Blog
/
/
March 20, 2019

The Invisible Threat: How AI Catches the Ursnif Trojan

The cyber AI approach successfully detected the Ursnif infections even though the new variant of this malware was unknown to security vendors at the time.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
20
Mar 2019

Over the past few months, I’ve analyzed some of the world’s stealthiest trojan attacks like Emotet, which employ deception to bypass traditional security tools that rely on rules and signatures. Guest contributor Keith Siepel also explained how cyber AI defenses managed to catch a zero-day trojan on his firm’s network for which no such rules or signatures yet exist. Indeed, with the incidence of banking trojans having increased by 239% among our customer base last year, it appears that this kind of subterfuge is the new normal.

However, one particularly sophisticated trojan, Ursnif, takes deception a step further evidence of which we are still seeing emerge. Rather than writing executable files that contain malicious code, some of its variants instead exploit vulnerabilities inherent to a user’s own applications, essentially turning the victim’s computer against them. The result of this increasingly common technique is that — once the victim has been tricked into clicking a malicious link or duped into opening an attachment via a phishing email — Ursnif begins to ‘live off the land’, blending into the victim’s environment. And by exploiting Microsoft Office and Windows features, such as document macros, PsExec, and PowerShell scripts, Ursnif can execute commands directly from the computer’s RAM.

One of the most prevalent and destructive strains of the Gozi banking malware, Ursnif was recently placed at the center of a new campaign that saw it dramatically expand its functionality. Originally created to infect hosts with spyware in order to steal sensitive banking information and user credentials, it can now also deploy advanced ransomware like GandCrab. These new functions are aided by the elusive trojan’s aforementioned file-less capabilities, which render it invisible to many security tools and allow it to hide in plain sight within legitimate, albeit corrupted applications. Shining a light on Ursnif therefore requires AI tools that can learn to spot when these applications act abnormally:

Cyber AI detects Ursnif on multiple client networks

First campaign: February 4, 2019

Darktrace detected the initial Ursnif compromise on a customer’s network when it caught several devices connecting to a highly unusual endpoint and subsequently downloading masqueraded files, causing Darktrace’s “Anomalous File / Masqueraded File Transfer” model to breach. Such files are often masqueraded as other file types not only to bypass traditional security measures but also to deceive users — for instance, with the intention of tricking a user into executing a file received in a malicious email by disguising it as a document.

As it happens, this Ursnif variant was a zero-day at the time Darktrace detected it, meaning that its files were unknown to antivirus vendors. But while the never-before-seen files bypassed the customer’s endpoint tools, Darktrace AI leveraged its understanding of the unique ‘pattern of life’ for every user and device in the customer’s network to flag these file downloads as threatening anomalies — without relying on signatures.

A sample of the masqueraded files initially downloaded:

File: xtex13.gas
File MIME type: application/x-dosexec
Size: 549.38 KB
Connection UID: C8SlueG1mT7VdcJ00

File: zyteb17.gas
File MIME type: application/x-dosexec
SHA-1 hash: 4ed60393575d6b47bd82eeb03629bdcb8876a73f
Size: 276.48 KB

File: File: adnaz2.gas
File MIME type: application/x-dosexec
Size: 380.93 KB
Connection UID: CmPOzP1AC4tzuuuW00

A sample of the endpoints detected:

kieacsangelita[.]city · 209.141.60[.]214
muikarellep[.]band · 46.29.167[.]73
cjasminedison[.]com · 185.120.58[.]13

Following the initial suspicious downloads, the compromised devices were further observed making regular connections to multiple rare destinations not previously seen on the affected network in a pattern of beaconing connectivity. In some cases, Darktrace marked these external destinations as suspicious when it recognized the hostnames they queried as algorithm-generated domains. High volumes of DNS requests for such domains is a common characteristic of malware infections, which use this tactic to maintain communication with C2 servers in spite of domain black-listing. In other cases, the endpoints were deemed suspicious because of their use of self-signed SSL certificates, which cyber-criminals often use because they do not require verification by a trusted authority.

In fact, the large volume of anomalous connections commonly triggered a number of Darktrace’s behavioral models, including:

Compromise / DGA Beacon
Anomalous Connection / Suspicious Self-Signed SSL
Compromise / High Volume of Connections with Beacon Score
Compromise / Beaconing Activity To Rare External Endpoint

Beaconing is a method of communication frequently seen when a compromised device attempts to relay information to its control infrastructure in order to receive further instructions. This behavior is characterized by persistent external connections to one or multiple endpoints, a pattern that was repeatedly observed for those devices that had previously downloaded malicious files from the endpoints later associated with the Ursnif campaign. While beaconing behavior to unusual destinations is not necessarily always indicative of infection, Darktrace AI concluded that, in combination with the suspicious file downloads, this type of activity represented a clear indication of compromise.

Figure 1: A device event log that shows the device had connected to internal mail servers shortly before downloading the malicious files.

Lateral movement and file-less capabilities

In the wake of the initial compromise, Darktrace AI also detected Ursnif’s lateral movement and file-less capabilities in real time. In the case of one infected device, an “Anomalous Connection / High Volume of New Service Control” model breach was triggered following the aforementioned suspicious activities. The device in question was flagged after making anomalous SMB connections to at least 47 other internal devices, and after accessing file shares which it had not previously connected. Subsequently, the device was observed writing to the other devices’ service control pipe – a channel used for the remote control of services. The anomalous use of these remote-control channels represent compelling examples of how Ursnif leverages its file-less capabilities to facilitate lateral movement.

Figure 2: Volume of SMB writes made to the service control pipe on internal devices by one of the infected devices, as shown on the Darktrace UI.

Although network administrators often use remote control channels for legitimate purposes, Darktrace AI considered this particular usage highly suspicious, particularly as both devices had previously breached a number of behavioral models as a result of infection.

Second campaign: March 18, 2019

A second Ursnif campaign was detected just this week. At the time of detection, no OSINT was available for the C2 servers nor the malware samples.

On a US manufacturer’s network, the initial malware download took place from: xqzuua1594[.]com/loq91/10x.php?l=mow1.jad hosted on IP 94.154.10[.]62.
Every single malware download is unique. This is indicating auto-patching or a malware factory working in the background.
Darktrace immediately identified this as another Anomalous File / Masqueraded File Transfer.

Directly after this, initial C2 was observed with the following parameters:

HTTP GET to: vwdlpknpsierra[.]email
Destination IP: 162.248.225[.]14
URI: /images/CKicJCsNNNfaJwX6CJ/0Ohp3OUfj/pI_2FszUK7ybqh33Qdwz/bOUeatCG2Qfks5DTzzO/H6SeiL8YozEYXKfornjfVt/hBgfcPVPCOf1H/2qo12IGl/L3B18ld4ZSx37TbdTUpALih/A5dl8FVHel/jMPIKnQfd/H.avi
User Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko

What’s interesting here is that the C2 server provides a Sufee Admin login page:

This C2 appears to have bad operational security (OPSEC) as browsing random URIs on the server reveals some of the dashboard’s contents:

The initial C2 communication was followed by sustained TCP beaconing to ksylviauudaren[.]band on 185.180.198[.]245 over port 443 with SSL encryption using a self-signed certificate. Darktrace highlighted this C2 behavior as Compromise / Sustained TCP Beaconing Activity To Rare Endpoint and Anomalous Connection / Repeated Rare External SSL Self-Signed IP.

As of the writing of this article, the domain ksylviauudaren[.]band was still not recognized in OSINT as malicious – highlighting again Darktrace’s independence of signatures and rules to catch previously unknown threats.

Conclusion

The cyber AI approach successfully detected the Ursnif infections even though the new variant of this malware was unknown to security vendors at the time. Moreover, it even managed to catch Ursnif’s file-less capabilities for lateral movement through its modelling of expected patterns of connectivity. In terms of the wider security context, the ease with which cyber AI flagged such sophisticated malware — malware which takes action by corrupting a computer’s own applications — further demonstrates that AI anomaly detection is the only way to navigate a threat landscape increasingly populated by near-invisible trojans.

