Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

MIT Sloan: 80% of ransomware attacks use AI

AI tools accelerate malware creation, targeted phishing, and deepfake schemes, challenging traditional cybersecurity measures day by day.

byAytun Çelebi
September 11, 2025
in Cybersecurity, Artificial Intelligence
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A recent study by MIT Sloan and Safe Security shows a sharp increase in ransomware attacks using artificial intelligence (AI). Analyzing 2,800 ransomware incidents, researchers found that 80% of attacks now rely on AI, while only 20% remain non-AI-based.

Experts expect this proportion to rise further in 2025 as AI tools become more accessible to cybercriminals.

How AI is transforming ransomware attacks

AI is being used across several attack methods:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • Advanced malware creation – automating the creation of hard-to-detect ransomware.
  • Targeted phishing campaigns – AI crafts convincing messages tailored to individuals or organizations.
  • Deepfake-driven social engineering – realistic audio or video is used to trick employees, such as fake customer service calls.
  • LLM-assisted attacks – large language models help with password cracking, bypassing CAPTCHAs, and generating malicious code.

These AI-driven methods allow attackers to exploit weaknesses faster than traditional security measures, reshaping the threat environment.

The cybersecurity challenge

Michael Siegel, principal research scientist at CAMS, explains the inherent imbalance:

“The attacker only needs one point of entry, while the defender must secure all points.”

AI worsens this imbalance by accelerating attacks, making real-time detection and defense harder for IT teams.

Proactive strategies against AI ransomware

Experts suggest a layered, AI-informed defense strategy with three main pillars:

  • Automated security hygiene
    • Self-healing code and self-patching systems
    • Continuous monitoring and zero-trust architectures
    • Automated attack surface management
  • Autonomous and deceptive defense systems
    • Real-time analytics and machine learning to anticipate attacks
    • Moving-target defenses and decoy systems to confuse attackers
  • Augmented oversight and reporting
    • Executive dashboards with real-time intelligence on emerging threats
    • Data-driven decision-making to guide rapid response

As cybercriminals increasingly use AI, AI-powered ransomware attacks are expected to dominate in 2025. Organizations will need strong AI-driven defenses and ongoing monitoring to counter evolving threats.


Featured image credit

Tags: AICybersecurityFeatured

Related Posts

Samsung Bixby gains Perplexity AI search powers in new update

Samsung Bixby gains Perplexity AI search powers in new update

December 29, 2025
Google NotebookLM introduces “Lecture Mode” for 30-minute AI learning

Google NotebookLM introduces “Lecture Mode” for 30-minute AI learning

December 26, 2025
ChatGPT evolves into an office suite with new formatting blocks

ChatGPT evolves into an office suite with new formatting blocks

December 26, 2025
Alibaba’s Qwen Code v0.5.0 transforms terminal into a full dev ecosystem

Alibaba’s Qwen Code v0.5.0 transforms terminal into a full dev ecosystem

December 26, 2025
Google reveals “pill-shaped” button for persistent Gemini sessions

Google reveals “pill-shaped” button for persistent Gemini sessions

December 25, 2025
Pope Leo XIV prepares landmark “Magnifica Humanitas” encyclical on AI

Pope Leo XIV prepares landmark “Magnifica Humanitas” encyclical on AI

December 25, 2025

LATEST NEWS

Samsung Bixby gains Perplexity AI search powers in new update

Boomerang challenges WeTransfer with login-free file sharing

Netflix could lose over 100 original shows in 2026

Samsung TVs gain Google Photos integration ahead of CES 2026

Ubisoft shuts down Rainbow Six Siege X following 13 million dollar exploit

Police charge woman for killing pedestrian on TikTok live

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.