Previous Article in Journal
Zero Trust in Practice: A Mixed-Methods Study Under the TOE Framework
Previous Article in Special Issue
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Use of Artificial Intelligence in Cybercrime: Impact Analysis in Ecuador and Mitigation Strategies

by
Carlos Varela Enríquez
*,
Renato Toasa
and
Maryory Urdaneta
Departamento de Ciencias de la Ingeniería, Universidad Tecnológica Israel, Quito 170516, Ecuador
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2025, 5(4), 100; https://doi.org/10.3390/jcp5040100
Submission received: 17 September 2025 / Revised: 19 October 2025 / Accepted: 7 November 2025 / Published: 17 November 2025

Abstract

This article analyzes how artificial intelligence (AI) is influencing the evolution of cybercrime in Ecuador. The use of AI tools to create new threats, such as intelligent malware, automated phishing, and financial fraud, is on the rise. The main problem is the increasing sophistication of AI-driven cyberattacks and the limited preventive response capacity in Ecuador. In Ecuador, cybercrime rose by more than 7% in 2024 compared to 2023, and by nearly 130% between 2020 and 2021. This research focuses on exploring mitigation strategies based on international frameworks such as NIST and ISO, as well as developing measures through training and knowledge transfer. The results obtained are expected to help identify the main trends in AI-driven cyberthreats and propose a set of technical, legal, and training measures to strengthen public and private institutions in Ecuador. It is important to emphasize that the implementation of international standards, national policies, and specialized training is essential to address emerging cybersecurity risks in Ecuador.

1. Introduction

In recent years, Ecuador has experienced accelerated growth in the use of digital technologies due to the expansion of mobile internet, online banking, and the digitalization of public services. With the advancement of AI (Artificial Intelligence), which provides us with a personal assistant both on mobile devices and with direct access via the internet, and machine learning (a subset that leverages algorithms and statistical models that allow systems to learn and adapt to data without the need for explicit programming), in addition to the use of natural language processing (NLP), which gives AI systems the ability to understand, interpret, generate, and interact with human languages, exposure to cybercrimes has increased, which are becoming increasingly sophisticated due to the malicious use of artificial intelligence (AI) in their processes. According to data from the Attorney General’s Office, 5237 cybercrime reports were filed in 2021, representing a 129% increase compared to 2020, as shown in the 2021 Cybercrime Reports in Ecuador.
Attackers have leveraged these AI techniques to develop more sophisticated cyberthreats, such as financial fraud; phishing and ransomware lead the statistics, as well as intelligent malware and automated vulnerability exploitation. These AI-driven attacks can be more difficult to detect and defend against in the cloud, posing significant challenges to traditional security measures and their prevention, affecting individuals, businesses, and public institutions alike.
Cybercriminals in Ecuador and around the world are using AI to create sophisticated financial fraud schemes, such as generating fake transactions, phishing (deepfakes), and manipulating banking algorithms. An example of this malicious use is the use of deepfakes to impersonate executives and authorize illegal transfers. There are also cases of scams using AI-powered chatbots that mimic legitimate services, such as fraudulent job offers, loans, or fraudulent banking services. In this case, AI allows cybercriminals to personalize messages for greater credibility. For example, WhatsApp bots trick users into obtaining personal data.
Several phishing attacks use AI, allowing cybercriminals to generate increasingly convincing fake emails and web pages. This is done, for example, by automatically translating messages into Spanish using local slang or idioms, for example, in emails mimicking Ecuadorian banks (Pichincha, Produbanco, etc.) that contain fraudulent links.
Likewise, in this case, cybercriminals use AI to identify vulnerabilities in Ecuadorian companies or public institutions (healthcare, SMEs, banking, etc.) and then launch ransomware with greater precision, obviously with the aim of demanding payments in cryptocurrency. For example, the Sercop attack in January 2025, where critical data was encrypted [1].
AI has revolutionized cybersecurity, both by enabling early threat detection through predictive analytics and automated responses, and by allowing cybercriminals to leverage it to generate more precise attacks using machine learning to optimize phishing strategies and create highly convincing fake messages and profiles. There is also the case of malware automation, which develops viruses that evade traditional antivirus programs and adapt to system defenses. We also have seen the use of deepfakes and phishing with generative AI, which creates fake audio and video content for extortion or disinformation.
While the Ecuadorian State has focused on updating the COIP, according to the National Assembly:
“Within the framework of the draft Organic Law Reforming the Comprehensive Organic Criminal Code (COIP), the Justice and State Structure Commission took note of twelve bills related to this matter” [2]. “Among other aspects, the reforms address issues such as the expiration of pretrial detention, cyberterrorism, cyber sabotage, and digital identity theft…”
Asamblea Nacional del Ecuador [2]
“These reforms are among the bills prioritized by the commission for the 2025–2027 legislative period. Of the general list, 60 initiatives are under review for initial debate, to which the 12 new bills are being incorporated”
Asamblea Nacional del Ecuador [2]
Therefore, it is necessary that these crimes be defined precisely and clearly to ensure their correct classification and legal application.

