Google warns of AI-powered malware targeting crypto users

2025-11-8 13:17

Threat actors, including those with ties to North Korea, are using AI-enabled malware that rewrites itself in real time to target cryptocurrency users, according to a warning issued this week by Google.

“Threat actors associated with the Democratic People’s Republic of Korea (DPRK) continue to misuse generative AI tools to support operations across the stages of the attack lifecycle, aligned with their efforts to target cryptocurrency and provide financial support to the regime,” Google Threat Intelligence Group wrote in a recent report.

AI-powered malware poses new risks to crypto users

Google has tracked at least five distinct malware families that can “dynamically generate malicious scripts, obfuscate their own code to evade detection,” using large language models such as Gemini and Qwen2.5-Coder during execution.

AI-enabled malware is the new frontier in cyberattacks and presents a major escalation from previous approaches, where malicious functions were typically hardcoded directly into the malware itself.

The new malware strain can essentially rewrite and adapt its code on the go, thereby making it significantly harder to detect and mitigate using traditional security tools.

Google specifically highlighted two malware families, PROMPTFLUX and PROMPTSTEAL, which integrate large language models directly into their operations to regenerate code, evade antivirus software, and execute system-level commands in real time.

PROMPTFLUX is an experimental dropper that uses Gemini’s API to continually rewrite its VBScript code, allowing it to refresh its obfuscation tactics and slip past security tools. 

While PROMPTSTEAL, a data miner, leverages the Qwen model hosted on Hugging Face to generate Windows commands on demand for collecting files and system information.

PROMPTSTEAL has been directly associated with Russia’s APT28 group and has already been deployed in live operations.

Crypto users are also at risk as the North Korea–linked group UNC1069, also known as Masan, has been using Gemini “to research cryptocurrency concepts, and perform research and reconnaissance related to the location of users’ cryptocurrency wallet application data.”

According to Google, the group went further by crafting multilingual phishing messages and attempting to develop code that impersonated software updates in order to steal credentials and extract digital assets.

Threat actors, including DPRK-linked attackers, have also used AI-powered tools to generate deepfake images and videos impersonating individuals in the cryptocurrency industry as part of social engineering campaigns aimed at distributing malware and gaining access to target systems.

Google said it had already disabled the accounts tied to these activities, but risks still remain as attackers can use AI to generate bespoke exfiltration scripts, phishing lures, and system commands that could target crypto platforms and their users with far greater precision than before.

Past attempts to target crypto users using malware

Since the inception of the crypto industry, attackers have used various creative attack vectors to exploit vulnerabilities in platforms, users, and infrastructure.

Last month, in a separate report, Google identified another malware strain dubbed EtherHiding that North Korea-linked attackers were pushing through blockchain smart contracts on Ethereum and BNB Smart Chain to covertly deliver malicious payloads.

Earlier this year, Kaspersky flagged another large-scale malware operation that abused the SourceForge software platform to distribute crypto-targeting malware disguised as fake Microsoft Office add-ons and managed to infiltrate over 4,600 devices, mostly in Russia.

The post Google warns of AI-powered malware targeting crypto users appeared first on Invezz

origin »

Emerald Crypto (EMD) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 4.67 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 19.117m EMD / 32m EMD

users malware crypto past slip actors threat

users malware → Результатов: 126


Mac Users Beware: ‘Realst’ Malware Emerges, Specifically Targeting Crypto Wallets

A new and challenging form of malware dubbed “Realst” currently targets macOS and Windows users, posing a particular risk to Apple computer owners. This cunning malware disguises itself as fake blockchain games, such as Brawl Earth and Dawnland, and spreads through social media promotions and direct messages, putting unwary users in harm’s way. When unwary […]

2023-7-26 16:00


SecureBrain joins the PolySwarm decentralized cyber threat intel marketplace

PolySwarm, a crowd-sourced marketplace for threat intelligence and malware detection, has announced SecureBrain Corporation as its latest threat detection partner. SecureBrain’s threat detection technology will be active on PolySwarm starting this month February, detecting threats and helping users get determinations on potentially malicious files and URLs.

2020-2-10 14:06


Kaspersky: Lazarus Hackers To Steal Crypto Using Telegram in ‘Operation AppleJesus Sequel’

The Moscow-based cybersecurity firm Kaspersky has informed cryptocurrency users that North Korean hackers have developed new ways of delivering malware through Telegram. Kaspersky has been looking at the latest attacks of the Lazarus Group, a North Korea-related cybercrime organization that has also conducted the AppleJesus attack on some of the most important crypto exchanges in […]

2020-1-10 22:16


Cybercriminals are targeting healthcare companies with phishing campaigns to steal sensitive data

Healthcare providers are facing an unprecedented level of social engineering-driven malware threats, according to new research. The findings — disclosed by California-based enterprise security solutions provider Proofpoint US — discovered at least 77 percent of email attacks on the medical sector during the first three months of 2019 involved the use of malicious links.

2019-10-9 19:00


Newly Discovered Spyware Uses Telegram Bots to Steal Cryptocurrency from a Number of Wallets

Jupiter Threat Labs recently released a report about a newly discovered commercial spyware called “Masad Clipper and Stealer.” It uses Telegram bots as its command and control (C2) to phish information from Windows and Android users, along with the capability to steal cryptocurrency from unsuspecting victims, while dumping more malware on their devices. The report […]

2019-9-28 00:30


Фото:

Android users suckered for $100s by basic calculator and QR scanning apps

If all the different types of malware that find a way to sneak into the Google Play Store wasn’t enough, here’s another nasty surprise. A new category of apps called “Fleeceware” has been unearthed on the app distribution platform; these apps were found to abuse the Play Store policies and grossly charge users hundreds of dollars for mundane services like calculators and QR code scanners.

2019-9-26 09:30


Фото:

VPN apps with 500M+ installs caught serving disruptive ads to Android users

Google Play Store has a malware problem. And it doesn’t seem to go away despite the company’s best efforts to rein in sketchy apps. In a yet another instance of Android adware, New Zealand-based independent security researcher Andy Michael found four Android VPN apps with cumulative downloads of over 500 million that not only serve ads while running the background, but are also placed outside the apps, including the home screen.

2019-9-20 14:53