TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

AI: Friend or Faux in Cybersecurity? Huntress Tradecraft Tuesday

2025-06-30 · Read original ↗

ATT&CK techniques detected

8 predictions
T1683.002Audio-Visual Content
84%
“financial assistance. figure 1 : the creation process for a deepfake video using ai tools the scams above mostly use audio deepfakes, but there have been some incidents that have involved both audio and video deepfakes. these types of deepfakes allow threat actors to add some lev…”
T1598Phishing for Information
69%
“. in fact, the demo video below shows just how easy it was for us to create a deepfake involving huntress ’ own ceo. what ’ s truly concerning about deepfake scams? in our eyes, it ’ s the fact that these types of scams are turning existing verification processes upside down. thi…”
T1684.001Impersonation
65%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”
T1588.007Artificial Intelligence
58%
“truman kain, staff product researcher at huntress, talked about the good, the bad, and the ugly parts of ai. and how it ’ s helping ( and hurting ) both defenders and threat actors. how threat actors are using ai attackers are already using ai in various ways, including : - deepf…”
T1683.002Audio-Visual Content
46%
“truman kain, staff product researcher at huntress, talked about the good, the bad, and the ugly parts of ai. and how it ’ s helping ( and hurting ) both defenders and threat actors. how threat actors are using ai attackers are already using ai in various ways, including : - deepf…”
T1598.004Spearphishing Voice
41%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”
T1684.001Impersonation
33%
“. in fact, the demo video below shows just how easy it was for us to create a deepfake involving huntress ’ own ceo. what ’ s truly concerning about deepfake scams? in our eyes, it ’ s the fact that these types of scams are turning existing verification processes upside down. thi…”
T1566.004Spearphishing Voice
31%
“recently been using. here, attackers use deepfakes to pretend to be legitimate it workers during job interviews. after securing a role, the workers infiltrate organizations in order to steal sensitive data. and in some cases, even extort the employers. many different companies, i…”

Summary

Is AI in cybersecurity a tool for defenders or the attackers? Find out in our recap of Huntress’ June Tradecraft Tuesday, where we break it down.