Ransomware hackers used AI images, Microsoft flaw in campaign


The Exotic Lily group sent over 5,000 malicious emails a day, Google observed, to as many as 650 organisations around the world, often leveraging a flaw in MSHTML, a proprietary browser engine for Windows. — Identity theft photo created by standret - www.freepik.com

A group of ransomware hackers used a variety of techniques to try breaching hundreds of companies last year, exploiting a vulnerability in Microsoft Corp’s Windows and using artificial intelligence technology to create fake LinkedIn profiles, Alphabet Inc’s Google found.

The group, which Google refers to as Exotic Lily in research published March 17, is known as an initial access broker. Such groups specialise at breaking into corporate computer networks, and then providing that access to other cybercriminal syndicates that deploy malware that locks computers and demands a ransom.

Play, subscribe and stand a chance to win prizes worth over RM39,000! T&C applies.

Monthly Plan

RM 13.90/month

RM 11.12/month

Billed as RM 11.12 for the 1st month, RM 13.90 thereafter.

Best Value

Annual Plan

RM 12.33/month

RM 9.87/month

Billed as RM 118.40 for the 1st year, RM 148 thereafter.

Follow us on our official WhatsApp channel for breaking news alerts and key updates!
Ransomware

Next In Tech News

‘Life Is Strange: Reunion’ finally arrives this week
VW's software partnership with Rivian clears investment hurdle
Nearly half a million customers hit by Lloyds IT glitch that exposed transaction data, committee says
Apple plans to open up Siri to rival AI assistants in iOS 27 update
Australia court fines Binance unit $6.9 million over client onboarding failures
Apple discontinues Mac Pro Desktop in favour of the Mac Studio
Verdicts against Meta, YouTube validate concerns long raised by parents, child safety advocates
EU rules to tackle child sex abuse online to lapse
ChatGPT's taste for literary nonsense sparks alarm
One Tech Tip: Here's how AI can (and can't) help you in your job hunt

Others Also Read