• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • GenAI Is Now Creating Malware Delivery Vehicles

    September 25, 2024 Alex Woodie

    As if the threat posed by human bad actors wasn’t enough to admins up at night, security professionals are now tasked with preparing defenses for AI actors, including malware created by generative AI. That’s the takeaway from a new report published this month by HP that documents GenAI-generated malware. IBM i security professionals should take note.

    The September 2024 edition of the HP Wolf Security Threat Insights Report brought some concerning news around GenAI. While the HP Wolf Security team had seen convincing phishing lures created by GenAI, it hadn’t seen any actual malicious code written by GenAI before.

    But that changed during the second quarter, when the HP Threat Research team identified a malware campaign spreading AsyncRAT using VBScript and JavaScript. AsyncRAT is an open-source remote access Trojan (RAT) project used for controlling victims’ computers. Because AsyncRAT is easily obtainable, all the malicious actor needs to do is develop an “infection chain to deliver and install the malware,” the HP Wolf Security research team explains.

    And it would appear that GenAI is now helping create that infection chain, according the researchers, who began their investigation after discovering a malicious email attachment sent to a French user. Once they decrypted the file (expertly encrypted with AES) using a brute-force password attack, the researchers were surprised to discover that the VBScript and JavaScript inside was not only un-obfuscated, but the developer had left copious comments throughout the code. (And you thought it was hard to get legitimate developers to document their work.)

    Security researchers say this malicious code bears the telltale signs of GenAI.

    “Based on the scripts’ structure, consistent comments for each function and the choice of function names and variables, we think it’s highly likely that the attacker used GenAI to develop these scripts,” the researchers write. “The activity shows how GenAI is accelerating attacks and lowering the bar for cybercriminals to infect endpoints.”

    This appears to be the first documented case of GenAI being used to help spread malware in the wild (although researchers at Hyas had used GenAI to create malware called BlackMamba to bypass an EDR as an experiment back in 2023). Considering the widespread success that vendors like IBM are having with GenAI co-pilots to help with rote code-understanding and coding tasks, it was likely just a matter of time before someone used the tech for malicious ends rather than maintaining old COBOL code or whipping up some quick SQL.

    GenAI seems destined to change the nature of the cybersecurity business permanently. For bad actors, the tech gives them a powerful tool to do things like craft realistic-looking phishing lures (emails, texts, etc.), create malicious bots that impersonate real humans, and build malicious co-pilots that develop tools for distributing malware.

    The good news is security pros also get to use GenAI for things like combing through vast amounts of information to find anomalies that could indicate a security problem or functioning as a lower-level assistant to help with coding or administrative tasks.

    The cat-and-mouse game in the cybersecurity business will never end, and thanks to GenAI, it’s likely to get more interesting. Security pros working on all platforms, including the IBM i, should keep an eye on the development of GenAI-generated malware.

    The risk for IBM i shops, who have benefited from “security through obscurity” for years, may increase if the bad guys are forced to go after tougher, more obscure targets once the low-hanging fruit is eaten thanks to GenAI making it easier to pull off a ransomware attack. Considering how poorly many IBM i servers are configured, and the number of newly discovered security vulnerabilities in IBM i, that’s a scary proposition.

    RELATED STORIES

    Ethical Hackers Discuss Penetration Work On IBM i

    Summer of IBM i Vulnerabilities

    April Showers Bring May IBM i Security Vulnerabilities

    IBM i Security Concern Hits All-Time High, But Solution Adoption Lags, Fortra’s Marketplace Study Shows

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: AI, AsyncRAT, cybersecurity, GenAI, IBM i, JavaScript, Malware, VBScript

    Sponsored by
    FalconStor

    Simplify Secure Offsite Data Protection for IBM Power with FalconStor Habanero™

    IBM i teams are under growing pressure to ensure data is protected, recoverable, and compliant—without adding complexity or disrupting stable environments.

    FalconStor Habanero™ provides secure, fully managed offsite data protection purpose-built for IBM Power. It integrates directly with existing IBM i backup tools and processes, enabling reliable offsite copies without new infrastructure, workflow changes, or added operational overhead.

    By delivering and managing the service end-to-end, FalconStor helps organizations strengthen cyber resilience, improve disaster recovery readiness, and meet compliance requirements with confidence. Offsite copies are securely maintained and available when needed, supporting recovery, audits, and business continuity.

    FalconStor Habanero offers a straightforward way to modernize offsite data protection for IBM i: focused on simplicity, reliability, and resilience.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, September 25 Shield Revs HA Software for IBM i

    Leave a Reply Cancel reply

TFH Volume: 34 Issue: 47

This Issue Sponsored By

  • Maxava
  • New Generation Software
  • Manta Technologies
  • WorksRight Software
  • Raz-Lee Security

Table of Contents

  • Inside Avatier’s Goals to Modernize Identity Management
  • Shield Revs HA Software for IBM i
  • GenAI Is Now Creating Malware Delivery Vehicles
  • Four Hundred Monitor, September 25
  • IBM Is Running Out Of DDR4 Memory Faster Than It Thought

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • 2025: An IBM i Year In Review
  • A Tale Of Two Server Markets
  • Guru: CRTSRVPGM Parameters That Can Save or Sink You
  • As I See It: What’s Past is Prologue
  • IBM i PTF Guide, Volume 27, Numbers 49 Through 52
  • Learning And Laughing With Scott Forstie And Tim Rowe
  • IBM’s CEO Says GenAI Is Great For Enterprise, But It Will Not Be AGI
  • Guru: A First Look at Bob, The IBM i Assistant That’s Closer Than You Think
  • Happy Holidays To All Of You From All Of Us
  • IBM i PTF Guide, Volume 27, Number 48

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle