More

    Google flags adaptive malware that rewrites itself with AI

    PROMPTFLUX queries Google Gemini for ‘just-in-time’ obfuscation, signalling a shift toward adaptive, partially autonomous code in attacker toolchains.

    Hackers are experimenting with malware that taps large language models to morph in real time, according to Google’s Threat Intelligence Group. An experimental family dubbed PROMPTFLUX can rewrite and obfuscate its own code as it executes, aiming to sidestep static, signature-based detection.

    PROMPTFLUX interacts with Gemini’s API to request on-demand functions and ‘just-in-time’ evasion techniques, rather than hard-coding behaviours. GTIG describes the approach as a step toward more adaptive, partially autonomous malware that dynamically generates scripts and changes its footprint.

    Defenders are turning to AI, using security frameworks and agents like ‘Big Sleep’ to find flaws. Teams should expect AI-assisted obfuscation, emphasise behaviour-based detection, watch model-API abuse, and lock down developer and automation credentials.

    Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

     

    Latest articles

    Related articles