Cybersecurity 2025: Deepfakes, AI-assisted phishing, fraud

Cybersecurity 2025: Deepfakes, AI-powered phishing, fraud Image: Bing - AI
Advertising

Share post

Trend Micro experts warn of an era of hyper-personalized cyberattacks and identity theft in 2025. In their security predictions for the new year, the experts warn of highly individualized, AI-powered fraud, phishing and influence campaigns.

The report on 2025 predictions, "The Easy Way In/Out: Securing The Artificial Future," specifically warns of the potential of malicious "digital twins," which use stolen or leaked personal information to train a Large Language Model (LLM) that mimics the victim's knowledge, personality, and writing style. Combined with fake video and audio files and compromised biometric data, such LLMs can be abused to spoof identities and lure the victim's friends, colleagues, or family members into a scam.

Advertising

AI creates almost perfect deepfakes

Deepfakes and AI can also be used in large-scale, hyper-personalized attacks to:

  • To scale fraud schemes such as “business email compromise”, “business process compromise” and the infiltration of fake employees.
  • To specifically identify and address victims of “pig butchering” – online relationship and investment fraud – before a human contact deepens the deception.
  • to facilitate information gathering using open source intelligence for threat actors.
  • to improve the development of skills in preparing for a cyber attack and thus achieve more successful attacks.
  • to create authentic-looking social media identities that are used for online fraud and to spread misinformation and disinformation.

How used AI can become a danger

Companies that are increasing their use of AI this year should keep an eye on the following threats:

Advertising
  • Exploiting vulnerabilities and manipulating AI agents to perform malicious or prohibited actions
  • Unintentional leakage of information from generative AI (Gen AI) systems
  • Waste of resources due to faulty or misused AI agents, which can lead to service interruptions

"As generative AI becomes more widely used in businesses and society, we must prepare for the risks associated with it," said Jon Clay, Vice President of Threat Intelligence at Trend Micro. "Hyper-personalized attacks and the manipulation of AI agents require an industry-wide effort. Business leaders should remember that there is no longer an isolated cyber risk. Every security risk is ultimately a business risk and can have a profound impact on companies' future strategy."

Outside the AI ​​Threat Landscape

The report also highlights other areas that are at risk in 2025. These include:

vulnerability

  • Memory management errors, memory corruption bugs, vulnerability chains, and exploits targeting APIs
  • Increased container breakouts
  • Older vulnerabilities such as cross-site scripting (XSS) and SQL injections
  • The possibility that a single vulnerability in a widely used system affects multiple models and manufacturers, for example in connected vehicles

Ransomware

Threat actors are increasingly developing strategies to evade Endpoint Detection & Response (EDR) tools, such as:

  • Kill chains that use environments where EDR tools are usually not installed (e.g. cloud systems or mobile, edge and IoT devices)
  • Disabling antivirus / EDR systems
  • Bring Your Own Vulnerable Driver (BYOVD) techniques
  • Hiding shellcodes in inconspicuous loaders
  • Redirects in Windows subsystems to bypass EDR/AV detection

As a result, they can carry out faster attacks with fewer steps that are harder to detect.

It's time to act

Trend Micro security experts recommend that companies act proactively and adapt their cybersecurity strategies:

  • Risk-based approach: Central identification, prioritization and mitigation of risks across the entire IT environment
  • AI as defense: Using AI to analyze threat data, vulnerable systems, attack path prediction, and defenses – ideally through a unified platform.
  • Employee training: Raise awareness of the advances and risks of AI.
  • Monitoring and securing AI systems: Protection against misuse through strict validation processes for input and output
  • protection of LLMs through hardened sandbox environments, strict data validation and multi-layered security measures against prompt injections.
  • Supply chain security: Fix vulnerabilities in publicly accessible systems and better protect internal networks through multi-layered security measures.
  • Consistent visibility: Comprehensively monitor AI agents.
  • implementation of attack path predictionsto combat cloud threats.
More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Programmer cracks Akira ransomware!

The Akira ransomware has attacked numerous companies worldwide, encrypting their data and extorting large amounts of ransom. Now an Indonesian programmer has ➡ Read more

Zero-Trust Architecture – Opportunities & Risks

Trust is good, control is better: The Zero Trust architecture turns traditional security models on their head by checking every access – ➡ Read more

25 years with numerous cybersecurity challenges

As we approached the year 2000, the IT and business world looked with concern at the infamous “Y2K bug” – a ➡ Read more

DeceptiveDevelopment: Attack on software developers

With the "DeceptiveDevelopment" campaign, cybercriminals are targeting software developers looking for jobs. Together with a test to prove their ➡ Read more

AI poses growing challenges for data protection in 2025

With the introduction of generative AI in many companies, the amount of data that needs to be protected has increased by 2024. ➡ Read more

Threats in the European retail sector

In 2024, business services were the most frequently attacked sector in the retail sector, followed by retail and manufacturing. In France, Germany, and Italy ➡ Read more

These are the most important security vulnerabilities and attack techniques

The number of reported security vulnerabilities increased by 2024 percent in 38. With the increasing dependence on software systems, the ➡ Read more

Real-time deepfakes: The new dimension of cyberattacks

Artificial intelligence will also determine cybersecurity in 2025. One of the fields in which it has been used for some time is ➡ Read more