2. Materials and Methods

Methodological Process

The study used a mixed analysis methodology, structured in clear phases that guided the research from data collection to interpretation (Table 1).
Phase 1: Documentary and Regulatory Analysis.
The analysis focused on a systematic review of secondary sources. The selection criteria for academic literature included: thematic relevance (AI applied to cybercrime or cybersecurity), timeliness (publications from the last 5 years), and relevance to the Latin American or Ecuadorian context. For the legal framework, the COIP and the LOPD were analyzed and compared with the EU (GDPR) and Spanish frameworks using comparative analysis matrices that evaluated criteria such as explicit classification of AI crimes, compliance with international standards (NIST, ISO), and data protection and incident response mechanisms.
Phase 2: Empirical Analysis.
This phase consisted of the collection and analysis of primary data. Two instruments were designed and applied: a survey to assess perceptions and knowledge, and a semi-structured interview guide for experts. The survey analysis process was quantitative, using descriptive statistics (frequencies, percentages) to identify trends. For the interviews, qualitative thematic analysis was used, transcribing and coding responses to identify emerging categories and common patterns regarding challenges, threats, and mitigation strategies.
Phase 3: Synthesis and Integration.
In this phase, the findings from the previous phases were triangulated. The analysis process cross-referenced quantitative data (surveys) with qualitative data (interviews) and the results of documentary and comparative analysis. This allowed for a comparison of the perception of the problem with the regulatory and technical reality, validating the conclusions and supporting the proposed mitigation strategies with solid, multifaceted evidence.

3. Results

3.1. Review of Secondary Sources

3.1.1. Evolution of the Use of AI in Cybercrime Globally

Globally, artificial intelligence has transformed the cyberthreat landscape, evolving from simple automation tools to complex systems capable of learning and adapting to commit crimes with greater efficiency and proficiency. Cybercriminals now use machine learning techniques to optimize phishing attacks, generate hyper-realistic deepfakes for impersonation and extortion purposes, and develop intelligent malware that evades traditional defenses [3]. Furthermore, AI enables the automated exploitation of vulnerabilities and the mass personalization of fraud, posing an unprecedented challenge to conventional security mechanisms [4]. This rapid evolution has made AI a critical enabler of modern cybercrime, demanding equally advanced responses in detection and prevention.
Below, we detail the data on the evolution of AI-related cybersecurity incidents globally, using a data matrix (Table 2) and a line graph (Figure 1).
Below is a matrix (Table 3) and bar chart (Figure 2) of the types of AI-related cybercrimes and the sectors most vulnerable to their impact.
Below is a matrix (Table 4) and bar chart (Figure 3) showing the average economic impact of a security incident, with its costs in US dollars. It also shows a comparison of the average global cost and the cost of the region under analysis.

3.1.2. Relevant Cases or Incidents in Latin America and Ecuador

In Latin America and Ecuador, the malicious use of AI is already a reality, with incidents illustrating its growing impact. Last year, Mexico fell victim to an AI-assisted ransomware attack against its public health system, which optimized the targeting of critical data and hampered its recovery [13]. In Ecuador, cases have been documented, such as the rise of banking fraud using voice deepfakes that impersonate individuals to authorize illegitimate transfers [14], as well as generative phishing campaigns that use AI to create highly personalized and persuasive messages in Spanish, leveraging local idioms to deceive unsuspecting victims [15]. Furthermore, the growing reliance on digital platforms has exposed critical vulnerabilities in data security, making them easier to exploit with AI-powered techniques [16]. These incidents reflect a regional and national trend toward more effective and difficult-to-detect cyberattacks.
Below is a matrix (Table 5) and bar chart (Figure 4) showing the increase from 2020 to 2025 in crimes classified according to the COIP. It should be clarified that at the time of the study, these crimes are only grouped by the type “Fraudulent Appropriation by Electronic Means”. It is important to note the increase between 2020 (COVID-19 Pandemic) and 2021 (Final stages of the COVID-19 Pandemic), which highlights a greater use of electronic media for daily tasks and therefore attacks focus on these media.

3.1.3. Current Legal Framework in Ecuador (Criminal Code, Data Protection Law, Cybersecurity Regulations)

The Ecuadorian legal framework attempts to respond to these challenges, albeit with significant limitations given the evolving nature of AI-driven crimes. The Comprehensive Organic Criminal Code (COIP) criminalizes offenses such as unauthorized access to computer systems (Art. 232) and digital identity theft (Reform Bill Art. 212.14), but lacks specific definitions for modern forms such as fraudulent deepfakes or malicious algorithmic manipulation. Meanwhile, the Organic Law on the Protection of Personal Data (LOPD) establishes security and confidentiality principles for data processing, requiring incident reporting within short timeframes; however, it does not explicitly address risks associated with the use of AI, such as the inference of sensitive data through automated analysis. At the cybersecurity level, although CERT-EC guidelines and references to international standards exist, Ecuador still lacks comprehensive legislation that combines technological risk management with advances in AI, leaving critical gaps in the protection of digital infrastructure and citizen privacy [18].
Below are two comparison matrices (Table 6 and Table 7): the Comprehensive Organic Criminal Code (COIP) and the Organic Law on the Protection of Personal Data (LOPD), with their equivalents, the Spanish Penal Code and EU (GDPR).
“The Global Cybersecurity Index (GCI) is a reliable benchmark that measures countries’ commitment to cybersecurity globally, raising awareness of the importance and different dimensions of the problem. Since cybersecurity has a broad scope, spanning many industries and diverse sectors, each country’s level of development or commitment is assessed based on five pillars: (i) Legal Measures, (ii) Technical Measures, (iii) Organizational Measures, (iv) Capacity Building, and (v) Cooperation, and then aggregated into an overall score”
ITU-Unión Internacional de Telecomunicaciones [19]
“Of the five GCI assessment pillars, the legal measures component analyzes the development and implementation of cybersecurity policy and regulatory frameworks”
ITU-Unión Internacional de Telecomunicaciones [19]
For this reason, it is important to compare the countries in the region (Brazil and Mexico), the country on which the Ecuadorian LOPD and the Ecuadorian penal code are based (Spain), and the country leading the global ranking (the United States). The results of this comparison are shown in a results matrix (Table 8, Table 9, Table 10 and Table 11) and an area chart (Figure 5 and Figure 6).
Data for 2020 and 2024 have been selected for the comparative analysis, considering that Ecuador implemented key regulatory instruments after the reference year 2020. The National Cybersecurity Policy (2021) and the Organic Law on Personal Data Protection (2021), both issued after the initial period, constitute significant regulatory advances reflected in an improvement in the indices, observed both in the Cybersecurity Readiness Benchmark and in the Global Cybersecurity Index Score for 2024.

