AI-Driven Ransomware Strain PromptLock Discovered
Summary
Hide â˛
Show âŧ
A new ransomware strain named PromptLock has been identified by ESET researchers. This strain leverages AI to generate malicious scripts in real-time, making it more difficult to detect and defend against. PromptLock is currently in development and has not been observed in active attacks. It can exfiltrate files, encrypt data, and is being upgraded to destroy files. The ransomware uses the gpt-oss:20b model from OpenAI via the Ollama API and is written in Go, targeting Windows, Linux, and macOS systems. The Bitcoin address associated with PromptLock appears to belong to Satoshi Nakamoto. PromptLock uses Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target files, exfiltrate selected data, and perform encryption. The ransomware can generate custom ransom notes based on the type of infected machine and uses the SPECK 128-bit encryption algorithm to lock files. PromptLock is assessed to be a proof-of-concept (PoC) rather than a fully operational malware deployed in the wild.
Timeline
-
27.08.2025 16:27 đ° 2 articles
AI-Driven Ransomware Strain PromptLock Discovered
ESET researchers identified the first known AI-driven ransomware strain, PromptLock. This ransomware uses the gpt-oss:20b model from OpenAI to generate malicious scripts in real-time, making detection more challenging. PromptLock is currently under development and targets Windows, Linux, and macOS systems. The associated Bitcoin address belongs to Satoshi Nakamoto. PromptLock uses Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target files, exfiltrate selected data, and perform encryption. It can generate custom ransom notes based on the type of infected machine and uses the SPECK 128-bit encryption algorithm to lock files. The ransomware is assessed to be a proof-of-concept (PoC) rather than a fully operational malware deployed in the wild. PromptLock does not download the entire AI model; instead, it establishes a proxy or tunnel to a server running the Ollama API with the gpt-oss-20b model.
Show sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
Information Snippets
-
PromptLock is the first known ransomware strain that uses an AI model as its engine.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
-
PromptLock leverages the gpt-oss:20b model from OpenAI locally using the Ollama API to generate new scripts in real-time.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
-
The ransomware is written in the Go programming language and targets both Windows and Linux systems.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
-
PromptLock can exfiltrate files and encrypt data, and is being upgraded to destroy files.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
-
The ransomware's Bitcoin address for payments appears to belong to Satoshi Nakamoto.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
-
PromptLock samples were uploaded to VirusTotal from the United States.
First reported: 27.08.2025 16:27đ° 2 sources, 2 articlesShow sources
- AI-Powered Ransomware Has Arrived With 'PromptLock' â www.darkreading.com â 27.08.2025 16:27
- Someone Created the First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model â thehackernews.com â 27.08.2025 20:07
Similar Happenings
HybridPetya Ransomware Bypasses UEFI Secure Boot via CVE-2024-7344
A new ransomware strain, HybridPetya, has been discovered. It resembles the Petya/NotPetya malware and can bypass UEFI Secure Boot using the CVE-2024-7344 vulnerability. HybridPetya encrypts the Master File Table (MFT) on NTFS-formatted partitions and installs a malicious EFI application on the EFI System Partition. The ransomware has two main components: a bootkit and an installer. The bootkit handles encryption and decryption processes, displaying fake CHKDSK messages to deceive victims. The ransom note demands $1,000 in Bitcoin, with a wallet receiving $183.32 between February and May 2025. HybridPetya exploits a remote code execution vulnerability in the Howyar Reloader UEFI application, allowing it to bypass Secure Boot. The variant uses a specially crafted file named 'cloak.dat' to load the bootkit binary. Microsoft revoked the vulnerable binary in January 2025. ESET's telemetry data indicates no evidence of HybridPetya being used in the wild, suggesting it may be a proof-of-concept (PoC). The ransomware incorporates characteristics from both Petya and NotPetya, including the visual style and attack chain. It drops several files into the EFI System Partition, including configuration, validation, and encryption progress tracking files. The ransom note provides a 32-character key for decryption and system restoration upon payment. Indicators of compromise for HybridPetya are available on a GitHub repository. Microsoft fixed CVE-2024-7344 with the January 2025 Patch Tuesday updates.
