Executive Summary
In early 2026, Lithuania faced a surge in AI-driven social engineering attacks targeting its digital infrastructure. Cybercriminals utilized advanced AI tools to craft highly personalized phishing campaigns, deepfake videos, and voice-cloned calls, deceiving individuals into divulging sensitive information. These sophisticated attacks led to significant data breaches across various sectors, including finance and public services, compromising personal data and undermining trust in digital platforms.
This incident underscores the escalating threat of AI-enhanced cyber fraud, highlighting the need for robust cybersecurity measures and public awareness. As AI technologies become more accessible, the potential for their misuse in cyberattacks grows, necessitating proactive defense strategies and continuous monitoring to safeguard digital ecosystems.
Why This Matters Now
The rapid advancement and accessibility of AI technologies have enabled cybercriminals to execute highly sophisticated and personalized attacks, making traditional security measures less effective. This trend emphasizes the urgent need for organizations to adopt AI-driven defense mechanisms and enhance public awareness to mitigate the risks associated with AI-powered cyber threats.
Attack Path Analysis
The adversary initiated the attack by deploying AI-generated phishing emails to deceive employees into revealing their credentials. Upon obtaining valid credentials, the attacker escalated privileges by exploiting misconfigured IAM policies. They then moved laterally within the cloud environment, accessing sensitive data across multiple services. The attacker established command and control channels using covert communication methods to maintain persistence. Subsequently, they exfiltrated sensitive data by transferring it to external servers. Finally, the adversary leveraged the exfiltrated data to conduct financial fraud and disseminate disinformation, causing reputational damage.
Kill Chain Progression
Initial Compromise
Description
The adversary initiated the attack by deploying AI-generated phishing emails to deceive employees into revealing their credentials.
Related CVEs
CVE-2024-27564
CVSS 6.5A server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure allows attackers to inject malicious URLs, causing the application to make unintended requests.
Affected Products:
OpenAI ChatGPT – f9f4bbc
Exploit Status:
exploited in the wildCVE-2025-32711
CVSS 7.5A zero-click vulnerability in Microsoft Copilot, named 'EchoLeak', enables the exfiltration of sensitive data without user interaction.
Affected Products:
Microsoft Copilot – Affected versions prior to patch
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques identified for AI-enhanced social engineering attacks; further enrichment with STIX/TAXII data is recommended.
Obtain Capabilities: Artificial Intelligence
Phishing: Spearphishing Attachment
Phishing: Spearphishing Link
Impersonation
Vulnerability Scanning: Scanning for Vulnerable Software
Exploitation for Client Execution
Indicator Removal on Host
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST SP 800-53 – System Monitoring
Control ID: SI-4
PCI DSS 4.0 – Security Awareness Training
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Training and Monitoring
Control ID: 500.14
DORA – ICT Risk Management Framework
Control ID: Article 5
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
CISA Zero Trust Maturity Model 2.0 – Identity Verification and Authentication
Control ID: Identity Pillar
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
AI-enhanced social engineering directly threatens e-government services and digital identity systems, requiring advanced zero trust segmentation and threat detection capabilities.
Financial Services
GenAI-powered fraud bypasses traditional pattern detection in FinTech platforms, necessitating enhanced egress security and multimodal AI defense systems integration.
Higher Education/Acadamia
Academic institutions face sophisticated phishing targeting research data and credentials, demanding encrypted traffic monitoring and kubernetes security for educational platforms.
Information Technology/IT
IT sectors must defend against adaptive social engineering and deepfake attacks while implementing cloud native security fabric solutions effectively.
Sources
- Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraudhttps://thehackernews.com/2026/02/safe-and-inclusive-esociety-how.htmlVerified
- Lithuania sees 63% rise in cyber incidents amid growing disinformationhttps://www.aa.com.tr/en/europe/lithuania-sees-63-rise-in-cyber-incidents-amid-growing-disinformation/3582302Verified
- CVE-2024-27564 Actively Exploited in the Wildhttps://www.veriti.ai/blog/cve-2024-27564-actively-exploited/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Aviatrix Zero Trust CNSF would likely have constrained the attacker's ability to escalate privileges, move laterally, and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily focuses on network-level controls, its integration with identity-aware policies could likely have limited the attacker's ability to exploit compromised credentials.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation would likely have limited the attacker's ability to escalate privileges by enforcing strict access controls and segmenting network resources.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security would likely have constrained the attacker's lateral movement by enforcing strict segmentation and monitoring east-west traffic.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control would likely have constrained the attacker's command and control channels by providing real-time monitoring and control over network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement would likely have constrained the attacker's data exfiltration efforts by enforcing strict egress policies and monitoring outbound traffic.
While Aviatrix CNSF focuses on network-level controls, its implementation could have likely reduced the scope of data exfiltration, thereby limiting the potential for financial fraud and reputational damage.
Impact at a Glance
Affected Business Functions
- Public Citizen Services
- E-Government Platforms
- Digital Health Records
Estimated downtime: 7 days
Estimated loss: $17,300,000
Personal data of citizens, including health records and financial information.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and limit lateral movement within the cloud environment.
- • Deploy East-West Traffic Security controls to monitor and restrict internal traffic, preventing unauthorized access between services.
- • Utilize Multicloud Visibility & Control solutions to gain comprehensive insights into cloud activities and detect anomalies.
- • Enforce Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration to unauthorized destinations.
- • Establish Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities promptly.



