Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users
  • Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw
  • Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)
  • Top 10 Cybersecurity Resolutions Every User Should Make in 2026
  • New Year, New Threats: Emerging Malware Families to Watch in 2026
  • Cybersecurity Weekly Report: Multiple Security Breakdowns Close Out 2025
  • WIRED Data Breach Exposes 2.3 Million Subscriber Records | Full Incident Analysis
  • Data Breaches 2025: The 10 Biggest Incidents and Lessons Learned
Friday, January 9
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber news

AI Tools Promoted by Threat Actors: How Artificial Intelligence Is Fueling a New Era of Cybercrime

When intelligence turns against its creator — AI’s dark evolution in the world of cybercrime.
Cyber infosBy Cyber infosNovember 7, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link
The dark corners of the internet are evolving and fast. In 2025, artificial intelligence (AI) isn’t just a tool for innovation; it’s also one of the most powerful weapons in the hands of cybercriminals that is AI tools
A recent report by Google’s Threat Intelligence Group (GTIG) reveals that AI-based hacking tools are being actively promoted in underground forums, transforming how cybercrime is executed. What used to require advanced technical skills can now be done by anyone with access to these AI-driven platforms.
Table of Contents hide
1 The Underground AI Boom
2 WormGPT — The Blackhat Pioneer
3 FraudGPT — The AI-as-a-Service Model
4 Xanthorox AI — The “Killer of WormGPT”
5 NYTHEON AI — The Rise of GenAI-as-a-Service
6 AI-Powered Phishing and Malware Development
7 The Subscription Economy of Cybercrime
8 A Dangerous Future
9 Final thoughts

The Underground AI Boom

According to cybersecurity researchers at KELA, discussions around AI-powered hacking tools increased by over 200% in 2024 — and the momentum has only grown through 2025. The surge marks a major shift in how hackers operate, with underground markets offering AI services designed to automate phishing, malware development, and social engineering.

Among the most popular tools in circulation are WormGPT, FraudGPT, Evil-GPT, Xanthorox AI, and NYTHEON AI — each crafted for a specific purpose in the cyberattack chain.

WormGPT — The Blackhat Pioneer

Launched in mid-2023, WormGPT quickly became infamous for its ability to create realistic phishing and BEC (Business Email Compromise) emails. Built on the GPT-J model, the tool was marketed as a “blackhat alternative” to ChatGPT, capable of crafting convincing corporate messages that easily slip past spam filters.

Subscriptions range from $100 per month to $5,000 for private access, making it accessible to a wide range of attackers. In several documented cases, WormGPT was used to impersonate executives and trick employees into authorizing fraudulent transactions — a new low in digital deception.

FraudGPT — The AI-as-a-Service Model

Following closely was FraudGPT, launched in July 2023 by the underground seller “CanadianKingpin12.” This AI tool offered a subscription model similar to legitimate SaaS platforms — $200 per month or $1,700 annually complete with customer support, tutorials, and premium feature tiers.

FraudGPT could generate malicious code, identify vulnerabilities, and even teach hacking methods. At higher tiers, users gained access to API integrations, image generation, and Discord connectivity. Its success marked the moment when cybercrime adopted the polished professionalism of the tech industry.

AI Tools Promoted by Threat Actors: How Artificial Intelligence Is Fueling a New Era of Cybercrime

Xanthorox AI — The “Killer of WormGPT”

By early 2025, new entrants like Xanthorox AI appeared, boasting modular design and enhanced stealth. Marketed as the “Killer of WormGPT,” Xanthorox runs entirely on private, self-hosted servers, making detection nearly impossible.

The platform offers a full range of capabilities, from phishing and deepfake generation to malware creation and vulnerability scanning. Its developers claim it delivers an all-in-one AI hacking environment — and unfortunately, that claim seems accurate.

NYTHEON AI — The Rise of GenAI-as-a-Service

NYTHEON AI represents another step forward — or backward, depending on perspective. Operated through the dark web and Telegram channels, NYTHEON combines several legitimate open-source AI models into a unified malicious framework.

It includes six specialized modules: Nytheon Coder (for generating malicious code), Nytheon Vision (for image recognition), and Nytheon R1 (for reasoning tasks). This modular structure offers hackers unprecedented flexibility and efficiency, resembling the AI capabilities used by ethical developers — but with criminal intent.

AI-Powered Phishing and Malware Development

Phishing remains the top weapon of choice among cybercriminals. Security analysts report a 1,265% surge in AI-generated phishing attacks, with many proving just as effective as those written by humans — but produced in seconds.

Tools such as WormGPT and MalwareGPT are also enabling polymorphic malware that continuously changes its code to evade detection. Google’s research identified five new malware families in 2025 using AI to rewrite their own code, rendering traditional antivirus systems less effective.

The Subscription Economy of Cybercrime

Underground AI developers are now copying the business strategies of legitimate software firms. They offer tiered pricing, free trials, customer support, and regular updates — transforming cybercrime into a fully operational economy.

Tools like Evil-GPT are sold for as little as $10, proving that advanced attack capabilities are now accessible to almost anyone with malicious intent.

A Dangerous Future

Authorities such as the FBI warn that AI has dramatically accelerated the pace and sophistication of cyberattacks. In early 2025, AI-assisted phishing made up more than 80% of global social engineering campaigns, a staggering indication of how deeply AI has infiltrated cybercrime.

Final thoughts

The rise of WormGPT, FraudGPT, Xanthorox AI, and NYTHEON AI signals a pivotal shift in cybersecurity. Artificial intelligence, once used to defend networks, is now equally effective in breaching them. As these underground markets mature, defenders must adapt quickly — deploying AI-driven defense strategies and real-time threat intelligence to stay ahead of this growing menace.

Follow Cyberinfos for daily updates on AI-driven threats, vulnerability reports, and digital defense strategies. 

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticlePentest Copilot: AI-Powered Ethical Hacking Tool Redefining Penetration Testing
Next Article Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams
Cyber infos
  • Website

Related Posts

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026
Read More

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026
Read More

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026

Google Ends Dark Web Scanning in 2026 – How to Protect Your Data Now

December 17, 2025

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

New Year, New Threats: Emerging Malware Families to Watch in 2026

December 31, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.