CrowdStrike flags AI use in ransomware attacks across Europe

Source Cryptopolitan

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

A new report has revealed that ransomware attackers across Europe are now turning to artificial intelligence to bolster their operations. In the report released by CrowdStrike, it highlighted that the rise in ransomware attacks experienced by Europe is due to how these attackers have been integrating AI into their operations.

In its report, the firm claims that Europe is responsible for about 22% of the global ransomware and extortion victims. It also noted that the continent ranks second among the most targeted regions worldwide after North America, leading to unprecedented risks for businesses and governments alike.

In the report, CrowdStrike revealed that criminals are using AI to reduce the time it takes to breach networks and deploy ransomware. The report mentioned groups like SCATTERED SPIDER, who now use AI in their activities. The group uses the technology to increase their deployment speed by 48% and reduce the attack cycle to around 24 hours. This rise also shows how AI helps attackers carry out their criminal activities.

CrowdStrike reveals integration of AI and ransomware

According to the report, more than 2,100 firms have been affected by ransomware attacks. The platform mentioned that the attackers target firms like manufacturing, professional services, and retail. The report also noted that ransomware is on the rise in most European countries, including Germany, France, Spain, and the United Kingdom.

Aside from improving their speed, threat actors have also changed their methods, diversifying their attacks through advanced social engineering and deception techniques.

Another growing method is the CAPTCHA lure, which is known as Click fix. In these attacks, users are tricked into copying malicious code into their systems under the guise of verifying their identity. European organizations have reported over 1,000 of these cases since 2024.

According to CrowdStrike, these evolving methodologies show how AI tools are being used to improve traditional social engineering strategies. Attackers carry out targeted campaigns that bypass security filters by using several methods

State-sponsored usage of AI on the rise

State-sponsored actors from countries like Russia, North Korea, China, and Iran have also expanded their targets across Europe. According to CrowdStrike, Russia-nexus actors have continued to pursue intelligence collection and disruptive campaigns tied to the war against Ukraine.

Their objectives include tracking military aid, influencing European public opinion, and undermining NATO cohesion. Similarly, groups in Iran have also increased their campaigns against other countries as regional tensions escalate.

CrowdStrike also noted that China has been focusing its cyber operations on strategic industries such as defense, manufacturing, and biotechnology. It identified Vertigo Panda’s use of USB-based exploits and Vixen Panda’s focus on cloud infrastructure, both designed to steal intellectual property that supports China’s industrial and technological ambitions. CrowdStrike noted that traditional defensive models that rely on static detection and reactive response are no longer sufficient.

Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, noted the need for “intelligence-led defense powered by AI and guided by human expertise.” This strategy is expected to use several strategies to block the activities of these hackers before they cause further threats. Meanwhile, firms would need proactive intelligence sharing and other measures.

Sharpen your strategy with mentorship + daily ideas - 30 days free access to our trading program

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
What Crypto Whales are Buying For May 2025Crypto whales are making bold moves heading into May 2025, and three tokens are standing out: Ethereum (ETH), Artificial Superintelligence Alliance (FET), and Onyxcoin (XCN).
Author  Beincrypto
Apr 21, Mon
Crypto whales are making bold moves heading into May 2025, and three tokens are standing out: Ethereum (ETH), Artificial Superintelligence Alliance (FET), and Onyxcoin (XCN).
placeholder
Bitcoin ETF Inflows For 2025 Now Outpace 2024, Data ShowsUS Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
Author  Bitcoinist
Jul 16, Wed
US Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
placeholder
Litecoin Price Forecast: LTC breaks above bullish technical pattern, targets $170 markLitecoin (LTC) price is showing renewed bullish strength after breaking out of an ascending channel pattern, trading above $133 at the time of writing on Wednesday.
Author  FXStreet
Aug 13, Wed
Litecoin (LTC) price is showing renewed bullish strength after breaking out of an ascending channel pattern, trading above $133 at the time of writing on Wednesday.
placeholder
Gold Price Forecast: XAU/USD gains momentum to near $3,650, eyes on US CPI releaseThe Gold price (XAU/USD) gains momentum to near $3,645 during the early Asian session on Thursday.
Author  FXStreet
Sep 11, Thu
The Gold price (XAU/USD) gains momentum to near $3,645 during the early Asian session on Thursday.
placeholder
Silver Price Forecast: XAG/USD rises to near $48.50 as Fed rate cut bets increaseSilver price (XAG/USD) gains ground after recovering losses registered in the previous session, trading around $48.40 per troy ounce during the Asian hours on Friday.
Author  FXStreet
Yesterday 06: 03
Silver price (XAG/USD) gains ground after recovering losses registered in the previous session, trading around $48.40 per troy ounce during the Asian hours on Friday.
goTop
quote