How AI is Revolutionizing Hacking (And How to Stop It)
Introduction
In just the first half of this year alone, Malaysians lost hundreds of thousands of ringgit to phone scams and online frauds. A teacher was tricked into giving away RM890,000, an engineer lost RM275,000 to a fake investment app, and a lecturer in Pahang panicked after a scammer pretending to be a police officer threatened jail and whipping—he ended up losing RM294,000. Even a retiree was scammed out of nearly RM700,000, and one woman lost RM5,000 just by answering a call from someone pretending to be her boss. These stories aren’t rare—they’re real, and they all happened this year. Why is this happening? Because as technology grows, so do the tricks of scammers. And the truth is—if we don’t brush up our digital knowledge, we might be the next victim. So how do we fight back? This blog explores how cybercriminals are using AI to launch sophisticated attacks—and what businesses and individuals can do to protect themselves.
How AI is Fueling Modern Cybercrime
-
AI-Powered Phishing & Social Engineering as shown in Figure 1
-
Automated Phishing Emails: AI generates highly personalized scam emails, making them harder to detect.
-
Voice Cloning & Deepfake Scams: Attackers use AI to mimic executives or customer service agents in fraudulent calls.
Chatbot-Based Fraud: AI chatbots engage victims in realistic conversations to extract sensitive data.
Figure 1
B. AI-Generated Malware & Adaptive Attacks as shown in Figure 2
-
Polymorphic Malware: AI modifies malicious code in real-time to evade antivirus detection.
-
Automated Vulnerability Scanning: AI tools (like WormGPT) scan systems for weaknesses faster than human hackers.
Figure 2
C. AI-Driven Disinformation & Fake News as shown in Figure 3
-
Deepfake Videos & Fake Profiles: AI creates convincing fake identities to spread misinformation.
-
Automated Botnets: AI-powered bots amplify scams on social media.
How to Defend Against AI-Powered Cyberattacks
A. For Businesses
-
AI-Based Threat Detection: Deploy tools like Darktrace or Microsoft Sentinel to detect anomalies.
-
Zero-Trust Security Models: Verify every access request, even from "trusted" sources.
-
Employee Training: Teach staff to recognize AI-generated scams (e.g., voice cloning, phishing).
B. For Individuals
-
Verify Suspicious Calls/Emails: Use secondary authentication (e.g., call back via official numbers).
-
Enable Multi-Factor Authentication (MFA): Prevents AI-driven credential stuffing attacks.
-
Use AI Security Tools: Some antivirus software now includes AI-based behavioral analysis.
C. For Governments & Tech Companies
-
Regulate AI Misuse: Laws to prevent malicious AI tools (e.g., banning deepfake scams).
- Ethical AI Development: Ensure AI models (like ChatGPT) have built-in security restrictions.
How SBIT Prepares Students for AI Cybersecurity Threats?
A. Professional Degree in Software Engineering
-
Advanced Web Application Design (React, PHP, MySQL)
- Build secure apps resistant to AI-generated SQL injections or phishing attacks
-
Learn Python, AI and Machine Learning
- Understand the skills to reverse-engineer cyberattacks, analyze malware behavior, and predict emerging threats.
B. Professional Degree in IT Support
-
-
Learn to secure AWS/Azure environments where AI-driven attacks (e.g., automated exploits) often target misconfigured cloud services.
-
-
- Study AI-powered threat detection, penetration testing, and ethical hacking to counter adaptive malware.
C. Professional Diploma in Software Engineering
-
Relational Database Management (RDBMS)
-
Understand the concept of secure databases against AI-automated brute-force attacks.
-
D. Professional Diploma in IT Support
-
Computer Security Fundamentals
-
Understand encryption, zero-trust models, and behavioral analysis to stop deepfake scams.
- Learn firewall or antivirus tools to detect traditional and AI-enhanced threats.
-
Bridging Degrees and Diplomas: Shared Cybersecurity Principles
Degree Focus (Advanced) |
Diploma Focus (Foundation) |
|
AI Threat Prevention |
AI-driven security tools (Darktrace, Fortinet) |
Basic phishing/scam recognition |
Tech Stack |
Multi-cloud microservices security |
On-premises server/network security |
Attack Response |
Proactive AI and machine Learning monitoring |
Reactive (patch management, network devices) |
Conclusion
AI is like a superpower—it can protect or destroy, depending on who uses it. And right now, scammers are using AI to get smarter, faster, and sneakier. If you're not upgrading your knowledge, you’re already falling behind. Think scams only happen to “uncle and auntie”? Think again. Students, teachers, even engineers and lecturers have all fallen victim this year alone.