Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Bitcoin drops below $69,200 as Trump gives 48-hour ultimatum on Iran power plants

17 minutes ago

Hawk Tuah Girl Warns Others To Stay Clear of Crypto in Latest Interview

24 minutes ago

Bitcoin miners are losing $19,000 on every BTC produced as difficulty drops 7.8%

1 hour ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Sunday, March 22
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»Google Threat Report Links AI-powered Malware to DPRK Crypto Theft
Cryptocurrency & Free Speech Finance

Google Threat Report Links AI-powered Malware to DPRK Crypto Theft

News RoomBy News Room5 months agoNo Comments3 Mins Read771 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
Google Threat Report Links AI-powered Malware to DPRK Crypto Theft
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

In brief

  • Google identified five malware families that query LLMs to generate or hide malicious code.
  • A DPRK-linked group called UNC1069 used Gemini to probe wallet data and craft phishing scripts.
  • Google says it has disabled the accounts and tightened safeguards around model access.

Google has warned that several new malware families now use large language models during execution to modify or generate code, marking a new phase in how state-linked and criminal actors are deploying artificial intelligence in live operations.

In a report released this week, the Google Threat Intelligence Group said it has tracked at least five distinct strains of AI-enabled malware, some of which have already been used in ongoing and active attacks.

The newly-identified malware families “dynamically generate malicious scripts, obfuscate their own code to evade detection,” while also making use of AI models “to create malicious functions on demand,” instead of having those hard-coded into malware packages, the threat intelligence group stated.

Each variant leverages an external model such as Gemini or Qwen2.5-Coder during runtime to generate or obfuscate code, a method GTIG dubbed “just-in-time code creation.”

The technique represents a shift from traditional malware design, where malware logic is typically hard-coded into the binary.

By outsourcing parts of its functionality to an AI model, the malware can continuously make changes to harden itself against systems designed to deter it.

Two of the malware families, PROMPTFLUX and PROMPTSTEAL, demonstrate how attackers are integrating AI models directly into their operations.

GTIG’s technical brief describes how PROMPTFLUX runs a “Thinking Robot” process that calls Gemini’s API every hour to rewrite its own VBScript code, while PROMPTSTEAL, linked to Russia’s APT28 group, uses the Qwen model hosted on Hugging Face to generate Windows commands on demand.

The group also identified activity from a North Korean group known as UNC1069 (Masan) that misused Gemini.

Google’s research unit describes the group as “a North Korean threat actor known to conduct cryptocurrency theft campaigns leveraging social engineering,” with notable use of “language related to computer maintenance and credential harvesting.”

Per Google, the group’s queries to Gemini included instructions for locating wallet application data, generating scripts to access encrypted storage, and composing multilingual phishing content aimed at crypto exchange employees.

These activities, the report added, appeared to be part of a broader attempt to build code capable of stealing digital assets.

Google said it had already disabled the accounts tied to these activities and introduced new safeguards to limit model abuse, including refined prompt filters and tighter monitoring of API access.

The findings could point to a new attack surface where malware queries LLMs at runtime to locate wallet storage, generate bespoke exfiltration scripts, and craft highly credible phishing lures.

Decrypt has approached Google on how the new model could change approaches to threat modeling and attribution, but has yet to receive a response.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

Bitcoin drops below $69,200 as Trump gives 48-hour ultimatum on Iran power plants

17 minutes ago
Cryptocurrency & Free Speech Finance

Hawk Tuah Girl Warns Others To Stay Clear of Crypto in Latest Interview

24 minutes ago
Cryptocurrency & Free Speech Finance

Bitcoin miners are losing $19,000 on every BTC produced as difficulty drops 7.8%

1 hour ago
Cryptocurrency & Free Speech Finance

Ripple linked token falls 3% as bitcoin weakness caps recovery

2 hours ago
Cryptocurrency & Free Speech Finance

Resolv Labs’ Stablecoin Depegs Amid Exploit

3 hours ago
Cryptocurrency & Free Speech Finance

Nevada Judge Blocks Kalshi From Operating in State

6 hours ago
Add A Comment

Comments are closed.

Editors Picks

Hawk Tuah Girl Warns Others To Stay Clear of Crypto in Latest Interview

24 minutes ago

Bitcoin miners are losing $19,000 on every BTC produced as difficulty drops 7.8%

1 hour ago

Ripple linked token falls 3% as bitcoin weakness caps recovery

2 hours ago

Resolv Labs’ Stablecoin Depegs Amid Exploit

3 hours ago
Latest Posts

Nevada Judge Blocks Kalshi From Operating in State

6 hours ago

CFTC Staff Share FAQ on Crypto Collateral

8 hours ago

Georgia Court Order Apparently Included AI-Hallucinated Cases, Copied from Prosecutor’s Proposed Order

8 hours ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

Bitcoin drops below $69,200 as Trump gives 48-hour ultimatum on Iran power plants

17 minutes ago

Hawk Tuah Girl Warns Others To Stay Clear of Crypto in Latest Interview

24 minutes ago

Bitcoin miners are losing $19,000 on every BTC produced as difficulty drops 7.8%

1 hour ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.