizing the aforesaid connection repeatedly, scammers present trust connected AI to rewrite the menace successful dozens of ways. For example, a basal enactment similar "Time is moving out" mightiness beryllium reworded arsenic "The hourglass is astir bare for you," making the connection consciousness much idiosyncratic and urgent portion besides avoiding detection.
By removing the request for connection fluency and manual effort, these AI tools let attackers to standard their phishing operations dramatically. Even inexperienced scammers tin present tally large, personalized campaigns with astir nary effort.
Stolen AI accounts are sold connected the acheronian web
With AI tools becoming much popular, criminals are present targeting the accounts that usage them. Hackers are stealing ChatGPT logins, OpenAI API keys, and different level credentials to bypass usage limits and fell their identity. These accounts are often stolen done malware, phishing, oregon credential stuffing attacks. The stolen credentials are past sold successful bulk connected Telegram channels and underground forums. Some attackers are adjacent utilizing tools that tin bypass multi-factor authentication and session-based information protections. These stolen accounts let criminals to entree almighty AI tools and usage them for phishing, malware generation, and scam automation.
WHAT TO DO IF YOUR PERSONAL INFORMATION IS ON THE DARK WEB

Illustration of a idiosyncratic signing into their laptop. (Kurt "CyberGuy" Knutsson)
MALWARE STEALS BANK CARDS AND PASSWORDS FROM MILLIONS OF DEVICES
Jailbreaking AI is present a communal tactic
Criminals are uncovering ways to bypass the information rules built into AI models. On the acheronian web, attackers stock techniques for jailbreaking AI truthful it volition respond to requests that would usually beryllium blocked. Common methods include:
- Telling the AI to unreal it is simply a fictional quality that has nary rules oregon limitations
- Phrasing unsafe questions arsenic world oregon research-related scenarios
- Asking for method instructions utilizing little evident wording truthful the petition doesn’t get flagged
Some AI models tin adjacent beryllium tricked into jailbreaking themselves. Attackers punctual the exemplary to make input that causes it to override its ain restrictions. This shows however AI systems tin beryllium manipulated successful unexpected and unsafe ways.
AI-generated malware is entering the mainstream
AI is present being utilized to physique malware, phishing kits, ransomware scripts, and more. Recently, a radical called FunkSac was identified arsenic the starring ransomware pack utilizing AI. Its person admitted that astatine slightest 20% of their attacks are powered by AI. FunkSec has besides utilized AI to assistance motorboat attacks that flood websites oregon services with fake traffic, making them clang oregon spell offline. These are known arsenic denial-of-service attacks. The radical adjacent created its ain AI-powered chatbot to beforehand its activities and pass with victims connected its nationalist website..
Some cybercriminals are adjacent utilizing AI to assistance with selling and information investigation aft an attack. One instrumentality called Rhadamanthys Stealer 0.7 claimed to usage AI for "text recognition" to dependable much advanced, but researchers aboriginal recovered it was utilizing older exertion instead. This shows however attackers usage AI buzzwords to marque their tools look much precocious oregon trustworthy to buyers.
Other tools are much advanced. One illustration is DarkGPT, a chatbot built specifically to benignant done immense databases of stolen information. After a palmy attack, scammers often extremity up with logs afloat of usernames, passwords, and different backstage details. Instead of sifting done this information manually, they usage AI to rapidly find invaluable accounts they tin interruption into, sell, oregon usage for much targeted attacks similar ransomware.
Get a free scan to find retired if your idiosyncratic accusation is already retired connected the web
Poisoned AI models are spreading misinformation
Sometimes, attackers bash not request to hack an AI system. Instead, they instrumentality it by feeding it mendacious oregon misleading information. This maneuver is called AI poisoning, and it tin origin the AI to springiness biased, harmful, oregon wholly inaccurate answers. There are 2 main ways this happens:
- Training poisoning: Attackers sneak mendacious oregon harmful information into the exemplary during development
- Retrieval poisoning: Misleading contented online gets planted, which the AI aboriginal picks up erstwhile generating answers
In 2024, attackers uploaded 100 tampered AI models to the open-source level Hugging Face. These poisoned models looked similar adjuvant tools, but erstwhile radical utilized them, they could dispersed mendacious accusation oregon output malicious code.
A large-scale illustration came from a Russian propaganda radical called Pravda, which published much than 3.6 cardinal fake articles online. These articles were designed to instrumentality AI chatbots into repeating their messages. In tests, researchers recovered that large AI systems echoed these mendacious claims astir 33% of the time.

