Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI-Enabled Malware Now Actively Deployed, Says Google
News

AI-Enabled Malware Now Actively Deployed, Says Google

Team-CWDBy Team-CWDNovember 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google has discovered a new breed of AI-powered malware that uses large language models (LLMs) during execution to dynamically generate malicious scripts and evade detection.

A Google Threat Intelligence Group (GTIG) report yesterday highlighted two families it said use “just-in-time AI” in this way – PromptFlux and PromptSteal.

“These tools dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware,” the report explained.

“While still nascent, this represents a significant step toward more autonomous and adaptive malware.”

Read more on LLM abuse: New “LameHug” Malware Deploys AI-Generated Commands

PromptFlux is a dropper written in VBScript which “regenerates” by using the Google Gemini API. It prompts the LLM to rewrite its own source code on the fly, and then save the obfuscated version to the Startup folder for persistence. The malware also tries to spread by copying itself to removable drives and mapped network shares, GTIG said.

PromptSteal is a data miner written in Python that queries the LLM Qwen2.5-Coder-32B-Instruct to generate one-line Windows commands to collect information and documents in specific folders and send the data to a command-and-control (C2) server.

GTIG said it had observed PromptSteal being used by Russian actor APT28 in Ukraine, while PromptFlux is still being developed.

Among the other AI-enabled malware families the report highlighted are:

  • FruitShell: a reverse shell written in PowerShell which establishes remote C2 connections and enables the execution of commands on a targeted system. It uses hard-coded prompts to evade detection by LLM-based security
  • PromptLock: ransomware written in Go which uses an LLM to dynamically generate malicious Lua scripts at runtime for reconnaissance, data encryption and exfiltration
  • QuietVault: a JavaScript credential stealer which uses an AI prompt and on-host installed AI CLI tools to search for and exfiltrate secrets

The AI Malware Market Matures

Google warned that the cybercrime market for AI tools is developing at a rapid pace. It cited “multiple offerings of multifunctional tools designed to support phishing, malware development, and vulnerability research,” which could democratize cybercrime further.

It also noted continued efforts to bypass guardrails in Gemini by using “social engineering-like pretexts” in prompts. Additionally, GTIG warned that nation state actors are misusing the chatbot to assist in all stages of their attacks – from reconnaissance and creation of phishing lures to C2 development and data exfiltration.

Cory Michal, CSO at AppOmni, said the GTIG report echoes what his firm is seeing in the SaaS threat landscape.

“AI-enabled malware mutates its code, making traditional signature-based detection ineffective. Defenders need behavioral EDR that focuses on what malware does, not what it looks like,” he added.

“Detection should key in on unusual process creation, scripting activity or unexpected outbound traffic especially to AI APIs like Gemini, Hugging Face or OpenAI. By correlating behavioral signals across endpoint, SaaS and identity telemetry, organizations can spot when attackers are abusing AI and stop them before data is exfiltrated.”

Max Gannon, cyber intelligence team manager at Cofense, argued that the use of AI at every step of the kill chain should be a concern to network defenders.

“This is a significant change from last year when AI was used minimally with a focus on phishing emails and kits,” he added.

“I expect that in the near future enterprising threat actors will be selling all-inclusive AI-based kits that generate every part of the attack chain and require zero knowledge – making the only barrier to entry the subscription fee.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human
Next Article Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.