International Crime Investigation Authorities Called. Here's What AI-Enabled Crime Actually Looks Like Now.
Threat actors like Scattered Spider — thought to be roughly 1,000 loosely affiliated actors operating across the US and UK — are among the fastest adopters of AI on the planet. And they're not alone.
State-sponsored AI teams from Russia, China, North Korea, and Iran are now using frontier models at every stage of the attack cycle: reconnaissance, phishing, malware development, and data exfiltration. North Korea uses AI to synthesize intelligence on targets at defense companies. Iran uses it to augment reconnaissance and map business partner networks. China uses it to conduct vulnerability analysis and penetration testing planning against US targets.
These groups are deploying AI across the full attack surface. Social engineering is one method — cloning executive voices, manipulating help desks, automating identity takeover at scale. But it doesn't stop there. The same groups use agentic AI scripts to infiltrate code repositories and accelerate source code theft, run automated reconnaissance that maps internal networks and locates SOPs faster than any human analyst, exploit leaked credentials to move laterally before anyone knows they're inside, and — increasingly — use prompt injection to hijack AI agents operating inside enterprise systems, redirecting them to exfiltrate data or execute actions their owners never authorized. When your AI agent can be told what to do by the content it's reading, the attack surface isn't just your network. It's every document, email, and data feed your agents touch.
Sibito has been inside this fight. His team built the predictive fingerprinting system — developed in collaboration with the International Crime Investigation Authorities — that detected the behavioral signatures left by AI-automated attack operations. What he found, and what he'll discuss this morning: identity is now the perimeter, and AI has made every attack vector faster, cheaper, and harder to detect.
The question isn't whether your organization is a target. It's whether your defenses were built for the threat that exists today.
Speaker:
Sibito Morley — Co-Founder and President, Veromesh.ai · Former Chief Data Officer, Sinch (~1T of Western-world mobile message traffic flows through this network) · Former CTO, Lumen, Century Link, Davita