CyberheistNews Vol 15 #35 | September third, 2025
[Watch Out] Hackers Now Use AI to Write Higher Phish
Cybercriminals are more and more abusing AI-assisted web site turbines to shortly craft convincing phishing websites, in accordance with researchers at Palo Alto Networks’ Unit 42.
In lots of instances, even when these providers have safeguards in place to stop abuse, criminals can bypass these measures with the intention to create phishing pages. Unit 42 examined a well-liked web site generator to see how straightforward it was to spin up a spoofed web site.
“The web site builder solely required a sound electronic mail handle to ascertain a trial account and publish a web page impersonating our firm,” Unit 42 says.
“Since these pages are meant to shortly set up an online presence for a brand new firm or group, they lack the design components that criminals would in any other case use to spoof a focused model. In our check, the web site builder promised to generate a free AI web site in 60 seconds, which is an correct assertion. Our solely enter was a short description of the corporate for an preliminary textual content immediate.”
Moreover, the researchers discovered that roughly 40% of AI abuse by risk actors concerned writing assistants or chatbots. These instruments can assist attackers write tailor-made phishing messages which can be free from typos or grammatical errors.
“Textual content technology instruments reminiscent of conversational, writing and assembly assistants can improve productiveness, content material creation and buyer interplay,” Unit 42 says. “Nevertheless, attackers can manipulate them to generate convincing phishing content material, unfold misinformation or leak confidential knowledge.”
AI instruments are quickly rising in sophistication, and Unit 42 says misuse of those instruments will maintain tempo. The researchers state, “Our telemetry displays the rising adoption of GenAI purposes and providers, and we anticipate a corresponding enhance in assaults that make the most of GenAI as time passes.”
AI-powered safety consciousness coaching can provide your group a vital layer of protection towards evolving social engineering assaults.
Use AI to combat AI. KnowBe4’s AIDA (Synthetic Intelligence Protection Brokers) are a set of brokers that up-levels your method to human danger administration.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/threat-actors-are-increasingly-abusing-generative-ai-tools-for-phishing
[Live Demo] Ridiculously Straightforward AI-Powered Safety Consciousness Coaching and Phishing
Phishing and social engineering stay the #1 cyber risk to your group, with 68% of information breaches brought on by human error. Your safety crew wants a straightforward option to ship personalised coaching. That is exactly what our AI Protection Brokers present.
Be part of us for a demo showcasing KnowBe4’s modern method to human danger administration with agentic AI that delivers personalised, related and adaptive safety consciousness coaching with minimal admin effort.
See how straightforward it’s to coach and phish your customers with KnowBe4′ HRM+ platform:
- SmartRisk Agent™ – Generate actionable knowledge and metrics that can assist you decrease your group’s human danger rating
- Template Generator Agent – Create convincing phishing simulations, together with Callback Phishing, that mimic actual threats. The Beneficial Touchdown Pages Agent then suggests acceptable touchdown pages primarily based on AI-generated templates
- Automated Coaching Agent – Routinely determine high-risk customers and assign personalised coaching
- Information Refresher Agent and Coverage Quizzes Agent – Reinforce your safety program and organizational insurance policies.
- Enhanced Govt Experiences – Observe consumer actions, visualize tendencies, obtain widgets, and enhance looking out/sorting to supply deeper insights and streamline collaboration
See how these highly effective AI-driven options work collectively to dramatically cut back your group’s danger whereas saving your crew helpful time.
Date/Time: Thursday, September 11 @ 2:00 PM (ET)
Save My Spot:
https://data.knowbe4.com/ksat-demo-3?partnerref=CHN2
Again to Faculty: Cybersecurity Training for All Ages
By KnowBe4’s Chief Studying Officer John N Simply, Ed.D. & Ben Syn
It is that exhilarating time of yr once more! Summer time is winding down, and the back-to-school season is in full swing—a very unbelievable time to give attention to the ability of schooling, not simply within the conventional sense, however particularly within the ever-evolving digital world.
At KnowBe4, acknowledged because the #1 Safety Product and #2 General Software program Product in G2’s 2025 Finest Software program Awards, we’re passionately dedicated to remodeling human danger and championing cutting-edge cybersecurity schooling for everybody, from our youngest digital explorers to seasoned school college students and past.
We essentially imagine that this people-centric method goes past simply checking a field, focusing as an alternative on actual, measurable habits change to construct a powerful safety tradition towards cyber threats.
