Article
June 2, 2025

AI in Cybercrime and Cybersecurity

AI in Cybercrime and Cybersecurity

AI's Role in Cybersecurity

In an era where cyber threats are becoming more sophisticated, AI plays a crucial role in enhancing cybersecurity measures. By leveraging machine learning algorithms, organizations can detect anomalies and respond to threats in real-time.

Benefits of AI in Cybersecurity

  • Threat Detection: AI can identify potential threats faster than traditional methods.
  • Automated Responses: AI systems can automatically respond to security breaches.
  • Data Protection: AI helps in safeguarding sensitive information from cyber attacks.

Integrating AI into cybersecurity strategies is essential for protecting digital assets in today's interconnected world.

That being said, AI has an equally important role (and probably more impactful role) in cyber crime. I recently presented on AI in crime (blue-collar, white-collar and cartels), which I'll be adapting and presenting in 2026 to incorporate cybercrime (the updated version will be available later next year, when it's no longer current).

Here are some of the ways AI is assisting cyber ciminals:

AI-Driven Content & Social Engineering

  • Hyper-personalised phishing generated from scraped social media, CRM leaks, or breached inboxes.
  • Deepfake voices used to impersonate executives, family members, or service providers in real-time.
  • Deepfake video for high-trust fraud (e.g., fake Zoom calls for CEO fraud or vendor-payment redirection).
  • AI-written SMS scams that adapt to language, slang, or region.
  • Synthetic online identities (faces, bios, behaviour patterns) to build trust over long periods.
  • Automated romance or business-relationship social engineering, running hundreds of active personas at once.

Malware, Intrusions & Exploits

  • AI-assisted vulnerability discovery (pattern searching in codebases, configs, or binaries).
  • Adaptive malware that rewrites its signature when detected.
  • AI-designed payloads that self-optimise for a target environment.
  • Automated exploit chaining to assemble multi-step attack paths.
  • Intelligent evasion techniques (detecting honeypots, sandboxes, behavioral analysis).
  • AI-driven credential-stuffing and brute-force tools that prioritise likely password candidates.
  • LLM-powered reverse engineering, making it dramatically faster for attackers to understand proprietary code or firmware.

Fraud, Financial Crime & Scams

  • Conversational scam bots that negotiate, pressure, and escalate with victims.
  • Fraudulent document generation (IDs, invoices, bank letters, paystubs).
  • AI-edited screenshots and video evidence that appear authentic during disputes.
  • Synthetic KYC identities that pass automated verification.
  • AI in crypto fraud, from automated pump-and-dump scripts to liquidity-drain strategies.
  • Faster tax, benefit, and insurance fraud using AI to auto-fill complex forms accurately.

Scale, Automation & Orchestration

  • 24/7 autonomous attack campaigns with no human in the loop.
  • AI “spam factories” generating millions of personalised messages per hour.
  • Fully automated BEC (Business Email Compromise) cycles, from email scraping to invoice redirection.
  • Botnets enhanced with AI for dynamic C2 routing, target selection, and load balancing.
  • Automated reconnaissance that maps an organisation’s external attack surface with extreme precision.
  • AI-run initial access brokers, scoring and pricing compromised systems automatically.

Manipulation, Influence, & Information Ops

  • Automated propaganda and disinformation tuned for local politics, culture, or events.
  • AI-generated news sites that appear legitimate and index in search engines.
  • Automated harassment or pressure campaigns targeting individuals or executives.
  • Micro-targeted influence operations based on behavioural profiles built from breached data.

Operational Efficiency for Criminal Enterprises

  • AI-based logistics for cybercrime (e.g., scheduling mule activities or routing stolen goods).
  • Optimised ransomware operations, from target selection to ransom-amount prediction.
  • Automated negotiation bots that handle ransom chats more effectively than humans.
  • Improved OPSEC—AI helps attackers detect whether they’re being tracked or deanonymised.
  • Translation + localisation of criminal operations into new countries, instantly expanding reach.

Other blog posts

Start a conversation


What’s real in AI and AI security: what’s happening, what matters, and why does it matter?

I’ve spent my career exploring how technology, infrastructure, and human behavior intersect across cybersecurity, subsea systems, and more recently AI. I’ve worked in offensive security, engineering, and now lead Subsea Cloud, where we build sustainable, high-performance data centers beneath the sea.

I write and speak about the edges of technology: how we secure them, scale them, and sometimes subvert them. My work has been featured in conferences and publications across the U.S. and Europe, and I’ve presented to organizations including Amazon, NASA, Linkedin, U.S. federal agencies, the United Nations and the UK government and at conferences across the world including South by Southwest, Underwater Defense Technology, OODA Con, DEFCON, PTC, DataCloud Global Congress and BlackHat.

Say Hello

You can find more on LinkedIn or reach out directly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.