Executive Summary
The cybercrime world is undergoing a fundamental transformation. According to a comprehensive report by Trend Microâs Forward-Looking Threat Research team, weâre witnessing the evolution from âCybercrime-as-a-Serviceâ to âCybercrime-as-a-Sidekickââa shift that dramatically changes how criminal operations function and threatens to overwhelm traditional security defenses.
This isnât just about AI writing better phishing emails. Weâre entering an era where artificial intelligence agents can autonomously plan, execute, and adapt complex criminal operations with minimal human interventionâoperating more like sophisticated enterprise platforms than simple tools. crimininal-agentic-ai_research-papercrimininal-agentic-ai_research-paper.pdf3 MB.a{fill:none;stroke:currentColor;stroke-linecap:round;stroke-linejoin:round;stroke-width:1.5px;}download-circle
What Is Agentic AI?
Unlike traditional AI chatbots that simply respond to prompts, agentic AI systems can:
- Reason and plan complex multi-step operations- Act autonomously without constant human supervision- Interact with external systems through APIs, web clients, and other tools- Adapt and learn from their environment in real-time- Coordinate multiple tasks simultaneously at machine speed
Think of the difference between asking a human assistant to âdraft an emailâ versus instructing them to âmanage my entire email workflow, schedule meetings based on context, research recipients, and adapt communication style accordingly.â Thatâs the leap from simple AI to agentic AI.
From Service to Sidekick: The Criminal Evolution
The Old Model: Cybercrime-as-a-Service
For years, cybercrime has operated like an underground marketplace:
- Need malware? Buy it from a specialized vendor- Want stolen credentials? Purchase them from a data broker- Looking for hosting? Rent bulletproof servers- Need to launder money? Hire cryptocurrency tumblers
Criminals manually assembled these pieces, requiring technical knowledge, coordination skills, and significant time investment.




The New Model: Cybercrime-as-a-Sidekick
Agentic AI fundamentally changes this equation by:
- Automating coordination - AI orchestrators manage the entire criminal workflow2. Scaling operations exponentially - One criminal can now operate dozens of simultaneous campaigns3. Reducing technical barriers - Low-skill criminals can execute sophisticated attacks4. Self-healing infrastructure - Systems automatically rebuild when parts are taken offline5. Adaptive tactics - Operations adjust in real-time based on victim responses and security measures
Five Game-Changing Capabilities
1. Massive Scaling of Existing Operations
Real-world example: The Dragonforce ransomware group now offers automated analysis services for stolen data that:
- Provide comprehensive risk reports for targeted organizations- Generate prepared communication scripts- Create tailored messages for CEOs and decision-makers
What previously took weeks of manual analysis now happens in hoursâor minutes.
2. Unprecedented Flexibility and Adaptation
Traditional malware follows rigid scripts. Agentic systems can:
- Identify victim type (consumer, small business, enterprise)- Customize payloads in real-time- Switch tactics mid-attack based on discovered vulnerabilities- Prioritize high-value targets automatically
Case study: Trend Micro researchers observed an agentic system that:
- Scanned for vulnerabilities matching the attackerâs toolkit- Executed and adapted exploitation attempts in real-time- Triaged successful compromises and reported back to operators- All without human intervention beyond initial goal-setting
3. Self-Healing, Distributed Infrastructure
Criminal agentic systems employ âagent-watching agentsâ that:
- Continuously monitor other agentsâ operational status- Detect when agents go offline- Automatically redeploy compromised components- Spread across multiple jurisdictions to evade takedowns
This creates infrastructure that behaves like a peer-to-peer botnetâextremely difficult to permanently disable.
4. Making Low-Margin Scams Profitable
Previously unprofitable scam types are becoming viable:
High-volume social engineering: Operations like grandparent scams, lottery frauds, and tech support schemes historically required extensive human interaction for minimal returns. Agentic AI can now:
- Conduct millions of simultaneous conversations- Maintain context across long-term engagements- Generate deepfake videos and AI-generated images for authenticity- Identify and focus on the most vulnerable targets
According to Malwarebytesâ 2025 State of Malware Report, âAI-assisted malicious emails doubled over the past two years,â and this trend is accelerating with agentic capabilities.
5. Creating Entirely New Attack Categories
Perhaps most concerning, agentic AI enables attacks that were previously technically or economically impossible.