3.2. Design and Application of Empirical Instruments

This phase consisted of primary data collection and analysis. Two instruments were designed and applied: a survey to assess perceptions and knowledge, and a semi-structured interview guide for experts. The survey analysis process was quantitative, using descriptive statistics (frequencies, percentages) to identify trends. For the interviews, qualitative thematic analysis was used, transcribing responses and coding them to identify emerging categories and common patterns regarding challenges, threats, and mitigation strategies.

3.3. Data Processing and Analysis

The results of the surveys and interviews shown in the graphs of this study should be interpreted considering the characteristics of the sample. The quantitative data, represented in figures below, reflect the responses from a survey conducted with 136 cybersecurity professionals (n = 136), where the 95% confidence intervals demarcate the margin of error for the percentages shown. This component is complemented by qualitative data from 12 interviews with cybersecurity experts, allowing for a more nuanced understanding of the perception of the phenomena investigated.

3.3.1. Knowledge and Perception of AI in Cybersecurity

Based on the analysis of survey data, the “level of knowledge” indicator revealed that 57% of participants have intermediate knowledge about AI (Figure 7). Regarding the “perceived duality” criterion, 71% consider AI to represent both an opportunity and a threat (Figure 8). This demonstrates a nascent but critical awareness of the issue, which serves as a basis for training initiatives, although it also challenges the paradox that the key technology for defense is also the vector of threat.

3.3.2. Use of AI in Cybercrime in Ecuador

Regarding the “threat identification” indicator, it was shown that most respondents perceive and have heard of cases where cybercriminals are already using AI in Ecuador. The interviews, analyzed using perception and visualization criteria, show that citizens and experts in the field validate the hypothesis that international threats are applicable to the local context, discussing the urgency of adopting advanced countermeasures (Figure 9, Figure 10, Figure 11 and Figure 12).

3.3.3. Security Breaches Identified

The analysis of responses under the criteria of “technical, regulatory, and educational gaps” identified the main barriers as a lack of infrastructure (technical), outdated legal frameworks (regulatory), and limited training (educational). This demonstrates a systemic and multifactorial vulnerability. It is argued that the convergence of these gaps amplifies the risk, making mere technological updating insufficient without parallel advances in regulations and human capital (Figure 13 and Figure 14).

3.3.4. Adaptation of the Legal Framework

Comparative analysis using a matrix of legal criteria (crime classification, sanctions, data protection) as shown in the comparison matrices of COIP, Spanish Criminal Code, LOPD, and GDPR, revealed substantial gaps in the COIP and the LOPD compared to reference frameworks such as the Spanish one and the GDPR, specifically in the criminalization of deepfakes and AI governance. This finding supports the conclusion that the Ecuadorian framework is insufficient and calls into question the need for legal reform that incorporates specific definitions and is harmonized with international standards for the effective prosecution of these crimes (Figure 15).

3.3.5. Mitigation Strategies

The analysis of expert interviews, coded under the “priority strategies” criterion, identified consensus on the need to implement threat hunting, adopt frameworks such as NIST/ISO, and strengthen training. Triangulation of these findings with the results of the documentary analysis confirms that the most robust strategy is a comprehensive one, combining technology, regulations, and education. It is argued that the adoption of international standards is not only a technical best practice, but a requirement for national competitiveness and resilience (Figure 16, Figure 17, Figure 18 and Figure 19).

3.4. Preparation of Mitigation Proposal

Faced with the rise in AI-enhanced cybercrimes in both Ecuador and Latin America and the identified gaps, Ecuador urgently needs a realistic and scalable strategy. The proposal should focus on three pillars: regulatory modernization, technical and educational strengthening, and public–private–academic cooperation.

3.4.1. Modernization of the Legal Framework and Adoption of Standards

It is urgent to reform the COIP to expressly criminalize crimes committed with AI, such as fraudulent deepfakes, malicious algorithmic manipulation, etc., following models like Spain’s, which already criminalize these behaviors. Likewise, mandatory adoption of international standards such as ISO/IEC 27001 [21] and the NIST Cybersecurity Framework by public entities and critical suppliers should be promoted. This allows for closing legal loopholes and aligning technical defenses with global best practices, enabling us to leverage the progress reflected in the GCI 2024 Index.

3.4.2. Capacity Building and Adaptive Infrastructure

To improve and overcome technical and educational barriers, the creation of a National Cybersecurity and AI Center is proposed, led by a competent entity in the field and focused on:
  • Mass training and certification of professionals in defensive AI tools, for example, threat hunting and malware analysis.
  • Implementing low-cost, open-source solutions for SMEs, for example, community SIEMs and threat intelligence sharing platforms.
  • Running workshops with simulated AI cyberattack exercises for critical sectors (banking, healthcare), using CERT-EC data to prioritize real threat sectors.

