AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Plummets to 24-48 Hours

Published:

spot_img

AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Plummets to 24-48 Hours

The landscape of cybercrime has evolved dramatically, with industrialized methods now enabling attacks that are faster, larger in scale, and more successful than ever before. As cybercriminals increasingly leverage artificial intelligence (AI) and automation, defenders must adopt similar technologies to keep pace with these evolving threats.

The industrialization of cybercrime traces its roots back to the 1990s, when criminal activities began to mirror the operational efficiencies of legitimate businesses. This shift has transformed cybercrime into a structured enterprise, where efficiency is paramount. Today, cybercriminals utilize AI, automation, and streamlined data sharing to maximize their returns while minimizing effort.

FortiGuard has conducted an extensive analysis of the current threat landscape, utilizing telemetry from millions of sensors deployed globally since 2002. This analysis encompasses data collected in 2025, providing insights across various security domains and vectors of compromise.

AI Speeds the Attack Process

Derek Manky, Chief Security Strategist at FortiGuard Labs, highlights that the latest Global Threat Landscape Report indicates a significant shift in how malicious actors are employing agentic AI to execute more sophisticated attacks.

Cybercriminals now have access to a variety of AI-enabled tools, including WormGPT, FraudGPT, HexStrike AI, APEX AI, and BruteForceAI. These tools serve as force multipliers, reducing the skill and time needed for attacks, allowing perpetrators to operate at unprecedented speeds.

FraudGPT and WormGPT are particularly effective in crafting convincing phishing attacks. By circumventing traditional security measures, these tools enable attackers to refine their scams, generate malicious code, and conduct large-scale social engineering campaigns.

HexStrike AI facilitates automated reconnaissance, attack-path generation, and malicious content creation. Meanwhile, APEX AI simulates advanced persistent threat (APT) attacks, incorporating automated open-source intelligence (OSINT), attack chaining, and kill-chain generation to model comprehensive compromise paths.

BruteForceAI functions as a penetration testing tool, identifying login form selectors and executing multi-threaded attacks that mimic human behavior patterns.

The deployment of these malicious tools does not introduce new vulnerabilities; rather, they expedite the exploitation of existing ones, contributing to a significant collapse in predictive security.

Automation Finds the Vulnerabilities

The identification of vulnerabilities is increasingly automated through global scanning using standard commercial tools. Solutions like Qualys are employed to detect vulnerable software versions and misconfigurations, while Nmap is utilized for port scanning and service fingerprinting. Nessus and OpenVAS further enrich vulnerability assessments.

Data Sharing Fine-Tunes the Cybercrime Business

Access to targets is often readily available on underground markets. FortiGuard reports that databases, credentials, validated access paths, and attacker tools are continuously advertised and exchanged, creating an upstream supply chain that supports downstream intrusion activities.

This data is primarily harvested through infostealers like RedLine, Lumma, and Vidar. Access brokers then sell validated access to enterprises, with corporate VPNs and Remote Desktop Protocol (RDP) being the most frequently advertised access types.

The cybercriminal ecosystem is further bolstered by extensive discussions among operatives. FortiGuard notes that 656 vulnerabilities were actively discussed on the darknet in 2025. Among these, 344 (52.44%) had publicly available proof-of-concept (PoC) exploit code, while 176 (26.83%) had working exploit code, and 149 (22.71%) featured both PoC and operational exploit code.

The report warns that Common Vulnerabilities and Exposures (CVEs) become “industrial” when packaged with scripts, modules, guides, proof code, and operational playbooks, allowing exploitation to occur in a repeatable manner rather than as a one-off intrusion.

The Effect of This Industrialization of Cybercrime

One of the most significant impacts of this new cybercrime paradigm is the drastic reduction in time-to-exploit. Previously, the average time-to-exploit for critical vulnerabilities was nearly a week. This window has now shrunk to 24 to 48 hours, with some exploits occurring within hours of public disclosure.

Douglas Santos, director of advanced threat intelligence at FortiGuard, emphasizes that the trajectory is clear: as AI accelerates reconnaissance, weaponization, and execution, it is only a matter of time before exploitation occurs in “hours or even minutes, not days.” Early signs of this trend are already evident.

Ransomware continues to be the most alarming attack vector, offering the highest potential for monetization. In 2025, there were 7,831 confirmed ransomware victims globally. The most active ransomware groups included Qilin, Akira, and Safepay, with the United States, Canada, and Europe being the most targeted regions.

FortiGuard asserts that the global attack surface is continuously mapped, refreshed, and maintained in a state of operational readiness.

Defending Against Industrialized Cybercrime

The efficiency of the cybercrime sector has significantly increased the speed, scale, and success of attacks. Consequently, defense mechanisms must also evolve, particularly in terms of detection and response speed. The rapid pace of adversarial AI and automation necessitates the implementation of defensive AI and automation.

FortiGuard recommends prioritizing identity-centric detection, exposure reduction, and automation to match the operational tempo of attackers.

In its commitment to combat industrial cybercrime, FortiGuard has engaged in several international disruption efforts over the past year. These initiatives include INTERPOL’s Serengeti 2.0 and Operation Red Card 2.0, the Cybercrime Atlas initiative in collaboration with the World Economic Forum, partnerships with cybersecurity peers through the Cyber Threat Alliance, and a new Cybercrime Bounty program launched in conjunction with Crime Stoppers International.

Source: www.securityweek.com

Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Dubai Police Strengthen Global Fight Against Fraud, Arrest 276 in Major International Operation

Dubai Police Strengthen Global Fight Against Fraud, Arrest 276 in Major International Operation In a significant international enforcement initiative, Operation Tri-Force Sentinel, spearheaded by Dubai...

Symbolic Developments Boosts Homeownership with Jetour T2 SUV Offer for May Buyers of Zen Residences

Symbolic Developments Boosts Homeownership with Jetour T2 SUV Offer for May Buyers of Zen Residences In a strategic move to enhance the homebuying experience, Symbolic...

PyTorch Lightning and Intercom-client Compromised in Supply Chain Attacks Targeting Credential Theft

PyTorch Lightning and Intercom-client Compromised in Supply Chain Attacks Targeting Credential Theft In a significant cybersecurity breach, threat actors have compromised the widely used Python...

Event Security in the Middle East Advances Amidst Complex Challenges and Growing Global Demand

Event Security in the Middle East Advances Amidst Complex Challenges and Growing Global Demand In recent decades, the United Arab Emirates (UAE) and the broader...