IoCs

kieacsangelita[.]city · 209.141.60[.]214
muikarellep[.]band · 46.29.167[.]73
cjasminedison[.]com · 185.120.58[.]13
xqzuua1594[.]com · 94.154.10.[6]2
vwdlpknpsierra[.]email · 162.248.225[.]14
ksylviauudaren[.]band · 185.180.198[.]245

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO

More in this series

No items found.

Blog

/

AI

/

May 20, 2026

Prompt Security in Enterprise AI: Strengths, Weaknesses, and Common Approaches

prompt securityDefault blog imageDefault blog image

How enterprise AI Agents are changing the risk landscape  

Generative AI Agents are changing the way work gets done inside enterprises, and subsequently how security risks may emerge. Organizations have quickly realized that providing these agents with wider access to tooling, internal information, and granting permissions for the agent to perform autonomous actions can greatly increase the efficiency of employee workflows.

Early deployments of Generative AI systems led many organizations to scope individual components as self-contained applications: a chat interface, a model, and a prompt, with guardrails placed at the boundary. Research from Gartner has shown that while the volume and scope of Agentic AI deployments in enterprise environments is rapidly accelerating, many of the mechanisms required to manage risk, trust, and cost are still maturing.

The issue now resides on whether an agent can be influenced, misdirected, or manipulated in ways that leads to unsafe behavior across a broader system.

Why prompt security matters in enterprise AI

Prompt security matters in enterprise AI because prompts are the primary way users and systems interact with Agentic AI models, making them one of the earliest and most visible indicators of how these systems are being used and where risk may emerge.

For security teams, prompt monitoring is a logical starting point for understanding enterprise AI usage, providing insight into what types of questions are being asked and tasks are being given to AI Agents, how these systems are being guided, and whether interactions align with expected behavior. Complete prompt security takes this one step further, filtering out or blocking sensitive or dangerous content to prevent risks like prompt injection and data leakage.

However, visibility only at the prompt layer can create a false sense of security. Prompts show what was asked, but not always why it was asked, or what downstream actions were triggered by the agent across connected systems, data sources, or applications.

What prompt security reveals  

The primary function of prompt security is to minimize risks associated with generative and agentic AI use, but monitoring and analysis of prompts can also grant insight into use cases for particular agents and model. With comprehensive prompt security, security teams should be able to answer the following questions for each prompt:

  • What task was the user attempting to complete?
  • What data was included in the request, and was any of the data high-risk or confidential?
  • Was the interaction high-risk, potentially malicious, or in violation of company policy?
  • Was the prompt anomalous (in comparison to previous prompts sent to the agent / model)?

Improving visibility at this layer is a necessary first step, allowing organizations to establish a baseline for how AI systems are being used and where potential risks may exist.  

Prompt security alone does not provide a complete view of risk. Further data is needed to understand how the prompt is interpreted, how context is applied, what autonomous actions the agent takes (if any), or what downstream systems are affected. Understanding the outcome of a query is just as important for complete prompt security as understanding the input prompt itself – for example, a perfectly normal, low-risk prompt may inadvertently result in an agent taking a high-risk action.

Comprehensive AI security systems like Darktrace / SECURE AI can monitor and analyze both the prompt submitted to a Generative AI system, as well as the responses and chain-of-thought of the system, providing greater insight into the behavior of the system. Darktrace / SECURE AI builds on the core Darktrace methodology, learning the expected behaviors of your organization and identifying deviations from the expected pattern of life.

How organizations address prompt security today

As prompt-level visibility has become a focus, a range of approaches have emerged to make this activity more observable and controllable. Various monitoring and logging tools aim to capture prompt inputs to be analyzed after the fact.  

Input validation and filtering systems attempt to intervene earlier, inspecting prompts before they reach the model. These controls look for known jailbreak patterns, language indicative of adversarial attacks, or ambiguous instructions which could push the system off course.

Importantly, for a prompt security solution to be accurate and effective, prompts must be continually observed and governed, rather than treated as a point-in-time snapshot.  

Where prompt security breaks down in real environments

In more complex environments, especially those involving multiple agents or extensive tool use, AI security becomes harder to define and control.

Agent-to-Agent communications can be harder to monitor and trace as these happen without direct user interaction. Communication between agents can create routes for potential context leakage between agents, unintentional privilege escalation, or even data leakage from a higher privileged agent to a lower privileged one.

