Connect with us

Hi, what are you looking for?

AI Cybersecurity

PNNL and Anthropic Unveil ALOHA Tool to Replicate Cyber Attacks in Hours, Cutting Costs Significantly

PNNL and Anthropic launch ALOHA, slashing cyber attack replication time from weeks to hours, drastically reducing costs for critical infrastructure defense.

Researchers at the Department of Energy’s Pacific Northwest National Laboratory (PNNL) are advancing efforts to improve cybersecurity by developing a new tool designed to replicate complex cyber attacks more rapidly and affordably. This initiative, a collaboration with Anthropic, aims to automate the emulation of cyber attacks using the company’s large language model, known as Claude, thereby reducing the time and costs associated with this critical aspect of cyber defense.

The new system, dubbed ALOHA—an acronym for Agentic LLMs for Offensive Heuristic Automation—can condense the normally lengthy cyber attack replication process from several weeks to mere hours. By employing MITRE’s open-source Caldera software, which assists organizations in preparing for and defending against cyber threats, ALOHA enables users to input a text description of an attack. The system then reconstructs the necessary steps to emulate that particular incident, even if it involves a complex chain of tactics and multiple steps.

In a recent Teams interview with SIGNAL Media, Loc Truong, a data scientist at PNNL leading the ALOHA project, and fellow researcher Kristopher Willis, highlighted the importance of efficient attack replication. They noted that many companies charge tens of thousands of dollars for such services, making it prohibitive for some organizations. “Usually, the process is very costly for people to reproduce the attack and can take a team of experts, in the past, a few weeks to months and a lot of money,” Truong said. “We hope to create a tool and techniques to bring down the cost of attack replication so that we can protect critical infrastructure faster when these exploits are discovered.”

Truong outlined a common ransomware technique as an example of the tool’s capabilities. In this scenario, numerous files are encrypted by a binary code, relocated, and subsequently deleted. Traditionally, replicating this process has required substantial resources and time. With ALOHA, however, the effort can be significantly streamlined, expediting critical defenses against emerging threats.

Willis recounted a notable incident from a few years ago when the playbook for the Conti ransomware, attributed to the Russia-based group Wizard Spider, was leaked. The Conti ransomware encrypts victim data and can spread throughout a network, effectively giving attackers full control. This has led to its evolution into a ransomware-as-a-service model. However, ALOHA has the potential to revolutionize how such tactics are countered. “This book was about 30 pages, 40 pages long, that someone had leaked to GitHub,” Willis explained. “You can take the Conti playbook, feed it into ALOHA and be able to build all of the tactics, techniques and procedures.”

Even with translation inaccuracies in the playbook, which sometimes misrepresent certain attacks, ALOHA is designed to pick up on these discrepancies. “They had wrong commands in there, and so these are things that can be picked up as a signature for that particular adversary,” Willis noted. Previously, analyzing such a playbook could take a person 20 to 30 days, but ALOHA reduces that timeframe to about an hour.

The implications of ALOHA extend beyond mere replication of attacks; they signal a broader shift in how organizations can approach cybersecurity. With rapid advancements in automation and artificial intelligence, tools like ALOHA could empower cybersecurity teams to respond to threats with unprecedented speed and efficiency. As cyber threats continue to evolve, the development of such technologies will be critical in safeguarding essential infrastructure and data against increasingly sophisticated attacks.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Regulation

Anthropic rejects the Pentagon's proposed changes to a $200M AI contract, prioritizing safeguards against misuse for surveillance and autonomous weapons.

Top Stories

Perplexity unveils "Computer," a cloud-based AI tool that orchestrates multi-agent workflows securely, optimizing productivity for Max subscribers with powerful models.

AI Cybersecurity

Chinese threat actors exploited Anthropic's Claude model to execute the first large-scale AI cyberattack, targeting 30 organizations globally with minimal human intervention.

AI Government

Anthropic defies Pentagon demands for unrestricted military AI use, prioritizing ethical standards despite potential supply chain risk designation.

AI Technology

Pentagon threatens Anthropic with loss of government contract unless it opens AI technology for military use under the Defense Production Act by Friday.

Top Stories

Pentagon threatens Anthropic's Claude AI to comply with military specs, warning CEO Dario Amodei of severing ties over concerns about autonomous weapons.

AI Government

Anthropic partners with Rwanda on a three-year MOU to integrate AI in health and education, empowering 2,000 educators with Claude Pro licenses for enhanced...

AI Business

Tata Consultancy Services partners with GitLab to revolutionize enterprise software development by integrating AI-driven automation across multiple sectors.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.