IBM links likely AI-generated Slopoly malware to Interlock ransomware attack


IBM X-Force says a new malware strain called Slopoly was used during an Interlock ransomware intrusion, where it helped attackers keep access to a compromised server for more than a week and support data theft. The company describes Slopoly as a likely AI-generated PowerShell backdoor, but stops short of claiming proof about which model created it.

That distinction matters. The strongest confirmed claim here is not that AI wrote the malware with certainty, but that the script shows strong signs of large language model-assisted development. IBM points to traits such as extensive comments, structured logging, error handling, clearly named variables, and unused code that resembles iterative AI-assisted output.

IBM attributes the intrusion to a financially motivated cluster it tracks as Hive0163, which it says has deployed Interlock ransomware in major attacks. According to IBM, the group used Slopoly late in the attack chain after an initial ClickFix social engineering lure, alongside other malware including NodeSnake, InterlockRAT, JunkFiction, and the Interlock ransomware payload itself.

What IBM says Slopoly did

FunctionReported behavior
PersistenceCreates a scheduled task named Runtime Broker
C2 communicationsSends heartbeat beacons every 30 seconds
Command pollingChecks for commands every 50 seconds
Command executionRuns received commands through cmd.exe
Data returnSends command output back to the C2
LoggingMaintains a rotating persistence.log file
Deployment pathC:\ProgramData\Microsoft\Windows\Runtime\

These technical details come from IBM’s analysis of the PowerShell script used in the incident. IBM says the malware was likely generated by a builder that inserted static configuration values such as session IDs, mutex names, command-and-control addresses, and beacon intervals.

Why the “AI-generated” label needs care

IBM’s report does not claim that Slopoly is advanced because of AI. In fact, the company says the script is “mediocre at best” from a technical standpoint and lacks the self-modifying behavior suggested by its own “polymorphic” label. IBM also says it could not determine which model was used, though it believes the quality suggests a less advanced one.

So the real story is not that AI suddenly created elite malware. It is that AI may have helped attackers build custom malware faster and with less effort. IBM frames this as an early sign that threat actors can now produce workable tools more quickly, even if those tools are not especially sophisticated.

Attack chain at a glance

  • Initial access came through a ClickFix social engineering tactic.
  • Attackers later deployed Slopoly to maintain access for more than a week.
  • IBM says the same intrusion also involved NodeSnake, InterlockRAT, and the JunkFiction loader.
  • The final ransomware stage used a 64-bit Windows Interlock payload.

IBM says the ransomware sample it observed could run as a scheduled task with SYSTEM privileges and used the Windows Restart Manager API to unlock files before encrypting them. The encrypted files reportedly received either the . !NT3RLOCK or .int3R1Ock extensions.

Attack chain deploying Slopoly in a later stage
Source: IBM X-Force

Why this incident matters

This case matters because it shows a practical use of AI in cybercrime, not a theoretical one. IBM’s assessment suggests attackers may already be using generative AI to speed up malware development, create custom backdoors, and adjust tooling during live intrusions. That does not make the malware better than established families overnight, but it can shorten development time and lower the skill barrier for attackers.

It also fits a broader pattern around Interlock. IBM and IBM X-Force Exchange describe Interlock as a big-game ransomware operation tied to multi-stage intrusions, multiple backdoors, and extortion-focused campaigns. Slopoly appears to be one more tool in that ecosystem rather than a standalone breakthrough.

FAQ

Was Slopoly definitely written by AI?

No public report proves that with certainty. IBM says the script shows strong indicators of large language model-assisted development, but it could not identify the exact model.

What did Slopoly do in the attack?

IBM says it acted as a PowerShell backdoor that maintained persistence, contacted a command-and-control server, executed commands, and returned the results.

How did the attack begin?

IBM says the intrusion started with a ClickFix social engineering lure, then expanded through additional malware and ransomware components.

Was Slopoly sophisticated malware?

IBM says no. The company describes it as technically unsophisticated and says it mainly shows how AI can speed up malware creation rather than produce advanced capabilities by itself.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages