Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Apple could show off revamped Phone, Safari, and Camera apps next week

    June 6, 2025

    8BitDo’s controllers will work with the Switch 2 after a firmware update

    June 6, 2025

    Apple’s WWDC 2025: How to Watch and What to Expect

    June 6, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare
    Security

    The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare

    News RoomBy News RoomJune 5, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Google did not respond to a request for comment.

    In 2023, security researchers at Trend Micro got ChatGPT to generate malicious code by prompting it into the role of a security researcher and pentester. ChatGPT would then happily generate PowerShell scripts based on databases of malicious code.

    “You can use it to create malware,” Moussouris says. “The easiest way to get around those safeguards put in place by the makers of the AI models is to say that you’re competing in a capture-the-flag exercise, and it will happily generate malicious code for you.”

    Unsophisticated actors like script kiddies are an age-old problem in the world of cybersecurity, and AI may well amplify their profile. “It lowers the barrier to entry to cybercrime,” Hayley Benedict, a Cyber Intelligence Analyst at RANE, tells WIRED.

    But, she says, the real threat may come from established hacking groups who will use AI to further enhance their already fearsome abilities.

    “It’s the hackers that already have the capabilities and already have these operations,” she says. “It’s being able to drastically scale up these cybercriminal operations, and they can create the malicious code a lot faster.”

    Moussouris agrees. “The acceleration is what is going to make it extremely difficult to control,” she says.

    Hunted Labs’ Smith also says that the real threat of AI-generated code is in the hands of someone who already knows the code in and out who uses it to scale up an attack. “When you’re working with someone who has deep experience and you combine that with, ‘Hey, I can do things a lot faster that otherwise would have taken me a couple days or three days, and now it takes me 30 minutes.’ That’s a really interesting and dynamic part of the situation,” he says.

    According to Smith, an experienced hacker could design a system that defeats multiple security protections and learns as it goes. The malicious bit of code would rewrite its malicious payload as it learns on the fly. “That would be completely insane and difficult to triage,” he says.

    Smith imagines a world where 20 zero-day events all happen at the same time. “That makes it a little bit more scary,” he says.

    Moussouris says that the tools to make that kind of attack a reality exist now. “They are good enough in the hands of a good enough operator,” she says, but AI is not quite good enough yet for an inexperienced hacker to operate hands-off.

    “We’re not quite there in terms of AI being able to fully take over the function of a human in offensive security,” she says.

    The primal fear that chatbot code sparks is that anyone will be able to do it, but the reality is that a sophisticated actor with deep knowledge of existing code is much more frightening. XBOW may be the closest thing to an autonomous “AI hacker” that exists in the wild, and it’s the creation of a team of more than 20 skilled people whose previous work experience includes GitHub, Microsoft, and a half a dozen assorted security companies.

    It also points to another truth. “The best defense against a bad guy with AI is a good guy with AI,” Benedict says.

    For Moussouris, the use of AI by both blackhats and whitehats is just the next evolution of a cybersecurity arms race she’s watched unfold over 30 years. “It went from: ‘I’m going to perform this hack manually or create my own custom exploit,’ to, ‘I’m going to create a tool that anyone can run and perform some of these checks automatically,’” she says.

    “AI is just another tool in the toolbox, and those who do know how to steer it appropriately now are going to be the ones that make those vibey frontends that anyone could use.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Enhanced Games Has a Date, a Host City, and a Drug-Fueled World Record
    Next Article Amazon is reportedly training humanoid robots to deliver packages

    Related Posts

    How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

    June 5, 2025

    A GPS Blackout Would Shut Down the World

    June 4, 2025

    You’re Not Ready

    June 4, 2025

    A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign

    June 4, 2025

    The US Grid Attack Looming on the Horizon

    June 4, 2025

    A Swedish MMA Tournament Spotlights the Trump Administration’s Handling of Far-Right Terrorism

    June 4, 2025
    Our Picks

    8BitDo’s controllers will work with the Switch 2 after a firmware update

    June 6, 2025

    Apple’s WWDC 2025: How to Watch and What to Expect

    June 6, 2025

    OpenAI is storing deleted ChatGPT conversations as part of its NYT lawsuit

    June 6, 2025

    Palantir Is Going on Defense

    June 6, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    The Vergecast’s WWDC 2025 preview

    By News RoomJune 6, 2025

    This year’s developer conference is coming to a close, but most years the last one…

    Samsung’s Cheaper Galaxy A26 Is Surprisingly a Better Buy Than the Galaxy A36

    June 6, 2025

    The Samsung Galaxy S25 Edge is a big phone with small phone energy

    June 6, 2025

    How to maximize your privacy using Signal calls and chat

    June 6, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.