Powering This Analysis:

  • 2.6M+ AI-related posts analyzed across underground sources in just five months — including jailbreak prompts, fraud toolkits, and deepfake services.
  • 100,000+ illicit sources tracked, giving unmatched visibility into how adversaries are experimenting, optimizing, and operationalizing AI.
  • 5 distinct threat actor use cases, from multilingual phishing kits to synthetic voice impersonation tools.