IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack

Related

CISOs to Watch in Georgia’s Financial Services Sector

Georgia’s financial services sector includes banks, wealth management firms,...

ScreenConnect Vulnerability Exposes Machine Keys, Enables Session Hijacking

What happened ConnectWise disclosed a critical vulnerability in its ScreenConnect...

RondoDox Botnet Targets 174 Vulnerabilities Across Devices and Platforms

What happened Researchers at Bitsight identified a large-scale campaign involving...

11 Cybersecurity Vendors CISOs Must Check Out at RSA Conference 2026

Cybersecurity has shifted from reactive defense to continuous, intelligence-driven...

Share

What happened

IBM X-Force uncovered a likely AI-generated malware strain called Slopoly during a ransomware incident involving the financially motivated threat group Hive0163. The script was deployed on an already compromised Windows server and functioned as the client component of a custom command-and-control framework, with persistence established through a scheduled task named Runtime Broker. IBM said the malware’s structure showed likely signs of AI-assisted development, including extensive comments, consistent error handling, clearly named variables, and an unused “Jitter” function. The broader intrusion began with a ClickFix social-engineering attack and progressed through tools including NodeSnake, InterlockRAT, AzCopy, and Advanced IP Scanner, with Slopoly used later in the attack chain to maintain access to the infected server. 

Who is affected

Organizations hit by Hive0163 ransomware activity are affected, particularly Windows environments where attackers can gain initial access through social engineering and maintain persistence with custom malware. 

Why CISOs should care

The discovery shows how threat actors can use likely AI-generated malware to speed up development of custom tools for persistence and command-and-control, while blending those tools into broader ransomware operations. 

3 practical actions

  1. Watch for ClickFix-style initial access attempts. Monitor for fake verification pages and suspicious PowerShell execution triggered by user interaction. 
  2. Hunt for Hive0163 indicators of compromise. Review systems for artifacts tied to Slopoly, NodeSnake, InterlockRAT, and the reported C2 infrastructure. 
  3. Prioritize behavior-based detection. IBM X-Force advised defenders to move beyond signature-based tools because AI-generated malware may not match known patterns. 

For more coverage of malicious code, infostealers, loaders, and ransomware tooling, explore our reporting under the Malware tag.