Tracking CyberStrikeAI Usage

Team Cymru is continuously monitoring our global netflow visibility to uncover patterns of adversary activity, identify malicious operations, and gain actionable intelligence. In this post, we are diving into CyberStrikeAI, an open-source artificial intelligence (AI) offensive security tool (OST) developed by a China-based developer who we assess has some ties to the Chinese government.

What is CyberStrikeAI?

In its own words from the GitHub repository (see here), “CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities.”

CyberStrikeAI comes with its own dashboard that helps users quickly understand the platform's core features and current state, as shown in Figure 1 below.

Figure 1: CyberStrikeAI Dashboard from GitHub

CyberStrikeAI was first brought to our attention following the Amazon CTI team’s blog about AI-augmented threat actor infrastructure they had discovered. Amazon shared this related IP 212.11.64[.]250.

Analysis of that IP address in Team Cymru Scout’s open port scan data revealed that it had this “CyberStrikeAI” banner running on this service, as shown in Figure 2 below.

Figure 2: The CyberStrikeAI port banner in Team Cymru Scout.

Identifying Targeting with NetFlow

Using Team Cymru Scout, we can find NetFlow communications between the IP shared by Amazon and its targets, such as the Fortinet FortiGate devices it was observed targeting, as shown in Figure 3 below.

Figure 3. IP address running CyberStrikeAI targeting a Fortinet FortiGate device.

Researching Ed1s0nZ

While researching the GitHub profile (see here) of CyberStrikeAI’s developer, “Ed1s0nZ”, several attributes about the individual caught our attention.

Firstly, Ed1s0nZ’s other GitHub repositories suggest interest in exploitation activity:

  • watermark-tool: A secure and efficient invisible document watermarking solution that can add completely invisible digital watermarks to various documents, while supporting watermark extraction and verification. Developed in Go, it supports both web and CLI usage. The watermark uses steganography technology to ensure that the watermark is completely invisible and does not affect the reading experience and visual effects of the original document.
  • PrivHunterAI: This tool uses a passive proxy approach and mainstream AI (such as Kimi, DeepSeek, GPT, etc.) to detect privilege escalation vulnerabilities. Its core detection function is built on the open APIs of the relevant AI engines and supports data transmission and interaction via HTTPS protocol.
  • InfiltrateX: A useful privilege escalation scanning tool. While automated detection of privilege escalation vulnerabilities is difficult, prone to occur, and poses serious risks, it can still strive to automate the detection of some such vulnerabilities.

Further, Ed1s0nZ’s GitHub activities indicate they interact with organisations that support potentially Chinese government state-sponsored cyber operations. This includes Chinese private sector firms that have known ties to the Chinese Ministry of State Security (MSS).

A number of GitHub activities potentially link Ed1s0nZ to the Chinese state-sponsored cyber operations. On 19 December 2025, Ed1s0nZ posted CyberStrikeAI to Knownsec 404’s Starlink Project, as shown in Figure 4 below. Based on published reporting by DomainTools and others, Knownsec does work for the MSS and the Chinese People’s Liberation Army (PLA).

Figure 4. Ed1s0nZ’s post sharing CyberStrikeAI to Knownsec 404’s Starlink Project.

Further, on 5 January 2026, Ed1s0nZ added to their GitHub profile “CNNVD(国家信息安全漏洞) 2024 年度漏洞奖励计划 · 二级贡献奖(个人). Translation: CNNVD (Chinese National Vulnerability Database) 2024 Vulnerability Reward Program - Level 2 Contribution Award (Individual).” The CNNVD is run by CNITSEC and is also overseen by the MSS. Arguably, this program exists as a vehicle for the CCP to collect zero days before they are publicly disclosed, as detailed by researchers at BitSight.

Interestingly, we noticed Ed1s0nZ removed the reference to the CNNVD from their GitHub profile, potentially in effort to cover up these ties to one of these MSS-affiliated organisations.

Number of IPs Over Time

While researching CyberStrikeAI, we noticed that the repository was first added on 8 November 2025, as shown in Figure 5 below.. We did not observe a lot of IPs running the platform around this date though.

Figure 5. Ed1s0nZ’s first commit to the CyberStrikeAI GitHub repository.

However, from 20 January 2026 to the conclusion of this assessment on 26 February 2026, we observed 21 unique IP addresses running CyberStrikeAI, over differing periods of time, as shown in Figure 6 below.

