The Use of Artificial Intelligence in Cyberattacks, Part 1

Fundamental Concepts of Artificial Intelligence and the Cyber Kill Chain Model

doi: 10.32567/hm.2025.4.3

Absztrakt

The rapid advancement of artificial intelligence (AI) technology has fundamentally transformed the field of cybersecurity, impacting both defensive and offensive capabilities. This series of articles analyses the malicious applications of artificial intelligence in cyberattacks, structured around the Cyber Kill Chain model. It details how AI can increase the effectiveness, automation and stealth of attacks in all phases of cyberattacks described by the Cyber Kill Chain model, from reconnaissance to actions on objectives. The aim of this series of articles is to provide a comprehensive overview of current threats and to highlight the importance of further research and proactive defence strategies. This article, the first in the series, covers the definitions of AI and the Cyber Kill Chain model to the extent necessary for understanding.

Kulcsszavak:

artificial intelligence cybersecurity cyberattack Cyber Kill Chain machine learning deep learning phishing malware

Hivatkozások

ABBADI, Driss – LACHKAR, Abdelkader (2024): Cyber Threats in the Age of Artificial Intelligence. Exploiting Advanced Technologies and Strengthening Cybersecurity. International Journal of Science and Research Archive, 13(1), 2576–2588. Online: https://doi.org/10.30574/ijsra.2024.13.1.1961

AWS [s. a.]: What is Deep Learning in AI? AWS, s. a. Online: https://aws.amazon.com/what-is/deep-learning/

BADMAN, Annie – KOSINSKI, Matthew [s. a.]: What is AI security? IBM/think. Online: https://www.ibm.com/think/topics/ai-security

ERDÉSZ, Viktor (2023): A mesterséges intelligencia alkalmazása a katonai nemzetbiztonsági hírszerzésben. Budapest: Katonai Nemzetbiztonsági Szolgálat. Online: https://bit.ly/4tKmx65

KIDD, Chrissy (2024): Cyber Kill Chains: Strategies & Tactics. Splunk, 26 August 2024. Online: https://www.splunk.com/en_us/blog/learn/cyber-kill-chains.html

GOSS, Adam (2024): The Cyber Kill Chain: A Powerful Model For Analyzing Cyberattacks. Kraven Security, 11 March 2024. Online: https://kravensecurity.com/cyber-kill-chain/

Hungary’s Artificial Intelligence Strategy 2020–2030 (2020). AI Coalition – Digital Success Programme – Ministry for Innovation and Technology. Online: https://mik.neum.hu/wp-content/uploads/2025/03/2020-hungarian-AI-strategy.pdf

JORDAN, Michael I. – MITCHELL, Tom M. (2015): Machine Learning: Trends, Perspectives, and Prospects. Science, 349(6245), 255–260. Online: https://doi.org/10.1126/science.aaa8415

Magyarország Mesterséges Intelligencia Stratégiája (2025–2030) [Hungary’s Artificial Intelligence Strategy (2025–2030)] (2025). Online: https://cdn.kormany.hu/uploads/document/c/c0/c0d/c0dfdbd37cfa520ae37361a168d244c85e7295af.pdf

MATTIOLI, Rossella et al. (2023): Identifying Emerging Cybersecurity Threats and Challenges for 2030. European Union Agency for Cybersecurity (ENISA). Online: https://doi.org/10.2824/117542

MCCARTHY, John (2007): What is Artificial Intelligence? Online: https://www-formal.stanford.edu/jmc/whatisai.pdf

Microsoft [s. a.a]: What is AI for Cybersecurity? Microsoft Security, s. a. Online: https://www.microsoft.com/en-us/security/business/security-101/what-is-ai-for-cybersecurity

Microsoft [s. a.b]: What is the Cyber Kill Chain? Microsoft Security, s. a. Online: https://www.microsoft.com/en-us/security/business/security-101/what-is-cyber-kill-chain

Pentera [s. a.]: Cyber Kill Chain. Glossary Pentera, s. a. Online: https://pentera.io/glossary/cyber-kill-chain-framework-explained/

RADLE, Andrew J. et al. (2023): MITRE FiGHTTM: High-Level Overview. MITRE Five-G Hierarchy of Threats (FiGHT). The MITRE Corporation. Online: https://fight.mitre.org/FiGHT_High-Level_Overview_PRS-23-2698.pdf

Team Antier (2022): DAO és Metaverzum: Egy kiváló kombináció és megoldás a holnap világa számára. Antier Solutions. 4 October 2022. Online: https://www.antiersolutions.com/hu/blogok/A-dao-%C3%A9s-a-metaverzum-egy-kiv%C3%A1l%C3%B3-kombin%C3%A1ci%C3%B3-%C3%A9s-megold%C3%A1s-a-holnap-vil%C3%A1ga-sz%C3%A1m%C3%A1ra/

The Cyber Kill Chain® [s. a.]. Lockheed Martin. Online: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

USMAN, Yusuf – UPADHYAY, Aadesh – CHATAUT, Robin – GYAWALI, Prashnna K. (2024): Is Generative AI the Next Tactical Cyber Weapon for Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks. arXiv:2408.12806. Online: https://doi.org/10.48550/arXiv.2408.12806

VELAZQUEZ, Chris (2015): Detecting and Preventing Attacks Earlier in the Kill Chain. Global Information Assurance Certification Paper. The SANS Institute. Online: https://www.giac.org/paper/gsec/36774/detecting-preventing-attacks-earlier-kill-chain/145219

What Is a Cyber Kill Chain? | Pure Storage. (n.d.). Retrieved 28 October 2025, from Online: https://www.purestorage.com/knowledge/cyber-kill-chain.html

WOLFENSTEIN, Konrad (2023): Mesterséges intelligencia vagy metaverzum? Mi a fontosabb? Vagy itt szinergiák alakulnak ki a további úttörő fejlesztések érdekében? Xpert.Digital, 28 December 2023. Online: https://xpert.digital/hu/ki-metaverzum/