Real-World Proof of Concept: License Plate Phishing
Trend Micro researchers developed a proof-of-concept demonstration showing how agentic systems can execute novel attack chains:
The Attack Flow:
- Discovery Agent scans internet-exposed security cameras using services like Shodan2. Collection Agent captures license plate images from camera feeds3. Recognition Agent uses computer vision to extract plate numbers and vehicle details4. Enhancement Agent cross-references plates with breach databases (like the 2021 ParkMobile data breach)5. Analysis Agent matches vehicles to owners and prioritizes targets6. Communication Agent generates personalized phishing messages
Example message:
âYour vehicle (2023 Kia Niro) with plate #ABC1234 was flagged at [specific location] for a traffic incident. To avoid penalties, confirm your details at: [malicious link]â
The sophistication lies in the accuracy and personalizationâvictims receive messages that match:
- Their actual vehicle make and model- Their license plate number- Locations they actually frequent- Realistic municipal or parking authority branding
Researchers note: âThe likelihood of people falling for this scheme is extremely high, especially if they receive an urgent-looking text that matches their actual vehicle and locations they recognize.â
Critically, this entire workflow can be assembled using no-code platforms like n8nâmeaning individuals without programming expertise can deploy these systems.
The Three Laws of Cybercrime Adoption
Trend Microâs research team has identified patterns in how criminals adopt new technologies:
Law 1: Criminals Want an Easy Life
Crime is appealing when it offers higher rewards with less effort than legitimate work. Agentic AI delivers exactly this.
Law 2: ROI Must Beat Alternatives
For widespread adoption, returns must substantially exceed existing methods. Current evidence suggests agentic approaches are reaching this threshold.
Law 3: Evolution, Not Revolution
Criminals focus on short-term gains. Only after a leading group demonstrates clear profitability does rapid ecosystem-wide adoption occurâa âNexus Event.â
We may be approaching this nexus point right now. Ransomware success rates are declining due to improved defenses, creating pressure for innovation. Simultaneously, agentic AI tools are becoming accessible and proven effective.
Timeline: What to Expect
Near-Term (Current - 2026)
AI as accelerant:
- Enhanced traditional attacks (better phishing, faster malware development)- AI-dependent threats (deepfakes, high-volume social engineering)- Increased targeting of cloud and AI infrastructure- Experimentation with basic agent systems
Already observed:
- Anthropic disrupted sophisticated espionage campaigns using Claude for autonomous attacks- Famous Chollima (North Korean group) used GenAI to automate fake resume creation, deepfake interviews, and technical tasks- Cybercriminals are building malware with AI assistance even when they lack coding skills
Medium-Term (2026-2028)
True agentic ecosystems emerge:
- Tiered criminal agent marketplaces (Bronze/Silver/Gold subscription tiers)- Sophisticated orchestrator frameworks become standard- âCybercrime-as-a-Sidekickâ overtakes traditional service models- Attacks increase 10-100x in volume and speed
Predictions:
- Gartner forecasts 33% of enterprise apps will include agentic AI by 2028- CrowdStrike reports adversaries are already âtreating AI agents like infrastructure, attacking them the same way they target SaaS platformsâ
Long-Term (2028+)
Second-order effects reshape the landscape:
- Highly distributed, self-healing criminal infrastructure becomes standard- Autonomous criminal enterprises operate independently of human creators- Criminal leaders become âdesigners and teachersâ rather than operators- AI agents may continue generating profits even while operators are imprisoned
Implications:
- Law enforcement must investigate systems, not just individuals- Defensive AI becomes mandatory to match attacker speed and scale- Traditional security approaches become obsolete
Novel Threats: What Scams to Watch For
1. AI-Powered Ransomware Data Exploitation
Instead of just encrypting data, criminals use AI to:
- Parse millions of stolen records in hours- Identify the most sensitive/valuable information- Generate personalized extortion messages to executives- Calculate optimal ransom amounts based on financial analysis- Create âalarmingâ ransom notes with psychological targeting
Impact: Dragonforce and similar groups now offer this as a service to other criminals.
2. Continuous Credential Harvesting
Agentic systems that:
- Monitor for new data breaches 24/7- Automatically test credentials across thousands of services- Build victim profiles from multiple sources- Package high-value accounts for targeted attacks
Real case: Anthropic detected Claude being used for âlarge-scale theft and extortionâ targeting 17+ organizations including healthcare, emergency services, and government agencies, with ransom demands exceeding $500,000.
