Disrupting malicious uses of AI | February 2026
TL;DR
Threat actors combine AI models with traditional tools across platforms, as shown in case studies. Sharing insights helps industry and society identify and avoid such malicious AI uses.
Tags
In the two years since we began publishing these threat reports, we have gained important insights into the ways threat actors attempt to abuse AI models. In particular, the case studies in this report, as in our earlier reports, illustrate how threat actors typically use AI in combination with other, more traditional tools such as websites and social media accounts. Threat activity is seldom limited to one platform; as our report on a Chinese influence operator shows, it is not always limited to one AI model. Rather, threat actors may use different AI models at various points in their operational workflow. We share these insights in our threat reports so that our industry, and wider society, can be better placed to identify and avoid such threats.
Read the full report here(opens in a new window).