ChillyHell macOS Backdoor Resurfaces with New Capabilities
The ChillyHell macOS backdoor malware, initially observed in 2022, has resurfaced with a new version. This modular backdoor allows attackers remote access and the ability to drop payloads, brute-force passwords, and evade detection. The malware, disguised as an executable applet, was discovered on VirusTotal and had been publicly hosted on Dropbox since 2021. The malware employs multiple persistence mechanisms and communicates over various protocols, making it highly flexible. It can exfiltrate data, drop additional payloads, and enumerate user accounts. Apple has revoked the notarization of the developer certificates associated with the malware. The resurgence of ChillyHell highlights the increasing threat landscape for macOS, emphasizing the need for robust security measures. A new Go-based remote access trojan (RAT) named ZynorRAT has been discovered, targeting Windows and Linux systems. ZynorRAT uses a Telegram bot for command and control and supports a wide range of functions, including file exfiltration and system enumeration.
APT28 deploys NotDoor backdoor via Microsoft Outlook
APT28, a Russian state-sponsored threat group, has been using a new backdoor malware called NotDoor to target Microsoft Outlook. The malware exploits Outlook as a covert communication, data exfiltration, and malware delivery channel. NotDoor is a VBA macro that monitors incoming emails for specific trigger words. When triggered, it allows attackers to exfiltrate data, upload files, and execute commands on the victim's computer. The malware is delivered via a legitimate signed binary, Microsoft's OneDrive.exe, vulnerable to DLL sideloading. The backdoor was identified by researchers from Lab52, the threat intelligence arm of Spanish cybersecurity firm S2 Grupo. The malware has been deployed against companies in NATO member countries, using advanced techniques to evade detection and maintain persistence. NotDoor supports multiple commands for data exfiltration and file uploads, and uses Base64-encoded PowerShell commands for various operations. The malware creates a staging folder in the %TEMP% directory to store and exfiltrate files, encoding them with custom encryption before sending via email. APT28's attacks involve the abuse of Microsoft Dev Tunnels for C2 infrastructure, providing stealth and rapid infrastructure rotation. The attack chain includes the use of bogus Cloudflare Workers domains to distribute additional payloads, demonstrating a high level of specialized design and obfuscation.
SentinelOne Recognized as Leader in Gartner Magic Quadrant for Endpoint Protection Platforms
SentinelOne has been named a Leader in the 2025 Gartner Magic Quadrant for Endpoint Protection Platforms for the fifth consecutive year. The recognition highlights the Singularity Platform's innovation and capabilities in AI-driven cybersecurity, including real-time, autonomous protection across enterprises. The platform secures organizations across various devices, operating systems, and cloud environments, providing robust endpoint security solutions. The Singularity Platform's advanced features include AI-powered threat detection, automated remediation, and integration with existing security tools. It supports industries with stringent security requirements, such as healthcare and finance, by ensuring operational continuity and fast containment of threats. The platform's capabilities have been proven to detect threats 63% faster, reduce mean time to respond (MTTR) by 55%, and lower the likelihood of security incidents by 60%.
HOOK Android Trojan Expands Capabilities with Ransomware Overlays and 107 Remote Commands
A new variant of the HOOK Android banking trojan has been discovered, featuring ransomware-style overlay screens to extort victims. This variant supports 107 remote commands, including new capabilities for capturing user gestures, stealing cryptocurrency wallet information, and displaying fake NFC overlays. The trojan is distributed via phishing websites, bogus GitHub repositories, and malicious APK files, posing a significant threat to financial institutions and users. The HOOK trojan is believed to be an offshoot of the ERMAC banking trojan, which had its source code leaked publicly. The trojan can display fake overlays on financial apps to steal credentials and abuse Android accessibility services for fraud and remote control. The latest version of HOOK includes commands for ransomware overlays, capturing user gestures, and stealing sensitive information like credit card details and lockscreen PINs. It also features transparent overlays to capture user gestures and screen-streaming sessions for real-time monitoring.