PromptLock Ransomware Uses AI to Encrypt and Steal Data

Researchers uncovered PromptLock, the first AI-powered ransomware generating malicious Lua scripts via LLM prompts. Though only a proof-of-concept, it highlights risks of weaponized AI in cybercrime.
PromptLock Ransomware Uses AI to Encrypt and Steal Data
Table of Contents
    Add a header to begin generating the table of contents

    Security researchers have identified PromptLock, a new proof-of-concept ransomware that uses artificial intelligence to generate malicious scripts capable of stealing and encrypting data across Windows, macOS, and Linux systems. The malware employs OpenAI’s gpt-oss:20b model via the Ollama API to dynamically create Lua scripts for a range of attack functions.

    “The investigation determined that an unauthorized actor may have accessed and copied certain files on our computer systems,” researchers explained in their disclosure.

    How PromptLock Leverages AI to Generate Malicious Lua Scripts

    PromptLock is written in Golang and connects through a proxy tunnel to access the large language model hosted on a remote server. Its hard-coded prompts instruct the model to create Lua scripts that can:

    • Enumerate local filesystems
    • Inspect and target sensitive files
    • Exfiltrate collected data
    • Encrypt compromised files

    Researchers also noted code fragments suggesting data destruction functionality, though this feature has not been fully implemented.

    Encryption Method and Choice of Algorithm

    For file encryption, PromptLock relies on the SPECK 128-bit cipher. This algorithm, designed primarily for lightweight use cases such as RFID, is considered weak by modern standards. Its inclusion further indicates that PromptLock is not yet optimized for practical large-scale attacks.

    Indicators That PromptLock is a Proof of Concept

    ESET clarified that PromptLock has not appeared in real-world telemetry and was only identified after being uploaded to VirusTotal. Multiple characteristics suggest it is still a prototype:

    • Use of a weak encryption algorithm unsuitable for ransomware operations
    • Presence of a hard-coded Bitcoin wallet address linked to Satoshi Nakamoto
    • Unfinished data destruction feature

    Shortly after ESET’s disclosure, a researcher claimed ownership of the malware, stating that the project had leaked unintentionally.

    Significance of PromptLock in AI-Powered Cybercrime

    Despite being a concept, PromptLock illustrates how AI can lower barriers to cybercrime by dynamically generating malicious scripts. Its approach showcases how adversaries might achieve:

    • Cross-platform targeting flexibility
    • Real-time operational adaptation
    • Enhanced evasion against static detection methods

    This development follows similar findings from Ukraine’s CERT in July, when analysts uncovered LameHug, an AI-powered malware tool allegedly linked to Russian APT28 actors. LameHug uses Hugging Face APIs and Alibaba’s Qwen-2.5-Coder-32B model to generate Windows shell commands. While PromptLock leverages proxying to interact with AI models, LameHug uses direct API calls—both achieving dynamic attack generation in different ways.

    MITRE ATT&CK Mapping for PromptLock

    The table below highlights techniques that PromptLock likely uses based on current analysis.

    TacticTechniqueIDDescription
    Initial AccessSupply Chain Compromise / Uploaded FileT1195/T1204Delivery via shared files (VirusTotal submission hints PoC distribution).
    ExecutionCommand and Scripting InterpreterT1059.003Lua script execution for malicious tasks.
    PersistenceModify Registry / System ScriptsT1112/T1037Potential persistence using system modifications.
    Defense EvasionProxy UseT1090LLM communication through proxy tunnels.
    Credential AccessUnsecured CredentialsT1552Targeting sensitive files for credential theft.
    CollectionFile and Directory DiscoveryT1083Identifies target files across local systems.
    ExfiltrationExfiltration Over Alternative ProtocolT1048Transfers stolen data using non-standard channels.
    ImpactData Encrypted for ImpactT1486File encryption using SPECK algorithm.

    Related Posts