Generative AI Begins Powering the Execution of …

Generative AI is no longer confined to the development phase of malware; it is now also used during their operation.

Google echoes this… and provides five examples. Among them, a VBScript dropper it named PROMPTFLUX.

A dropper rewrites its code thanks to Gemini

Identified in early June, the malware leverages the latest Gemini Flash 1.5 version — via the API, with the key hardcoded — to help obscure its code. And thus maximize its chances of evading antivirus detection.

Read also: Project Zero changes its vulnerability disclosure policy

Variants have been discovered. One, for instance, requests Gemini every hour to rewrite its entire source code. And to save each new version in the startup folder, in order to establish persistence.

PROMPTFLUX also bears worm-like traits, capable of spreading across network shares and removable media. It does not, however, appear able to compromise a network or even a device. Some of its functions are indeed commented out, including the one by which it modifies its code using the elements provided by Gemini. But the presence of this function, as well as the logging of AI responses, clearly illustrates its intent.

A data miner generates Windows commands via Qwen

Another example: PROMPTSTEAL. Also identified in June, it was used by APT28 (the Russia-aligned group) against Ukraine.

It is a Python data miner disguised as an image-creation program. It contains a compiled script that calls Qwen2.5-Coder-32B-Instruct via the Hugging Face API, probably using a stolen token. Objective: generate Windows commands intended to collect system information and copy documents into a specific folder for exfiltration.

When the host’s AI tools are used to search for secrets

Google also mentions PROMPTLOCK, a Go-written ransomware. Considered experimental, it exploits an (unspecified) LLM to generate Lua scripts. It includes capabilities for filesystem discovery, data exfiltration, and encryption on Windows as well as Linux.

FRUITSHELL and QUIETVAULT, on the other hand, have been observed in operations.
The former, publicly available, is a reverse shell written in PowerShell. It carries prompts intended to help it evade detection by security systems relying on LLMs.
The latter, coded in JavaScript, is supposed to exfiltrate GitHub and NPM tokens by pushing them to a public repository. For searching for other secrets, it feeds on the host’s online command-line AI tools.

Dawn Liphardt

Dawn Liphardt

I'm Dawn Liphardt, the founder and lead writer of this publication. With a background in philosophy and a deep interest in the social impact of technology, I started this platform to explore how innovation shapes — and sometimes disrupts — the world we live in. My work focuses on critical, human-centered storytelling at the frontier of artificial intelligence and emerging tech.