Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla postpones mass production announcement of Roadster 2 to April Fools’ Day

Tesla shareholders approve Elon Musk’s $1 trillion compensation package

Sam Altman doesn’t want government to bail out OpenAI if it fails

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour
Identity

Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour

userBy userNovember 5, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 5, 2025Ravi LakshmananArtificial Intelligence/Threat Intelligence

Google announced Wednesday that it has discovered that an unknown attacker using experimental Visual Basic Script (VB Script) malware called PROMPTFLUX interacts with the company’s Gemini artificial intelligence (AI) model API to create its own source code to improve obfuscation and evasion.

“PROMPTFLUX is written in VBScript and interacts with Gemini’s API to request certain VBScript obfuscation and evasion techniques to facilitate ‘just-in-time’ self-modification and likely evade static signature-based detection,” Google Threat Intelligence Group (GTIG) said in a report shared with The Hacker News.

This new feature is part of the “Thinking Robot” component, which periodically queries a large-scale language model (LLM) (in this case Gemini 1.5 Flash or newer) to retrieve new code to avoid detection. This is accomplished by sending queries to the Gemini API endpoint using a hard-coded API key.

The prompts sent to the model are very specific and machine-parseable, requesting changes to the VB Script code for antivirus evasion, and instructing the model to output only the code itself.

Aside from its regeneration capabilities, the malware also establishes persistence by storing new obfuscated versions in the Windows startup folder and attempts to propagate by copying itself to removable drives and mapped network shares.

“Although the self-modifying function (AttemptToUpdateSelf) is commented out, its presence, combined with active logging of AI responses to ‘%TEMP%\ Thinking_robot_log.txt’, clearly indicates the authors’ goal of creating metamorphic scripts that evolve over time,” Google added.

DFIR retainer service

The tech giant also said it discovered multiple variations of PROMPTFLUX that incorporated code regeneration by LLM, with one version using a prompt to rewrite the entire malware source code every hour by instructing LLM to act as an “expert VB script obfuscator.”

PROMPTFLUX is rated as being in the development/testing stage, and the malware currently has no means to compromise victim networks or devices. Although it is currently unclear who is behind the malware, there are indications that financially motivated attackers are targeting a wide range of users, adopting a broad approach that is agnostic to geography and industry.

Google also noted that adversaries are not only using AI for simple productivity improvements, but also creating tools that can adjust their behavior on the fly, as well as proprietary tools that are sold on underground forums for financial gain. Other examples of LLM-based malware observed by the company include:

FRUITSHELL, a reverse shell written in PowerShell that contains hardcoded prompts that bypass detection and analysis by LLM-powered security systems. PROMPTLOCK, a cross-platform ransomware written in Go that uses LLM to dynamically generate and execute malicious Lua scripts at runtime (identified as a proof of concept) Ukraine that queries Qwen2.5-Coder-32B-Instruct to generate commands to run via Hugging Face QUIETVAULT’s API. This is a credential stealer written in JavaScript that targets GitHub and NPM tokens.

From Gemini’s perspective, the company said it has observed China-linked threat actors abusing its AI tools to create persuasive decoy content, build technology infrastructure, and design tools for data breaches.

In at least one instance, the attackers allegedly reframed the prompt by identifying themselves as participants in a capture-the-flag (CTF) exercise in order to circumvent guardrails and trick the AI ​​system into returning useful information that could be used to exploit the compromised endpoint.

“The attackers appear to have learned from this interaction and used the CTF pretext to support phishing, exploitation, and web shell development,” Google said. “The attackers prefaced many of the prompts for exploitation of specific software or email services with comments such as ‘I’m working on a CTF issue’ or ‘I’m currently on CTF and I saw someone from another team say this.’ This approach provided advice on next steps to exploit in a ‘CTF scenario.'”

Other examples of Gemini exploitation by state-sponsored actors in China, Iran, and North Korea for operational efficiency purposes such as reconnaissance, phishing lure creation, command and control (C2) development, and data theft are listed below.

Exploitation of Gemini by threat actors suspected of having ties to China for a variety of tasks, from initial reconnaissance of targets of interest and phishing techniques to delivery of payloads and requests for assistance with lateral movement and data extraction methods Exploitation of Gemini by Iranian nation-state actor APT41 to obfuscate code and assist in the development of C++ and Golang code for multiple tools, including a C2 framework called OSSTUN Gemini by Iranian nation-state Exploiting attacker MuddyWater (also known as Mango Sandstorm, MUDDYCOAST, or TEMP.Zagros) conducted research to support the development of custom malware that supports file transfer and remote execution while circumventing security walls by claiming to be a student working on a university final project or writing an article on cybersecurity Gemini by Iranian nation-state attacker APT42 (also known as Charming Kitten and Mint Sandstorm) Exploitation of Gemini by North Korean threat actor UNC1069 (aka CryptoCore or MASAN) – TraderTraitor (aka PUKCHONG or UNC4899), successor to the defunct APT38 (aka PUKCHONG or UNC4899) One of two clusters alongside BlueNoroff (UNC4899) – generates social engineering decoy materials, develops code to steal cryptocurrencies, and crafts malicious instructions disguised as software updates to extract user credentials. Exploiting Gemini to develop code, research exploits, and improve tools with TraderTraitor

CIS build kit

Additionally, GTIG stated that it recently observed UNC1069 using deepfake images and video lures impersonating individuals in the cryptocurrency industry in social engineering campaigns to distribute a backdoor known as BIGMACHO to victims’ systems under the guise of the Zoom Software Development Kit (SDK). It is worth noting that some aspects of this activity share similarities with Kaspersky’s recently revealed GhostCall campaign.

The development comes as Google said it expects attackers to “move decisively from using AI as the exception to using it as the norm” to increase the speed, scope, and effectiveness of their operations and enable large-scale attacks.

“The increasing accessibility of powerful AI models and the growing number of companies integrating them into their daily operations creates the perfect conditions for instant injection attacks,” the report said. “Theater attackers are rapidly refining their techniques, and the low cost and high reward of these attacks makes them an attractive option.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThere’s another comet Atlas in our solar system – and it just turned golden after a dangerous dance with the sun
Next Article Three Chinese astronauts stranded on Tiangong space station after debris hits return capsule
user
  • Website

Related Posts

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

November 6, 2025

Cisco warns of new firewall attacks exploiting CVE-2025-20333 and CVE-2025-20362

November 6, 2025

Building cyber resilience in financial services

November 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla postpones mass production announcement of Roadster 2 to April Fools’ Day

Tesla shareholders approve Elon Musk’s $1 trillion compensation package

Sam Altman doesn’t want government to bail out OpenAI if it fails

SpaceX’s Starlink passes 8 million customers, secures more spectrum and airlines

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.