ARTICLE
11 September 2025

Ankura CTIX FLASH Update - September 9, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Recent reports highlight sophisticated cybercriminal tactics exploiting popular digital platforms. One incident reveals attackers leveraging Apple's iCloud calendar feature to conduct...
United States Technology

Malware Activity

Cybersecurity Threats Exploiting Cloud Services and AI

Recent reports highlight sophisticated cybercriminal tactics exploiting popular digital platforms. One incident reveals attackers leveraging Apple's iCloud calendar feature to conduct highly convincing phishing campaigns by sending malicious invitations through Apple's servers. Thus, making the malicious messages appear legitimate and bypass traditional spam filters. Users are urged to scrutinize unexpected calendar invites to prevent falling victim to such schemes. Concurrently, a surge in AI-driven malware campaigns targeting GitHub accounts demonstrates how cybercriminals utilize machine learning to craft convincing phishing content, automate malicious code deployment, and evade detection. Over 2,180 accounts were compromised in the S1ngularity attack. The hackers were using these platforms to host malicious repositories and facilitate cyber espionage. These developments underscore the urgent need for enhanced security protocols, increased user awareness, and vigilant monitoring to defend against evolving, AI-enabled cyber threats across cloud services and software development ecosystems. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

NYU Engineers' AI-Powered Ransomware PoC, a Potential Tool Threat Actors are also Developing

A group of New York University engineers developed a proof-of-concept (PoC) AI-driven ransomware, dubbed "Ransomware 3.0", to explore the intersection of advanced ransomware strains and AI technologies. Their aim was to present their research at a security conference, demonstrating how AI could automate a ransomware attack lifecycle. The AI system performs four (4) phases of an attack, generating Lua scripts tailored to victims' computer setups, mapping IT systems, and identifying valuable files for targeted extortion. Unlike traditional ransomware, Ransomware 3.0 targets specific files, making it harder to detect due to its polymorphic nature, where generated code varies across systems and executions. Additionally, the AI crafts personalized ransom notes using user data from infected computers. During testing, the researchers uploaded the malware to VirusTotal, leading to it being mistakenly identified as a real attack by ESET analysts, who named it PromptLock. Despite the media attention, the researchers clarified that the binary functions only in a lab environment and requires significant modification for real-world use. The lighter AI model, gpt-oss-20b, was more compliant with queries than its heavier counterpart, which often refused due to OpenAI's protective policies. The team did not manipulate the AI, simply instructing it to generate code for file scanning and ransom notes. The emergence of AI-driven malware like Ransomware 3.0, alongside extortion operations using AI tools, signals a potential shift in cyber threats. CTIX analysts highlight this PoC in preparation for the evolving landscape where AI may play a significant role in cyberattacks.

Vulnerabilities

When Attackers Pose as Employees: Combating Hiring Fraud with Zero Standing Privileges

Hiring fraud has become a growing attack vector, with adversaries increasingly infiltrating organizations not through phishing links but by posing as legitimate employees during the hiring process. Remote work has removed traditional in-person safeguards, leaving identity as the new perimeter; one that can now be convincingly faked with AI-generated resumes, deepfaked interviews, spoofed references, and coached responses. Real-world cases highlight the scale of the threat, including more than 320 North Korean operatives who successfully obtained remote IT roles using fabricated identities, AI manipulation, and "laptop farms" to appear physically located in the U.S., funneling stolen data and salaries back to the regime. These incidents underscore how the traditional "castle-and-moat" model of security, which locks everything down from the outside but leaves insiders free, is no longer sufficient. Overly rigid restrictions stifle productivity, while granting exceptions creates dangerous gaps that attackers can exploit. To address this, organizations are turning to Zero Standing Privileges (ZSP), a framework that eliminates persistent access, enforces just-in-time and just-enough privilege, and requires comprehensive auditing of every grant and revoke. By aligning protection with productivity, ZSP reduces the risk that fraudulent hires exploit to gain a lasting foothold, while still empowering legitimate employees to work efficiently and securely.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More