3.4.3. Cooperative Governance and Awareness

It is necessary to establish working groups between the Attorney General’s Office, CERT-EC, the National Assembly, universities, and private companies in critical sectors to update incident response protocols with a focus on AI. To complement this, it is also necessary to launch national citizen awareness campaigns on the risks of generative phishing and deepfakes, based on documented local examples. This will foster a culture of proactive cybersecurity and facilitate the prosecution of complex cases.
This proposal is achievable by leveraging existing capabilities, such as progress made in GCI 2024, and allows for prioritizing high-impact, low-cost actions aligned with the urgent needs of the Ecuadorian context.

4. Discussion

Artificial intelligence has evolved from an automation tool to an enabler of critical and sophisticated cyberthreats. Cyberattackers now use machine learning algorithms to optimize phishing campaigns, generate hyper-realistic deepfakes, and develop adaptive malware that evades traditional security controls [3]. This scenario is confirmed in the local context, where most of the experts surveyed reported an increase in incidents using AI to personalize attacks using local idioms. This is demonstrated by Santillán Molina [22] in his work on data centralization in Ecuador, where he warns that “AI allows attackers to identify and exploit vulnerabilities in critical infrastructure with unprecedented precision”, which coincides with the ransomware incident against Sercop in 2025 [1].
The International Telecommunication Union’s (ITU) Global Cybersecurity Index (GCI) reveals a substantial improvement in Ecuador’s readiness between 2020 and 2024, directly affecting the pillars of legal measures and international cooperation. This progress reflects local efforts such as the enactment of the Organic Law on Personal Data Protection (LOPD) in 2021 and the National Cybersecurity Policy. However, Ecuador still lags below the regional average in technical capabilities and specialized skills development. This is demonstrated by the ITU report, which highlights that countries that have integrated international frameworks such as the NIST CSF and fostered public–private partnerships show more accelerated and resilient improvements in the face of complex. This trend underscores the need to invest in technical capabilities and professional training.
The comparative analysis shows that the Ecuadorian legal framework (COIP and LOPD) presents critical gaps in the face of AI-enhanced crimes. As Boza Rendón [23] concludes in his analysis of the Ecuadorian legal framework, “the absence of specific regulations for artificial intelligence leaves regulatory gaps that can compromise the security and privacy of citizens, especially in the use of automated decision-making systems” [23]. While the Organic Law on Personal Data Protection (LOPD) establishes general principles, the study reveals shortcomings in “the definition of effective control mechanisms, independent oversight, and clear guarantees for the protection of fundamental rights” [23] against the risks associated with data processing using AI. Furthermore, the Comprehensive Organic Criminal Code (COIP) lacks provisions that specifically address crimes committed through malicious algorithmic manipulation or deepfakes, which contrasts with more advanced legal frameworks such as that of the European Union. For effective regulation, the author recommends “incorporating fundamental rights impact assessment mechanisms before implementing AI systems” and “establishing provisions that promote the development of ethical and responsible AI” [23], actions still pending in national legislation.
Now, to address the identified gaps, realistic mitigation strategies are proposed for the Ecuadorian context: the implementation of collaborative threat hunting based on threat intelligence shared between the public and banking sectors; the adoption of open-source tools for the detection of generative phishing and deepfakes; and certified AI training programs for prosecutors and judges. This approach to practical, low-cost solutions is aligned with the recommendations of the NIST Cybersecurity Framework (2020) for resource-constrained organizations, which prioritizes the identification and protection of critical assets through open frameworks and collaboration. Similarly, the International Telecommunication Union [20] emphasizes in its report that training and awareness initiatives are one of the most cost-effective investments to improve national cyber resilience. These actions do not require massive initial investment, but rather strategic prioritization and multi-sector collaboration.

5. Conclusions

It was established that AI techniques used in cyberattacks internationally (generative phishing, deepfakes, adaptive malware) are fully applicable to the Ecuadorian context, due to its increasing digitalization and the vulnerabilities present in critical infrastructure and SMEs.
It was identified that the main security gaps in Ecuador against AI-driven cyberthreats are technical (lack of advanced tools), regulatory (outdated legal framework), and educational (lack of training and awareness), which severely limits preventive response capacity.
It was analyzed that the evolution of malicious uses of AI in the region, characterized by increased automation and sophistication, is already an operational trend in Ecuador, with a potentially high impact on sectors that handle sensitive data, as exemplified by the attack on Sercop.
It was determined that the Ecuadorian legal framework (COIP, LOPD) presents substantial gaps in the ability to effectively criminalize and prosecute AI-enhanced cybercrimes, making legal reform imperative that incorporates specific definitions and aligns with international ethical governance principles.
The impact of the malicious use of AI in cybercrimes is a growing and real threat to Ecuador, requiring comprehensive and tailored mitigation strategies based on the adoption of international standards (NIST, ISO), urgent regulatory updates, and the implementation of massive training programs.

