Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Découvrir
Envoyer
  • Bienvenue sur AIID
  • Découvrir les incidents
  • Vue spatiale
  • Vue de tableau
  • Vue de liste
  • Entités
  • Taxonomies
  • Soumettre des rapports d'incident
  • Classement des reporters
  • Blog
  • Résumé de l’Actualité sur l’IA
  • Contrôle des risques
  • Incident au hasard
  • S'inscrire
Fermer
Découvrir
Envoyer
  • Bienvenue sur AIID
  • Découvrir les incidents
  • Vue spatiale
  • Vue de tableau
  • Vue de liste
  • Entités
  • Taxonomies
  • Soumettre des rapports d'incident
  • Classement des reporters
  • Blog
  • Résumé de l’Actualité sur l’IA
  • Contrôle des risques
  • Incident au hasard
  • S'inscrire
Fermer
Entités

hugging face

Incidents involved as Developer

Incident 12202 Rapports
LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

2025-07-10

Ukraine's CERT-UA and Cato CTRL reported LAMEHUG, the first known malware to integrate a large language model (Qwen2.5-Coder-32B-Instruct via Hugging Face) for real-time command generation. Attributed with moderate confidence to APT28 (Fancy Bear), the malware reportedly targeted Ukrainian officials through phishing emails. The LLM is reported to have dynamically generated reconnaissance and data-exfiltration commands executed on infected systems.

Plus

Incidents implicated systems

Incident 9963 Rapports
Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

2020-10-25

Meta and Bloomberg allegedly used Books3, a dataset containing 191,000 pirated books, to train their AI models, including LLaMA and BloombergGPT, without author consent. Lawsuits from authors such as Sarah Silverman and Michael Chabon claim this constitutes copyright infringement. Books3 includes works from major publishers like Penguin Random House and HarperCollins. Meta argues its AI outputs are not "substantially similar" to the original books, but legal challenges continue.

Plus

Incident 9502 Rapports
NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

2024-07-11

A Disney employee, Matthew Van Andel, reportedly downloaded AI-powered malware allegedly developed by the cybercriminal group NullBulge, resulting in a major cybersecurity breach. Hackers purportedly accessed Disney's Slack system, exposing 44 million internal messages, employee and customer data, and financial records. NullBulge also reportedly leaked Van Andel’s personal financial information, leading to identity theft and his eventual termination.

Plus

Entités liées
Autres entités liées au même incident. Par exemple, si le développeur d'un incident est cette entité mais que le responsable de la mise en œuvre est une autre entité, ils sont marqués comme entités liées.
 

Entity

NullBulge

Incidents impliqués en tant que développeur et déployeur
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Matthew Van Andel

Affecté par des incidents
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Disney employees

Affecté par des incidents
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Disney

Affecté par des incidents
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

GitHub

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Reddit

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

BeamNG

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Slack

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Discord

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

1Password

Incidents implicated systems
  • Incident 950
    2 Report

    NullBulge's AI-Powered Malware Allegedly Compromises Disney Employee and Internal Data

Plus
Entity

Various generative AI developers

Incidents impliqués en tant que développeur et déployeur
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Meta

Incidents impliqués en tant que développeur et déployeur
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

EleutherAI

Incidents impliqués en tant que développeur et déployeur
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Bloomberg

Incidents impliqués en tant que développeur et déployeur
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

The Pile

Incidents involved as Developer
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Shawn Presser

Incidents involved as Developer
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Zadie Smith

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Writers

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Verso

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Stephen King

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Sarah Silverman

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Richard Kadrey

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Publishers found in Books3

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Penguin Random House

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Oxford University Press

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Over 170,000 authors found in Books3

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Michael Pollan

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Margaret Atwood

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Macmillan

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

HarperCollins

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

General public

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Creative industries

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Christopher Golden

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Authors

Affecté par des incidents
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

LLaMA

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

GPT-J

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Books3

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

BloombergGPT

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

Bibliotik

Incidents implicated systems
  • Incident 996
    3 Report

    Meta Allegedly Used Books3, a Dataset of 191,000 Pirated Books, to Train LLaMA AI

Plus
Entity

APT28

Incidents involved as Deployer
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Fancy Bear

Incidents involved as Deployer
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Alibaba

Incidents involved as Developer
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Government of Ukraine

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Ukrainian government ministries

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Ukrainian government officials

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Public sector information systems

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

National cybersecurity infrastructure of Ukraine

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

State institutions targeted by espionage operations

Affecté par des incidents
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Qwen2.5-Coder-32B-Instruct

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Hugging Face API platform

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

LAMEHUG malware family

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

PyInstaller-compiled Python executables

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

Flux AI image generation API

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

stayathomeclasses[.]com exfiltration endpoint

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus
Entity

144[.]126[.]202[.]227 SFTP server

Incidents implicated systems
  • Incident 1220
    2 Report

    LAMEHUG Malware Reportedly Integrates Large Language Model for Real-Time Command Generation in a Purported APT28-Linked Cyberattack

Plus

Recherche

  • Définition d'un « incident d'IA »
  • Définir une « réponse aux incidents d'IA »
  • Feuille de route de la base de données
  • Travaux connexes
  • Télécharger la base de données complète

Projet et communauté

  • À propos de
  • Contacter et suivre
  • Applications et résumés
  • Guide de l'éditeur

Incidents

  • Tous les incidents sous forme de liste
  • Incidents signalés
  • File d'attente de soumission
  • Affichage des classifications
  • Taxonomies

2024 - AI Incident Database

  • Conditions d'utilisation
  • Politique de confidentialité
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • 6f6c5a5