Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

Posted on March 12, 2026 By CWS

Cybersecurity experts have unveiled detailed insights into a new artificial intelligence (AI)-generated malware known as Slopoly. This malware is reportedly leveraged by the financially driven cybercrime group, Hive0163, to enhance their ransomware operations.

AI-Driven Malware in Cybercrime

Slopoly, though not particularly advanced, signifies how easily AI can be harnessed to streamline malware creation. IBM X-Force researcher Golo Mühr highlighted this in a report shared with The Hacker News, noting the speed at which AI can help develop new malware frameworks. Hive0163’s activities primarily involve data theft and extortion through ransomware, utilizing an array of malicious tools such as NodeSnake and Interlock RAT.

In a notable attack from early 2026, Hive0163 used Slopoly during the post-exploitation phase to ensure ongoing access to a compromised server for over a week.

Technical Details of Slopoly

The discovery of Slopoly is linked to a PowerShell script, likely deployed via a builder that also sets up a scheduled task named “Runtime Broker” for persistence. Evidence suggests the malware’s development involved an unidentified large language model (LLM), characterized by comprehensive comments, structured logging, and well-named variables. These attributes suggest a command-and-control (C2) framework, although the script lacks true polymorphic capabilities.

Functioning as a backdoor, the PowerShell script regularly communicates with a C2 server, sending system information and awaiting new commands. The exact commands executed on compromised systems remain uncertain.

Hive0163’s Attack Strategies

Hive0163 often employs social engineering techniques like ClickFix to deceive victims into executing PowerShell commands, which subsequently download malware like NodeSnake. This initial component can execute shell commands, maintain persistence, and initiate broader malware frameworks, including Interlock RAT.

For initial access, Hive0163 relies on methods such as malvertising and collaboration with access brokers like TA569 and TAG-124. Their malware framework supports multiple programming languages, ensuring compatibility across Windows and Linux systems, and enabling actions like spawning reverse shells and deploying further payloads.

Implications of AI in Cybersecurity

The introduction of AI-assisted malware such as Slopoly, alongside others like VoidLink and PromptSpy, underscores the evolving threat landscape. While not technically groundbreaking, these developments allow threat actors to expedite attack preparation and execution, posing significant challenges for cybersecurity defenses.

IBM X-Force emphasizes that while AI-generated malware does not introduce technically complex threats, it significantly aids cybercriminals by shortening the time required to develop and execute attacks.

The Hacker News Tags:AI malware, ClickFix, Cybersecurity, data exfiltration, Hive0163, Interlock ransomware, Interlock RAT, Malvertising, malware development, NodeSnake, PowerShell, Ransomware, reverse shell, Slopoly, SOCKS5 proxy

Post navigation

Previous Post: Rust-Based VENON Malware Targets Brazilian Banks

Related Posts

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT The Hacker News
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts The Hacker News
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme The Hacker News
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News