{"id":252,"date":"2026-03-12T19:59:52","date_gmt":"2026-03-12T19:59:52","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=252"},"modified":"2026-03-12T19:59:52","modified_gmt":"2026-03-12T19:59:52","slug":"hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=252","title":{"rendered":"Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Mar 12, 2026<\/span><\/span><span class=\"p-tags\">Artificial Intelligence \/ Malware<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAvQYbgT2Bzyhv6lldqV781Ec5C2EKl2Y-ezdEDwakAZnizcub5ZIyJxZKg-fouq4L04gr_sNDHb5JPVhoOYYRKLnzo_TQqAiOFCPycF2EfjVA2wpA3ak9ZgfUFXCi_O9Pwx2GdtCDo3u6PFlheeR9IC2OMfGF5XZ8Cr-53uP01xsQxEGDQ8AO3rbvka8e\/s1700-e365\/ransomware-ai.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed <strong>Slopoly<\/strong> put to use by a financially motivated threat actor named <strong>Hive0163<\/strong>.<\/p>\n<p>\u00abAlthough still relatively unspectacular, AI-generated malware such as Slopoly shows how easily threat actors can weaponize AI to develop new malware frameworks in a fraction of the time it used to take,\u00bb IBM X-Force researcher Golo M\u00fchr <a href=\"https:\/\/www.ibm.com\/think\/x-force\/slopoly-start-ai-enhanced-ransomware-attacks\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report shared with The Hacker News.<\/p>\n<p>Hive0163&#8217;s operations are driven by extortion through large-scale data exfiltration and ransomware. The e-crime group is primarily associated with a wide range of malicious tools, including NodeSnake, Interlock RAT, JunkFiction loader, and Interlock ransomware.<\/p>\n<p>In one ransomware attack observed by the company in early 2026, the threat actor was observed deploying Slopoly during the post-exploitation phase so as to maintain persistent access to the compromised server for more than a week.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Slopoly&#8217;s discovery can be traced back to a PowerShell script that&#8217;s likely deployed by means of a builder, which also established persistence via a scheduled task called \u00abRuntime Broker.\u00bb<\/p>\n<p>There are signs that the malware was developed with the help of an as-yet-undetermined large language model (LLM). This includes the presence of extensive comments, logging, error handling, and accurately named variables. The comments also describe the script as a \u00abPolymorphic C2 Persistence Client,\u00bb indicating that it&#8217;s part of a command-and-control (C2) framework.<\/p>\n<p>\u00abHowever, the script does not possess any advanced techniques and can hardly be considered polymorphic, since it&#8217;s unable to modify its own code during execution,\u00bb M\u00fchr noted. \u00abThe builder may, however, generate new clients with different randomized configuration values and function names, which is standard practice among malware builders.\u00bb<\/p>\n<p>The PowerShell script functions as a full-fledged backdoor that can beacon a heartbeat message containing system information to a C2 server every 30 seconds, poll for a new command every 50 seconds, execute it via \u00abcmd.exe,\u00bb and relay the results back to the server. The exact nature of the commands run on the compromised network is currently unknown.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi0r7LhOe89FnF9EZUtcpmRmaVw1Cfk6HapoLGi4Qz-DvjHRiXHWUjTvo06fj82fymyveJe2_-SRya-17QyrjAPsPzF-w4hCk2QNYzNNsMql1wEjZ52I-ejUrn27cBqMA_-oWTbDJU0H6sMotplnd5yewSgHnpCvGDL35psj6sfrYA0g9zCXeo8JGe0-zG4\/s1700-e365\/click.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi0r7LhOe89FnF9EZUtcpmRmaVw1Cfk6HapoLGi4Qz-DvjHRiXHWUjTvo06fj82fymyveJe2_-SRya-17QyrjAPsPzF-w4hCk2QNYzNNsMql1wEjZ52I-ejUrn27cBqMA_-oWTbDJU0H6sMotplnd5yewSgHnpCvGDL35psj6sfrYA0g9zCXeo8JGe0-zG4\/s1700-e365\/click.jpg\" alt=\"\" border=\"0\" data-original-height=\"1183\" data-original-width=\"1237\"\/><\/a><\/div>\n<p>The attack in itself is said to have leveraged the ClickFix social engineering tactic to trick a victim into running a PowerShell command, which then downloads NodeSnake, a known malware attributed to Hive0163. A first-stage component, NodeSnake, is designed to run shell commands, establish persistence, and retrieve and launch a wider malware framework referred to as Interlock RAT.<\/p>\n<p>Hive0163 has a track record of employing ClickFix and malvertising for initial access. Another method the threat actor uses to establish a foothold is by relying on initial access brokers such as TA569 (aka SocGholish) and TAG-124 (aka KongTuke and LandUpdate808).\u00a0<\/p>\n<p>The framework has multiple implementations in PowerShell, PHP, C\/C++, Java, and JavaScript to support both Windows and Linux. Like NodeSnake, it also communicates with a remote server to fetch commands that allow it to launch a SOCKS5 proxy tunnel, spawn a reverse shell on the infected machine, and deliver more payloads, such as Interlock ransomware and Slopoly.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/cyber-comm-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigDbfWwE4P_DsjfBRxgecgosqTRr8-2j328LrzdUBWrWmWeDUTI7OhXc-zXveYOjBc7GStGz5WnpXsJGaLCuoryIXbL7NxRyaWzIJGO1TBpd48NkYzNqTMj9zWMzgfvqh20RxsdMll45TFiMzXja0pAd7roFjMnzsRYBGHOWSLnyKN-oMKyCLoYcjmb5hm\/s728-e100\/ciso-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The emergence of Slopoly adds to a growing list of AI-assisted malware, which also includes VoidLink and PromptSpy, highlighting how bad actors are using the technology to accelerate malware development and scale their operations.<\/p>\n<p>\u00abThe introduction of AI-generated malware does not pose a new or sophisticated threat from a technical standpoint,\u00bb IBM X-Force said. \u00abIt disproportionately enables threat actors by reducing the time an operator needs to develop and execute an attack.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Mar 12, 2026Artificial Intelligence \/ Malware Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor&hellip;<\/p>\n","protected":false},"author":1,"featured_media":253,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[130,170,24,644,42,646,93,645],"class_list":["post-252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-access","tag-aiassisted","tag-attacks","tag-hive0163","tag-malware","tag-persistent","tag-ransomware","tag-slopoly"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=252"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/253"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}