Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Attackers Didn’t Wait for AI. They Built Workflows Around It.
Published:
April 22, 2026

Attackers Didn’t Wait for AI. They Built Workflows Around It.

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

Key Takeaways

  • Attackers aren’t just using AI. They’re redesigning entire workflows around it. The real shift is where and how attacks happen, not just the tools involved.
  • The most effective attacks now look like normal work. From search results to AI-style answers, malicious activity blends seamlessly into everyday user behavior.
  • Phishing has evolved from campaigns into scalable systems. With productized infrastructure and AI-generated lures, attacks run continuously at machine speed.
  • Trust is the new attack surface. Whether it’s search engines, AI outputs, or identity systems, attackers win by inserting themselves into places users already rely on.

The earliest adopter of AI wasn’t your security team. It wasn’t even your vendor. It was the adversary.

"Adversarial poetry" is an intriguing phrase making the rounds in security research circles lately. If you’re not familiar, here’s the short version. Researchers in Italy found that frontier AI models could be tricked into ignoring their safety guardrails when malicious prompts were disguised as flowery poetic metaphors and verse.

It worked 62% of the time across 25 frontier language models. Let that sink in for a minute. 

It’s a kind of finding that grabs your attention. It certainly did for us. And when we shared it on LinkedIn, it sparked a lot of discussion within our community.

But it’s also just one data point in a much bigger story.

What we’re seeing in the wild isn’t just attackers experimenting with AI models anymore. It’s attackers building their workflows around AI, because that’s where people are searching, troubleshooting, and working. These workflows move faster, blend into everyday behaviond make malicious actions feel normal to the victims.

That shift is something we’re already observing in practice. As John Hammond, Senior Principal Security Researcher at Huntress, noted in a recent _declassified session:

“I think threat actors and organized cybercriminals were kind of the earliest adopters and maybe first movers to leverage artificial intelligence… We now have threats that are moving sort of at machine speed. They're leveraging AI to pull off these attacks.”

At Huntress, we’ve seen this pattern play out across multiple recent incidents. Different techniques and different entry points, but the same underlying shift.


Old tricks, new targets: Fake AI tools in search

We know that attackers have always followed user behavior and adapted to exploit it. Right now, users are searching for and downloading AI tools, like Claude Code, ChatGPT integrations, and developer assistants, often multiple times a day. Things that make their workflows faster and more efficient. 

So attackers moved there, too. Instead of inventing something new, they’re scaling what already works: SEO poisoning, malvertising, and convincing download pages placed exactly where users expect to find legitimate tools.

In one case, a Huntress engineer searched for “Claude Code” and clicked a top sponsored result that appeared completely legitimate. Same naming, same positioning, nothing off at first glance.


Figure 1: The legitimate search and the questionable result


Unfortunately, it wasn’t legit. The download delivered malware designed to quietly steal credentials. The technical details were what we’d expect to see: obfuscation, staged payloads, targeting sensitive data. The delivery was something new, though.

As our Chief Security Officer (CSO), Eric Stride, put it: 

"Most people don't expect the top Google result to be malicious, but occasionally, it is."

The attacker didn’t need to trick a random user. They only needed to show up at the exact moment someone in their workflow started looking for an AI tool they already trusted.

The engineer shut things down quickly, and it never turned into a full incident thanks to a fast Security Operations Center (SOC) response. But this story is a clear example that attackers are inserting themselves directly into AI adoption.


When “helpful” AI answers become the attack

The next step isn’t just getting users to download fake AI tools. It’s also about getting them to trust the instructions these tools provide.

In a recent AMOS stealer campaign, users searching for something as routine as “clear disk space on macOS” were served results that looked like ChatGPT or Grok conversations. The pages were structured exactly the way people expect to see in their workflow: clean formatting, step-by-step explanations, and Terminal commands presented as normal system maintenance.

Nothing about the response felt sketchy. A user followed the instructions, ran the command, and that was enough to expose credentials, compromise the system, and install persistent malware. 

What matters here isn’t that an AI system did something wrong. It’s that attackers have recreated the experience of getting help from one to launch an attack.

As Chris Henderson, CISO at Huntress, said:

“Most incidents don’t look like attacks at first. They look like normal activity—until the context doesn’t make sense.”