Author Contributions

Conceptualization, C.V.E.; methodology, C.V.E.; validation, R.T. and M.U.; investigation, C.V.E.; resources, C.V.E.; writing—original draft preparation, C.V.E.; writing—review and editing, R.T. and M.U.; visualization, C.V.E.; supervision, R.T. and M.U. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The raw data supporting the conclusions of this article (transcripts and full survey responses) cannot be made available to protect the confidentiality and anonymity promised to the participants. The aggregated data and findings are presented within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

AIArtificial Intelligence
CERT-ECIncident Response Center Ecuador
COIPComprehensive Organic Criminal Code—Ecuador
GCIThe Global Cybersecurity Index
GDPR, RGPDGeneral Data Protection Regulation
ISOInternational Organization for Standardization
ITUInternational Telecommunication Union’s
LOPDOrganic Law on Data Protection—Ecuador
LOPDGDDOrganic Law on Data Protection and Guarantee of Digital Rights
NISTNational Institute of Standards and Technology
NIST CSFNIST Cybersecurity Framework
NLPNatural Language Processing
SercopNational Public Procurement Service—Ecuador
SMEsSmall and medium-sized enterprises

References

  1. El hackeo al Sistema de Compras Públicas Afectó 920 Procesos de Contratación en Ecuador. Available online: https://www.ecuavisa.com/noticias/ecuador/hackeo-sercop-compras-publicas-EL8728475 (accessed on 17 October 2025).
  2. Asamblea Nacional del Ecuador. Comisión de Justicia Conoció 12 Proyectos de Reforma al COIP. Asamblea Nacional 2025. Available online: https://www.asambleanacional.gob.ec/es/noticia/107158-comision-de-justicia-conocio-12-proyectos-de-reforma-al (accessed on 17 October 2025).
  3. Microsoft. Microsoft Digital Defense Report 2024. 2024. Available online: https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/Microsoft%20Digital%20Defense%20Report%202024%20%281%29.pdf (accessed on 17 October 2025).
  4. Kováč, R.; Horejší, J. ESET Threat Report H1 2024: Weird, Wild, Wonderful. ESET 2024. Available online: https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h12024.pdf (accessed on 17 October 2025).
  5. IBM Security X-Force. IBM X-Force Threat Intelligence Index 2021; IBM: New York, NY, USA, 2021; pp. 4, 21. Available online: https://www.ibm.com/downloads/documents/us-en/107a02e94ac8f670 (accessed on 17 October 2025).
  6. Verizon Business. Data Breach Investigations Report (DBIR) 2022. Verizon 2022. pp. 6, 40. Available online: https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf (accessed on 17 October 2025).
  7. European Union Agency for Cybersecurity (ENISA). ENISA Threat Landscape 2023; ENISA: Attiki, Greece, 2023; pp. 10, 11, 43. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023 (accessed on 17 October 2025).
  8. Microsoft. Microsoft Digital Defense Report 2023. 2023. Available online: https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2023 (accessed on 17 October 2025).
  9. INTERPOL. INTERPOL Annual Report 2023. INTERPOL 2023. Available online: https://www.interpol.int/content/download/22267/file/INTERPOL%20Annual%20Report%202023%20EN.pdf (accessed on 17 October 2025).
  10. Symantec. ISTR 23: Insights into the Cyber Security Threat Landscape. Available online: https://www.security.com/threat-intelligence/istr-23-cyber-security-threat-landscape (accessed on 17 October 2025).
  11. IBM. Cost of a Data Breach Report 2023. Available online: https://d110erj175o600.cloudfront.net/wp-content/uploads/2023/07/25111651/Cost-of-a-Data-Breach-Report-2023.pdf (accessed on 17 October 2025).
  12. NETSCUOT. NETSCOUT DDoS Threat Intelligence Report 2023. Available online: https://www.netscout.com/threatreport/2h2023/ddos-visibility/ (accessed on 17 October 2025).
  13. Positive Technologies. Cyberthreats in the Public Sector of Mexico. Available online: https://global.ptsecurity.com/es/research/analytics/cyberthreats-in-the-public-sector-of-mexico/ (accessed on 16 September 2025).
  14. Primicias. La Inteligencia Artificial, Nueva Aliada del Fraude en Ecuador. Available online: https://www.primicias.ec/noticias/entretenimiento/tecnologia/inteligencia-artificial-fraude-estafa-ecuador/ (accessed on 17 October 2025).
  15. ITahora. Phishing y deepfakes: Retos Para la Seguridad Digital en Ecuador. Available online: https://itahora.com/2025/02/04/phishing-y-deepfakes-retos-para-la-seguridad-digital-en-ecuador/ (accessed on 17 October 2025).
  16. Expreso. Redes Sociales y Digitalización: Desafíos Para la Humanidad y la Seguridad en Ecuador. 15 marzo 2025. Available online: https://www.expreso.ec/ciencia-y-tecnologia/redes-sociales-digital-desafios-humanidad-seguridad-ecuador-248219.html (accessed on 17 October 2025).
  17. Fiscalía General del Estado-Ecuador. Analítica-Noticas del Delito. (Apropiación Fraudulenta por Medios Electrónicos). Available online: https://www.fiscalia.gob.ec/analitica-noticias-del-delito/ (accessed on 16 September 2025).
  18. ITahora. Ciberseguridad en Ecuador: Entre la Inteligencia Artificial, la Protección de Datos y la Cultura Digital. Available online: https://itahora.com/2025/05/06/ (accessed on 17 October 2025).
  19. ITU-Unión Internacional de Telecomunicaciones. Global Cybersecurity Index (GCI) 2020. Available online: https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E (accessed on 16 September 2025).