Figure 6. Temporal analysis of IP addresses detected by Team Cymru running CyberStrikeAI.

Where users hosted CyberStrikeAI

Many of the CyberStrikeAI servers were hosted in Chinese-speaking locals, namely China, Singapore, and Hong Kong. Which is to be expected for a tool developed by a Chinese-speaking coder.

Figure 7. Country code statistics on number of unique IPs hosting CyberStrikeAI servers.

Outlook

Based on our analysis, the adoption of CyberStrikeAI is poised to accelerate, representing a concerning evolution in the proliferation of AI-augmented offensive security tools. While the GitHub repository was initially created in November 2025 with minimal active deployments, the rapid emergence of 21 unique IP addresses running the platform between January 20 and February 26 indicates a sharp increase in operational usage. Because the platform is heavily hosted in regions like China, Singapore, and Hong Kong, we anticipate that CyberStrikeAI will continue to see strong adoption among Chinese-speaking threat actors.

Furthermore, the developer’s (Ed1s0nZ) documented interactions with organizations affiliated with the MSS, specifically Knownsec and the CNNVD, suggest a high likelihood that this tool may be leveraged by Chinese state-sponsored advanced persistent threats (APTs). The developer's recent attempt to scrub references to the CNNVD from their GitHub profile points to an active effort to obscure these state ties, likely to protect the tool's operational viability as its popularity grows.

As adversaries increasingly embrace AI-native orchestration engines, we expect to see a rise in automated, AI-driven targeting of vulnerable edge devices, similar to the observed reconnaissance and targeting of Fortinet FortiGate appliances. In the near future, defenders must be prepared for an environment where tools like CyberStrikeAI, alongside the developer's other AI-assisted privilege escalation projects like PrivHunterAI and InfiltrateX, significantly lower the barrier to entry for complex network exploitation. Security teams should proactively monitor their environments using the provided IP indicators and prepare for the continued weaponization of AI in offensive cyber operations.

Related IP addresses

Indicator Description ASN Organisation GeoIP Last Seen
103.164.81.110CyberStrikeAI Server142002SCLOUDPTELTD-AS Scloud Pte Ltd, SGSG02/02/2026
106.52.47.65CyberStrikeAI Server45090TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CNCN25/02/2026
115.120.233.95CyberStrikeAI Server55990HWCSNET Huawei Cloud Service data center, CNCN26/02/2026
117.72.103.145CyberStrikeAI Server141679CHINATELECOM-IDC-BTHBD-AP China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch, CNCN23/02/2026
118.25.186.119CyberStrikeAI Server45090TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CNCN24/02/2026
142.171.160.137CyberStrikeAI Server35916MULTA-ASN1 - MULTACOM CORPORATION, USUS29/01/2026
144.31.224.253CyberStrikeAI Server215439PLAY2GO-NET, GBUS26/02/2026
146.190.195.154CyberStrikeAI Server14061DIGITALOCEAN-ASN - DigitalOcean, LLC, USSG23/01/2026
146.190.82.132CyberStrikeAI Server14061DIGITALOCEAN-ASN - DigitalOcean, LLC, USSG24/01/2026
154.219.114.92CyberStrikeAI Server401701COGNETCLOUD-2 - cognetcloud INC, USHK12/02/2026
212.11.64.250CyberStrikeAI Server42624SWISSNETWORK02, SCCH30/01/2026
38.38.250.182CyberStrikeAI Server139659LUCID-AS-AP LUCIDACLOUD LIMITED, HKUS25/01/2026
43.106.25.225CyberStrikeAI Server45102ALIBABA-CN-NET Alibaba US Technology Co., Ltd., CNSG31/01/2026
43.167.237.212CyberStrikeAI Server132203TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CNSG01/02/2026
47.101.186.156CyberStrikeAI Server37963ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CNCN25/02/2026
47.95.33.207CyberStrikeAI Server37963ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CNCN26/02/2026
60.204.227.64CyberStrikeAI Server55990HWCSNET Huawei Cloud Service data center, CNCN08/02/2026
62.234.61.215CyberStrikeAI Server45090TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CNCN25/02/2026
64.176.48.93CyberStrikeAI Server20473AS-VULTR - The Constant Company, LLC, USJP24/02/2026
81.70.144.252CyberStrikeAI Server45090TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CNCN26/02/2026
2400:d321:2308:1461::1CyberStrikeAI Server141995CAPL-SG Contabo Asia Private Limited, SGSG26/02/2026