Hive0163, a financially motivated threat actor, has been utilizing AI-assisted Slopoly malware to establish persistent access in ransomware attacks, as reported by IBM X-Force researchers1. This group specializes in post-compromise activity, leveraging custom backdoors for prolonged access, data exfiltration, and ransomware deployment. The use of AI-assisted malware enables Hive0163 to rapidly develop new frameworks, posing a significant threat to operational resilience. The fact that IBM, a prominent technology company, is being targeted highlights the sector-specific risk associated with ransomware attacks. This campaign demonstrates the evolving nature of threat actors, who are increasingly leveraging AI-powered tools to enhance their malicious activities. The implications of this are far-reaching, and practitioners must prioritize operational resilience planning to mitigate the risks associated with such sophisticated attacks.
AI-assisted Slopoly malware powers Hive0163’s ransomware campaigns
⚡ High Priority
Why This Matters
Ransomware targeting IBM highlights sector-specific risk — operational resilience planning is the real takeaway.
References
- SecurityAffairs. (2026, March 13). AI-assisted Slopoly malware powers Hive0163’s ransomware campaigns. SecurityAffairs. https://securityaffairs.com/189378/malware/ai-assisted-slopoly-malware-powers-hive0163s-ransomware-campaigns.html
Original Source
SecurityAffairs
Read original →