3. IoT Camera Surveillance Networks
Beyond license plates, criminals can:
- Monitor building entry/exit patterns- Identify high-value targets through vehicle analysis- Build detailed schedules of victim movements- Coordinate physical and digital attacks
4. Deepfake-Enhanced Social Engineering
AI agents that:
- Generate realistic video calls with cloned voices- Impersonate executives during financial authorization requests- Create convincing social media profiles with AI-generated photos- Maintain long-term fraudulent relationships
5. Automated Investment/Romance Scams
Systems capable of:
- Managing hundreds of simultaneous victim conversations- Adapting communication style to individual psychology- Researching victims through social media and public records- Generating realistic âproofâ documents and images- Coordinating cryptocurrency laundering automatically
How Defenders Are Responding
The AI Arms Race
According to the Trend Micro report: âOrganizations are presently in the preliminary phases of this technological evolution. While most cybercriminal entities continue to experiment with rudimentary AI capabilities, the cybersecurity landscape faces an impending transformation.â
Key defensive innovations:
- AI-Driven Threat Detection: Platforms like Trend Vision One process thousands of vulnerabilities at machine speed2. Continuous Risk Assessment: Attack Surface Risk Management (ASRM) systems monitor exposure points in real-time3. Behavioral Analysis: Detection systems look for AI agent patterns rather than traditional malware signatures4. Honeypot Networks: Organizations like Palisade Research deploy âLLM Agent Honeypotâ systemsâvulnerable servers masquerading as valuable targets to detect and study AI agent attacks5. Non-Human Identity (NHI) Management: New security frameworks track and control API keys, service accounts, and authentication tokens used by AI agents
The Challenge for Organizations
The exponential increase in attack volume and speed requires:
- Defensive systems that scale automatically and respond instantaneously- AI-powered security operations matching criminal agent capabilities- Zero-trust architectures extending beyond human identities to cover AI agents- Continuous monitoring of both human and machine identities- Quantum-resistant cryptography as AI accelerates cryptographic attacks
As CrowdStrikeâs Adam Meyers warns: âEvery AI agent is a superhuman identity: autonomous, fast and deeply integrated, making them high-value targets.â
What This Means for Everyday People
For Individuals
Increased risk of:
- Highly personalized phishing targeting your specific circumstances- Deepfake video/audio scams impersonating family members- Automated romance/investment scams with unprecedented realism- Physical surveillance combined with digital attacks- Scams referencing specific details about your life, vehicle, location, or schedule
Protection strategies:
- Verify unexpected communications through separate channels- Be skeptical of urgency, even when details seem accurate- Use strong, unique passwords with 2FA everywhere- Question requests involving money, even from âfamiliarâ voices/faces- Understand that scammers now have access to vast data about you
For Businesses
Prepare for:
- Attack volumes 10-100x higher than current levels- Attacks that adapt in real-time to your defenses- Targeting of your AI and cloud infrastructure- Ransomware groups with AI-enhanced data analysis- Competitorsâ AI agents being compromised to attack you
Essential actions:
- Deploy AI-powered security platforms immediately- Implement comprehensive NHI (non-human identity) management- Assume breach and focus on detection/response over prevention alone- Train employees on AI-enhanced social engineering- Develop incident response plans for autonomous attacks
For the Security Community
The paradigm shift:
- Human-speed defense is obsolete- Manual investigation of every alert is impossible- Traditional signature-based detection fails against adaptive agents- Network perimeter security is insufficient- Identity management must cover machines, not just humans
Red Flags: Spotting AI Agent Activity
While sophisticated AI agents can be difficult to detect, watch for:
Communication Red Flags
- Messages with oddly perfect grammar in non-native languages- Responses that are too quick or too perfectly tailored- Multiple simultaneous interactions from same âpersonâ- Conversations that seem to pull information from various sources seamlessly- Requests that follow logical sequences but feel âoffâ
Technical Red Flags
- Unusual API access patterns (rapid, sequential calls)- Credential testing at machine speed- Reconnaissance activity that systematically covers all attack surfaces- Malware that adapts its behavior in real-time- Attacks that seem coordinated across multiple vectors simultaneously
Behavioral Red Flags
- Scammers who know surprising details about you- Messages that reference your schedule, vehicle, or locations accurately- Requests timing perfectly with your known activities- Communications that adapt to your responses rather than following scripts
The Critical Question: Are We Prepared?
The Trend Micro report concludes with a stark warning: âThe future of cybercrime is agentic, and if defenders donât adapt at the same pace, we will be playing catch up for a long time.â
Current Reality Check
Cybercriminal advantages:
- Lower barriers to entry (no-code platforms enable agentic attacks)- Faster innovation cycles (no compliance or ethical constraints)- Immediate monetization (crime pays, funding further development)- Global talent pool (anonymous collaboration across borders)
Defender challenges:
- Budget constraints limiting AI security investments- Skills shortage in AI-powered defense- Legacy systems vulnerable to AI exploitation- Regulatory uncertainty around AI in security- Slower adoption cycles in enterprise environments
The Adoption Gap
At present, legitimate AI security innovation outpaces criminal adoptionâbut this advantage is temporary. As Trend Micro notes: âThreat actors can simply wait and replicate whatever proves most effective in an industryâa balance that is always eventually restored in the medium term.â
The window for building robust defenses is now, before criminal agentic systems reach full maturity.
