G2 Logo

The Rise of AI Abuse:
A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

Table of contents

  • Introduction
  • Early AI Abuse
  • The Rise of "Dark AI"
  • Underground Evolution
  • Deepfakes and Social Engineering
  • AI-Powered Malware
  • Targeting the AI Ecosystem
  • Computer Using Agents
  • AI Sleeper Agents
  • Conclusion
AI Risk
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

20 October 202510 min read
Share:

Recommended for you

[object Object]

Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats

In April 2025, large retailers were targeted by cyber attacks that caused disruption across their services. Although att...

[object Object]

A January Snapshot: Real-World AI Usage

This snapshot from CultureAI’s January usage data highlights how AI is actually being used across everyday workflows, an...

[object Object]

The Offensive Potential of Computer-Using Agents

Computer-Using Agents (CUAs), while intended to increase productivity, can be repurposed by threat actors for malicious...