Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics

Posted on March 12, 2026 By CWS

Cybersecurity experts have unveiled detailed insights into a new artificial intelligence (AI)-generated malware known as Slopoly. This malware is reportedly leveraged by the financially driven cybercrime group, Hive0163, to enhance their ransomware operations.

AI-Driven Malware in Cybercrime

Slopoly, though not particularly advanced, signifies how easily AI can be harnessed to streamline malware creation. IBM X-Force researcher Golo Mühr highlighted this in a report shared with The Hacker News, noting the speed at which AI can help develop new malware frameworks. Hive0163’s activities primarily involve data theft and extortion through ransomware, utilizing an array of malicious tools such as NodeSnake and Interlock RAT.

In a notable attack from early 2026, Hive0163 used Slopoly during the post-exploitation phase to ensure ongoing access to a compromised server for over a week.

Technical Details of Slopoly

The discovery of Slopoly is linked to a PowerShell script, likely deployed via a builder that also sets up a scheduled task named “Runtime Broker” for persistence. Evidence suggests the malware’s development involved an unidentified large language model (LLM), characterized by comprehensive comments, structured logging, and well-named variables. These attributes suggest a command-and-control (C2) framework, although the script lacks true polymorphic capabilities.

Functioning as a backdoor, the PowerShell script regularly communicates with a C2 server, sending system information and awaiting new commands. The exact commands executed on compromised systems remain uncertain.

Hive0163’s Attack Strategies

Hive0163 often employs social engineering techniques like ClickFix to deceive victims into executing PowerShell commands, which subsequently download malware like NodeSnake. This initial component can execute shell commands, maintain persistence, and initiate broader malware frameworks, including Interlock RAT.

For initial access, Hive0163 relies on methods such as malvertising and collaboration with access brokers like TA569 and TAG-124. Their malware framework supports multiple programming languages, ensuring compatibility across Windows and Linux systems, and enabling actions like spawning reverse shells and deploying further payloads.

Implications of AI in Cybersecurity

The introduction of AI-assisted malware such as Slopoly, alongside others like VoidLink and PromptSpy, underscores the evolving threat landscape. While not technically groundbreaking, these developments allow threat actors to expedite attack preparation and execution, posing significant challenges for cybersecurity defenses.

IBM X-Force emphasizes that while AI-generated malware does not introduce technically complex threats, it significantly aids cybercriminals by shortening the time required to develop and execute attacks.

The Hacker News Tags:AI malware, ClickFix, Cybersecurity, data exfiltration, Hive0163, Interlock ransomware, Interlock RAT, Malvertising, malware development, NodeSnake, PowerShell, Ransomware, reverse shell, Slopoly, SOCKS5 proxy

Post navigation

Previous Post: Rust-Based VENON Malware Targets Brazilian Banks
Next Post: Meta Unveils Advanced Anti-Scam Features on Key Platforms

Related Posts

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks The Hacker News
Starkiller Phishing Suite Evades MFA with Reverse Proxy Starkiller Phishing Suite Evades MFA with Reverse Proxy The Hacker News
Apple Resolves iOS Bug Exposing Deleted Signal Alerts Apple Resolves iOS Bug Exposing Deleted Signal Alerts The Hacker News
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure The Hacker News
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark