Are Hackers Already Weaponizing AI? Inside the ZeroFOX Experiment

A recent ZeroFOX experiment showed an AI system sending malicious tweets far faster than humans, prompting Elon Musk to highlight the growing threat of AI‑driven hacking, while security experts at Black Hat predict widespread AI weaponization in the near future.

ITPUB
ITPUB
ITPUB
Are Hackers Already Weaponizing AI? Inside the ZeroFOX Experiment

AI‑driven phishing experiment

In a 2022 study conducted by ZeroFOX data scientists, the effectiveness of an AI system (named SNAP_R) was compared with human operators for delivering phishing tweets on Twitter.

Methodology

Target pool: more than 800 Twitter accounts selected as potential victims.

AI approach: SNAP_R generated phishing messages autonomously, posting at a rate of 6.75 tweets per minute.

Human approach: participants manually crafted and posted phishing tweets at 1.075 tweets per minute.

Success metric: number of users who clicked the malicious link.

Results

AI: 6.75 tweets/min → 275 compromised users out of the target pool.

Humans: 1.075 tweets/min → 49 compromised users from 129 attempts.

The experiment demonstrates that AI can scale phishing campaigns by an order of magnitude while achieving a higher compromise rate.

Industry perception of AI‑enabled attacks

At the Black Hat security conference, a survey of attendees asked whether they expect hackers to employ AI within the next year. Sixty‑two percent answered affirmatively, indicating a strong consensus that AI will become a mainstream tool for malicious actors.

Expert commentary

Brian Wallace, senior scientist at Cylance, explained that AI and machine learning address the “scale problem” for attackers: they enable automated selection of targets, timing, and payload generation while minimizing the attacker’s exposure.

Implications

The findings suggest that defensive strategies must account for high‑throughput, AI‑generated phishing content, and that detection systems need to operate at comparable speed and adaptability.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

artificial intelligencephishingBlack HatAI ThreatsZeroFOX
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.