Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit AI for Enhanced Cyber Attacks

North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Posted on February 12, 2026 By CWS

Google has issued a warning about North Korean state-sponsored hackers, identified as UNC2970, who are leveraging the AI model Gemini for advanced cyber operations. The tech giant’s Threat Intelligence Group (GTIG) revealed these actors are utilizing AI to gather intelligence and streamline cyber attack processes.

AI-Powered Reconnaissance and Phishing

UNC2970, associated with notorious groups like Lazarus and Hidden Cobra, has been found using Gemini to enhance their reconnaissance capabilities. This includes synthesizing open-source intelligence (OSINT) to profile and target key individuals, primarily in the cybersecurity and defense sectors. By blending routine research with malicious intent, they craft convincing phishing personas to breach systems.

The group is infamous for its ‘Operation Dream Job’, targeting aerospace and energy sectors under the guise of job recruitment. Through AI, they now efficiently map technical roles and salaries, escalating their phishing strategies.

Broader Use of AI in Cyber Attacks

UNC2970 is not alone in utilizing AI for cyber operations. Other hacking groups, such as UNC6418 and Mustang Panda, have integrated AI to gather sensitive data and compile dossiers on individuals. Chinese groups APT31 and APT41 are noted for employing AI to analyze vulnerabilities and troubleshoot exploit codes.

Iranian group APT42 uses AI to create engaging personas for social engineering, while developing tools like a Google Maps scraper. These activities highlight a growing trend of AI weaponization across various state-sponsored hacking entities.

Emerging Threats and Global Implications

Google also highlighted the use of malware called HONESTCUE, which employs Gemini’s API for generating functional code. Additionally, the AI-generated phishing kit COINBAIT poses as a cryptocurrency exchange to harvest credentials. These tactics point to a sophisticated level of cyber threat sophistication.

Recent ‘ClickFix’ campaigns illustrate how AI is used to deliver malware by hosting instructions on common computer issues. Furthermore, Google thwarted model extraction attacks aimed at replicating AI model behavior, a tactic illustrated by a Praetorian-led PoC attack achieving high accuracy through systematic querying.

The threat landscape is evolving rapidly, with AI playing a pivotal role in cyber attacks. As organizations continue to rely on AI, understanding these threats becomes crucial for maintaining cybersecurity.

The Hacker News Tags:AI, cyber attack, Cybersecurity, Gemini AI, Hacking, Malware, model extraction, North Korea, Phishing, UNC2970

Post navigation

Previous Post: Cyber Threats Concealed by Compromised IoT Devices
Next Post: DragonForce Ransomware Group’s Expanding Cartel Operations

Related Posts

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach The Hacker News
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day The Hacker News
Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising The Hacker News
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs The Hacker News
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats The Hacker News
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark