IBM Links Suspected AI-Generated ‘Slopoly’ Malware To Hive0163 Ransomware Operation | #ransomware | #cybercrime


In early 2026, IBM X-Force researchers identified a novel, likely AI-generated malware framework dubbed “Slopoly”.

This discovery was made during an active ransomware engagement orchestrated by Hive0163, a financially motivated cybercrime group known for large-scale data exfiltration and the deployment of Interlock ransomware.

The emergence of Slopoly highlights a significant shift in the cybersecurity threat landscape, demonstrating how easily threat actors can weaponize artificial intelligence to develop and deploy new malicious tools rapidly.

While the script itself is relatively unsophisticated, it serves as a dangerous proof-of-concept for the future of ephemeral, AI-driven malware.

The Anatomy Of Slopoly and Interlock

The intrusion begins with a social engineering technique known as ClickFix. This method tricks users into executing malicious PowerShell scripts by presenting fake CAPTCHA-like verification pages.

Victims are prompted to copy and paste a script directly into the Windows Run dialog, granting the attackers an initial foothold.

Hive0163 is a highly organized threat actor specializing in post-compromise activity and operates several custom backdoors to facilitate long-term access to corporate environments.

Once access is secured, the attackers deploy NodeSnake, a NodeJS-based malware, followed by a more capable JavaScript backdoor known as InterlockRAT. It is during the later stages of the attack chain that Hive0163 introduces Slopoly.

Redacted snippet of Slopoly script (Source: ibm)

The Rise Of Ephemeral Malware and Defenses

The discovery of Slopoly signals the dawn of an era dominated by “ephemeral malware”. Because generative AI drastically reduces the time and cost of writing code, threat actors can now generate disposable, single-use malware variants on the fly.

This fundamentally changes the defensive equation. Historically, threat intelligence has relied on analyzing malware to attribute attacks to specific groups and assess their capabilities.

When malicious scripts are easily mass-produced and unique to each attack, signature-based detection and traditional attribution become significantly more difficult.​

C2 panel displayed (Source: ibm)
C2 panel displayed (Source: ibm)

To defend against Hive0163 and the growing threat of AI-generated malware like Slopoly, organizations should adopt the following technical mitigations and monitor for specific indicators of compromise:

  • Mitigate ClickFix attacks: Disable the “Win+R” shortcut for standard users and actively monitor the RunMRU registry key for suspicious entries.
  • Shift detection strategies: Prioritize behavior-based detection mechanisms over traditional, signature-based antivirus solutions, as AI-generated malware can easily bypass static signatures.
  • Monitor suspicious network traffic: Block connections to known Hive0163 infrastructure, including the Slopoly C2 IP address (94.156.181.89) and associated Cloudflare IBM tunnel domains used for persistence.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.



Source link

.........................

National Cyber Security

FREE
VIEW