Risk is shaped not just by what is asked, but by the conditions in which that prompt operates and the actions an agent takes. Controls at the orchestration layer are starting to reflect this reality. Techniques such as context isolation, scoped memory, and role-based boundaries aim to limit how far a prompt’s influence can extend.  

Furthermore, Shadow AI usage can be difficult to monitor. AI systems that are deployed outside of formal governance structures and Generative AI systems hosted on unknown endpoints can fly under the radar and can go unseen by monitoring tools, leaving a critical opening where adversarial prompts may go undetected. Darktrace / SECURE AI features comprehensive detection of Shadow AI usage, helping organizations identify potential risk areas.

How prompt security fits in a broader AI risk model

Prompt security is an important starting point, but it is not a complete security strategy. As AI systems become more integrated into enterprise environments, the risks extend to what resources the system can access, how it interprets context, and what actions it is allowed to take across connected tools and workflows.

This creates a gap between visibility and control. Prompt security alone allows security teams to observe prompt activity but falls short of creating a clear understanding of how that activity translates into real-world impact across the organization.

Closing that gap requires a broader approach, one that connects signals across human and AI agent identities, SaaS, cloud, and endpoint environments. It means understanding not just how an AI system is being used, but how that usage interacts with the rest of the digital estate.

Prompt security, in that sense, is less of a standalone solution and more of an entry point into a larger problem: securing AI across the enterprise as a whole.

Explore how Darktrace / SECURE AI brings prompt security to enterprises

Darktrace brings more than a decade of AI expertise, built on an enterprise‑wide platform designed to operate in and understand the behaviors of the complex, ambiguous environments where today’s AI now lives. With Darktrace / SECURE AI, enterprises can safely adopt, manage, monitor, and build AI within their business.  

Learn about Darktrace / SECURE AI here.

Sign up today to stay informed about innovations across securing AI.

[related-resource]

Continue reading
About the author
Jamie Bali
Technical Author (AI) Developer

Blog

/

AI

/

May 20, 2026

State of AI Cybersecurity 2026: 77% of security stacks include AI, but trust is lagging

Default blog imageDefault blog image

Findings in this blog are taken from Darktrace’s annual State of AI Cybersecurity Report 2026.

AI is a contributing member of nearly every modern cybersecurity team. As we discussed earlier in this blog series, rapid AI adoption is expanding the attack surface in ways that security professionals have never before experienced while also empowering attackers to operate at unprecedented speed and scale. It’s only logical that defenders are harnessing the power of AI to fight back.

After all, AI can help cybersecurity teams spot the subtle signs of novel threats before humans can, investigate events more quickly and thoroughly, and automate response. But although AI has been widely adopted, this technology is also frequently misunderstood, and occasionally viewed with suspicion.

For CISOs, the cybersecurity marketplace can be noisy. Making sense of competing vendors’ claims to distinguish the solutions that truly deliver on AI’s full potential from those that do not isn’t always easy. Without a nuanced understanding of the different types of AI used across the cybersecurity stack, it is difficult to make informed decisions about which vendors to work with or how to gain the most value from their solutions. Many security leaders are turning to Managed Security Service Providers (MSSPs) for guidance and support.

The right kinds of AI in the right places?

Back in 2024, when we first conducted this annual survey, more than a quarter of respondents were only vaguely familiar with generative AI or hadn’t heard of it at all. Today, GenAI plays a role in 77% of security stacks. This percentage marks a rapid increase in both awareness and adoption over a relatively short period of time.

According to security professionals, different types of AI are widely integrated into cybersecurity tooling:

  • 67% report that their organization’s security stack uses supervised machine learning
  • 67% report that theirs uses agentic AI
  • 58% report that theirs uses natural language processing (NLP)
  • 35% report that theirs uses unsupervised machine learning

But their responses suggest that organizations aren’t always using the most valuable types of AI for the most relevant use cases.

Despite all the recent attention AI has gotten, supervised machine learning isn’t new. Cybersecurity vendors have been experimenting with models trained on hand-labeled datasets for over a decade. These systems are fed large numbers of examples of malicious activity – for instance, strains of ransomware – and use these examples to generalize common indicators of maliciousness – such as the TTPs of multiple known ransomware strains – so that the models can identify similar attacks in the future. This approach is more effective than signature-based detection, since it isn’t tied to an individual byte sequence or file hash. However, supervised machine learning models can miss patterns or features outside the training data set. When adversarial behavior shifts, these systems can’t easily pivot.

