AI Malware Evades Microsoft Defender 8% of the Time, Study Shows

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 2 min read

AI Malware Bypassing Microsoft Defender

A recent study reveals that AI-powered malware can evade Microsoft Defender approximately 8% of the time. This finding comes from researchers at Outflank, who will present their work at the Black Hat 2025 conference. The malware utilizes an open-source language model, Qwen 2.5, which was developed over three months with a budget of around $1,500.

Cybersecurity


Image courtesy of Tom's Hardware

According to Kyle Avery, principal offensive specialist lead at Outflank, the capability of this AI malware is significant when considering the scale of potential attacks. "If deployed at a large enough scale to access one in every 10 of the 1.4 billion active Windows machines, this could result in over 11 million compromised PCs," he stated.

This new development poses a challenge for Microsoft, as the AI malware can generate variants that bypass security measures without needing internet access for training. The implications are serious as the sophistication of AI tools rises, making it easier for cybercriminals to create effective phishing schemes and malicious software.

For further reading, see PCWorld, Windows Central, and Tom's Hardware.

Reinforcement Learning Techniques

The training process for this AI malware involved reinforcement learning, a technique that improves models based on feedback. Avery explained, "I wrote a program to grade how close the AI model came to outputting an evasion tool." This iterative process allowed the model to become increasingly effective at generating functional malware.

Anonymous computer hacker


Image courtesy of Windows Central

Avery highlighted the challenges faced during development, noting that traditional LLMs typically require internet data for training. However, by utilizing reinforcement learning, he was able to create a program that could generate malware while circumventing Microsoft Defender's alerts effectively.

This development showcases the potential for AI to disrupt traditional cybersecurity methods, as it allows for more adaptive and innovative approaches to malware creation. For a deeper examination of this topic, see Dark Reading, and Windows Central.

Impact and Future Considerations

The emergence of AI malware that can bypass Microsoft Defender raises questions about the future of cybersecurity. As Avery noted, "It's important to consider what happens when Microsoft Defender is improved to compensate for these new threats." The ongoing arms race between cybersecurity and cybercriminals continues to evolve, with AI advancements influencing the landscape.

Windows 11 start search


Image courtesy of PCWorld

With AI tools becoming increasingly accessible, the potential for widespread misuse becomes a pressing concern. The cybersecurity industry must adapt to these developments, ensuring that defenses evolve alongside emerging threats. For more on this, explore Tom's Hardware, PCWorld, and Windows Central.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article