Connect with us

Hi, what are you looking for?

AI Cybersecurity

PNNL and Anthropic Unveil ALOHA Tool to Replicate Cyber Attacks in Hours, Cutting Costs Significantly

PNNL and Anthropic launch ALOHA, slashing cyber attack replication time from weeks to hours, drastically reducing costs for critical infrastructure defense.

Researchers at the Department of Energy’s Pacific Northwest National Laboratory (PNNL) are advancing efforts to improve cybersecurity by developing a new tool designed to replicate complex cyber attacks more rapidly and affordably. This initiative, a collaboration with Anthropic, aims to automate the emulation of cyber attacks using the company’s large language model, known as Claude, thereby reducing the time and costs associated with this critical aspect of cyber defense.

The new system, dubbed ALOHA—an acronym for Agentic LLMs for Offensive Heuristic Automation—can condense the normally lengthy cyber attack replication process from several weeks to mere hours. By employing MITRE’s open-source Caldera software, which assists organizations in preparing for and defending against cyber threats, ALOHA enables users to input a text description of an attack. The system then reconstructs the necessary steps to emulate that particular incident, even if it involves a complex chain of tactics and multiple steps.

In a recent Teams interview with SIGNAL Media, Loc Truong, a data scientist at PNNL leading the ALOHA project, and fellow researcher Kristopher Willis, highlighted the importance of efficient attack replication. They noted that many companies charge tens of thousands of dollars for such services, making it prohibitive for some organizations. “Usually, the process is very costly for people to reproduce the attack and can take a team of experts, in the past, a few weeks to months and a lot of money,” Truong said. “We hope to create a tool and techniques to bring down the cost of attack replication so that we can protect critical infrastructure faster when these exploits are discovered.”

Truong outlined a common ransomware technique as an example of the tool’s capabilities. In this scenario, numerous files are encrypted by a binary code, relocated, and subsequently deleted. Traditionally, replicating this process has required substantial resources and time. With ALOHA, however, the effort can be significantly streamlined, expediting critical defenses against emerging threats.

Willis recounted a notable incident from a few years ago when the playbook for the Conti ransomware, attributed to the Russia-based group Wizard Spider, was leaked. The Conti ransomware encrypts victim data and can spread throughout a network, effectively giving attackers full control. This has led to its evolution into a ransomware-as-a-service model. However, ALOHA has the potential to revolutionize how such tactics are countered. “This book was about 30 pages, 40 pages long, that someone had leaked to GitHub,” Willis explained. “You can take the Conti playbook, feed it into ALOHA and be able to build all of the tactics, techniques and procedures.”

Even with translation inaccuracies in the playbook, which sometimes misrepresent certain attacks, ALOHA is designed to pick up on these discrepancies. “They had wrong commands in there, and so these are things that can be picked up as a signature for that particular adversary,” Willis noted. Previously, analyzing such a playbook could take a person 20 to 30 days, but ALOHA reduces that timeframe to about an hour.

The implications of ALOHA extend beyond mere replication of attacks; they signal a broader shift in how organizations can approach cybersecurity. With rapid advancements in automation and artificial intelligence, tools like ALOHA could empower cybersecurity teams to respond to threats with unprecedented speed and efficiency. As cyber threats continue to evolve, the development of such technologies will be critical in safeguarding essential infrastructure and data against increasingly sophisticated attacks.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Technology

Anthropic's Mythos AI model, deemed capable of executing complex cyber attacks, sparks urgent meetings among U.S. banking leaders over unprecedented global financial risks.

Top Stories

Therapists are urged to explore patients' AI chatbot use for emotional support, as a JAMA Psychiatry study reveals its growing role in mental health...

Top Stories

Meta's Yann LeCun labels concerns over Anthropic's AI model Claude Mythos as exaggerated drama, questioning its groundbreaking claims amid cybersecurity debates.

Top Stories

Anthropic surpasses OpenAI with $30B annual recurring revenue and captures 54% market share in AI code generation, signaling a seismic shift in the industry.

AI Finance

Treasury Secretary Scott Bessent and Fed Chair Jerome Powell convened banking leaders to address escalating cybersecurity threats from Anthropic's AI model, Mythos, highlighting urgent...

AI Business

Anthropic's Claude gained traction at the HumanX conference, signaling a pivotal shift in enterprise AI as businesses favor reliability over OpenAI's previous dominance.

AI Finance

UK regulators urgently assess cyber risks of Anthropic's AI model Claude Mythos Preview, as it identifies thousands of vulnerabilities in critical systems.

AI Cybersecurity

Anthropic launches Project Glasswing with partners like AWS and Google to transform cybersecurity using AI, targeting zero-day vulnerabilities for real-time defense.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.