Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Research shows LLMs can conduct sophisticated attacks without humans

By CIO Dive by By CIO Dive
July 30, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Carnegie Mellon University researchers have demonstrated that large language models can autonomously plan and carry out sophisticated cyberattacks without human intervention.

The research, conducted in partnership with artificial intelligence firm Anthropic, showed that AI could replicate the 2017 cyberattack on Equifax by autonomously exploiting vulnerabilities, installing malware and stealing data.

The Equifax breach compromised approximately 147 million customers’ data, making it one of the largest data breaches in U.S. history. 

Researchers from Carnegie Mellon and Anthropic developed an attack toolkit called Incalmo that they used to translate the strategy behind the Equifax breach into specific system commands used to carry out the attacks. 

Brian Singer, the lead researcher and a PhD candidate at Carnegie Mellon’s Department of Electrical and Computer Engineering, said the goal was to measure LLMs’ ability to autonomously plan an attack without the need for human assistance.

“It is unclear how well Incalmo generalizes to other networks. However, in the research paper, we evaluated Incalmo in 10 small enterprise environments,” Singer told Cybersecurity Dive via email. “In 9 out of 10 of them, LLMs were able to autonomously partially succeed in the attacks (e.g., exfiltrate some sensitive data).”

The LLM provided high-level strategic guidance for the attack, while a combination of LLM and non-LLM agents handled lower-level tasks such as scanning and deploying exploits, according to the researchers. 

Anthropic said in June that LLMs had fully compromised five of 10 test networks and partially compromised four other networks. One of the models used in those tests was the 2021 Colonial Pipeline ransomware attack, which disrupted fuel supplies for nearly a week.

The Equifax breach was chosen for simulation due to the large amount of public information about how it was carried out. 

Asked if modern defenses are capable of stopping such an autonomous attack, Singer said it is currently unclear how well modern defenses would hold up. He said his biggest concern was about how quickly and inexpensively someone could orchestrate such an attack. 

“Currently, a lot of cybersecurity defenses rely on human operators and I am not sure how well that will scale up to machine-timescale defenses,” Singer said. “For this reason, we are currently exploring research into defenses for autonomous attacks and LLM-based autonomous defenders.”



Source link

By CIO Dive

By CIO Dive

Next Post
Data-as-a-Product Approach Improves Value Delivery for Organizations, Says Info-Tech Research Group

Data-as-a-Product Approach Improves Value Delivery for Organizations, Says Info-Tech Research Group

Recommended.

Wall Street trading desks are feasting on the volatility from Trump’s global upheavals

Wall Street trading desks are feasting on the volatility from Trump’s global upheavals

April 16, 2025
Schoolyard Social Launches App That Turns Competition Into Community

Schoolyard Social Launches App That Turns Competition Into Community

October 29, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio