Page cover

brain-circuitFirst AI Powered Ransomware Discovered - PromptLock

Overview

On August 26, 2025, cybersecurity researchers at ESET uncovered PromptLock, the first known artificial intelligence-powered ransomware.

This ransomware is a milestone in cybercrime evolution, for the first time, an open-source large language model (LLM) is integrated directly into ransomware to generate adaptive, autonomous, and platform-independent malicious code.

How PromptLock Operates

1. AI Generated Script Creation

  • Written in Golong.

  • Uses OpenAI's gpt-oss-20b model (released August 5, 2025).

  • The ransomware issues hard-coded prompts to the LLM, instructing it to create malicious Lua scripts on demand.

  • These scripts locate files, filter for high-value data, exfiltrate it, and then encrypt the remaining files.

2. Adaptive Deployment Strategy

Unlike traditional ransomware, PromptLock doesn’t require shipping the entire model. Attackers can:

  • Run the model locally on the victim machine (if hardware allows).

  • OR tunnel requests to a remote Ollama API server running the AI model.

This reduces footprint while retaining full functionality — making it harder to detect during initial stages.

3. Encryption Implementation

PromptLock uses the SPECK 128-bit cipher, designed by the NSA in 2013.

  • Block Size: 128 bits (2×64-bit words)

  • Key Size: 128 bits

  • Rounds: 32 iterations

  • Performance: ~1.99 cycles/byte (extremely fast)

  • Structure: Add-Rotate-XOR (ARX) — combines modular addition, XOR, and rotations for efficiency.

This makes PromptLock’s encryption lightweight, efficient, and deadly effective across diverse systems.

Key Technical Components

Programming Language: Golang (portable, cross-compiled easily).

Script Engine: Lua (lightweight, portable, cross-OS).

AI Model: OpenAI GPT-OSS-20B

  • Parameters: 21B total / 3.6B active (Mixture-of-Experts architecture).

  • Memory: 16GB RAM/GPU minimum.

  • Context: 128,000 tokens.

  • Optimized for local inference (edge computing).

Article content

Discovery & Current Status

Timeline

  • Aug 25, 2025 → Samples uploaded to VirusTotal from U.S. systems.

  • Aug 26, 2025 → Analyzed & disclosed by ESET researchers Anton Cherepanov and Peter Strycek.

  • Classified as Filecoder.PromptLock.A.

Current Assessment

  • Proof of Concept (PoC): Indicators suggest PromptLock is not yet in active mass campaigns.

  • Unfinished Features: Data destruction code exists but is currently disabled.

  • Ransom Wallet Symbolism: Points to Satoshi Nakamoto’s BTC address, suggesting a symbolic demo rather than profit motive.Security Implications

1. Variable Indicators of Compromise (IoCs)

Each execution generates different Lua scripts, meaning no static signature exists. Traditional detection (hash-based, YARA rules) becomes less reliable.

2. Cross-Platform Reach

Lua + Golang combo = seamless execution across Windows, Linux, and macOS. This increases potential target scope and lowers dev effort for attackers.

3. Autonomous Target Selection

Using AI, PromptLock evaluates file contents and metadata to choose what to encrypt. Unlike traditional ransomware (which encrypts blindly), PromptLock is selective and strategic, increasing potential damage.

4. Ollama API Weaknesses

Default Ollama API settings leave port 11434 unauthenticated, exposing victims to:

  • Model theft

  • API resource abuse

  • Configuration manipulation

  • Remote code execution (CVE-2024-37032, path traversal → arbitrary file write)

Industry Response & Broader Context

OpenAI Statement: “Ensuring the safe development of our models is paramount. We are continuously enhancing safeguards to strengthen against exploitation.”

Anthropic Findings: Criminals have used Claude AI for:

  • Automated target reconnaissance

  • Malware script generation

  • Drafting ransom notes Affecting at least 17 organizations in 2025.

Expert Predictions for 2025–26:

  • AI-driven social engineering (deepfake voice phishing, adaptive spearphishing).

  • Automated target prioritization by LLMs.

  • Dynamic evasion in malware (adapts mid-execution).

  • Custom ransomware tuned per victim org.

Defense & Mitigation

For Organizations

  • Behavioral Detection Systems → Watch for abnormal Lua execution, ARX-heavy encryption patterns.

  • Network Monitoring → Flag unauthorized API traffic to Ollama endpoints.

  • Segmentation → Limit access to AI inference servers.

  • Patch Management → Fix CVE-2024-37032 & related Ollama vulnerabilities.

  • AI Governance → Restrict internal LLM use, enforce model security policies.

For Security Teams

  • Threat Intelligence → Track evolving AI-powered malware signatures.

  • Training → Educate defenders on AI-assisted cybercrime tactics.

  • Incident Response → Prepare for adaptive ransomware where IoCs differ case by case.

Conclusion

PromptLock is not just another ransomware strain — it’s a paradigm shift. For the first time, AI-generated scripts replace traditional static payloads, making the malware:

  • Adaptive (IoCs constantly changing)

  • Autonomous (chooses targets intelligently)

  • Universal (runs on multiple OSs with minimal tweaking)

ESET’s Anton Cherepanovarrow-up-right put it bluntly:

“With the help of AI, launching sophisticated attacks has become dramatically easier—eliminating the need for teams of skilled developers.”

The cybersecurity industry has a limited window to adapt while PromptLock remains in proof-of-concept stage. Its emergence proves one truth: AI is a double-edged sword, capable of empowering both defenders and adversaries.

Last updated

Was this helpful?