Close Menu
  • Home
  • AI & Technology
  • Politics
  • Business
  • Cryptocurrency
  • Sports
  • Finance
  • Fitness
  • Gadgets
  • World
  • Marketing

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

RiminiWellness 2026: Celebrating 20 Years as Europe’s Global Hub for Fitness, Innovation and Well-Being

April 13, 2026

Circle Just Unveiled a Quantum-Resistant Roadmap, and BMIC Is Tipped as the Best Crypto to Buy in This Niche

April 13, 2026

Bitcoin Bulls Must Hold This Level Or Price Could Crash To $65,000 Again

April 13, 2026
Facebook X (Twitter) Instagram
  • Home
  • About US
  • Advertise
  • Contact US
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
MNK NewsMNK News
  • Home
  • AI & Technology
  • Politics
  • Business
  • Cryptocurrency
  • Sports
  • Finance
  • Fitness
  • Gadgets
  • World
  • Marketing
MNK NewsMNK News
Home » Google Threat Report Links AI-powered Malware to DPRK Crypto Theft
Cryptocurrency

Google Threat Report Links AI-powered Malware to DPRK Crypto Theft

MNK NewsBy MNK NewsNovember 6, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google has warned that several new malware families now use large language models during execution to modify or generate code, marking a new phase in how state-linked and criminal actors are deploying artificial intelligence in live operations.

In a report released this week, the Google Threat Intelligence Group said it has tracked at least five distinct strains of AI-enabled malware, some of which have already been used in ongoing and active attacks.

The newly-identified malware families “dynamically generate malicious scripts, obfuscate their own code to evade detection,” while also making use of AI models “to create malicious functions on demand,” instead of having those hard-coded into malware packages, the threat intelligence group stated.

Each variant leverages an external model such as Gemini or Qwen2.5-Coder during runtime to generate or obfuscate code, a method GTIG dubbed “just-in-time code creation.”

The technique represents a shift from traditional malware design, where malware logic is typically hard-coded into the binary.

By outsourcing parts of its functionality to an AI model, the malware can continuously make changes to harden itself against systems designed to deter it.

Seoul Considers Sanctions on North Korea Following US Crypto Crackdown

Two of the malware families, PROMPTFLUX and PROMPTSTEAL, demonstrate how attackers are integrating AI models directly into their operations.

GTIG’s technical brief describes how PROMPTFLUX runs a “Thinking Robot” process that calls Gemini’s API every hour to rewrite its own VBScript code, while PROMPTSTEAL, linked to Russia’s APT28 group, uses the Qwen model hosted on Hugging Face to generate Windows commands on demand.

The group also identified activity from a North Korean group known as UNC1069 (Masan) that misused Gemini.

Google’s research unit describes the group as “a North Korean threat actor known to conduct cryptocurrency theft campaigns leveraging social engineering,” with notable use of “language related to computer maintenance and credential harvesting.”

North Korea Targets Crypto Professionals With New Malware in Hiring Scams

Per Google, the group’s queries to Gemini included instructions for locating wallet application data, generating scripts to access encrypted storage, and composing multilingual phishing content aimed at crypto exchange employees.

These activities, the report added, appeared to be part of a broader attempt to build code capable of stealing digital assets.

Google said it had already disabled the accounts tied to these activities and introduced new safeguards to limit model abuse, including refined prompt filters and tighter monitoring of API access.

The findings could point to a new attack surface where malware queries LLMs at runtime to locate wallet storage, generate bespoke exfiltration scripts, and craft highly credible phishing lures.

Decrypt has approached Google on how the new model could change approaches to threat modeling and attribution, but has yet to receive a response.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
MNK News
  • Website

Related Posts

Circle Just Unveiled a Quantum-Resistant Roadmap, and BMIC Is Tipped as the Best Crypto to Buy in This Niche

April 13, 2026

Bitcoin Bulls Must Hold This Level Or Price Could Crash To $65,000 Again

April 13, 2026

XRP Price Stalls Once More, Bears Prepare for Next Leg Lower

April 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Fury cruises to decision victory over Makhmudov

April 13, 2026

Jannik Sinner beats Alcaraz in Monte Carlo final to reclaim top spot in tennis rankings

April 12, 2026

Zalmi thrash hapless Qalandars to go top

April 11, 2026

POA honours Rizwan Aftab Ahmed with highest shield

April 11, 2026
Our Picks

Circle Just Unveiled a Quantum-Resistant Roadmap, and BMIC Is Tipped as the Best Crypto to Buy in This Niche

April 13, 2026

Bitcoin Bulls Must Hold This Level Or Price Could Crash To $65,000 Again

April 13, 2026

XRP Price Stalls Once More, Bears Prepare for Next Leg Lower

April 13, 2026

Recent Posts

  • RiminiWellness 2026: Celebrating 20 Years as Europe’s Global Hub for Fitness, Innovation and Well-Being
  • Circle Just Unveiled a Quantum-Resistant Roadmap, and BMIC Is Tipped as the Best Crypto to Buy in This Niche
  • Bitcoin Bulls Must Hold This Level Or Price Could Crash To $65,000 Again
  • Fury cruises to decision victory over Makhmudov
  • XRP Price Stalls Once More, Bears Prepare for Next Leg Lower

Recent Comments

No comments to show.
MNK News
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About US
  • Advertise
  • Contact US
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 mnknews. Designed by mnknews.

Type above and press Enter to search. Press Esc to cancel.