Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit AI for Enhanced Cyber Attacks

North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Posted on February 12, 2026 By CWS

Google has issued a warning about North Korean state-sponsored hackers, identified as UNC2970, who are leveraging the AI model Gemini for advanced cyber operations. The tech giant’s Threat Intelligence Group (GTIG) revealed these actors are utilizing AI to gather intelligence and streamline cyber attack processes.

AI-Powered Reconnaissance and Phishing

UNC2970, associated with notorious groups like Lazarus and Hidden Cobra, has been found using Gemini to enhance their reconnaissance capabilities. This includes synthesizing open-source intelligence (OSINT) to profile and target key individuals, primarily in the cybersecurity and defense sectors. By blending routine research with malicious intent, they craft convincing phishing personas to breach systems.

The group is infamous for its ‘Operation Dream Job’, targeting aerospace and energy sectors under the guise of job recruitment. Through AI, they now efficiently map technical roles and salaries, escalating their phishing strategies.

Broader Use of AI in Cyber Attacks

UNC2970 is not alone in utilizing AI for cyber operations. Other hacking groups, such as UNC6418 and Mustang Panda, have integrated AI to gather sensitive data and compile dossiers on individuals. Chinese groups APT31 and APT41 are noted for employing AI to analyze vulnerabilities and troubleshoot exploit codes.

Iranian group APT42 uses AI to create engaging personas for social engineering, while developing tools like a Google Maps scraper. These activities highlight a growing trend of AI weaponization across various state-sponsored hacking entities.

Emerging Threats and Global Implications

Google also highlighted the use of malware called HONESTCUE, which employs Gemini’s API for generating functional code. Additionally, the AI-generated phishing kit COINBAIT poses as a cryptocurrency exchange to harvest credentials. These tactics point to a sophisticated level of cyber threat sophistication.

Recent ‘ClickFix’ campaigns illustrate how AI is used to deliver malware by hosting instructions on common computer issues. Furthermore, Google thwarted model extraction attacks aimed at replicating AI model behavior, a tactic illustrated by a Praetorian-led PoC attack achieving high accuracy through systematic querying.

The threat landscape is evolving rapidly, with AI playing a pivotal role in cyber attacks. As organizations continue to rely on AI, understanding these threats becomes crucial for maintaining cybersecurity.

The Hacker News Tags:AI, cyber attack, Cybersecurity, Gemini AI, Hacking, Malware, model extraction, North Korea, Phishing, UNC2970

Post navigation

Previous Post: Cyber Threats Concealed by Compromised IoT Devices
Next Post: DragonForce Ransomware Group’s Expanding Cartel Operations

Related Posts

Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack The Hacker News
How to Automate CVE and Vulnerability Advisory Response with Tines How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News
Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign The Hacker News
Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News