  20. ITU-Unión Internacional de Telecomunicaciones. Global Cybersecurity Index (GCI) 2024. Available online: https://www.itu.int/epublications/publication/global-cybersecurity-index-2024 (accessed on 16 September 2025).
  21. ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems —Requirements. International Organization for Standardization: Geneva, Switzerland, 2022. Available online: https://www.iso.org/es/norma/27001 (accessed on 17 October 2025).
  22. Santillán Molina, K.J. Impacto de centralizar bases de datos en Ecuador con ciberseguridad basada en inteligencia artificial. Rev. Univ. Sociedad. 2024, 20, 454–464. Available online: https://rus.ucf.edu.cu/index.php/rus/article/view/4786/4772 (accessed on 17 October 2025).
  23. Boza Rendón, K.Z. Regulación Normativa del Uso de la Inteligencia Artificial en el Ecuador, Una Revisión Con Perspectiva Constitucional. Diploma Thesis, Universidad Católica de Santiago de Guayaquil, Guayaquil, Ecuador, 2024. Available online: http://repositorio.ucsg.edu.ec/bitstream/3317/24623/1/UCSG-C416-24118.pdf (accessed on 16 September 2025).
Figure 1. Evolution of AI-Related Cybersecurity Incidents Globally (2020−2023).
Figure 1. Evolution of AI-Related Cybersecurity Incidents Globally (2020−2023).
Jcp 05 00100 g001
Figure 2. Cybercrimes with AI and Vulnerable Sectors.
Figure 2. Cybercrimes with AI and Vulnerable Sectors.
Jcp 05 00100 g002
Figure 3. Average Economic Impact of a Security Incident (2023).
Figure 3. Average Economic Impact of a Security Incident (2023).
Jcp 05 00100 g003
Figure 4. Cybercrime Reports in Ecuador (2020−2025).
Figure 4. Cybercrime Reports in Ecuador (2020−2025).
Jcp 05 00100 g004
Figure 5. Cybersecurity Readiness Comparison (2020).
Figure 5. Cybersecurity Readiness Comparison (2020).
Jcp 05 00100 g005
Figure 6. Cybersecurity Readiness Comparison (2024).
Figure 6. Cybersecurity Readiness Comparison (2024).
Jcp 05 00100 g006
Figure 7. Level of knowledge about artificial intelligence (AI).
Figure 7. Level of knowledge about artificial intelligence (AI).
Jcp 05 00100 g007
Figure 8. AI: An Opportunity or a Threat in Cybersecurity?
Figure 8. AI: An Opportunity or a Threat in Cybersecurity?
Jcp 05 00100 g008
Figure 9. Opinion on the use of AI tools to enhance attacks in Ecuador.
Figure 9. Opinion on the use of AI tools to enhance attacks in Ecuador.
Jcp 05 00100 g009
Figure 10. AI-powered phishing cases in nearby environments.
Figure 10. AI-powered phishing cases in nearby environments.
Jcp 05 00100 g010
Figure 11. Opinion on the future impact of AI-powered ransomware.
Figure 11. Opinion on the future impact of AI-powered ransomware.
Jcp 05 00100 g011
Figure 12. Opinion: Types of cyberthreats that will be most enhanced by AI in the coming years.
Figure 12. Opinion: Types of cyberthreats that will be most enhanced by AI in the coming years.
Jcp 05 00100 g012
Figure 13. Main barriers to applying AI in cybercrime defense in Ecuador.
Figure 13. Main barriers to applying AI in cybercrime defense in Ecuador.
Jcp 05 00100 g013
Figure 14. AI-enhanced cybersecurity mechanisms in institutions or the workplace.
Figure 14. AI-enhanced cybersecurity mechanisms in institutions or the workplace.
Jcp 05 00100 g014
Figure 15. COIP and LOPD’s ability to address AI-powered crimes.
Figure 15. COIP and LOPD’s ability to address AI-powered crimes.
Jcp 05 00100 g015
Figure 16. Importance of adopting international standards of ethics and governance in AI to mitigate cybercrime.
Figure 16. Importance of adopting international standards of ethics and governance in AI to mitigate cybercrime.
Jcp 05 00100 g016
Figure 17. Importance of collaboration between strategic sectors.
Figure 17. Importance of collaboration between strategic sectors.
Jcp 05 00100 g017
Figure 18. Importance of awareness and training in cybercrime mitigation.
Figure 18. Importance of awareness and training in cybercrime mitigation.
Jcp 05 00100 g018
Figure 19. Priority level in implementing AI-powered security.
Figure 19. Priority level in implementing AI-powered security.
Jcp 05 00100 g019
Table 1. Methodological Process Matrix.
Table 1. Methodological Process Matrix.
PhaseObjectiveTechniques and InstrumentsType of Analysis
1. Documentary and Regulatory AnalysisAnalyze the current theoretical and legal framework and compare it with international standardsSystematic review of academic and regulatory literature. Comparative analysis matricesQualitative content analysis and legal comparison.
2. Empirical AnalysisCollect and analyze primary data on experts’ perceptions and experiences.Surveys and semi-structured interviews were applied to a sample of the sector.Descriptive statistics (quantitative) and thematic analysis (qualitative)
3. Synthesis and IntegrationTriangulate the findings to contrast perceptions with the regulatory and technical reality.Triangulation of data (documentary, quantitative, and qualitative).Comprehensive analysis to validate conclusions and proposals.
Table 2. Evolution of AI-Related Cybersecurity Incidents Globally (2020−2023).
Table 2. Evolution of AI-Related Cybersecurity Incidents Globally (2020−2023).
YearNumber of Incidents Reported Globally 1Main TechniqueMost Affected SectorSource
20201200+Basic Phishing, BotnetsHealth (due to COVID-19)[5]