That’s exactly what’s happening here. The attack doesn’t stand out because it blends in with a user’s normal online activity. It looks like the kind of AI answer you’d expect, delivered in the format you trust, for a task you perform all the time.



Phishing as a product: Infrastructure at machine speed

They’re not just hacking anymore. Attackers are running full-scale product launches, building and selling systems that can be reused, scaled, and adapted in real time. Operations like EvilTokens highlight that shift.


Figure 2: EvilTokens product store

By early 2026, attackers were already using platforms like Railway to spin up session token theft infrastructure on demand, impacting hundreds of organizations globally in a matter of weeks.

But the infrastructure is only part of the story. As attacks become productized, the phishing lures themselves evolve just as quickly.

Instead of relying on reusable templates that get flagged by email filters, attackers generate messages tailored to each target, aligned to roles, tools, organizations, and workflows. For example, both the B2B Sender and Capture Link products in EvilTokens support AI workflows that help bypass email filtering, tailor phishing lures, and find sensitive emails for wire fraud or data exfiltration activities. This is how attackers make each interaction feel normal because it closely mirrors how the victims’ workflows actually operate.

Figure 3: EvilTokens dashboard with custom branding options for phishing lures

AI also helps attackers to correlate signals such as user behavior, authentication flows, SaaS activity, and trusted infrastructure in real time, packaging them into experiences that look and behave like normal business operations.

Figure 4: EvilTokens product update with announcement of integrated AI tooling


When attacks are built on trusted platforms and delivered through expected workflows, the line between legitimate and malicious activity blurs. In that environment, the attack doesn’t need to break authentication. It only needs to operate within it.

And when infrastructure, lures, and execution can all be generated on demand at scale, phishing stops being a campaign and becomes a system that runs at machine speed, designed to blend in so well that nothing looks wrong until it is too late.


The throughline

It’s tempting to frame all of this as simply “AI-powered attacks.” But there's more to it than that. 

AI isn’t the weapon in these stories. Attackers are shaping workflows around systems people already trust, and AI is accelerating how quickly those workflows can scale and adapt.

We see that in different forms. Sometimes it’s mimicking AI-generated answers. Sometimes it means showing up in search results for AI tools. And sometimes it’s abusing identity systems at scale using infrastructure that blends into normal traffic.

The approaches are different, but the outcomes are the same. Faster, scalable, and stealthier paths to compromise that don’t look like attacks at all.

The goal for defenders is to build resilient teams that can catch what tools miss and respond before it becomes a crisis.




Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Credential Theft: Expanding Your Reach, Pt. II

    As with many tactics within the MITRE ATT&CK framework, credential theft consists of a number of different techniques. Showing what many of them look like on an endpoint helps other security professionals understand what to look for and how to detect and respond to similar activity.
  • Learn to Think Like a Hacker at hack_it 2021.2

    Do you have what it takes to hack_it? Read on for a sneak peek into our upcoming hack_it event and how it can help you better understand how hackers use their skills against you.
  • Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

    Threat actors often steal data during the course of their attacks. This is particularly true for ransomware threat actors, who do it before deploying file encryption in order to engage in “double extortion” activities. This activity can be difficult to detect, particularly if it’s not dissimilar to legitimate actions taken by system administrators.
  • Velociraptor Misuse, Pt. II: The Eye of the Storm

    Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more.
  • How Security-Centric Procedures and Training Helped Huntress Catch a $100,000 BEC Scam

    Discover how Huntress caught an attempted business email compromise (BEC) scam that would have cost the company more than $100,000 had it gone undetected.
  • A Series of Unfortunate (RMM) Events

    Recently, the Huntress SOC has observed threat actors increasingly use PDQ and GoTo Resolve to deploy further remote monitoring and management (RMM) tools in attacks.
  • How to Detect and Eliminate Persistent Malware Before It Wreaks Havoc

    Stopping malware isn’t about catching one-off alerts. It’s about finding and shutting down the persistence that keeps them in your systems. Here’s how Huntress found, fought, and drop-kicked malware that others missed.
  • Insights: RMM Tools

    Over the past year, the Huntress team has posted a number of blog posts related to remote monitoring and management (RMM) tools being installed or abused by threat actors.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy