Categories: Cyber Security News

Google Alerts Users to New PROMPTFLUX Malware Leveraging Gemini API for Self-Modifying Code

The Google Threat Intelligence Group (GTIG) has uncovered a new wave of malicious activity where artificial intelligence (AI) is directly integrated into malware operations.

The most prominent discovery, a dropper called PROMPTFLUX, showcases the first known use of “just-in-time” AI a mechanism that enables malware to modify its own code during execution dynamically.

Unlike traditional obfuscation methods, PROMPTFLUX interacts with the Gemini API to rewrite and regenerate its VBScript source code, allowing it to evade signature-based detection by constantly altering structure and content.

Researchers found that PROMPTFLUX leverages Gemini’s “gemini-1.5-flash-latest” model to fetch updated obfuscation logic and executables.

The malware communicates via hard‑coded API keys, issuing specific prompts to Gemini requesting new VBScript variants purely focused on antivirus evasion.

Its module, known as “Thinking Robot,” further automates this cycle by periodically polling the API and saving new regenerated files into the Windows Startup folder to maintain persistence. This approach signals a major advancement toward autonomous, adaptive malware ecosystems powered by LLMs.

Dynamic Regeneration and Early Testing Phases

GTIG’s reverse-engineering analysis identified multiple experimental builds of PROMPTFLUX, including one using a renamed “Thinging” function that instructs Gemini to fully rewrite the malware’s source code every hour.

Each variant embeds the original payload, regeneration logic, and persistent API key, forming a recursive mutation chain.

Capabilities of notable AI tools and services advertised in English- and Russian-language underground forums

Although some elements, such as the self‑update function “AttemptToUpdateSelf,” remain commented out, logs written to “% TEMP%thinking_robot_log.txt.txt” show active communication with Gemini and attempts to process live responses.

At this stage, PROMPTFLUX appears to be under active development rather than wide deployment. Google has since disabled the assets associated with the campaign, noting its early-stage nature.

However, the use of LLMs for runtime metamorphism highlights a potential paradigm shift where malware becomes semi‑autonomous and capable of continual evolution without human reprogramming.

Broader AI Abuse Across Nation-State Operations

The GTIG report also correlates similar activity with other AI-enabled malware such as PROMPTSTEAL and PROMPTLOCK, uncovering efforts by government-backed and financially motivated actors from North Korea, Iran, and China.

These adversaries are exploiting generative AI systems for phishing content creation, reconnaissance, code generation, and even direct command execution through APIs like Hugging Face and Gemini.

North Korean threat actor’s misuse of Gemini to support their operations

Google has strengthened its defensive classifiers and model safeguards to block such misuse in Gemini.

The company reaffirmed its commitment to responsible AI development through active asset takedowns and enhanced model hardening, ensuring future AI-based malware like PROMPTFLUX will face heightened resistance across the ecosystem.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Google Alerts Users to New PROMPTFLUX Malware Leveraging Gemini API for Self-Modifying Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Spacelift Unleashes Infrastructure Teams From DevOps Gridlock

Spacelift has launched Spacelift Intelligence to help infrastructure teams escape drowning in provisioning requests. Developers…

20 minutes ago

Reco Tackles AI Agent Chaos With SaaS Security

Reco has released Reco AI Agent Security to fill the visibility gap for AI agents…

20 minutes ago

Sana from Workday launches AI Superintelligence to streamline business

Workday has announced a major evolution of its business platform, with the first update to…

20 minutes ago

Van Weelde Sets Sail with Unit4 ERPx Upgrade

Unit4 has announced that Van Weelde Shipping Group is one of the latest customers to…

20 minutes ago

Are We ‘Data Ready’ for AI or any Meaningful Process Transformation?

AI in all its forms (analytical, generative, agentic, et al) promises to redefine how work…

20 minutes ago

Xbox Will Finally Let You Disable Quick Resume for Specific Games, Such as Online Titles That It Just Doesn’t Play Nice With

Microsoft has announced a fresh set of system features, including the long-requested ability to disable…

20 minutes ago

This website uses cookies.