20213800+Ransomware-as-a-Service (RaaS)Energy, Logistics[6]
20225200+AI-generated phishing, Deepfakes audioFinancial, Tech[7]
20238000+ (est.)Generative AI (malicious ChatGPT), hyper-realistic DeepfakesAll sectors[8]
2024N/A (Upward trend)Automated AI attacks, Adversarial MLCritical Infrastructure[9]
1 The “Number of Incidents” values represent industry-wide estimates of confirmed and significant security incidents (e.g., ransomware campaigns, data breaches), extrapolated from the analysis of billions of global telemetry signals collected daily by each firm.
Table 3. Types of Cybercrimes with AI and Vulnerable Sectors (2023).
Table 3. Types of Cybercrimes with AI and Vulnerable Sectors (2023).
TypologyDescriptionMost Vulnerable Sectors% of Global Incidents (Approx.) 1Source
AI-Generated PhishingMass creation of personalized and convincing emails and messages.All, especially Finance and Healthcare35%[5]
DeepfakesFake audio or video for extortion, disinformation, or identity theft.Government, Journalism, Business2% (but growing rapidly)[6]
Smart MalwareMalware that adapts its code to evade detection (sandboxing).Tech, Energy, Manufacturing18%[10]
AI-Powered Financial FraudData analysis for investment scams, fraudulent loans, or voice cloning.Banking, SMEs, End Users25%[9]
1 The “% of Global Incidents “ values represent industry-wide estimates of confirmed and significant security incidents (e.g., ransomware campaigns, data breaches), extrapolated from the analysis of billions of global telemetry signals collected daily by each firm.
Table 4. Average Economic Impact of a Security Incident (2023).
Table 4. Average Economic Impact of a Security Incident (2023).
Incident TypeGlobal Average Cost (USD)Average Cost Latin America (USD)Source
Ransomware$5.13 million$3.68 million 1[11]
Data Breach$4.45 million$3.29 million 1[11]
Denial of Service (DDoS) Attack$120 k–$2 M (per attack)N/A (Global figures used) 2[12]
1 They conducted in-depth interviews with 553 organizations in 16 countries and regions that suffered a data breach between March 2022 and March 2023. 2 Their estimate is based on analysis of millions of DDoS attacks on their global infrastructure and industry surveys of the business impact.
Table 5. Cybercrime Reports in Ecuador (2020–2025).
Table 5. Cybercrime Reports in Ecuador (2020–2025).
YearNumber of Complaints 1Year-over-Year IncreaseCriminal Offense 2Source
20202281-Fraudulent Appropriation by Electronic Means[17]
20215237129.6%Fraudulent Appropriation by Electronic Means[17]
20223136−40.1%Fraudulent Appropriation by Electronic Means[17]
2023344910.0%Fraudulent Appropriation by Electronic Means[17]
202437007.3%Fraudulent Appropriation by Electronic Means[17]
2025-July2439Data through July 2025 3Fraudulent Appropriation by Electronic Means[17]
1 The data is collected annually. This is the record in the Integrated System of Prosecutorial Actions (SIAF) of alleged criminal acts of public action under the jurisdiction of the State Attorney General’s Office. 2 For this type of crime, the Ecuadorian COIP only has this classification. 3 The cut-off date for 2025 was July 2025, which is the last date for consultation.
Table 6. COIP (Ecuador) vs. Penal Code (Spain)—Modern cybercrimes.
Table 6. COIP (Ecuador) vs. Penal Code (Spain)—Modern cybercrimes.
Type of CrimeCOIP (Ecuador) 1Penal Code (Spain) 1
PhishingDigital identity theft (Art. 212.14 COIP): illicit use of electronic credentials.Fraud (Article 248 of the Criminal Code): includes cases involving deepfakes/malware.
Electronic fraud (Art. 186 COIP): deception involving the transfer of resources, sentence of 5–7 years.Document forgery (Article 390 of the Criminal Code): manipulated documents or audio/videos.
Unauthorized access to systems (Art. 232 COIP): 1–3 yearsPrecursor to cybercrime (Article 264 ter of the Criminal Code): applies if malware/techniques are provided. (Código Penal y legislación complementaria—España)
Deepfakes/Voice Impersonation (AI)There is no specific article in the COIP, although use can be classified as fraud or impersonation using existing provisions.Draft reform creates Article 173 bis of the Criminal Code: penalizes deepfakes (unauthorized images/voices intended to harm moral integrity). Penalties: 1–2 years; more severe if they are made online or against minors. El País
Article 401 of the Criminal Code: impersonation of civil status (6 months–3 years).
Digital Identity Theft BeyondArt. 212.14 COIP, as mentioned. Not specific to deepfakes.Reform of Organic Law 10/22: the penalty is aggravated if an image is used without consent online for harassment or humiliation. (Ley Orgánica 10/2022, de 6 de septiembre, de garantía integral de la libertad sexual—España)
Malware/CyberattacksCOIP classifies unauthorized access (Art. 232) and attacks on the integrity of systems (Art. 232), but does not mention specific malware.Art. 264.1 CP: serious damage to data/programs—6 months to 3 years.
Art. 264 bis: system interference—6 months to 3 years.
Art. 264 ter: providing tools (such as malware)—6 months to 2 years or a fine. (Código Penal y legislación complementaria—España)
1 The comparative articles (where the crimes are referenced) are taken from current legislation.
Table 7. LOPD (Ecuador) vs. RGPD/LOPDGDD (Spain/EU)—Protection combined with cybersecurity 1.
