Check Point Research has released its first AI Security Report at RSA Conference 2025, revealing how cybercriminals are leveraging artificial intelligence for attacks. The report identifies four major AI-driven cyber threats: AI-enhanced impersonation, LLM data poisoning, AI-created malware, and weaponization of AI models.
Key findings show that attackers successfully mimicked Italy’s defense minister using AI-generated audio, while Russia’s Pravda network manipulated AI chatbots to repeat false narratives 33% of the time. Dark web services like FraudGPT and WormGPT are being used for hacking and fraud.
To counter these threats, Check Point recommends implementing AI-aware security frameworks, including AI-assisted threat detection, enhanced identity verification, and AI-context threat intelligence. The report emphasizes that organizations must now assume AI is embedded within all adversarial campaigns.
Check Point Research ha pubblicato il suo primo Rapporto sulla Sicurezza dell’IA alla RSA Conference 2025, rivelando come i cybercriminali stiano sfruttando l’intelligenza artificiale per condurre attacchi. Il rapporto identifica quattro principali minacce informatiche guidate dall’IA: impersonificazione potenziata dall’IA, avvelenamento dei dati nei modelli linguistici di grandi dimensioni (LLM), malware creato dall’IA e militarizzazione dei modelli di IA.
I risultati chiave mostrano che gli attaccanti sono riusciti a imitare con successo il ministro della difesa italiano utilizzando audio generato dall’IA, mentre la rete russa Pravda ha manipolato chatbot IA per ripetere narrazioni false nel 33% dei casi. Servizi del dark web come FraudGPT e WormGPT vengono impiegati per hacking e frodi.
Per contrastare queste minacce, Check Point raccomanda di implementare framework di sicurezza consapevoli dell’IA, includendo il rilevamento delle minacce assistito dall’IA, una verifica dell’identità potenziata e intelligence sulle minacce contestualizzata dall’IA. Il rapporto sottolinea che le organizzazioni devono ora presumere che l’IA sia integrata in tutte le campagne avversarie.
Check Point Research ha publicado su primer Informe de Seguridad de IA en la Conferencia RSA 2025, revelando cómo los ciberdelincuentes están utilizando la inteligencia artificial para realizar ataques. El informe identifica cuatro principales amenazas cibernéticas impulsadas por IA: suplantación mejorada con IA, envenenamiento de datos en modelos de lenguaje grande (LLM), malware creado por IA y la militarización de modelos de IA.
Los hallazgos clave muestran que los atacantes lograron imitar con éxito al ministro de defensa de Italia usando audio generado por IA, mientras que la red rusa Pravda manipuló chatbots de IA para repetir narrativas falsas en un 33% de las veces. Servicios de la dark web como FraudGPT y WormGPT se están utilizando para hackeo y fraude.
Para contrarrestar estas amenazas, Check Point recomienda implementar marcos de seguridad conscientes de la IA, incluyendo detección de amenazas asistida por IA, verificación de identidad mejorada e inteligencia de amenazas contextualizada con IA. El informe enfatiza que las organizaciones deben asumir ahora que la IA está integrada en todas las campañas adversarias.
체크포인트 리서치가 RSA 컨퍼런스 2025에서 첫 번째 AI 보안 보고서를 발표하며 사이버 범죄자들이 인공지능을 이용해 공격을 수행하는 방식을 공개했습니다. 보고서는 AI 기반의 주요 사이버 위협 네 가지를 지목했습니다: AI 강화 사칭, 대형 언어 모델(LLM) 데이터 오염, AI 생성 악성코드, 그리고 AI 모델의 무기화입니다.
주요 내용으로는 공격자들이 AI 생성 음성을 이용해 이탈리아 국방장관을 성공적으로 모방했으며, 러시아 프라브다 네트워크가 AI 챗봇을 조작해 33%의 경우 거짓 정보를 반복하게 했다는 점이 포함됩니다. FraudGPT와 WormGPT 같은 다크웹 서비스가 해킹과 사기에 이용되고 있습니다.
이러한 위협에 대응하기 위해 체크포인트는 AI 인식 보안 프레임워크 도입을 권장하며, AI 지원 위협 탐지, 강화된 신원 확인, AI 맥락 기반 위협 인텔리전스를 포함할 것을 제안합니다. 보고서는 조직들이 이제 모든 적대적 캠페인에 AI가 내재되어 있다고 가정해야 한다고 강조합니다.
Check Point Research a publié son premier Rapport sur la Sécurité de l’IA lors de la conférence RSA 2025, révélant comment les cybercriminels exploitent l’intelligence artificielle pour mener des attaques. Le rapport identifie quatre principales menaces cybernétiques pilotées par l’IA : l’usurpation améliorée par IA, l’empoisonnement des données des grands modèles de langage (LLM), les malwares créés par IA et l’armement des modèles d’IA.
Les principales conclusions montrent que des attaquants ont réussi à imiter le ministre de la Défense italien grâce à un audio généré par IA, tandis que le réseau russe Pravda a manipulé des chatbots IA pour répéter des récits faux dans 33 % des cas. Des services du dark web comme FraudGPT et WormGPT sont utilisés pour le piratage et la fraude.
Pour contrer ces menaces, Check Point recommande la mise en place de cadres de sécurité adaptés à l’IA, incluant la détection des menaces assistée par IA, une vérification d’identité renforcée et un renseignement sur les menaces contextualisé par l’IA. Le rapport souligne que les organisations doivent désormais considérer que l’IA est intégrée dans toutes les campagnes adverses.
Check Point Research hat auf der RSA-Konferenz 2025 seinen ersten KI-Sicherheitsbericht veröffentlicht, der aufzeigt, wie Cyberkriminelle Künstliche Intelligenz für Angriffe nutzen. Der Bericht identifiziert vier wesentliche KI-getriebene Cyberbedrohungen: KI-verbesserte Nachahmung, Datenvergiftung von großen Sprachmodellen (LLM), von KI erzeugte Malware und die Bewaffnung von KI-Modellen.
Wesentliche Erkenntnisse zeigen, dass Angreifer erfolgreich den italienischen Verteidigungsminister mit KI-generiertem Audio nachahmten, während das russische Pravda-Netzwerk KI-Chatbots manipulierte, um in 33 % der Fälle falsche Narrative zu wiederholen. Dark-Web-Dienste wie FraudGPT und WormGPT werden für Hacking und Betrug genutzt.
Um diesen Bedrohungen entgegenzuwirken, empfiehlt Check Point die Implementierung von KI-bewussten Sicherheitsrahmenwerken, einschließlich KI-unterstützter Bedrohungserkennung, verbesserter Identitätsprüfung und KI-kontextbezogener Bedrohungsinformationen. Der Bericht betont, dass Organisationen nun davon ausgehen müssen, dass KI in allen feindlichen Kampagnen eingebettet ist.
Positive
- Launch of comprehensive AI Security Report positions Check Point as a thought leader in AI cybersecurity
- Early identification and analysis of emerging AI threats demonstrates Check Point’s proactive approach to market opportunities
- Development of AI-assisted detection tools shows product innovation and market readiness
- Strategic focus on AI security solutions could drive new revenue streams
Negative
- Rising sophistication of AI-powered cyber threats could increase R&D costs
- Competitive pressure to keep pace with rapidly evolving AI threats may impact profit margins
- No specific financial metrics or growth figures provided in the report
Insights
Check Point’s AI research establishes leadership in combating AI-powered threats through detailed mapping of evolving attack techniques.
Check Point’s inaugural AI Security Report delivers crucial intelligence on the rapidly evolving landscape of AI-powered cyber threats. The research identifies four critical threat vectors that are fundamentally changing attack methodologies: AI-enhanced social engineering, data poisoning/disinformation, AI-generated malware, and AI model weaponization.
The most significant finding centers on what Check Point terms “digital twins” – sophisticated AI systems capable of not just mimicking voices or appearances, but replicating human thought patterns and behaviors. This represents a quantum leap beyond traditional impersonation techniques.
The report documents concrete examples of these threats in action, including an AI-generated impersonation of Italy’s defense minister and Russian disinformation successfully manipulating AI chatbots to repeat false narratives 33
The research also reveals the commercialization of malicious AI capabilities through dark web services like FraudGPT and WormGPT, indicating the industrialization of AI-powered attacks.
For enterprises, Check Point outlines a defensive framework centered on AI-assisted detection, enhanced identity verification systems, and AI-context-aware threat intelligence. This positions the company as not just documenting problems, but mapping solutions in this emerging security domain.
Check Point strategically positions at AI-cybersecurity intersection, demonstrating research leadership in emerging digital identity threats.
Check Point’s AI Security Report represents a calculated strategic positioning at the convergence of two high-growth markets: artificial intelligence and cybersecurity. By documenting how threat actors are weaponizing AI capabilities, the company establishes technical credibility in an increasingly critical security domain.
The report’s emphasis on the dissolution of trust in digital identity is particularly significant. As AI enables increasingly convincing impersonations across text, voice, and video, traditional authentication systems become inadequate. Check Point astutely identifies this as requiring “multi-layered identity checks” – signaling a potential growth area in security solutions.
Releasing this research at RSA Conference 2025 maximizes visibility within the security community and positions Check Point as forward-thinking in addressing emerging threats. The report’s structure – documenting specific threat vectors alongside defensive recommendations – creates a natural pathway toward the company’s security offerings.
The documented rise of AI-powered credential validation services like Gabbers Shop indicates threat actors are using AI not just for attack but for optimizing stolen data value. This sophistication in the threat landscape ultimately drives enterprise security investments.
While this announcement contains no financial metrics, it demonstrates Check Point’s strategic focus on establishing thought leadership in AI security – a domain likely to see significant enterprise spending as organizations confront increasingly sophisticated AI-powered threats.
New report unveils four key AI-driven cyber threats and how organizations can outsmart attackers in an AI-driven world
SAN FRANCISCO, April 30, 2025 (GLOBE NEWSWIRE) — RSA CONFERENCE, – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural AI Security Report at RSA Conference 2025. This report offers an in-depth exploration of how cyber criminals are weaponizing artificial intelligence (AI), alongside strategic insights for defenders to stay ahead.
As AI reshapes industries, it has also erased the lines between truth and deception in the digital world. Cyber criminals now wield generative AI and large language models (LLMs) to obliterate trust in digital identity. In today’s landscape, what you see, hear, or read online can no longer be believed at face value. AI-powered impersonation bypasses even the most sophisticated identity verification systems, making anyone a potential victim of deception on a scale.
“The swift adoption of AI by cyber criminals is already reshaping the threat landscape,” said Lotem Finkelstein, Director of Check Point Research. “While some underground services have become more advanced, all signs point toward an imminent shift – the rise of digital twins. These aren’t just lookalikes or soundalikes, but AI-driven replicas capable of mimicking human thought and behavior. It’s not a distant future – it’s just around the corner.”
Key Threat Insights from the AI Security Report:
At the heart of these developments is AI’s ability to convincingly impersonate and manipulate digital identities, dissolving the boundary between authentic and fake. The report uncovers four core areas where this erosion of trust is most visible:
- AI-Enhanced Impersonation and Social Engineering: Threat actors use AI to generate realistic, real-time phishing emails, audio impersonations, and deepfake videos. Notably, attackers recently mimicked Italy’s defense minister using AI-generated audio, demonstrating that no voice, face, or written word online is safe from fabrication.
- LLM Data Poisoning and Disinformation: Malicious actors manipulate AI training data to skew outputs. A case involving Russia’s disinformation network Pravda showed AI chatbots repeating false narratives
33% of the time, underscoring the need for robust data integrity in AI systems. - AI-Created Malware and Data Mining: Cyber criminals harness AI to craft and optimize malware, automate DDoS campaigns, and refine stolen credentials. Services like Gabbers Shop use AI to validate and clean stolen data, enhancing its resale value and targeting efficiency.
- Weaponization and Hijacking of AI Models: From stolen LLM accounts to custom-built Dark LLMs like FraudGPT and WormGPT, attackers are bypassing safety mechanisms and commercializing AI as a tool for hacking and fraud on the dark web.
Defensive Strategies:
The report emphasizes that defenders must now assume AI is embedded within adversarial campaigns. To counter this, organizations should adopt AI-aware cyber security frameworks, including:
- AI-Assisted Detection and Threat Hunting: Leverage AI to detect AI-generated threats and artifacts, such as synthetic phishing content and deepfakes.
- Enhanced Identity Verification: Enhanced Identity Verification: Move beyond traditional methods and implement multi-layered identity checks that account for AI-powered impersonation across text, voice, and video—recognizing that trust in digital identity is no longer guaranteed.
- Threat Intelligence with AI Context: Equip security teams with the tools to recognize and respond to AI-driven tactics.
“In this AI-driven era, cyber security teams need to match the pace of attackers by integrating AI into their defenses,” added Finkelstein. “This report not only highlights the risks but provides the roadmap for securing AI environments safely and responsibly.”
The full AI Security Report 2025 is available for download here and join the April 30 livestream for more insights about the report.
Follow Check Point via:
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
X (Formerly known as Twitter): https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers.
Legal Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.
FAQ
What are the 4 main AI cyber threats identified in Check Point’s (CHKP) 2025 AI Security Report?
The report identifies four key threats: 1) AI-Enhanced Impersonation and Social Engineering, 2) LLM Data Poisoning and Disinformation, 3) AI-Created Malware and Data Mining, and 4) Weaponization and Hijacking of AI Models.
How is Check Point (CHKP) addressing AI-powered cyber threats in 2025?
Check Point recommends three main defensive strategies: AI-Assisted Detection and Threat Hunting, Enhanced Identity Verification with multi-layered checks, and Threat Intelligence with AI Context to recognize and respond to AI-driven tactics.
What is the success rate of AI-driven disinformation according to Check Point’s (CHKP) 2025 report?
According to the report, Russia’s disinformation network Pravda demonstrated that AI chatbots repeated false narratives 33% of the time, highlighting significant concerns about AI data integrity.
What types of AI impersonation attacks are emerging in 2025 according to Check Point (CHKP)?
The report reveals AI-powered impersonation attacks including real-time phishing emails, audio impersonations, and deepfake videos. A notable example was the AI-generated audio impersonation of Italy’s defense minister.
What are Dark LLMs, and why are they a concern according to Check Point’s (CHKP) AI Security Report?
Dark LLMs, such as FraudGPT and WormGPT, are AI models being used by attackers to bypass safety mechanisms and commercialize AI for hacking and fraud on the dark web.
Click Here For The Original Source.