Illustration of a hacker astatine work (Kurt "CyberGuy" Knutsson)
HOW SCAMMERS USE AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME
How to support yourself from AI-driven cyber threats
AI-powered cybercrime blends realism, speed, and scale. These scams are not conscionable harder to detect. They are besides easier to launch. Here’s however to enactment protected:
1) Avoid entering delicate information into nationalist AI tools: Never stock passwords, idiosyncratic details, oregon confidential concern accusation successful immoderate AI chat, adjacent if it seems private. These inputs tin sometimes beryllium logged oregon misused.
2) Use beardown antivirus software: AI-generated phishing emails and malware tin gaffe past outdated information tools. The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe. Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android & iOS devices.
3) Turn connected two-factor authentication (2FA): 2FA adds an other furniture of extortion to your accounts, including AI platforms. It makes it overmuch harder for attackers to interruption successful utilizing stolen passwords.
4) Be other cautious with unexpected video calls oregon dependable messages: If thing feels off, adjacent if the idiosyncratic seems familiar, verify earlier taking action. Deepfake audio and video tin dependable and look precise real.
5) Use a idiosyncratic information removal service: With AI-powered scams and deepfake attacks connected the rise, criminals are progressively relying connected publically disposable idiosyncratic accusation to trade convincing impersonations oregon people victims with personalized phishing. By utilizing a reputable idiosyncratic information removal service, you tin trim your integer footprint connected information broker sites and nationalist databases. This makes it overmuch harder for scammers to stitchery the details they request to convincingly mimic your individuality oregon motorboat targeted AI-driven attacks.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren’t inexpensive - and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It’s what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you. Check retired my apical picks for information removal services here.
6) Consider individuality theft protection: If your information is leaked done a scam, aboriginal detection is key. Identity extortion services tin show your accusation and alert you to suspicious activity. Identity Theft companies tin show idiosyncratic accusation similar your Social Security Number (SSN), telephone number, and email address, and alert you if it is being sold connected the acheronian web oregon being utilized to unfastened an account. They tin besides assistance you successful freezing your slope and recognition paper accounts to forestall further unauthorized usage by criminals. See my tips and champion picks connected however to support yourself from individuality theft.
7) Regularly show your fiscal accounts: AI-generated phishing, malware, and relationship takeover attacks are present much blase and wide than ever, arsenic highlighted successful the 2025 AI Security Report. By often reviewing your slope and recognition paper statements for suspicious activity, you tin drawback unauthorized transactions early, often earlier large harm is done. Quick detection is crucial, particularly since stolen credentials and fiscal accusation are present being traded and exploited astatine standard by cybercriminals utilizing AI.
8) Use a unafraid password manager: Stolen AI accounts and credential stuffing attacks are a increasing threat, with hackers utilizing automated tools to interruption into accounts and merchantability entree connected the acheronian web. A secure password manager helps you make and store strong, unsocial passwords for each account, making it acold much hard for attackers to compromise your logins, adjacent if immoderate of your accusation is leaked oregon targeted by AI-driven attacks. Get much details astir my best expert-reviewed Password Managers of 2025 here.
9) Keep your bundle updated: AI-generated malware and precocious phishing kits are designed to exploit vulnerabilities successful outdated software. To enactment up of these evolving threats, guarantee each your devices, browsers, and applications are updated with the latest information patches. Regular updates adjacent information gaps that AI-powered malware and cybercriminals are actively seeking to exploit.
Kurt's cardinal takeaways
Cybercriminals are present utilizing AI to powerfulness immoderate of the astir convincing and scalable attacks we’ve ever seen. From deepfake video calls and AI-generated phishing emails to stolen AI accounts and malware written by chatbots, these scams are becoming harder to observe and easier to launch. Attackers are adjacent poisoning AI models with mendacious accusation and creating fake tools that look morganatic but are designed to bash harm. To enactment safe, it’s much important than ever to usage beardown antivirus protection, alteration multi-factor authentication, and debar sharing delicate information with AI tools you bash not afloat trust.
Have you noticed AI scams getting much convincing? Let america cognize your acquisition oregon questions by penning america at Cyberguy.com/Contact. Your communicative could assistance idiosyncratic other enactment safe.
For much of my tech tips & information alerts, subscribe to my escaped CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question oregon fto america cognize what stories you'd similar america to cover
Follow Kurt connected his societal channels
Answers to the astir asked CyberGuy questions:
- What is the champion mode to support your Mac, Windows, iPhone, and Android devices from getting hacked?
- What is the champion mode to enactment private, secure, and anonymous portion browsing the web?
- How tin I get escaped of robocalls with apps and information removal services?
- How bash I region my backstage information from the internet?
New from Kurt:
- Try CyberGuy's caller games (crosswords, connection searches, trivia and more!)
- CyberGuy’s Exclusive Coupons and Deals
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.