Recommendations: Building Resilience
For Individuals
- Verify everything: Develop a personal verification protocol for unexpected communications2. Separate channels: Confirm urgent requests through different contact methods3. Question accuracy: Detailed, personalized messages may indicate AI targeting4. Share carefully: Assume criminals have access to your public information5. Stay informed: Understand emerging AI scam tactics through resources like ScamWatchHQ
For Businesses
Immediate actions:
- Conduct AI risk assessment: Identify where AI agents could target your operations2. Deploy AI-powered security: Traditional tools cannot match agentic attack speed3. Inventory non-human identities: Catalog all API keys, service accounts, and tokens4. Implement behavioral monitoring: Detect unusual patterns indicating AI activity5. Train your workforce: Educate on AI-enhanced social engineering tactics
Strategic investments:
- AI-driven threat detection platforms (like Trend Vision One, CrowdStrike Falcon)2. Continuous risk exposure management systems3. Zero-trust architecture covering both human and machine identities4. Incident response automation to match attacker speed5. Threat intelligence focused on agentic attack patterns
For Law Enforcement & Regulators
- Develop frameworks for investigating autonomous criminal systems, not just individuals2. International cooperation to combat distributed, self-healing criminal infrastructure3. Update laws to address AI agent criminal liability4. Resource allocation for AI-powered forensic capabilities5. Public awareness campaigns about agentic threat landscape
Conclusion: The Dawn of Autonomous Cybercrime
We stand at an inflection point. The transformation from âCybercrime-as-a-Serviceâ to âCybercrime-as-a-Sidekickâ represents more than a technological evolutionâitâs a fundamental restructuring of how criminal enterprises operate.
The Nexus Event Approaches
All indicators suggest weâre nearing the âNexus Eventââthe rapid, ecosystem-wide adoption of agentic AI by criminals:
â Technology matured: Tools are accessible via no-code platforms â Profitability proven: Early adopters demonstrate superior returns â Criminal pressure: Traditional methods face declining success â Barrier reduction: Technical skills no longer required
When this nexus arrives, the attack landscape will transform overnightânot gradually.
The Choice Before Us
The security community, businesses, and individuals face a clear decision:
Option 1: Wait and react after agentic criminal operations become standard Result: Years of playing catch-up, massive financial losses, undermined trust
Option 2: Invest now in AI-powered defenses and resilience Result: Prepared infrastructure, trained workforce, competitive advantage
A Call to Action
The Trend Micro researchers emphasize: âOrganizations will encounter entirely new categories of cyberattacks that were previously technically or economically infeasible prior to the advent of artificial intelligence capabilities.â
These arenât theoretical future threats. Theyâre happening now:
- Anthropic disrupted AI-orchestrated espionage in September 2025- Dragonforce offers AI-powered ransom analysis services today- CrowdStrike tracks 265+ attack groups, many experimenting with agentic AI- Verizon reports AI-assisted attacks doubled in two years
Final Thoughts
The good news: Defensive AI is advancing rapidly, and organizations investing now can build robust protection.
The concerning news: The window is closing. Once criminal agentic systems achieve widespread adoption, the volume and sophistication of attacks will overwhelm unprepared defenses.
The question isnât whether agentic AI will transform cybercrimeâitâs whether weâll be ready when it does.
Stay vigilant. Stay informed. Stay protected.
Additional Resources
For Further Reading
- Trend Micro Full Report: âVibeCrime: Preparing Your Organization for the Next Generation of Agentic AI Cybercrimeâ- Anthropic Threat Report: âDetecting and Countering Misuse of AI: August 2025â- Malwarebytes: 2025 State of Malware Report- CrowdStrike: 2025 Threat Hunting Report- World Economic Forum: âNon-Human Identities: Agentic AIâs New Frontier of Cybersecurity Riskâ
About ScamWatchHQ: We track emerging fraud tactics and provide actionable intelligence to help individuals and organizations protect themselves from evolving threats. Our research team monitors global scam trends, cybercriminal innovation, and defensive strategies to keep our community informed and secure.
Article last updated: December 11, 2025
