Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
Friday, April 10
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Industry Updates

AI Tools Promoted by Threat Actors: How Artificial Intelligence Is Fueling a New Era of Cybercrime

When intelligence turns against its creator — AI’s dark evolution in the world of cybercrime.
V DiwaharBy V DiwaharNovember 7, 2025Updated:March 24, 2026No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link
The dark corners of the internet are evolving and fast. In 2025, artificial intelligence (AI) isn’t just a tool for innovation; it’s also one of the most powerful weapons in the hands of cybercriminals that is AI tools
A recent report by Google’s Threat Intelligence Group (GTIG) reveals that AI-based hacking tools are being actively promoted in underground forums, transforming how cybercrime is executed. What used to require advanced technical skills can now be done by anyone with access to these AI-driven platforms.
Table of Contents hide
1 The Underground AI Boom
2 WormGPT — The Blackhat Pioneer
3 FraudGPT — The AI-as-a-Service Model
4 Xanthorox AI — The “Killer of WormGPT”
5 NYTHEON AI — The Rise of GenAI-as-a-Service
6 AI-Powered Phishing and Malware Development
7 The Subscription Economy of Cybercrime
8 A Dangerous Future
9 Final thoughts

The Underground AI Boom

According to cybersecurity researchers at KELA, discussions around AI-powered hacking tools increased by over 200% in 2024 — and the momentum has only grown through 2025. The surge marks a major shift in how hackers operate, with underground markets offering AI services designed to automate phishing, malware development, and social engineering.

Among the most popular tools in circulation are WormGPT, FraudGPT, Evil-GPT, Xanthorox AI, and NYTHEON AI — each crafted for a specific purpose in the cyberattack chain.

WormGPT — The Blackhat Pioneer

Launched in mid-2023, WormGPT quickly became infamous for its ability to create realistic phishing and BEC (Business Email Compromise) emails. Built on the GPT-J model, the tool was marketed as a “blackhat alternative” to ChatGPT, capable of crafting convincing corporate messages that easily slip past spam filters.

Subscriptions range from $100 per month to $5,000 for private access, making it accessible to a wide range of attackers. In several documented cases, WormGPT was used to impersonate executives and trick employees into authorizing fraudulent transactions — a new low in digital deception.

FraudGPT — The AI-as-a-Service Model

Following closely was FraudGPT, launched in July 2023 by the underground seller “CanadianKingpin12.” This AI tool offered a subscription model similar to legitimate SaaS platforms — $200 per month or $1,700 annually complete with customer support, tutorials, and premium feature tiers.

FraudGPT could generate malicious code, identify vulnerabilities, and even teach hacking methods. At higher tiers, users gained access to API integrations, image generation, and Discord connectivity. Its success marked the moment when cybercrime adopted the polished professionalism of the tech industry.

AI Tools Promoted by Threat Actors: How Artificial Intelligence Is Fueling a New Era of Cybercrime

Xanthorox AI — The “Killer of WormGPT”

By early 2025, new entrants like Xanthorox AI appeared, boasting modular design and enhanced stealth. Marketed as the “Killer of WormGPT,” Xanthorox runs entirely on private, self-hosted servers, making detection nearly impossible.

The platform offers a full range of capabilities, from phishing and deepfake generation to malware creation and vulnerability scanning. Its developers claim it delivers an all-in-one AI hacking environment — and unfortunately, that claim seems accurate.

NYTHEON AI — The Rise of GenAI-as-a-Service

NYTHEON AI represents another step forward — or backward, depending on perspective. Operated through the dark web and Telegram channels, NYTHEON combines several legitimate open-source AI models into a unified malicious framework.

It includes six specialized modules: Nytheon Coder (for generating malicious code), Nytheon Vision (for image recognition), and Nytheon R1 (for reasoning tasks). This modular structure offers hackers unprecedented flexibility and efficiency, resembling the AI capabilities used by ethical developers — but with criminal intent.

AI-Powered Phishing and Malware Development

Phishing remains the top weapon of choice among cybercriminals. Security analysts report a 1,265% surge in AI-generated phishing attacks, with many proving just as effective as those written by humans — but produced in seconds.

Tools such as WormGPT and MalwareGPT are also enabling polymorphic malware that continuously changes its code to evade detection. Google’s research identified five new malware families in 2025 using AI to rewrite their own code, rendering traditional antivirus systems less effective.

The Subscription Economy of Cybercrime

Underground AI developers are now copying the business strategies of legitimate software firms. They offer tiered pricing, free trials, customer support, and regular updates — transforming cybercrime into a fully operational economy.

Tools like Evil-GPT are sold for as little as $10, proving that advanced attack capabilities are now accessible to almost anyone with malicious intent.

A Dangerous Future

Authorities such as the FBI warn that AI has dramatically accelerated the pace and sophistication of cyberattacks. In early 2025, AI-assisted phishing made up more than 80% of global social engineering campaigns, a staggering indication of how deeply AI has infiltrated cybercrime.

Final thoughts

The rise of WormGPT, FraudGPT, Xanthorox AI, and NYTHEON AI signals a pivotal shift in cybersecurity. Artificial intelligence, once used to defend networks, is now equally effective in breaching them. As these underground markets mature, defenders must adapt quickly — deploying AI-driven defense strategies and real-time threat intelligence to stay ahead of this growing menace.

Follow Cyberinfos for daily updates on AI-driven threats, vulnerability reports, and digital defense strategies. 

Related posts:

  1. BitConnect’s Dirty Secrets: How India Tracked Down ₹1,646 Crore in Stolen Crypto
  2. Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams
  3. India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety
  4. Trump Cybersecurity Executive Order 2026 Explained
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticlePentest Copilot: AI-Powered Ethical Hacking Tool Redefining Penetration Testing
Next Article Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis

March 17, 2026
Read More

Trump Cybersecurity Executive Order 2026 Explained

March 9, 2026
Read More

UK Cyber Essentials Campaign Urges SMEs to Lock the Digital Door

February 17, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.