Table 7. LOPD (Ecuador) vs. RGPD/LOPDGDD (Spain/EU)—Protection combined with cybersecurity 1.
AspectLOPD (Ecuador) 1GDPR/LOPDGDD (Spain/EU) 1
Security/AttacksIt requires technical measures to protect data, although it does not mention specific malware or phishing.The GDPR requires “security of processing” (Art. 32) and breach notification (Art. 33–34).
It does not explicitly address phishing or deepfakes.
Incident ReportingNotification to the data subject and the authority within 3 days (Art. 46).Notification to authorities and, if necessary, to data subjects within 72 h.
Proactive ResponsibilityPrinciple of accountability: technical measures, DPO, risk assessment.The GDPR requires DPIAs, data processing records, DPOs, and technical and organizational measures.
Penalties and ScopeProportional fines (up to 1% of turnover), including extraterritoriality.Fines of up to €20 million or 4% of the global volume, with similar extraterritoriality.
1 These laws focus on data protection, but also cover aspects related to cyberattacks, incidents, and information security.
Table 8. Cybersecurity Readiness Benchmark (2020)—ITU Global Cybersecurity Index (GCI) 1.
Table 8. Cybersecurity Readiness Benchmark (2020)—ITU Global Cybersecurity Index (GCI) 1.
CountryOverall ScoreComparative RankingStrong IndicatorWeak IndicatorSource
United States100.001All-[19]
Spain98.522Legal Measures, Capacity Building, Cooperative MeasuresOrganizational Measures[19]
Brazil96.603Legal MeasuresTechnical Measures[19]
Mexico81.684Technical MeasuresOrganizational Measures[19]
Ecuador26.305Legal MeasuresOrganizational Measures, Cooperative Measures[19]
1 A report by the International Telecommunication Union (ITU) that measures the level of countries’ commitment to cybersecurity, based on five pillars: legal, technical, organizational, capacity building, and cooperation measures, year 2020—Global Cybersecurity Index 2020.
Table 9. ITU Global Cybersecurity Index (GCI) Score (2020) 1.
Table 9. ITU Global Cybersecurity Index (GCI) Score (2020) 1.
CountryLegal MeasuresTechnical MeasuresOrganizational MeasuresCapacity BuildingCooperative MeasuresOverall Score
United States20.0020.0020.0020.0020.00100
Spain20.0019.5418.9820.0020.0098.52
Brazil20.0018.7318.9819.4819.4196.60
Mexico15.6117.9014.7016.1317.3481.68
Ecuador10.229.550.006.530.0026.30
1 A report by the International Telecommunication Union (ITU) that measures the level of countries’ commitment to cybersecurity, based on five pillars: legal, technical, organizational, capacity building, and cooperation measures, year 2020—Global Cybersecurity Index 2020.
Table 10. Cybersecurity Readiness Benchmark (2024)—ITU Global Cybersecurity Index (GCI) 1.
Table 10. Cybersecurity Readiness Benchmark (2024)—ITU Global Cybersecurity Index (GCI) 1.
CountryOverall ScoreComparative RankingStrong IndicatorWeak IndicatorSource
USA99.861Legal measures, Technical measures, Organizational measures, Cooperative measuresCapacity Development[20]
Spain99.742Legal Measures, Technical Measures, Organizational Measures, Cooperative MeasuresCapacity Development[20]
Brazil96.383Legal Measures, Technical Measures, Cooperative MeasuresOrganizational Measures[20]
Ecuador87.184Legal MeasuresCapacity Development[20]
Mexico85.775Technical MeasuresCooperative Measures[20]
1 A report by the International Telecommunication Union (ITU) that measures the level of countries’ commitment to cybersecurity, based on five pillars: legal, technical, organizational, capacity building, and cooperation measures, year 2024—Global Cybersecurity Index 2024.
Table 11. ITU Global Cybersecurity Index (GCI) Score (2024) 1.
Table 11. ITU Global Cybersecurity Index (GCI) Score (2024) 1.
CountryLegal MeasuresTechnical MeasuresOrganizational MeasuresCapacity BuildingCooperative MeasuresOverall Score
USA20.0020.0020.0019.8620.0099.86
Spain20.0020.0018.9819.7420.0099.74
Brazil20.0020.0017.2919.0920.0096.38
Mexico18.3919.6017.3417.0513.3985.77
Ecuador19.2117.8918.6013.7817.7087.18
1 A report by the International Telecommunication Union (ITU) that measures the level of countries’ commitment to cybersecurity, based on five pillars: legal, technical, organizational, capacity building, and cooperation measures, year 2024—Global Cybersecurity Index 2024.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Varela Enríquez, C.; Toasa, R.; Urdaneta, M. The Use of Artificial Intelligence in Cybercrime: Impact Analysis in Ecuador and Mitigation Strategies. J. Cybersecur. Priv. 2025, 5, 100. https://doi.org/10.3390/jcp5040100

AMA Style

Varela Enríquez C, Toasa R, Urdaneta M. The Use of Artificial Intelligence in Cybercrime: Impact Analysis in Ecuador and Mitigation Strategies. Journal of Cybersecurity and Privacy. 2025; 5(4):100. https://doi.org/10.3390/jcp5040100

Chicago/Turabian Style

Varela Enríquez, Carlos, Renato Toasa, and Maryory Urdaneta. 2025. "The Use of Artificial Intelligence in Cybercrime: Impact Analysis in Ecuador and Mitigation Strategies" Journal of Cybersecurity and Privacy 5, no. 4: 100. https://doi.org/10.3390/jcp5040100

APA Style

Varela Enríquez, C., Toasa, R., & Urdaneta, M. (2025). The Use of Artificial Intelligence in Cybercrime: Impact Analysis in Ecuador and Mitigation Strategies. Journal of Cybersecurity and Privacy, 5(4), 100. https://doi.org/10.3390/jcp5040100

Article Metrics

Back to TopTop