For older college students transitioning into the workforce or greater schooling, we’re proud to announce a big milestone for our KnowBe4 Scholar Version! We now have over 200 tutorial establishments providing our student-specific safety consciousness coaching to greater than 1,000,000 college students!
This initiative was born from heartbreaking tales of scholars falling sufferer to phishing assaults and employment scams, and a transparent want expressed by employers for extra cyber-prepared graduates. For the previous yr, we have collaborated with a steering committee of esteemed establishments worldwide, together with Bournemouth College, Nelson Mandela College, the College of Oklahoma, Hood School, and Nova Southeastern College, to develop extremely related, personalized, and actionable content material for college kids aged 16 and over.
The affect goes past simply coaching; it builds a real safety tradition. As Tina Rebello, an info safety analyst at Bridgewater State College, shared with us, “The scholars had been educating one another the purple flags of phishing messages and had numerous enjoyable choosing them aside. It additionally introduced our college students collectively a bit extra, which was actually thrilling to see.”
The Scholar Version tackles essential subjects like social engineering purple flags, sextortion, safe on-line habits, and avoiding on-line scams, getting ready college students to be cyber-ready of their future careers whereas additionally defending them and their establishments from present assaults.
The pricing is ready as a fraction of normal license prices, making certain all college students can entry this important content material and contribute to constructing a future workforce of safety champions inside their communities.
[CONTINUED] with hyperlinks and screenshots:
https://weblog.knowbe4.com/back-to-school-a-cybersecurity-education-for-all-ages
A New Period of E-mail Protection: The Energy of KnowBe4 and Microsoft Defender for Workplace 365
Uncover how KnowBe4 and Microsoft Defender for Workplace 365 are remodeling electronic mail safety and discover the ability of the brand new integration.
Be part of our stay demo with Murali Natarajan, Principal Product Supervisor at Microsoft, and Stuart Clark, Vice President of Product Technique at KnowBe4, to see how KnowBe4’s superior risk detection capabilities and Microsoft’s Built-in Cloud E-mail Safety (ICES) ecosystem work collectively to create an unmatched protection towards right now’s most subtle electronic mail threats.
Throughout this session, you may learn to:
- Seamlessly combine KnowBe4 Defend with Microsoft’s safety controls for unified quarantine, constant coverage enforcement and complete visibility
- Leverage the mixed strengths of KnowBe4’s specialised AI detection and Microsoft Defender, making certain the strongest verdict all the time wins for superior risk prevention
- Simplify deployment, cut back complexity and eradicate separate quarantine programs by way of seamless integration with Microsoft instruments
- Undertake Microsoft’s latest framework early, making certain compatibility with future developments and unlocking co-marketing alternatives
- Allow your safety groups to research, reply to and remediate threats by way of acquainted Microsoft interfaces whereas harnessing KnowBe4’s superior detection capabilities
Date/Time: Wednesday, September 10 @ 1:00 PM (ET)
Save My Spot:
https://data.knowbe4.com/knowbe4-microsoft-defender?partnerref=CHNP
New Phishing Equipment Bypasses MFA to Steal Microsoft 365 Credentials
Attackers are utilizing a newly found phishing-as-a-service (PhaaS) platform dubbed “Salty 2FA” to focus on a variety of industries throughout North America and Europe, in accordance with researchers at ANYRUN.
The phishing assaults are delivered through electronic mail and primarily try and steal Microsoft 365 credentials. Like many common commodity phishing kits, Salty 2FA is designed to bypass quite a lot of multifactor authentication measures.
“With its means to distribute phishing payloads at scale, keep dynamic infrastructure, intercept and course of most identified 2FA authentication strategies past easy credentials, and handle a posh communication mannequin between phishing pages and C2 servers, Salty 2FA stands on par with the ‘main’ kits in right now’s phishing panorama,” the researchers notice.
Widespread phishing lures utilized by the package relate to billing statements, payroll amendments, requests for proposals, or bid invites. ANYRUN noticed the attackers utilizing the phishing package to focus on quite a lot of sectors throughout the U.S., Canada, France, Germany, Greece, Italy, Spain, Switzerland and the UK. The assaults have additionally focused the monetary sector in Latin America and the metallurgy business within the US and India.
