• About
  • FAQ
  • Landing Page
Newsletter
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
No Result
View All Result
Home Business

Google Threat Report Links AI-powered Malware to DPRK Crypto Theft

admin by admin
November 7, 2025
in Business
0
Google Threat Report Links AI-powered Malware to DPRK Crypto Theft
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter



In brief

  • Google identified five malware families that query LLMs to generate or hide malicious code.
  • A DPRK-linked group called UNC1069 used Gemini to probe wallet data and craft phishing scripts.
  • Google says it has disabled the accounts and tightened safeguards around model access.

Google has warned that several new malware families now use large language models during execution to modify or generate code, marking a new phase in how state-linked and criminal actors are deploying artificial intelligence in live operations.

In a report released this week, the Google Threat Intelligence Group said it has tracked at least five distinct strains of AI-enabled malware, some of which have already been used in ongoing and active attacks.

Related articles

PIP Labs Sheds Staff as Story Protocol Leans Into AI

PIP Labs Sheds Staff as Story Protocol Leans Into AI

March 13, 2026
Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

March 12, 2026

The newly-identified malware families “dynamically generate malicious scripts, obfuscate their own code to evade detection,” while also making use of AI models “to create malicious functions on demand,” instead of having those hard-coded into malware packages, the threat intelligence group stated.

Each variant leverages an external model such as Gemini or Qwen2.5-Coder during runtime to generate or obfuscate code, a method GTIG dubbed “just-in-time code creation.”

The technique represents a shift from traditional malware design, where malware logic is typically hard-coded into the binary.

By outsourcing parts of its functionality to an AI model, the malware can continuously make changes to harden itself against systems designed to deter it.

Two of the malware families, PROMPTFLUX and PROMPTSTEAL, demonstrate how attackers are integrating AI models directly into their operations.

GTIG’s technical brief describes how PROMPTFLUX runs a “Thinking Robot” process that calls Gemini’s API every hour to rewrite its own VBScript code, while PROMPTSTEAL, linked to Russia’s APT28 group, uses the Qwen model hosted on Hugging Face to generate Windows commands on demand.

The group also identified activity from a North Korean group known as UNC1069 (Masan) that misused Gemini.

Google’s research unit describes the group as “a North Korean threat actor known to conduct cryptocurrency theft campaigns leveraging social engineering,” with notable use of “language related to computer maintenance and credential harvesting.”

Per Google, the group’s queries to Gemini included instructions for locating wallet application data, generating scripts to access encrypted storage, and composing multilingual phishing content aimed at crypto exchange employees.

These activities, the report added, appeared to be part of a broader attempt to build code capable of stealing digital assets.

Google said it had already disabled the accounts tied to these activities and introduced new safeguards to limit model abuse, including refined prompt filters and tighter monitoring of API access.

The findings could point to a new attack surface where malware queries LLMs at runtime to locate wallet storage, generate bespoke exfiltration scripts, and craft highly credible phishing lures.

Decrypt has approached Google on how the new model could change approaches to threat modeling and attribution, but has yet to receive a response.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.



Source link

Share76Tweet47

Related Posts

PIP Labs Sheds Staff as Story Protocol Leans Into AI

PIP Labs Sheds Staff as Story Protocol Leans Into AI

by admin
March 13, 2026
0

In brief Story Protocol developer PIP Labs has let go of several employees and contractors. The reductions come as the...

Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

Tether Backs Ark Labs’ $5.2 Million Bet on Bitcoin’s Stablecoin Revival

by admin
March 12, 2026
0

In brief Ark Labs secured backing from Tether and Anchorage Digital. The firm plans to advance stablecoins and real-world assets...

Top Bitcoin Mining Pool Operator Foundry Is Getting Into Zcash

Top Bitcoin Mining Pool Operator Foundry Is Getting Into Zcash

by admin
March 11, 2026
0

In brief Foundry Digital is establishing a mining pool for Zcash, the privacy-focused cryptocurrency, which has surged more than 600%...

Elon Musk’s X Money App Nears Public Launch, No Sign of Dogecoin

Elon Musk’s X Money App Nears Public Launch, No Sign of Dogecoin

by admin
March 10, 2026
0

In brief X Money, the financial services arm of the social media platform, will launch public access beta in April....

Strategy Drops $1.28 Billion on Bitcoin, Issues $377 Million in Preferred Shares

Strategy Drops $1.28 Billion on Bitcoin, Issues $377 Million in Preferred Shares

by admin
March 9, 2026
0

In brief Strategy notched its largest Bitcoin purchase in over a month. The firm issued STRC at its fastest rate...

Load More
  • Trending
  • Comments
  • Latest
XRP price holds firm amid 30% volume spike

XRP price holds firm amid 30% volume spike

December 26, 2025
Lido DAO’s LDO price spikes as Arthur Hayes acquires 1.85M tokens

Lido DAO’s LDO price spikes as Arthur Hayes acquires 1.85M tokens

December 26, 2025
Solana Pullback Finds Purpose As Strong Hands Eye Accumulation Below $160

Solana Pullback Finds Purpose As Strong Hands Eye Accumulation Below $160

November 6, 2025
Bitcoin hashprice sinks to 2-year low as AI pivots split miners

Bitcoin hashprice sinks to 2-year low as AI pivots split miners

November 5, 2025

US Commodities Regulator Beefs Up Bitcoin Futures Review

0

Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

0

India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

0

Bitcoin’s Main Rival Ethereum Hits A Fresh Record High: $425.55

0
An AI Pivot Won’t Save You, Wintermute Tells Bitcoin Miners

An AI Pivot Won’t Save You, Wintermute Tells Bitcoin Miners

March 14, 2026
Why Binance suddenly isn’t afraid of negative press anymore

Why Binance suddenly isn’t afraid of negative press anymore

March 14, 2026
US Treasury Sanctions Alleged $800 Million North Korean IT Worker Fraud Operation

US Treasury Sanctions Alleged $800 Million North Korean IT Worker Fraud Operation

March 13, 2026
Bitcoin targets $73,000 as crypto bounces despite oil price jitters

Bitcoin targets $73,000 as crypto bounces despite oil price jitters

March 13, 2026

Recent News

An AI Pivot Won’t Save You, Wintermute Tells Bitcoin Miners

An AI Pivot Won’t Save You, Wintermute Tells Bitcoin Miners

March 14, 2026
Why Binance suddenly isn’t afraid of negative press anymore

Why Binance suddenly isn’t afraid of negative press anymore

March 14, 2026

Categories

  • Bitcoin
  • Blockchain
  • Business
  • Ethereum
  • Guide
  • Market
  • Regulation
  • Ripple
  • Uncategorized
  • About
  • FAQ
  • Support Forum
  • Landing Page
  • Contact Us

© Copyright 2025 All Rights Reserved.

No Result
View All Result
  • Contact Us
  • Homepages
  • Business
  • Guide

© Copyright 2025 All Rights Reserved.