Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Why DIG AI is the most dangerous malicious AI of 2025

Resecurity reports a 200% surge in malicious AI tools as DIG AI gains massive traction during the 2025 holiday season.

byAytun Çelebi
December 23, 2025
in Research
Home Research
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Cybersecurity firm Resecurity (via Help Net Security) exposed DIG AI, an uncensored artificial intelligence assistant on the darknet that enables criminals to generate malware, create child sexual abuse material, and obtain detailed instructions for manufacturing explosives without safety restrictions. The tool operates via the Tor network.

Resecurity first detected DIG AI on September 29, 2025. The platform experienced a surge in adoption during the final quarter of 2025, particularly amid the winter holiday season when levels of illegal activity reached records. The creator, operating under the alias “Pitch,” presented DIG AI as a criminal alternative to mainstream artificial intelligence platforms. Access requires no account registration.

Resecurity’s report dated December 17 details the platform’s foundation on a jailbroken version of ChatGPT Turbo. It provides specialized models tailored to distinct functions. DIG-Uncensored handles generation of prohibited content. DIG-GPT processes text-based tasks. DIG-Vision supports creation of deepfakes and illicit imagery.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

This development aligns with a broader pattern in weaponized artificial intelligence. Resecurity recorded an increase exceeding 200 percent in mentions and use of malicious artificial intelligence tools across cybercriminal forums from 2024 to 2025. Such tools fall under the category of dark large language models, which consist of systems either constructed from scratch or derived from legitimate artificial intelligence with safety restrictions eliminated.

Predecessors in this category include FraudGPT and WormGPT. Resecurity analysts performed extensive testing on DIG AI. They verified its capacity to produce functional malicious code, such as obfuscated JavaScript backdoors intended to compromise web applications. Tasks like code obfuscation require three to five minutes owing to constrained computing resources.

Operators address these delays through premium services that charge fees, establishing a “Crime-as-a-Service” model. DIG AI also supports production of child sexual abuse material by generating hyper-realistic images. This occurs through entirely synthetic content or by altering benign images of real minors.

Resecurity collaborated with law enforcement authorities to gather and preserve evidence documenting threat actors’ use of the platform for highly realistic child sexual abuse material. The firm identified criminal artificial intelligence as presenting heightened threats prior to major global events in 2026, such as the Winter Olympics in Milan and the FIFA World Cup.

These tools allow bad actors to expand operations and circumvent content protection policies. Resecurity described the situation as a new frontier in which criminals develop and sustain custom infrastructure for artificial intelligence operations, terming it the “fifth domain of warfare: cyber.”


Featured image credit

Tags: AIDIG AI

Related Posts

Appfigures: Mobile app spending hits record 5.8 billion

Appfigures: Mobile app spending hits record $155.8 billion

January 15, 2026
Engineers build grasshopper-inspired robots to solve battery drain

Engineers build grasshopper-inspired robots to solve battery drain

January 14, 2026
Global memory chip shortage sends PC prices soaring

Global memory chip shortage sends PC prices soaring

January 12, 2026
63% of new AI models are now based on Chinese tech

63% of new AI models are now based on Chinese tech

January 12, 2026
Physics at -271°C: How the cold is heating up quantum computing

Physics at -271°C: How the cold is heating up quantum computing

January 8, 2026
Nature study projects 2B wearable health devices by 2050

Nature study projects 2B wearable health devices by 2050

January 7, 2026

LATEST NEWS

Apple secures Civilization VII for Arcade mobile and Mac subscribers

YouTube launches strict Shorts limits to curb teen screen addiction

Gemini gains Personal Intelligence to synthesize data from Gmail and Photos

Digg launches public open beta as toxicity-free Reddit rival

Netflix launches video podcasts starring Pete Davidson and Michael Irvin

Google integrates Gemini AI into redesigned Trends Explore page

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.