The researchers imagine Salty 2FA’s builders are nonetheless enhancing the platform, and organizations worldwide needs to be looking out for these phishing assaults.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/new-phishing-kit-bypasses-mfa-to-steal-microsoft-365-credentials
[FREE Resource Kit] The Cybersecurity Consciousness Month Equipment for 2025 is Now Accessible
Cybersecurity Consciousness Month is across the nook, and we’ve obtained your again!
It’s harmful on the market, so that you shouldn’t go alone. Take your customers on an 8-bit journey throughout 4 ranges of cyber sleuthing with our 80s arcade themed Cybersecurity Consciousness Month useful resource package! We’ve set you up with sufficient free coaching content material to run an entire theme marketing campaign all through October.
This yr, every themed week represents a brand new degree in your customers to discover. Alongside the best way they’ll encounter baddies bursting out of the arcade cupboard representing the important thing cyber threats for every week.
Here’s what you may get:
- Entry to a curated assortment of safety consciousness coaching movies and interactive modules straight from KnowBe4’s award-winning coaching library
- Assets that can assist you plan your actions, together with your Cybersecurity Consciousness Month Person Information and Cybersecurity Consciousness Weekly Planner
- NEW! 4 “Arcade Villain” character playing cards/posters, plus further posters and digital signage belongings out there in a number of languages
- Free sources for you together with our hottest on-demand webinar and whitepaper
This package will allow you to and your customers combat cyber crime this October and past.
Get Your Equipment Now:
https://data.knowbe4.com/cyber-security-awareness-kit-chn
FBI says Salt Hurricane focused greater than 80 international locations
The Wall Road Journal stories that the Chinese language cyberespionage marketing campaign often called “Salt Hurricane” focused roughly 600 organizations throughout greater than 80 international locations. Brett Leatherman, the FBI’s Deputy Assistant Director for Cyber Ops, instructed the Journal that the marketing campaign was “broader and extra indiscriminate than x beforehand understood, and past what international locations normally perceive to be espionage.”
The FBI believes the hackers obtained greater than 1,000,000 name information and particularly focused the cellphone calls and textual content messages of round 100 Individuals.
The risk actors additionally compromised telecommunication suppliers in different international locations, with various levels of entry. Leatherman added, “If you’ll be able to exfiltrate related info globally you can begin to combination that knowledge and begin to perceive a a lot totally different intelligence image than what you’d get in the event you simply focused and compromised one nation.” Yikes.
Allied spy businesses blame 3 Chinese language tech firms for Salt Hurricane assaults:
https://therecord.media/allied-spy-agencies-blame-chinese-companies-salt-typhoon
Let’s keep protected on the market.
Heat regards,
Stu Sjouwerman, SACP
Govt Chairman
KnowBe4, Inc.
PS: [Budget Ammo] By Yours Really: Past the Immediate: “Constructing Reliable Agent Methods”
https://www.securityweek.com/beyond-the-prompt-building-trustworthy-agent-systems/
PPS: Your KnowBe4 Contemporary Content material Updates from August 2025:
https://weblog.knowbe4.com/your-knowbe4-fresh-content-updates-from-august-2025
[BONUS LUNCH & LEARN] The $10 Trillion AI Revolution: Why It is Larger Than the Industrial Revolution:
https://youtu.be/yoycgOMq1tI?si=qgmFe1WkicPu7Y3i
Quotes of the Week
“My studying of historical past convinces me that the majority dangerous authorities outcomes from an excessive amount of authorities.”
– Thomas Jefferson – third President of the US (1743 – 1826)
“At this time you might be You, that’s more true than true. There isn’t a one alive who’s Youer than You.”
– Dr. Seuss
You possibly can learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-15-35-watch-out-hackers-now-use-ai-to-write-better-phish
Safety Information
Report: AI Can Now Automate Whole Assault Chains
Risk actors can now use AI instruments to automate complete assault operations, in accordance with a brand new report from Anthropic. The corporate says an attacker abused its Claude AI instrument to create a hacking and extortion marketing campaign that compromised not less than seventeen organizations.
The attacker used Claude to conduct reconnaissance, preliminary entry, malware growth, knowledge exfiltration, and extortion evaluation.
“A cybercriminal used Claude Code to conduct a scaled knowledge extortion operation throughout a number of worldwide targets in a brief timeframe,” the researchers write. “This risk actor leveraged Claude’s code execution atmosphere to automate reconnaissance, credential harvesting, and community penetration at scale, probably affecting not less than 17 distinct organizations in simply the final month throughout authorities, healthcare, emergency providers, and non secular establishments.”
