CrowdStrike flags AI use in ransomware attacks across Europe

Source Cryptopolitan

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

A new report has revealed that ransomware attackers across Europe are now turning to artificial intelligence to bolster their operations. In the report released by CrowdStrike, it highlighted that the rise in ransomware attacks experienced by Europe is due to how these attackers have been integrating AI into their operations.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

Sharpen your strategy with mentorship + daily ideas - 30 days free access to our trading program

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Bitcoin Price Annual Forecast: BTC readies for home run in 2024 with two bullish fundamentals on tapBitcoin prices could return to 2021 highs around $69,000 in 2024 on expectations of the next bull cycle.
Author  FXStreet
Dec 22, 2023
Bitcoin prices could return to 2021 highs around $69,000 in 2024 on expectations of the next bull cycle.
placeholder
Natural Gas sinks to pivotal level as China’s demand slumpsNatural Gas price (XNG/USD) edges lower and sinks to $2.56 on Monday, extending its losing streak for the fifth day in a row. The move comes on the back of China cutting its Liquified Natural Gas (LNG) imports after prices rose above $3.0 in June. It
Author  FXStreet
Jul 01, 2024
Natural Gas price (XNG/USD) edges lower and sinks to $2.56 on Monday, extending its losing streak for the fifth day in a row. The move comes on the back of China cutting its Liquified Natural Gas (LNG) imports after prices rose above $3.0 in June. It
placeholder
Could XRP Actually Reach $10,000? Expert Weighs InA highly-debated forecast that XRP may eventually reach $10,000 per coin has ignited controversy in the crypto world. The ambitious assertion has been greeted with excitement and skepticism as
Author  NewsBTC
Mar 31, 2025
A highly-debated forecast that XRP may eventually reach $10,000 per coin has ignited controversy in the crypto world. The ambitious assertion has been greeted with excitement and skepticism as
placeholder
ECB Policy Outlook for 2026: What It Could Mean for the Euro’s Next MoveWith the ECB likely holding rates steady at 2.15% and the Fed potentially extending cuts into 2026, EUR/USD may test 1.20 if Eurozone growth proves resilient, but weaker growth and an ECB pivot could pull the pair back toward 1.13 and potentially 1.10.
Author  Mitrade
Dec 26, 2025
With the ECB likely holding rates steady at 2.15% and the Fed potentially extending cuts into 2026, EUR/USD may test 1.20 if Eurozone growth proves resilient, but weaker growth and an ECB pivot could pull the pair back toward 1.13 and potentially 1.10.
placeholder
Gold Price Forecast: XAU/USD opens lower around $4,450 on fears of widening Iran conflictsGold price (XAU/USD) opens over 1% lower to near $4,445.00 on Monday, as oil prices have rallied further on fears of further widening of conflicts in the Middle East. WTI Oil price is up almost 3% above $102.50 in the opening trade, increasing fears of higher inflation expectations globally.
Author  FXStreet
Mar 30, Mon
Gold price (XAU/USD) opens over 1% lower to near $4,445.00 on Monday, as oil prices have rallied further on fears of further widening of conflicts in the Middle East. WTI Oil price is up almost 3% above $102.50 in the opening trade, increasing fears of higher inflation expectations globally.
goTop
quote