Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools

Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools

Phishing campaigns have long relied on social engineering to dupe unsuspecting users, but recent developments have elevated these attacks to a new level of sophistication.

Attackers now harness advanced content-generation platforms to craft highly personalized emails and webpages, blending genuine corporate branding with contextually relevant messages.

These platforms analyze public social media profiles, corporate press releases, and user activity to generate text that mirrors a victim’s communication style, greatly increasing the likelihood of engagement.

Google News

The resulting emails often bypass basic filters by avoiding known malicious keywords and employing dynamic content that changes with each delivery.

At the same time, these platforms integrate real-time language models to refine phishing templates on the fly, adapting to evolving email defenses and user responses.

This continuous learning loop allows campaigns to shift message templates within minutes, making static blocklists effectively obsolete.

Trend Micro researchers identified several clusters of these AI-enhanced phishing waves in August 2025, each targeting different industry verticals—from financial services to healthcare—demonstrating the breadth of the threat landscape.

Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
Fake captcha page (Source – Trend Micro)

As organizations scramble to deploy heuristic and behavior-based filters, attackers counter with polymorphic payloads that mutate both text and embedded URLs in real-time.

Beyond email, attackers leverage these platforms to generate convincing duplicate login portals hosted on cloud infrastructure, complete with valid SSL certificates and region-specific IP addresses.

Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
Captcha page does not redirect to the phishing page if the answer is incorrect (Source – Trend Micro)

The combination of genuine-looking domains, valid certificates, and personalized messaging leads many users to overlook subtle warning signs.

Trend Micro analysts noted that such campaigns often include a brief authentication step mimicking multi-factor prompts, further reducing suspicion by aligning with standard corporate login flows.

Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
Phishing page after the captcha is solved (Source – Trend Micro)

Once credentials are harvested, follow-on malware delivers a lightweight loader that contacts a command-and-control server over HTTPS, blending in with normal web traffic.

In parallel with credential theft, these campaigns deploy various evasion techniques within their code. Embedded scripts employ encryption and obfuscation routines to conceal their true purpose, only decrypting at runtime.

The loader, written in PowerShell, leverages native Windows API calls to disable monitoring services before deploying the final payload.

A representative snippet illustrates how the script resolves API functions dynamically:-

$kernel = Add-Type –MemberDefinition @"
    [DllImport("kernel32.dll")]
    public static extern IntPtr GetProcAddress(IntPtr hModule, string procName);
"@ –Name "Kernel" –Namespace "Win32"
$hMod = [Kernel]::GetModuleHandle("ntdll.dll")
$addr = [Kernel]::GetProcAddress($hMod, "NtOpenProcess")

Evasion Techniques and Detection Challenges

A critical aspect of these AI-driven campaigns lies in their ability to evade signature-based and behavioral detection systems.

The dynamically generated HTML payloads include randomized element IDs and inline style definitions that change with each interaction, rendering signature matching ineffective.

On the network side, attacker-controlled domains employ fast flux DNS to rotate authoritative name servers, while the malicious loader establishes encrypted tunnels over standard ports, camouflaging traffic among legitimate SSL connections.

Endpoint sensors that rely on static heuristics are frequently bypassed as the loader disables Windows Event Logging for PowerShell execution, then reinstates logging settings once the secondary payload activates.

This hit-and-run strategy leaves minimal forensic artifacts, complicating post-incident analysis and prolonging dwell time for threat actors.

Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.