The attacker was capable of steal “healthcare knowledge, monetary info, authorities credentials, and different delicate info, with direct ransom calls for sometimes exceeding $500,000.”
Anthropic additionally noticed a Chinese language state-sponsored APT abusing Claude to help in a profitable espionage marketing campaign concentrating on Vietnamese important infrastructure.
“The actor built-in Claude as an assistant throughout 12 of 14 MITRE ATT&CK ways, utilizing it as a technical advisor, code developer, safety analyst, and operational marketing consultant all through their marketing campaign,” the researchers write. “The actor seems to have compromised main Vietnamese telecommunications suppliers, authorities databases, and agricultural administration programs.”
Moreover, the researchers noticed AI-assisted assaults launched by North Korean and Russian APTs, in addition to ransomware gangs, romance scammers, and malware builders.
Anthropic has banned the accounts related to this exercise and is engaged on methods to stop such abuse sooner or later. Nevertheless, organizations ought to anticipate attackers to proceed to leverage AI of their operations, and these assaults will solely develop extra subtle because the expertise improves.
KnowBe4 empowers your workforce to make smarter safety selections on daily basis. Over 70,000 organizations worldwide belief the KnowBe4 HRM+ platform to strengthen their safety tradition and cut back human danger.
Anthropic has the story:
https://www.anthropic.com/information/detecting-countering-misuse-aug-2025
Report: Cybercriminals are Hiring Social Engineering Expertise
ReliaQuest has printed a report on the cybercriminal recruitment ecosystem, discovering that fluent English audio system with social engineering expertise are extremely sought-after.
“Among the many most in-demand expertise is English-speaking social engineering, with job posts greater than doubling from 2024 to 2025,” the researchers write. “Recruiters account for 87% of those postings, indicating sturdy demand, seemingly fueled by the success of teams like ‘Scattered Spider’ in leveraging this ability for preliminary entry assaults.”
The researchers notice that deepfake expertise can add one other layer of sophistication to social engineering assaults. Accordingly, crooks are additionally seeking to rent people with AI experience.
“Trying forward, as soon as deepfake expertise permits adversaries to take away language obstacles in actual time, it’s going to current an excellent better risk,” ReliaQuest says. “Attackers may goal organizations throughout a number of languages, considerably increasing their attain.
What’s extra, with recruitment for English-speaking social engineers already at an all-time excessive, real-time deepfake expertise provides an alternative choice to conventional strategies. As such, social engineering assaults will nearly definitely change into extra prevalent.”
ReliaQuest additionally notes a surge of exercise associated to the newly common ClickFix social engineering tactic, which tips victims into working malicious instructions on their computer systems.
“The cybercriminal job market is a key driver in accelerating the adoption of rising assault strategies, as demonstrated by the rise of ClickFix malware execution. Between late 2024 and early 2025, ClickFix exercise surged by an alarming 850%, with a 200% spike occurring inside only one month of focused recruitment posts showing.
This speedy escalation highlights how demand for particular experience instantly fuels the deployment of recent strategies, making it important for organizations to observe these shifts and proactively strengthen defenses.”
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/report-cybercriminals-are-hiring-social-engineering-talent
[Tool of the Week] Flip Your Messy Prompts Into Gold
OpenAI launched one thing value your espresso break. It is referred to as the Immediate Optimizer, and it is a free instrument contained in the ChatGPT Playground that quietly ranges up your AI sport.
Here is the way it works: You write a obscure or clumsy immediate. Hit “Optimize.” And increase—out comes a cultured, structured model that GPT‑5 understands higher. Consider it as spellcheck for prompts—besides it additionally teaches you why your unique was weak.
Why does this matter? As a result of sharper prompts result in sharper outcomes. You may immediately see higher responses from ChatGPT simply by feeding it higher enter. It is like giving a chef a recipe as an alternative of a grocery bag and hoping for dinner.
Higher nonetheless, the instrument exhibits you what it modified, and why. So when you’re getting work finished, you are additionally studying the right way to immediate like a professional. That makes it each helpful and academic.
The place to strive it: https://platform.openai.com/playground
You could familiarize your self with the UI. It is a bit extra technical and will get up to date regularly, discover and use the Optimize operate.
AI is just as sensible because the directions you give it. This instrument helps you sound like you recognize what you are doing—even in the event you’re winging it. 😀
The ten Fascinating Information Gadgets This Week
Cyberheist ‘Fave’ Hyperlinks