Google Discovers PROMPTFLUX Malware Leveraging AI for Evasion

AI malware LLM evasion PromptFlux QuietVault PromptSteal cybersecurity AI malware detection
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
November 6, 2025 3 min read

TL;DR

Attackers are now using Large Language Models (LLMs) to create advanced malware that can evade detection and adapt its behavior. This article covers examples like QuietVault, PromptSteal, and PromptFlux, which leverage AI for activities ranging from secret exfiltration to self-rewriting code to bypass security systems. Understanding these AI-driven threats is essential for modern cybersecurity.

AI-Powered Malware Detection Evasion

Google's threat intelligence analysts have identified malware leveraging Large Language Models (LLMs) to operate and evade security systems. This signifies a shift towards more autonomous and adaptive malware. Google's analysts pointed out that adversaries are deploying novel AI-enabled malware, dynamically altering behavior during execution. Underground marketplaces also offer illicit AI tools for cybercriminals. Google Threat Intelligence Group has outlined how threat actors misuse LLMs to increase productivity across various attack stages. Help Net Security reports that Google has uncovered several instances of AI-powered malware in the wild.

Examples of AI-Driven Malware

Several instances of AI-powered malware have been observed:

  • QuietVault: A credential stealer targeting GitHub and NPM tokens. It uses an AI prompt and on-host AI CLI tools to find and exfiltrate secrets. Google's report details this.
  • PromptSteal: Used by Russian APT28 (aka Fancy Bear), this data miner uses the Hugging Face API to query Qwen2.5-Coder-32B-Instruct for generating Windows commands to collect and exfiltrate data. Help Net Security mentions APT28's use of PromptSteal.
  • FruitShell: A reverse shell containing hard-coded prompts designed to bypass detection by LLM-powered security systems. Google's analysis includes FruitShell.

malware using LLMs
Image courtesy of Help Net Security

Experimental Malware: PromptLock and PromptFlux

  • PromptLock: This ransomware uses an LLM to dynamically generate and execute malicious Lua scripts at runtime. NYU Tandon researchers initially developed it.
  • PromptFlux: A dropper that uses the Google Gemini API to rewrite its own source code hourly to evade detection. The Hacker News reports on PromptFlux's capabilities.

Both are considered experimental, indicating ongoing development.

PROMPTFLUX Details

PROMPTFLUX is a VB Script malware that uses the Gemini AI model API to rewrite its source code for better obfuscation and evasion. The "Thinking Robot" component queries the LLM (Gemini 1.5 Flash or later) to obtain new code, bypassing detection. Google Threat Intelligence Group (GTIG) shared this information. It saves the obfuscated version in the Windows Startup folder for persistence and attempts to propagate via removable drives and network shares. The Hacker News provides a detailed overview.

Gemini Abuse by Threat Actors

A China-nexus threat actor misused Gemini to craft lure content, build infrastructure, and develop data exfiltration tools. Google's report details this misuse. The actor bypassed Gemini’s reluctance by posing as a participant in a capture-the-flag (CTF) exercise. PCMag notes that Google has implemented safeguards against these techniques.

Threat-actor-Gemini-misuse
Image courtesy of Help Net Security

Other Instances of Gemini Misuse

  • Iranian nation-state actor APT41 used Gemini for code obfuscation and developing C++ and Golang code for tools.
  • MuddyWater researched custom malware development, circumventing safety barriers by posing as a student.
  • APT42 crafted phishing material and developed a "Data Processing Agent" for SQL queries.
  • North Korean threat actor UNC1069 generated lure material for social engineering and developed code to steal cryptocurrency.
  • TraderTraitor developed code, researched exploits, and improved tooling.

The Hacker News provides detailed reports on these incidents.

PromptSteal Malware

PromptSteal, flagged by Ukrainian cyber authorities, is a data-mining malware that connects to a Qwen large language model developed by Alibaba Group. It acts as a Trojan, posing as an image generation program, and generates commands for execution. Google's analysis confirms this. It is suspected to be the work of Russian state-sponsored hacking group APT28 (Fancy Bear). PCMag also reports on PromptSteal's connection to APT28.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors
BRICKSTORM malware

China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors

Uncover the sophisticated BRICKSTORM malware campaign linked to China. Learn about its tactics, targets, and how to defend your organization. Read more!

By Jim Gagnard December 5, 2025 4 min read
Read full article
Critical RCE Vulnerabilities in React and Next.js Expose Millions
React security

Critical RCE Vulnerabilities in React and Next.js Expose Millions

React & Next.js hit by critical RCE flaws! Learn about CVE-2025-55182, CVE-2025-66478, and CVE-2025-11953. Patch immediately to protect your applications. Read more!

By Divyansh Ingle December 4, 2025 3 min read
Read full article
Combating Cyber Threats: Harnessing AI for Effective Defense
AI cybersecurity

Combating Cyber Threats: Harnessing AI for Effective Defense

Cyberattackers are leveraging AI for sophisticated threats. Discover how to defend your organization with AI-driven strategies and tools. Learn more at Gopher Security.

By Alan V Gutnov December 3, 2025 7 min read
Read full article
Google Patches 120 Android Vulnerabilities, 2 Zero-Days Fixed
Android security updates

Google Patches 120 Android Vulnerabilities, 2 Zero-Days Fixed

Google's latest Android security updates tackle critical vulnerabilities and actively exploited zero-days. Ensure your device is protected! Learn more.

By Alan V Gutnov December 2, 2025 2 min read
Read full article