HomeSample Page

Sample Page Title


Experimental PromptLock ransomware uses AI to encrypt, steal data

Risk researchers found the primary AI-powered ransomware, referred to as PromptLock, that makes use of Lua scripts to steal and encrypt information on Home windows, macOS, and Linux techniques.

The malware makes use of OpenAI’s gpt-oss:20b mannequin by the Ollama API to dynamically generate the malicious Lua scripts from hard-coded prompts.

How PromptLock works

In response to ESET researchers, PromptLock is written in Golang and makes use of the Ollama API to entry the gpt-oss:20b massive language mannequin. The LLM is hosted on a distant server, to which the menace actor connects by a proxy tunnel.

The malware makes use of hard-coded prompts that instruct the mannequin to generate malicious Lua scripts dynamically, together with for native filesystem enumeration, goal recordsdata inspection, information exfiltration, and file encryption.

File enumeration prompts
File enumeration prompts
Supply: ESET

The researchers additionally point out information destruction performance however the characteristic has not been applied.

For file encryption, PromptLock makes use of the light-weight SPECK 128-bit algorithm, a fairly uncommon selection for ransomware, thought of appropriate primarily for RFID functions.

PromptLock's encryption logic
PromptLock’s encryption logic
Supply: ESET

Only a demo for now

ESET advised BleepingComputer that PromptLock has not appeared of their telemetry, however fairly they found it on VirusTotal.

The cybersecurity firm believes that PromptLock is a proof-of-concept or work in progress, and never an energetic ransomware within the wild.

Moreover, a number of indicators point out that it is a idea device fairly than an actual menace at presen. Some clues suggesting that embrace utilizing a weak encryption cipher (SPECK 128-bit), a hard-coded Bitcoin tackle linked to Satoshi Nakamoto, and the truth that the information destruction functionality has not been applied.

After ESET revealed particulars about PromptLock, a safety researcher claimed that that the malware was their mission and one way or the other it bought leaked.

Nonetheless, the looks of PromptLock holds significance in demonstrating that AIs might be weaponized in malware workflows, providing cross-platform capabilities, operational flexibility, evasion, and reducing the bar for entry into cybercrime.

This evolution grew to become evident in July, when Ukraine’s CERT reported the invention of the LameHug malware, an LLM-powered device that makes use of Hugging Face API and Alibaba’s Qwen-2.5-Coder-32B to generate Home windows shell instructions on the fly.

LameHug, believed to be deployed by Russian hackers of the APT28 group, leverages API calls as a substitute of PromptLock’s proxying. Each implementations obtain the identical sensible end result, although the latter is extra advanced and dangerous.

46% of environments had passwords cracked, practically doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete take a look at extra findings on prevention, detection, and information exfiltration developments.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles