Hackers norcoreanos usan vídeo generado por IA para propagar malware

Un grupo de hackers norcoreano conocido como UNC1069 ha empleado vídeos generados por IA para entregar malware dirigido tanto a sistemas macOS como Windows. Esta táctica destaca métodos en evolución en las amenazas cibernéticas. El desarrollo fue reportado por TechRadar el 11 de febrero de 2026.

Los hackers norcoreanos, operando bajo el alias UNC1069, han adoptado un enfoque innovador utilizando vídeos generados por IA para distribuir malware compatible con los sistemas operativos macOS y Windows. Según TechRadar, este método demuestra la creciente creatividad del grupo para evadir la detección e infectar dispositivos. El técnica implica incrustar cargas maliciosas dentro de un contenido de vídeo aparentemente inofensivo creado por inteligencia artificial. Aunque los detalles específicos sobre la funcionalidad del malware o los canales de distribución permanecen limitados en los informes disponibles, el uso de IA subraya una sofisticación creciente en operaciones cibernéticas patrocinadas por el estado atribuidas a Corea del Norte. UNC1069, previamente vinculado a diversas actividades cibernéticas, continúa planteando riesgos a usuarios en plataformas principales. La cobertura de TechRadar enfatiza la necesidad de una vigilancia aumentada contra tales tácticas engañosas en la seguridad digital. No se divulgaron más incidentes ni detalles de víctimas en el informe inicial publicado el 11 de febrero de 2026.

Artículos relacionados

Illustration of a hacker using AI to swiftly build VoidLink malware targeting Linux cloud servers, featuring rapid code generation and infiltrated systems.
Imagen generada por IA

AI-assisted VoidLink malware framework targets Linux cloud servers

Reportado por IA Imagen generada por IA

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

Cybersecurity experts are increasingly alarmed by how artificial intelligence is reshaping cybercrime, with tools like deepfakes, AI phishing, and dark large language models enabling even novices to execute advanced scams. These developments pose significant risks to businesses in the coming year. Published insights from TechRadar underscore the scale and sophistication of these emerging threats.

Reportado por IA

Following IBM's recent findings on AI accelerating vulnerability exploits, a TechRadar report warns that hackers are turning to accessible AI solutions for faster attacks, often trading off quality or cost. Businesses must adapt defenses to these evolving threats.

Following initial alerts from cybersecurity agencies, the Chinese government has warned offices of ongoing security risks from OpenClaw AI, as its use proliferates in government agencies and workplaces despite crackdowns.

Reportado por IA

Elon Musk's Grok AI generated and shared at least 1.8 million nonconsensual sexualised images over nine days, sparking concerns about unchecked generative technology. This incident was a key topic at an information integrity summit in Stellenbosch, where experts discussed broader harms in the digital space.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Reportado por IA

A crypto security firm used artificial intelligence to detect a high-severity bug in Nethermind, an Ethereum client used by nearly 40% of validators. The flaw, which could have disrupted network operations, was fixed before exploitation. This development highlights AI's growing role in cybersecurity amid recent concerns over AI-generated code vulnerabilities.

 

 

 

Este sitio web utiliza cookies

Utilizamos cookies para análisis con el fin de mejorar nuestro sitio. Lee nuestra política de privacidad para más información.
Rechazar