Sunday , September 21 2025
MalTerminal

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called ‘MalTerminal’ utilizes OpenAI’s GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change in threat creation and deployment. The discovery was part of SentinelLABS’ “LLM-Enabled Malware In the Wild” research presented at the LABScon 2025 security conference.

PromptLock: An Academic Proof-of-Concept:

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called 'MalTerminal' utilizes OpenAI's GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change...
Read More
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cybersecurity researchers revealed a zero-click vulnerability in OpenAI ChatGPT's Deep Research agent that lets attackers leak sensitive Gmail inbox data...
Read More
Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cyber attack disrupts several European airports: check-in and boarding systems affected

Several European airports are experiencing flight delays and cancellations due to a cyber attack on a check-in and boarding systems...
Read More
Cyber attack disrupts several European airports: check-in and boarding systems affected

Hacker claim to breach Link3; 189,000 Users data up for sale

A threat actor claims to have breached Link3, a major IT solutions and internet service provider based in Bangladesh. The...
Read More
Hacker claim to breach Link3; 189,000 Users data up for sale

Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Check point, a cyber security solutions provider hosts an event titled "securing the hyperconnected world in the AI era" at...
Read More
Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. Despite being recognized for over...
Read More
Microsoft Confirms 900+ XSS Vulns Found in IT Services

Daily Security Update Dated : 15.09.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.09.2025

IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local privileged users...
Read More
IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

Major Australian Banks using Army of AI Bots to Scam Scammers

Australian banks are now using bots to combat scammers. These bots mimic potential victims to gather real-time information and drain...
Read More
Major Australian Banks using Army of AI Bots to Scam Scammers

F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

F5 plans to acquire CalypsoAI, which offers adaptive AI security solutions. CalypsoAI's technology will be added to F5's Application Delivery...
Read More
F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

In August 2025, ESET found PromptLock, initially identified as the first AI-powered ransomware. Later, it was revealed to be a proof-of-concept by NYU researchers to show the risks of such threats.

PromptLock, written in Golang, operates locally on the victim’s machine using the Ollama API, unlike MalTerminal, which uses a cloud-based API.

Based on predefined prompts, PromptLock generates malicious Lua scripts in real-time, making it compatible across Windows, Linux, and macOS.

The malware detects the infected system type—personal computer, server, or industrial controller—and decides on its own whether to exfiltrate or encrypt data with the SPECK 128-bit encryption algorithm.

Promptlock

MalTerminal Uncovered:

SentinelLABS researchers discovered LLM-enabled malware during the PromptLock research project. They concentrated on artifacts specific to LLM integration rather than known malicious code.

The team created YARA rules to find hardcoded API keys and common prompt structures in binaries. This method effectively detected suspicious Python scripts and a Windows executable called MalTerminal.exe.

Analysis shows the malware uses an outdated OpenAI API endpoint, indicating it was developed before November 2023, making it the earliest known sample of its type.

MalTerminal is a malware generator that lets users create either ‘Ransomware’ or a ‘Reverse Shell’. When run, it requests the GPT-4 API to generate the relevant malicious Python code.

This method prevents malicious code from being stored in the initial binary, allowing it to avoid detection by static analysis and signature-based tools.

The research found related scripts like early versions (TestMal2.py) and a defensive tool called ‘FalconShield’, which seems to be an experimental malware scanner made by the same author.

Malware such as MalTerminal and PromptLock presents a new challenge for cybersecurity. Its ability to create unique malicious code for each run complicates detection and analysis.

Nevertheless, this emerging type of malware comes with its own vulnerabilities. Its reliance on external APIs, local models, and hardcoded prompts opens up new avenues for defenders to exploit.

If an API key is revoked or a model is blocked, the malware won’t work. Though LLM-enabled malware is still experimental, these cases highlight the need for defenders to adapt by focusing on detecting malicious API use and unusual prompt activity.

Check Also

Bots

Major Australian Banks using Army of AI Bots to Scam Scammers

Australian banks are now using bots to combat scammers. These bots mimic potential victims to …