Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025

Top XDR-Tools für maximale Sicherheit

December 15, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Google Uncovers PROMPTFLUX Malware Rewriting Itself Every Hour with Gemini AI
Cybercrime and Ransomware

Google Uncovers PROMPTFLUX Malware Rewriting Itself Every Hour with Gemini AI

Staff WriterBy Staff WriterNovember 5, 2025No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Fast Facts

  1. Google uncovered PROMPTFLUX, a VBScript malware that self-modifies and evolves by interacting with Gemini’s AI to enhance obfuscation, persistence, and evasion, indicating a metamorphic capability.
  2. The malware, still in testing, can request code regeneration every hour and propagate via startup folder, removable drives, and network shares, aiming to evade static detection without currently compromising systems.
  3. Adversaries are increasingly leveraging AI-powered tools like PROMPTFLUX and others (e.g., FRUITSHELL, PROMPTLOCK) for sophisticated, dynamic cyberattacks, including code obfuscation, data theft, and malware development.
  4. State-sponsored groups from China, Iran, and North Korea misuse Gemini for reconnaissance, phishing, payload delivery, and social engineering, often masquerading as CTF participants to bypass safeguards, signaling a shift toward AI-driven operational efficiency and scale.

The Issue

Google has recently uncovered a sophisticated form of malware named PROMPTFLUX, created by an unknown threat actor, which cleverly exploits artificial intelligence to enhance its evasion capabilities. This malware, coded in VBScript, interacts with Google’s Gemini AI model API to generate and obfuscate its source code dynamically, enabling it to repeatedly modify itself and avoid detection by traditional security measures. Its primary functions include establishing persistence by copying itself to Windows startup folders and attempting to spread via removable drives and network shares. Though currently in a testing phase, PROMPTFLUX exemplifies a new wave of AI-driven cyber threats that can autonomously adapt their code during execution, making them increasingly difficult to identify and thwart.

The report from Google’s Threat Intelligence Group indicates that this malware is part of a broader trend where malicious actors leverage large language models (LLMs) to develop highly adaptable and covert tools. Several variations of PROMPTFLUX and other AI-powered malware—such as reverse shells and ransomware—have been observed, with some designed for widespread criminal activities, including data theft and system compromise. Notably, state-sponsored actors from China, Iran, and North Korea are also misusing Google’s Gemini AI not only to craft convincing lure content and streamline reconnaissance but also to develop sophisticated malware and conduct targeted espionage. The evolution of this AI-assisted cybercrime infrastructure signals that malicious groups are rapidly adopting AI to increase the scope, scale, and complexity of their operations, posing a significant challenge to cybersecurity defenses worldwide.

Risk Summary

The emergence of PROMPTFLUX malware, which leverages Gemini AI to autonomously rewrite its code every hour, presents a significant threat to any business by enabling relentless, adaptive cyberattacks that can bypass traditional security measures, compromise sensitive data, disrupt operations, and erode customer trust. This sophisticated malware’s ability to continuously evolve makes it especially dangerous, as it can infiltrate defenses designed to halt static threats, leading to sustained system breaches, financial loss, and reputational damage. Any enterprise ignoring these emerging, AI-driven cyber threats exposes itself to exponentially increased risks, underscoring the urgent need for advanced, adaptive cybersecurity strategies to protect assets and maintain operational integrity.

Possible Next Steps

In the rapidly evolving landscape of cyber threats, addressing malicious software like PROMPTFLUX that employs advanced artificial intelligence techniques such as Gemini AI to autonomously rewrite its code is crucial. Timely remediation is essential to limit operational disruption, protect sensitive data, and prevent potential exploitation of vulnerabilities.

Containment Measures
Quickly isolate infected systems to prevent malware spread and minimize damage.

Analysis & Identification
Conduct thorough forensic analysis to understand the malware’s functionality and identify entry points.

Update Defenses
Implement the latest security patches, update antivirus signatures, and enhance intrusion detection systems.

Code Review
Perform comprehensive code audits to uncover malicious code snippets and unauthorized modifications.

Enhanced Monitoring
Increase real-time monitoring and alerting to detect unusual activity indicative of malware evolution.

Disabling Automated Features
Turn off or restrict AI-driven processes that may facilitate rapid code rewriting or evasion.

Restoration & Recovery
Restore affected systems from secure backups to ensure integrity and operational stability.

User Education
Inform and train personnel on recognizing signs of malware activity and safe security practices.

Policy Revision
Update security policies to address AI-assisted malware threats, including procedures for rapid response.

Threat Intelligence Sharing
Collaborate with industry and cybersecurity communities to stay informed about emerging AI-augmented malware techniques.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update computer security cyber attacks cyber news cyber risk cyber security news cyber security news today cyber security updates cyber updates cybercrime Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware risk management software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCybercriminal Alliances and Major Data Breaches: What You Need to Know
Next Article AI-Powered Malware Now Mutates and Steals Data During Execution
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025

Top XDR-Tools für maximale Sicherheit

December 15, 2025

Comments are closed.

Latest Posts

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 20250 Views

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 20250 Views

Top XDR-Tools für maximale Sicherheit

December 15, 20250 Views

Cybersecurity Alerts: Windows, Chrome, Apple Zero-Days & Kali Linux 2025.4 Highlights

December 14, 20250 Views
Don't Miss

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments
  • New Gentlemen Ransomware Breaches and Encrypts Corporate Data
  • Top XDR-Tools für maximale Sicherheit
  • Dallas: Corinium CISO 2025 Conference
  • Prisma Browser Claims Top Spot in Frost Radar

Recent Comments

No comments to show.
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025

Top XDR-Tools für maximale Sicherheit

December 15, 2025
Most Popular

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Critical Linux Flaw Under Attack by Ransomware Gangs

November 1, 20258 Views

Scania Confirms Data Breach Amid Extortion Attempt

June 17, 20258 Views

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.