Current Cyber Threats

CyberstrikeAI Tool Adopted by Hackers for AI-Powered Attacks

Summary:
Team Cymru has identified a significant uptick in the use of CyberStrikeAI, an open-source, AI-augmented offensive security tool (OST) developed by a China-based individual, "Ed1s0nZ," who is assessed to have ties to Chinese state-sponsored cyber operations. CyberStrikeAI is a sophisticated platform built in Go that integrates over 100 existing security tools (such as Nmap, Metasploit, and SQLMap) with an intelligent AI orchestration engine. This engine allows even low-skilled operators to automate complex attack chains, from reconnaissance to post-exploitation, using conversational AI agents. Recent telemetry indicates a sharp rise in activity, specifically targeting Fortinet FortiGate devices. Between January and February 2026, over 21 unique IP addresses were observed running the platform, many of which were directly involved in a campaign that compromised over 600 edge devices across 55 countries.


Security Officer Comments:
The emergence of CyberStrikeAI represents a "democratization" of sophisticated cyberattacks. Historically, complex, multi-stage network exploitation required a high degree of manual expertise; however, this tool lowers the barrier to entry by using AI to handle the orchestration and decision-making usually reserved for human "hands-on-keyboard" attackers.

The specific focus on Fortinet FortiGate appliances highlights a persistent trend: threat actors are prioritizing edge devices and network infrastructure that often sit outside traditional endpoint detection and response (EDR) visibility. Because the tool is open-source and developed by an individual with links to the Knownsec 404 Starlink Project (associated with Chinese MSS/PLA interests), researchers anticipate rapid adoption by both state-aligned APTs and opportunistic "script kiddies." This means the volume and speed of automated reconnaissance and exploitation attempts against your perimeter are likely to increase. The use of "invisible watermarking" and AI-assisted privilege escalation (via related tools like PrivHunterAI) suggests that these actors are also becoming more adept at maintaining long-term persistence while evading forensic discovery.


Suggested Corrections:
To defend against the automated, AI-driven TTPs associated with CyberStrikeAI and similar orchestration engines, organizations should implement the following measures:
  • Harden Edge Infrastructure: Immediately audit all Fortinet FortiGate and other edge appliances. Disable administrative management interfaces (HTTPS/SSH) on the public-facing internet. Where remote management is required, enforce strict IP whitelisting and mandatory multi-factor authentication (MFA).
  • Behavioral NetFlow Monitoring: Since CyberStrikeAI often generates high-frequency scanning and unique service banners (specifically on port 8080), defenders should monitor NetFlow for unusual outbound connections to unauthorized IPs in China, Singapore, and Hong Kong, as these remain primary hosting hubs for the platform's C2.
  • Update Vulnerability Management: Prioritize patching for known vulnerabilities in edge devices (CVEs related to VPNs and Firewalls). The CyberStrikeAI campaign largely relied on weak authentication and known flaws rather than zero-days; therefore, maintaining a rigorous patch cycle for "low-hanging fruit" is the most effective defense.
  • Credential Hygiene: Implement robust password policies and rotate credentials for all service accounts. CyberStrikeAI’s automated modules are designed to harvest and crack credentials once initial access is gained.

Link(s):
https://www.team-cymru.com/post/tracking-cyberstrikeai-usage