The Use of Artificial Intelligence in Cyberattacks, Part 1
Fundamental Concepts of Artificial Intelligence and the Cyber Kill Chain Model
Copyright (c) 2026 Kovács Zoltán

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Absztrakt
The rapid advancement of artificial intelligence (AI) technology has fundamentally transformed the field of cybersecurity, impacting both defensive and offensive capabilities. This series of articles analyses the malicious applications of artificial intelligence in cyberattacks, structured around the Cyber Kill Chain model. It details how AI can increase the effectiveness, automation and stealth of attacks in all phases of cyberattacks described by the Cyber Kill Chain model, from reconnaissance to actions on objectives. The aim of this series of articles is to provide a comprehensive overview of current threats and to highlight the importance of further research and proactive defence strategies. This article, the first in the series, covers the definitions of AI and the Cyber Kill Chain model to the extent necessary for understanding.
Kulcsszavak:
Hivatkozások
ABBADI, Driss – LACHKAR, Abdelkader (2024): Cyber Threats in the Age of Artificial Intelligence. Exploiting Advanced Technologies and Strengthening Cybersecurity. International Journal of Science and Research Archive, 13(1), 2576–2588. Online: https://doi.org/10.30574/ijsra.2024.13.1.1961
AWS [s. a.]: What is Deep Learning in AI? AWS, s. a. Online: https://aws.amazon.com/what-is/deep-learning/
BADMAN, Annie – KOSINSKI, Matthew [s. a.]: What is AI security? IBM/think. Online: https://www.ibm.com/think/topics/ai-security
ERDÉSZ, Viktor (2023): A mesterséges intelligencia alkalmazása a katonai nemzetbiztonsági hírszerzésben. Budapest: Katonai Nemzetbiztonsági Szolgálat. Online: https://bit.ly/4tKmx65
KIDD, Chrissy (2024): Cyber Kill Chains: Strategies & Tactics. Splunk, 26 August 2024. Online: https://www.splunk.com/en_us/blog/learn/cyber-kill-chains.html
GOSS, Adam (2024): The Cyber Kill Chain: A Powerful Model For Analyzing Cyberattacks. Kraven Security, 11 March 2024. Online: https://kravensecurity.com/cyber-kill-chain/
Hungary’s Artificial Intelligence Strategy 2020–2030 (2020). AI Coalition – Digital Success Programme – Ministry for Innovation and Technology. Online: https://mik.neum.hu/wp-content/uploads/2025/03/2020-hungarian-AI-strategy.pdf
JORDAN, Michael I. – MITCHELL, Tom M. (2015): Machine Learning: Trends, Perspectives, and Prospects. Science, 349(6245), 255–260. Online: https://doi.org/10.1126/science.aaa8415
Magyarország Mesterséges Intelligencia Stratégiája (2025–2030) [Hungary’s Artificial Intelligence Strategy (2025–2030)] (2025). Online: https://cdn.kormany.hu/uploads/document/c/c0/c0d/c0dfdbd37cfa520ae37361a168d244c85e7295af.pdf
MATTIOLI, Rossella et al. (2023): Identifying Emerging Cybersecurity Threats and Challenges for 2030. European Union Agency for Cybersecurity (ENISA). Online: https://doi.org/10.2824/117542
MCCARTHY, John (2007): What is Artificial Intelligence? Online: https://www-formal.stanford.edu/jmc/whatisai.pdf
Microsoft [s. a.a]: What is AI for Cybersecurity? Microsoft Security, s. a. Online: https://www.microsoft.com/en-us/security/business/security-101/what-is-ai-for-cybersecurity
Microsoft [s. a.b]: What is the Cyber Kill Chain? Microsoft Security, s. a. Online: https://www.microsoft.com/en-us/security/business/security-101/what-is-cyber-kill-chain
Pentera [s. a.]: Cyber Kill Chain. Glossary Pentera, s. a. Online: https://pentera.io/glossary/cyber-kill-chain-framework-explained/
RADLE, Andrew J. et al. (2023): MITRE FiGHTTM: High-Level Overview. MITRE Five-G Hierarchy of Threats (FiGHT). The MITRE Corporation. Online: https://fight.mitre.org/FiGHT_High-Level_Overview_PRS-23-2698.pdf
Team Antier (2022): DAO és Metaverzum: Egy kiváló kombináció és megoldás a holnap világa számára. Antier Solutions. 4 October 2022. Online: https://www.antiersolutions.com/hu/blogok/A-dao-%C3%A9s-a-metaverzum-egy-kiv%C3%A1l%C3%B3-kombin%C3%A1ci%C3%B3-%C3%A9s-megold%C3%A1s-a-holnap-vil%C3%A1ga-sz%C3%A1m%C3%A1ra/
The Cyber Kill Chain® [s. a.]. Lockheed Martin. Online: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
USMAN, Yusuf – UPADHYAY, Aadesh – CHATAUT, Robin – GYAWALI, Prashnna K. (2024): Is Generative AI the Next Tactical Cyber Weapon for Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks. arXiv:2408.12806. Online: https://doi.org/10.48550/arXiv.2408.12806
VELAZQUEZ, Chris (2015): Detecting and Preventing Attacks Earlier in the Kill Chain. Global Information Assurance Certification Paper. The SANS Institute. Online: https://www.giac.org/paper/gsec/36774/detecting-preventing-attacks-earlier-kill-chain/145219
What Is a Cyber Kill Chain? | Pure Storage. (n.d.). Retrieved 28 October 2025, from Online: https://www.purestorage.com/knowledge/cyber-kill-chain.html
WOLFENSTEIN, Konrad (2023): Mesterséges intelligencia vagy metaverzum? Mi a fontosabb? Vagy itt szinergiák alakulnak ki a további úttörő fejlesztések érdekében? Xpert.Digital, 28 December 2023. Online: https://xpert.digital/hu/ki-metaverzum/