By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
Computing

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

News Room
Last updated: 2026/03/12 at 2:43 PM
News Room Published 12 March 2026
Share
Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
SHARE

Ravie LakshmananMar 12, 2026Artificial Intelligence / Malware

Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor named Hive0163.

“Although still relatively unspectacular, AI-generated malware such as Slopoly shows how easily threat actors can weaponize AI to develop new malware frameworks in a fraction of the time it used to take,” IBM X-Force researcher Golo Mühr said in a report shared with The Hacker News.

Hive0163’s operations are driven by extortion through large-scale data exfiltration and ransomware. The e-crime group is primarily associated with a wide range of malicious tools, including NodeSnake, Interlock RAT, JunkFiction loader, and Interlock ransomware.

In one ransomware attack observed by the company in early 2026, the threat actor was observed deploying Slopoly during the post-exploitation phase so as to maintain persistent access to the compromised server for more than a week.

Slopoly’s discovery can be traced back to a PowerShell script that’s likely deployed by means of a builder, which also established persistence via a scheduled task called “Runtime Broker.”

There are signs that the malware was developed with the help of an as-yet-undetermined large language model (LLM). This includes the presence of extensive comments, logging, error handling, and accurately named variables. The comments also describe the script as a “Polymorphic C2 Persistence Client,” indicating that it’s part of a command-and-control (C2) framework.

“However, the script does not possess any advanced techniques and can hardly be considered polymorphic, since it’s unable to modify its own code during execution,” Mühr noted. “The builder may, however, generate new clients with different randomized configuration values and function names, which is standard practice among malware builders.”

The PowerShell script functions as a full-fledged backdoor that can beacon a heartbeat message containing system information to a C2 server every 30 seconds, poll for a new command every 50 seconds, execute it via “cmd.exe,” and relay the results back to the server. The exact nature of the commands run on the compromised network is currently unknown.

The attack in itself is said to have leveraged the ClickFix social engineering tactic to trick a victim into running a PowerShell command, which then downloads NodeSnake, a known malware attributed to Hive0163. A first-stage component, NodeSnake, is designed to run shell commands, establish persistence, and retrieve and launch a wider malware framework referred to as Interlock RAT.

Hive0163 has a track record of employing ClickFix and malvertising for initial access. Another method the threat actor uses to establish a foothold is by relying on initial access brokers such as TA569 (aka SocGholish) and TAG-124 (aka KongTuke and LandUpdate808). 

The framework has multiple implementations in PowerShell, PHP, C/C++, Java, and JavaScript to support both Windows and Linux. Like NodeSnake, it also communicates with a remote server to fetch commands that allow it to launch a SOCKS5 proxy tunnel, spawn a reverse shell on the infected machine, and deliver more payloads, such as Interlock ransomware and Slopoly.

The emergence of Slopoly adds to a growing list of AI-assisted malware, which also includes VoidLink and PromptSpy, highlighting how bad actors are using the technology to accelerate malware development and scale their operations.

“The introduction of AI-generated malware does not pose a new or sophisticated threat from a technical standpoint,” IBM X-Force said. “It disproportionately enables threat actors by reducing the time an operator needs to develop and execute an attack.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Alexa Plus just got an ‘unfiltered’ personality that can (sort of) do swears Alexa Plus just got an ‘unfiltered’ personality that can (sort of) do swears
Next Article MacBook Neo: Here’s everything reviewers didn’t like MacBook Neo: Here’s everything reviewers didn’t like
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple TV scores its first F1 victory over ESPN viewership – 9to5Mac
Apple TV scores its first F1 victory over ESPN viewership – 9to5Mac
News
Bybit Pay Joins The Mastercard Crypto Credential Network, Simplifying Verifiable Crypto Transfers | HackerNoon
Bybit Pay Joins The Mastercard Crypto Credential Network, Simplifying Verifiable Crypto Transfers | HackerNoon
Computing
Today's NYT Connections Hints, Answers for March 13 #1006
Today's NYT Connections Hints, Answers for March 13 #1006
News
ByteDance launches Trae AI IDE in China with Doubao-1.5-Pro and DeepSeek Models · TechNode
ByteDance launches Trae AI IDE in China with Doubao-1.5-Pro and DeepSeek Models · TechNode
Computing

You Might also Like

Bybit Pay Joins The Mastercard Crypto Credential Network, Simplifying Verifiable Crypto Transfers | HackerNoon
Computing

Bybit Pay Joins The Mastercard Crypto Credential Network, Simplifying Verifiable Crypto Transfers | HackerNoon

8 Min Read
ByteDance launches Trae AI IDE in China with Doubao-1.5-Pro and DeepSeek Models · TechNode
Computing

ByteDance launches Trae AI IDE in China with Doubao-1.5-Pro and DeepSeek Models · TechNode

1 Min Read
Sonia Kabra’s journey from small Indian town to Nairobi’s bus terminals
Computing

Sonia Kabra’s journey from small Indian town to Nairobi’s bus terminals

32 Min Read
Strategy for Incorporating Data Engineering for Computer Vision in Autonomous Driving | HackerNoon
Computing

Strategy for Incorporating Data Engineering for Computer Vision in Autonomous Driving | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?