Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Microsoft Flight Simulator Gets a Paid Jurassic World Add-On

    August 9, 2025

    I thought I knew home theater bass until I experienced an 11.13.8-channel demo with an ‘infrasonic’ 32-inch subwoofer

    August 9, 2025

    Turn your AirPods Max into a masterpiece with Casetify’s new headphone wrap

    August 9, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Microsoft Flight Simulator Gets a Paid Jurassic World Add-On
    • I thought I knew home theater bass until I experienced an 11.13.8-channel demo with an ‘infrasonic’ 32-inch subwoofer
    • Turn your AirPods Max into a masterpiece with Casetify’s new headphone wrap
    • New report lays out Israeli military use of Microsoft services that prompted employee protests and a boycott of Xbox and Game Pass
    • Get $200 off this RTX 5060-powered OLED laptop with 32GB RAM
    • Vivo V60: Launch Date, Expected Price in India, Specifications, Features and More
    • Acer’s big-screen 4K monitor is an downright bargain for just $190
    • Truth Social’s New AI Chatbot Is Donald Trump’s Media Diet Incarnate
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»This AI didn’t just simulate an attack – it planned and executed a real breach like a human hacker
    How-To

    This AI didn’t just simulate an attack – it planned and executed a real breach like a human hacker

    techupdateadminBy techupdateadminAugust 2, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A laptop with digitally inserted hack warnings around it
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Researchers recreated the Equifax hack and watched AI do everything without direct control
    • The AI model successfully carried out a major breach with zero human input
    • Shell commands weren’t needed, the AI acted as the planner and delegated everything else

    Large language models (LLMs) have long been considered useful tools in areas like data analysis, content generation, and code assistance.

    However, a new study from Carnegie Mellon University, conducted in collaboration with Anthropic, has raised difficult questions about their role in cybersecurity.

    The study showed that under the right conditions, LLMs can plan and carry out complex cyberattacks without human guidance, suggesting a shift from mere assistance to full autonomy in digital intrusion.


    You may like

    From puzzles to enterprise environments

    Earlier experiments with AI in cybersecurity were mostly limited to “capture-the-flag” scenarios, simplified challenges used for training.

    The Carnegie Mellon team, led by PhD candidate Brian Singer, went further by giving LLMs structured guidance and integrating them into a hierarchy of agents.

    With these settings, they were able to test the models in more realistic network setups.

    In one case, they recreated the same conditions that led to the 2017 Equifax breach, including the vulnerabilities and layout documented in official reports.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The AI not only planned the attack but also deployed malware and extracted data, all without direct human commands.

    What makes this research striking is how little raw coding the LLM had to perform. Traditional approaches often fail because models struggle to execute shell commands or parse detailed logs.

    Instead, this system relied on a higher-level structure where the LLM acted as a planner while delegating lower-level actions to sub-agents.

    This abstraction gave the AI enough context to “understand” and adapt to its environment.

    Although these results were achieved in a controlled lab setting, they raise questions about how far this autonomy could go.

    The risks here are not just hypothetical. If LLMs can carry out network breaches on their own, then malicious actors could potentially use them to scale attacks far beyond what’s feasible with human teams.

    Even tools such as endpoint protection and the best antivirus software may be tested by such adaptive and responsive agents.

    Nevertheless, there are potential benefits to this capability. An LLM capable of mimicking realistic attacks might be used to improve system testing and expose flaws that would otherwise go unnoticed.

    “It only works under specific conditions, and we do not have something that could just autonomously attack the internet… But it’s a critical first step,” said Singer in explaining that this work remains a prototype.

    Still, the ability of an AI to replicate a major breach with minimal input should not be dismissed.

    Follow-up research is now exploring how these same techniques can be applied in defense, potentially even enabling AI agents to detect or block attacks in real-time.

    You may also like

    attack breach didnt executed hacker Human planned real simulate
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDeals: Moto Razr prices drop to compete with the Z Flip7 and FE, Galaxy S25 series also discounted
    Next Article LG’s new $2,246 5K ultrawide monitor promises pro specs even creatives might struggle to justify
    techupdateadmin
    • Website

    Related Posts

    How-To

    Easily add Android Auto to your car for just $35

    August 9, 2025
    How-To

    Google is killing Steam for Chromebooks at the end of this year

    August 8, 2025
    How-To

    Qualcomm just hinted at a full-blown server invasion with new CPUs and racks, and nobody’s ready for it

    August 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Apple Pencil With ‘Trackball’ Tip, Ability to Draw on Any Surface Described in Patent Document

    July 9, 20253 Views

    Samsung Galaxy Z Fold 7 and Galaxy Z Flip 7: First Impressions

    July 9, 20253 Views

    The Bezos-funded climate satellite is lost in space

    July 9, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    Microsoft Flight Simulator Gets a Paid Jurassic World Add-On

    August 9, 2025

    I thought I knew home theater bass until I experienced an 11.13.8-channel demo with an ‘infrasonic’ 32-inch subwoofer

    August 9, 2025

    Turn your AirPods Max into a masterpiece with Casetify’s new headphone wrap

    August 9, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.