AI Malware Evades Microsoft Defender 8% of the Time, Study Shows

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025
2 min read

AI Malware Bypassing Microsoft Defender

A recent study reveals that AI-powered malware can evade Microsoft Defender approximately 8% of the time. This finding comes from researchers at Outflank, who will present their work at the Black Hat 2025 conference. The malware utilizes an open-source language model, Qwen 2.5, which was developed over three months with a budget of around $1,500.

Cybersecurity


Image courtesy of Tom's Hardware

According to Kyle Avery, principal offensive specialist lead at Outflank, the capability of this AI malware is significant when considering the scale of potential attacks. "If deployed at a large enough scale to access one in every 10 of the 1.4 billion active Windows machines, this could result in over 11 million compromised PCs," he stated.

This new development poses a challenge for Microsoft, as the AI malware can generate variants that bypass security measures without needing internet access for training. The implications are serious as the sophistication of AI tools rises, making it easier for cybercriminals to create effective phishing schemes and malicious software.

For further reading, see PCWorld, Windows Central, and Tom's Hardware.

Reinforcement Learning Techniques

The training process for this AI malware involved reinforcement learning, a technique that improves models based on feedback. Avery explained, "I wrote a program to grade how close the AI model came to outputting an evasion tool." This iterative process allowed the model to become increasingly effective at generating functional malware.

Anonymous computer hacker


Image courtesy of Windows Central

Avery highlighted the challenges faced during development, noting that traditional LLMs typically require internet data for training. However, by utilizing reinforcement learning, he was able to create a program that could generate malware while circumventing Microsoft Defender's alerts effectively.

This development showcases the potential for AI to disrupt traditional cybersecurity methods, as it allows for more adaptive and innovative approaches to malware creation. For a deeper examination of this topic, see Dark Reading, and Windows Central.

Impact and Future Considerations

The emergence of AI malware that can bypass Microsoft Defender raises questions about the future of cybersecurity. As Avery noted, "It's important to consider what happens when Microsoft Defender is improved to compensate for these new threats." The ongoing arms race between cybersecurity and cybercriminals continues to evolve, with AI advancements influencing the landscape.

Windows 11 start search


Image courtesy of PCWorld

With AI tools becoming increasingly accessible, the potential for widespread misuse becomes a pressing concern. The cybersecurity industry must adapt to these developments, ensuring that defenses evolve alongside emerging threats. For more on this, explore Tom's Hardware, PCWorld, and Windows Central.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article