Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

MIT Sloan: 80% of ransomware attacks use AI

AI tools accelerate malware creation, targeted phishing, and deepfake schemes, challenging traditional cybersecurity measures day by day.

byAytun Çelebi
September 11, 2025
in Cybersecurity, Artificial Intelligence
Home News Cybersecurity

A recent study by MIT Sloan and Safe Security shows a sharp increase in ransomware attacks using artificial intelligence (AI). Analyzing 2,800 ransomware incidents, researchers found that 80% of attacks now rely on AI, while only 20% remain non-AI-based.

Experts expect this proportion to rise further in 2025 as AI tools become more accessible to cybercriminals.

How AI is transforming ransomware attacks

AI is being used across several attack methods:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • Advanced malware creation – automating the creation of hard-to-detect ransomware.
  • Targeted phishing campaigns – AI crafts convincing messages tailored to individuals or organizations.
  • Deepfake-driven social engineering – realistic audio or video is used to trick employees, such as fake customer service calls.
  • LLM-assisted attacks – large language models help with password cracking, bypassing CAPTCHAs, and generating malicious code.

These AI-driven methods allow attackers to exploit weaknesses faster than traditional security measures, reshaping the threat environment.

The cybersecurity challenge

Michael Siegel, principal research scientist at CAMS, explains the inherent imbalance:

“The attacker only needs one point of entry, while the defender must secure all points.”

AI worsens this imbalance by accelerating attacks, making real-time detection and defense harder for IT teams.

Proactive strategies against AI ransomware

Experts suggest a layered, AI-informed defense strategy with three main pillars:

  • Automated security hygiene
    • Self-healing code and self-patching systems
    • Continuous monitoring and zero-trust architectures
    • Automated attack surface management
  • Autonomous and deceptive defense systems
    • Real-time analytics and machine learning to anticipate attacks
    • Moving-target defenses and decoy systems to confuse attackers
  • Augmented oversight and reporting
    • Executive dashboards with real-time intelligence on emerging threats
    • Data-driven decision-making to guide rapid response

As cybercriminals increasingly use AI, AI-powered ransomware attacks are expected to dominate in 2025. Organizations will need strong AI-driven defenses and ongoing monitoring to counter evolving threats.


Featured image credit

Tags: AICybersecurityFeatured

Related Posts

AGI ethics checklist proposes ten key elements

AGI ethics checklist proposes ten key elements

September 11, 2025
ICO warns of student cyberattacks on UK schools

ICO warns of student cyberattacks on UK schools

September 11, 2025
Google Gemini now transcribes audio files

Google Gemini now transcribes audio files

September 11, 2025
Cybersecurity shifts from network to human element

Cybersecurity shifts from network to human element

September 11, 2025
FastNetMon mitigates 1.5 Gpps DDoS attack

FastNetMon mitigates 1.5 Gpps DDoS attack

September 11, 2025
Thinking Machines Lab reveals research on eliminating randomness in AI model responses

Thinking Machines Lab reveals research on eliminating randomness in AI model responses

September 11, 2025

LATEST NEWS

AGI ethics checklist proposes ten key elements

ICO warns of student cyberattacks on UK schools

Ant Group unveils their own Tesla Optimus competitor, R1 humanoid robot

Google Gemini now transcribes audio files

Cybersecurity shifts from network to human element

Meta expands Community Notes with user alerts

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.