AI ransomware, hiring fraud and the end of Scattered Lapsus$ Hunters

The IBM Security Intelligence podcast discusses the likely strategic pause of the hacker group Scattered Lapsus$ Hunters, the emerging but nascent threat of AI-powered ransomware like PromptLock, and the risks posed by software supply chain attacks and business identity compromise fueled by AI-generated fraud. The experts emphasize the need for ethical research, enhanced verification, continuous monitoring, and leveraging attacker mistakes to strengthen cybersecurity defenses amid evolving threats.

The podcast episode from IBM Security Intelligence covers several pressing cybersecurity topics with insights from experts Michelle Alvarez, Sridhar Ramaswamy, and Dave Bales. The discussion begins with the apparent disbanding of the hacker group Scattered Lapsus$ Hunters. Despite their announcement to go dark, the panelists express skepticism, suggesting this is likely a strategic pause rather than a permanent end. They highlight the group’s framing of their actions as a “war on power,” which the experts view as a psychological justification rather than a genuine motive. The consensus is that the group may be regrouping to launch more sophisticated attacks in the near future.

Next, the conversation shifts to AI-powered ransomware, specifically the proof-of-concept malware called PromptLock developed by researchers at NYU. This ransomware uses large language models to autonomously conduct attacks, including reconnaissance and payload generation. While the technology is impressive, the panel agrees that AI malware is still in its infancy and not an immediate widespread threat. However, they emphasize the importance of responsible disclosure and ethical research practices to ensure defenses can keep pace with evolving threats. The debate touches on the risks of publicly releasing such proof-of-concept tools, as they can be exploited by malicious actors.

The episode then examines a significant software supply chain attack where a single phishing email compromised 20 npm packages, collectively downloaded billions of times weekly. This breach highlights the vulnerabilities inherent in open-source software ecosystems and the risks posed by third-party dependencies. The experts stress the need for better transparency, such as software bills of materials, continuous verification, and anomaly detection to mitigate these risks. They also discuss the evolving sophistication of social engineering attacks, noting that even experienced developers can fall victim, underscoring the ongoing importance of user education and awareness.

Further, the panel explores the growing threat of business identity compromise (BIC), or hiring fraud, where attackers use AI-generated resumes, headshots, and even deepfake videos to secure remote jobs and gain insider access. The rise of remote work, accelerated hiring processes, and advanced AI tools have created a perfect storm for this type of fraud. The experts recommend a combination of people, processes, and technology to combat BIC, including enhanced verification methods like liveness tests and continuous monitoring to detect anomalous behavior within organizations.

Finally, the episode shares a lighter story about a cybercriminal who inadvertently installed Huntress EDR (Endpoint Detection and Response) on their own device, allowing security professionals to observe their activities in real-time. This incident serves as a reminder that attackers can make operational mistakes, providing defenders with valuable intelligence. The panelists appreciate the opportunity to gain insights into attacker tactics and emphasize the human element in cybersecurity, where errors and oversights can be leveraged to improve defenses. The episode closes with a call for continued vigilance and collaboration in the cybersecurity community.