Unsupervised machine learning, by contrast, can identify key patterns and trends in unlabeled data without human input. This enables it to classify information independently and detect anomalies without needing to be taught about past threats. Unsupervised learning can continuously learn about an environment and adapt in real time.

One key distinction between supervised and unsupervised machine learning is that supervised learning algorithms require periodic updating and re-training, whereas unsupervised machine learning trains itself while it works.

The question of trust

Even as AI moves into the mainstream, security professionals are eyeing it with a mix of enthusiasm and caution. Although 89% say they have good visibility into the reasoning behind AI-generated outputs, 74% are limiting AI’s ability to take autonomous action in their SOC until explainability improves. 86% do not allow AI to take even small remediation actions without human oversight.

This model, commonly known as “human in the loop,” is currently the norm across the industry. It seems like a best-of-both-worlds approach that allows teams to experience the benefits of AI-accelerated response without relinquishing control – or needing to trust an AI system.

Keeping humans somewhat in the loop is essential for getting the best out of AI. Analysts will always need to review alerts, make judgement calls, and set guardrails for AI's behavior. Their input helps AI models better understand what “normal” looks like, improving their accuracy over time.

However, relying on human confirmation has real costs – it delays response, increases the cognitive burden analysts must bear, and creates potential coverage gaps when security teams are overwhelmed or unavailable. The traditional model, in which humans monitor and act on every alert, is no longer workable at scale.

If organizations depend too heavily on in-the-loop humans, they risk recreating the very problem AI is meant to solve: backlogs of alerts waiting for analyst review. Removing the human from the loop can buy back valuable time, which analysts can then invest in building a proactive security posture. They can also focus more closely on the most critical incidents, where human attention is truly needed.

Allowing AI to operate autonomously requires trust in its decision-making. This trust can be built gradually over time, with autonomous operations expanding as trust grows. But it also requires knowledge and understanding of AI — what it is, how it works, and how best to deploy it at enterprise scale.

Looking for help in all the right places

To gain access to these capabilities in a way that’s efficient and scalable, growing numbers of security leaders are looking for outsourced support. In fact, 85% of security professionals prefer to obtain new SOC capabilities in the form of a managed service.

This makes sense: Managed Security Service Providers (MSSPs) can deliver deep, continuously available expertise without the cost and complexity of building an in-house team. Outsourcing also allows organizations to scale security coverage up or down as needs change, stay current with evolving threats and regulatory requirements, and leverage AI-native detection and response without needing to manage the AI tools themselves.

Preferences for MSSP-delivered security operations are particularly strong in the education, energy (87%), and healthcare sectors. This makes sense: all are high-value targets for threat actors, and all tend to have limited cybersecurity budgets, so the need for a partner who can deliver affordable access to expertise at scale is strong. Retailers also voiced a strong preference for MSSP-delivered services. These companies are tasked with managing large volumes of consumer personal and financial data, and with transforming an industry traditionally thought of as a late adopter to a vanguard of cyber defense. Technology companies, too, have a marked preference for SOC capabilities delivered by MSSPs. This may simply be because they understand the complexity of the threat landscape – and the advantages of specialized expertise — so well.

In order to help as many organizations as possible – from major enterprises to small and midmarket companies – benefit from enterprise-grade, AI-native security, Darktrace is making it easier for MSSPs to deliver its technology. The ActiveAI Security Portal introduces an alert dashboard designed to increase the speed and efficiency of alert triage, while a new AI-powered managed email security solution is giving MSSPs an edge in the never-ending fight against advanced phishing attacks – helping partners as well as organizations succeed on the frontlines of cyber defense.

Explore the full State of AI Cybersecurity 2026 report for deeper insights into how security leaders are responding to AI-driven risks.

Learn more about securing AI in your enterprise.

[related-resource]

Continue reading
About the author
The Darktrace Community
Your data. Our AI.
Elevate your network security with Darktrace AI