Living Off The AI: A Collection of AI Tools and Their Abuse by Threat Actors
The LOTAI Project tracks how AI tools are exploited by cybercriminals and threat actors. This site aims to inform researchers, defenders, and policymakers.
Used to draft convincing phishing emails, generate malware code, and simulate social engineering conversations.
Read more →Abused for impersonation in social engineering attacks, especially in executive impersonation or business email compromise (BEC).
Read more →Used to create cloned voice audio to bypass voice authentication or impersonate individuals in scams.
Read more →