AI Malware Evades Microsoft Defender 8% of the Time, Study Shows

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 2 min read

AI Malware Bypassing Microsoft Defender

A recent study reveals that AI-powered malware can evade Microsoft Defender approximately 8% of the time. This finding comes from researchers at Outflank, who will present their work at the Black Hat 2025 conference. The malware utilizes an open-source language model, Qwen 2.5, which was developed over three months with a budget of around $1,500.

Cybersecurity
Image courtesy of Tom's Hardware

According to Kyle Avery, principal offensive specialist lead at Outflank, the capability of this AI malware is significant when considering the scale of potential attacks. "If deployed at a large enough scale to access one in every 10 of the 1.4 billion active Windows machines, this could result in over 11 million compromised PCs," he stated.

This new development poses a challenge for Microsoft, as the AI malware can generate variants that bypass security measures without needing internet access for training. The implications are serious as the sophistication of AI tools rises, making it easier for cybercriminals to create effective phishing schemes and malicious software.

For further reading, see PCWorld, Windows Central, and Tom's Hardware.

Reinforcement Learning Techniques

The training process for this AI malware involved reinforcement learning, a technique that improves models based on feedback. Avery explained, "I wrote a program to grade how close the AI model came to outputting an evasion tool." This iterative process allowed the model to become increasingly effective at generating functional malware.

Anonymous computer hacker
Image courtesy of Windows Central

Avery highlighted the challenges faced during development, noting that traditional LLMs typically require internet data for training. However, by utilizing reinforcement learning, he was able to create a program that could generate malware while circumventing Microsoft Defender's alerts effectively.

This development showcases the potential for AI to disrupt traditional cybersecurity methods, as it allows for more adaptive and innovative approaches to malware creation. For a deeper examination of this topic, see Dark Reading, and Windows Central.

Impact and Future Considerations

The emergence of AI malware that can bypass Microsoft Defender raises questions about the future of cybersecurity. As Avery noted, "It's important to consider what happens when Microsoft Defender is improved to compensate for these new threats." The ongoing arms race between cybersecurity and cybercriminals continues to evolve, with AI advancements influencing the landscape.

Windows 11 start search
Image courtesy of PCWorld

With AI tools becoming increasingly accessible, the potential for widespread misuse becomes a pressing concern. The cybersecurity industry must adapt to these developments, ensuring that defenses evolve alongside emerging threats. For more on this, explore Tom's Hardware, PCWorld, and Windows Central.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article