Researchers at the Department of Energy’s Pacific Northwest National Laboratory (PNNL) are advancing efforts to improve cybersecurity by developing a new tool designed to replicate complex cyber attacks more rapidly and affordably. This initiative, a collaboration with Anthropic, aims to automate the emulation of cyber attacks using the company’s large language model, known as Claude, thereby reducing the time and costs associated with this critical aspect of cyber defense.
The new system, dubbed ALOHA—an acronym for Agentic LLMs for Offensive Heuristic Automation—can condense the normally lengthy cyber attack replication process from several weeks to mere hours. By employing MITRE’s open-source Caldera software, which assists organizations in preparing for and defending against cyber threats, ALOHA enables users to input a text description of an attack. The system then reconstructs the necessary steps to emulate that particular incident, even if it involves a complex chain of tactics and multiple steps.
In a recent Teams interview with SIGNAL Media, Loc Truong, a data scientist at PNNL leading the ALOHA project, and fellow researcher Kristopher Willis, highlighted the importance of efficient attack replication. They noted that many companies charge tens of thousands of dollars for such services, making it prohibitive for some organizations. “Usually, the process is very costly for people to reproduce the attack and can take a team of experts, in the past, a few weeks to months and a lot of money,” Truong said. “We hope to create a tool and techniques to bring down the cost of attack replication so that we can protect critical infrastructure faster when these exploits are discovered.”
Truong outlined a common ransomware technique as an example of the tool’s capabilities. In this scenario, numerous files are encrypted by a binary code, relocated, and subsequently deleted. Traditionally, replicating this process has required substantial resources and time. With ALOHA, however, the effort can be significantly streamlined, expediting critical defenses against emerging threats.
Willis recounted a notable incident from a few years ago when the playbook for the Conti ransomware, attributed to the Russia-based group Wizard Spider, was leaked. The Conti ransomware encrypts victim data and can spread throughout a network, effectively giving attackers full control. This has led to its evolution into a ransomware-as-a-service model. However, ALOHA has the potential to revolutionize how such tactics are countered. “This book was about 30 pages, 40 pages long, that someone had leaked to GitHub,” Willis explained. “You can take the Conti playbook, feed it into ALOHA and be able to build all of the tactics, techniques and procedures.”
Even with translation inaccuracies in the playbook, which sometimes misrepresent certain attacks, ALOHA is designed to pick up on these discrepancies. “They had wrong commands in there, and so these are things that can be picked up as a signature for that particular adversary,” Willis noted. Previously, analyzing such a playbook could take a person 20 to 30 days, but ALOHA reduces that timeframe to about an hour.
The implications of ALOHA extend beyond mere replication of attacks; they signal a broader shift in how organizations can approach cybersecurity. With rapid advancements in automation and artificial intelligence, tools like ALOHA could empower cybersecurity teams to respond to threats with unprecedented speed and efficiency. As cyber threats continue to evolve, the development of such technologies will be critical in safeguarding essential infrastructure and data against increasingly sophisticated attacks.
See also
Anthropic’s Claims of AI-Driven Cyberattacks Raise Industry Skepticism
Anthropic Reports AI-Driven Cyberattack Linked to Chinese Espionage
Quantum Computing Threatens Current Cryptography, Experts Seek Solutions
Anthropic’s Claude AI exploited in significant cyber-espionage operation
AI Poisoning Attacks Surge 40%: Businesses Face Growing Cybersecurity Risks















































