Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » News » Cyber Threats » Hackers are Now Using “KawaiiGPT,” a Dangerous New AI, to Power Attacks

Hackers are Now Using “KawaiiGPT,” a Dangerous New AI, to Power Attacks

Last updated:November 26, 2025
Human Written
  • KawaiiGPT, a free illegal LLM, has helped cybercriminals by sharing high-end hacking tools via a deceptively alluring open-source platform.

  • The platform generates sophisticated, digitally undetectable malicious documents, which include highly effective spear-phishing campaigns and useful Python scripts for network lateral transitions and extensive ransomware workflows.

  • Its high-end and super accessibility are bolstering data breach cycles, which forces digital security defenders to quickly change strategies from identifying poor code to depending on AI anomaly detection.

Hackers are Now Using KawaiiGPT a Dangerous New AI, to Power Attacks

The cybersecurity threat space is currently experiencing a swift transition, and is spurred by the democratization of illicit tools via the use of Artificial Intelligence. The most recent concern for cybersecurity researchers is the use of an illegal, black-hat AI model large language model (LLM) called KawaiiGPT.

KawaiiGPT was launched in July 2025 and is currently running version 2.5. However, the LLM is quickly enabling rookie and beginner-level hackers with the ability to run complicated hacks that previously needed notable coding experience. The LLM provides high-end services completely free and conceals its destructive nature with a deceptively beginner-friendly user interface (UI). Thus, it is bolstering the commoditization of online crime.

Democratizing Cybercrime: Free, Easy to Deploy, and Open-Source

It is worth noting that KawaiiGPT’s success among threat actors comes mainly from its extreme accessibility. Established black-hat LLMs such as WormGPT 4 charge monthly paid fees; however, KawaiiGPT is open source and hosted on repository platforms like GitHub. It also enables threat actors to run setups quickly on Linux OS, luring several hundreds of individuals through Telegram channels.

Furthermore, cybersecurity analysts point out the LLM’s lightweight CLI launches smoothly and allows even script kiddies to craft high-end attacks without requiring deep coding skills. KawaiiGPT launches useful Python scripts for lateral transitioning using Paramiko SSH modules. It also conducts data theft via smtplib and os.walk.

Due to this ease of access, hackers easily authenticate remotely, launch backdoors, exfiltrate documents smoothly, and escalate privileges. According to the report, more than 500 registered individuals, with 180 active in Telegram group chats, as at the beginning of November 2025, discuss tips to improve its offensive features.

Sophisticated Attack Generation: From Seamless Phishing to Extensive Ransomware

The LLM generates deceptive lures, such as “Urgent: Validate Your Account Details,” and links to fake websites that steal credentials using hxxps[:]//fakebankverify[.]com/updateinfo. Prompts like this evade security filters via smooth and flawless context and grammar, which far surpass the mainstream low-quality scams.

As per a report, the code generation covers crucial hacking phases, automates digital network pivots that once required top hacking expertise. According to the report, it further facilitates cybercrimes by combining legit libraries, helps the evasion of data loss avoidance tools, and its outputs mimic regular browsing traffic.

Furthermore, the LLM generates comprehensive ransomware workflows, such as threatening notes that claim “military-grade encryption” on documents. It also uses 72-hour deadlines and demands payments via Bitcoin to the hacker’s wallets.

Unit 42 observed that scripts encrypt PDF files with AES-256, guide engineers from hack to extortion, and support Tor data theft. According to the report, data exfiltration demos aim for Windows EML documents, recurrently scanning through from drives to email attachments anonymously via the Tor network. For a clear explanation of this hidden network and how it enables such anonymity, see our guide on what the deep web is. Attackers can further customize them for evasion and compression, leveraging Python standards to run quick campaigns.

Share this article

About the Author

Memchick E

Memchick E

Digital Privacy Journalist

Memchick is a digital privacy journalist who investigates how technology and policy impact personal freedom. Her work explores surveillance capitalism, encryption laws, and the real-world consequences of data leaks. She is driven by a mission to demystify digital rights and empower readers with the knowledge to protect their anonymity online.

View all posts by Memchick E >
Comments (0)

No comments.