ASSESSMENT OF THE IMPACT OF SOFTWARE TOOLS BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGIES ON RESOURCE EFFICIENCY IN CONDUCTING DESTRUCTIVE CYBER OPERATIONS AGAINST CRITICAL INFRASTRUCTURE OBJECTS
DOI: 10.31673/2409-7292.2025.031896
DOI:
https://doi.org/10.31673/2409-7292.2025.031896Abstract
The development of artificial intelligence technologies, together with the performances of the catalyst for the
development of cyberspace entities. Modern software tools that provide the capabilities of artificial intelligence technology are
actively used both by “ethical hackers” (cybersecurity specialists), in particular in cyber protection tools for antivirus programs,
EDR/XDR, SIEM, CTI platforms, and by cyber threat actors (hackers). According to the estimates of the cybersecurity company
“Crowdstrike”, cyber threat actors, of course, release software tools based on AI technologies for free in two cases: for quickly
writing the software code of the payload/script and for preparing text-visual phishing tools. In addition, cybersecurity experts
have identified numerous modular AI platforms for creating malicious code, conducting social engineering, selecting and
implementing MITRE procedures, Darknet - reconnaissance and reverse engineering, etc. The use of such software allows
cyberthreat actors to significantly reduce financial, time and human resources for deployment, including destructive cyberattacks
within the framework of cyber operations against critical infrastructure facilities. Thanks to the implementation and adaptation
of such accessible software solutions, attackers can do without the participation of individual narrowly specialized technical
specialists, perfect knowledge of programming languages and significantly reduce the life cycle of a cyber operation by several
times, which completes the mass of such activities. In the future, this process creates new challenges for the cyber defense
system, taking into account the impact of intelligent technologies, which remain increasingly functionally enriched and
increasingly accessible.
Keywords: artificial intelligence (AI), software tools based on AI technologies, cyber operation, cyber-attack,
specialized technological Trojan software, critical infrastructure facility, Stuxnet.
References
1. Kiran Maraju, Rashu, Tejaswi Sagi “Hackers Weaponry: Leveraging AI Chatbots for Cyber Attacks”// Proceedings of
the International Conference on Cybersecurity, Situational Awareness and Social Media (pp.385-398), February 2024;
2. Calvin NMN Nobles Offensive Artificial Intelligence in Cybersecurity: Techniques, Challenges, and Ethical
Considerations // Real-World Solutions for Diversity, Strategic Change, and Organizational Development (pp.348-363), June
2023;
3. Michael N. Schmitt, Liis Vihul “Tallin manual 2.0 on the international law applicable to cyber operations”, Cambridge
university press, 2017, p. 564;
4. ЗУ “Про основні засади забезпечення кібербезпеки України” [Електронний ресурс] режим доступу:
https://zakon.rada.gov.ua/laws/show/2163-19#Text;
5. Kareem K., Naik N., Jenkins P., Grace P., Song JP., “Understanding the Defence of Operational Technology Systems:
A Comparison of Lockheed Martin’s Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Model”, Contributions
presented at the international conference on computing, communication, cybersecurity and AI, 2024;
6. Maathuis C. “Human-Centred AI in Military Cyber Operations”, International Conference on Cyber Warfare and
Security, 2024;
7. Donald G. Dunn, Eric Cosman “Cybersecurity Fundamentals Are Not Just for Industrial Control Systems: Guidance
and Direction Are Available”, IEEE, 2024;
8. Кібератаки UAC-0001 на сектор безпеки та оборони із застосуванням програмного засобу LAMEHUG, що
використовує LLM (велику мовну модель) [Електронний ресурс] режим доступу доступу :https: // cert.gov.ua /
article/6284730;
9. Kour, R , Karim, R, Dersin, P “Modelling cybersecurity strategies with game theory and cyber kill chain”,
International journal of system assurance engineering and management, 2025;
10. F. Charmet, H. C. Tanuwidjaja, S. Ayoubi, P.-F. Gimenez, Y. Han, H. Jmila, G. Blanc, T. Takahashi, and Z. Zhang,
“Explainable artificial intelligence for cybersecurity: a literature survey,” Annals of Telecommunications - annales des tel´
ecommunications ´ , vol. 77, no. 11-12, pp. 789–812, Dec. 2022. [Online]. Available: https: //hal.science/hal-03965590;
11. Gustavo Bergantinos and Juan Vidal-Puga “A value for PERT problems” [Електронний ресурс] режим доступу:
https://www.worldscientific.com/doi/epdf/10.1142/S0219198909002418;
12. .K. Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, New York: Crown,
2014.