Compromised devices were identified across 55 countries in Africa, Asia, Latin and North America, and Europe.Following successful compromise, the hackers were seen leveraging open source offensive tools to extract NTLM password hashes, obtain complete domain credential databases, and move laterally through pass-the-hash/pass-the-ticket attacks.The attackers were also seen targeting Veeam Backup & Replication servers, likely to extract additional credentials and destroy backups in preparation for ransomware attacks.According to AWS, the hackers used at least two commercial LLMs to plan the attacks, generate tools, and assist with the operation, including duration and success rate assessments.“These plans reference academic research on offensive AI agents, suggesting the actor follows emerging literature on AI-assisted penetration testing. The AI produces technically accurate command sequences, but the actor struggles to adapt when conditions differ from the plan,” AWS notes.On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
Following successful compromise, the hackers were seen leveraging open source offensive tools to extract NTLM password hashes, obtain complete domain credential databases, and move laterally through pass-the-hash/pass-the-ticket attacks.The attackers were also seen targeting Veeam Backup & Replication servers, likely to extract additional credentials and destroy backups in preparation for ransomware attacks.According to AWS, the hackers used at least two commercial LLMs to plan the attacks, generate tools, and assist with the operation, including duration and success rate assessments.“These plans reference academic research on offensive AI agents, suggesting the actor follows emerging literature on AI-assisted penetration testing. The AI produces technically accurate command sequences, but the actor struggles to adapt when conditions differ from the plan,” AWS notes.On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
The attackers were also seen targeting Veeam Backup & Replication servers, likely to extract additional credentials and destroy backups in preparation for ransomware attacks.According to AWS, the hackers used at least two commercial LLMs to plan the attacks, generate tools, and assist with the operation, including duration and success rate assessments.“These plans reference academic research on offensive AI agents, suggesting the actor follows emerging literature on AI-assisted penetration testing. The AI produces technically accurate command sequences, but the actor struggles to adapt when conditions differ from the plan,” AWS notes.On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
According to AWS, the hackers used at least two commercial LLMs to plan the attacks, generate tools, and assist with the operation, including duration and success rate assessments.“These plans reference academic research on offensive AI agents, suggesting the actor follows emerging literature on AI-assisted penetration testing. The AI produces technically accurate command sequences, but the actor struggles to adapt when conditions differ from the plan,” AWS notes.On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
“These plans reference academic research on offensive AI agents, suggesting the actor follows emerging literature on AI-assisted penetration testing. The AI produces technically accurate command sequences, but the actor struggles to adapt when conditions differ from the plan,” AWS notes.On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
On the threat actor’s infrastructure, AWS identified multiple scripts likely generated using AI, used to parse configurations, extract credentials, automate VPN connections, perform mass scanning, and aggregate results.“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
“The volume and variety of custom tooling would typically indicate a well-resourced development team. Instead, a single actor or very small group generated this entire toolkit through AI-assisted development,” AWS says.The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
The attacks, it notes, were likely mounted by a financially motivated, Russian-speaking threat actor with low-to-medium technical capability, based on the extensive reliance on AI across all operational phases.Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
Related:Mississippi Hospital System Closes All Clinics After Ransomware AttackRelated:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
Related:FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025Related:Fortinet Patches Exploited FortiCloud SSO Authentication BypassRelated:New Wave of Attacks Targeting FortiGate Firewalls
Source: SecurityWeek