USD
41.98 UAH ▲0.2%
EUR
48.51 UAH ▲0.2%
GBP
55.05 UAH ▲0.23%
PLN
11.42 UAH ▲0.39%
CZK
1.99 UAH ▲0.18%
Share: Cybersecurity experts have discovered that the Russian hacker group APT28...

Hackers of the Russian Federation are attacking Ukraine with malicious software using AI: how it works

Share: Cybersecurity experts have discovered that the Russian hacker group APT28 is using a new malware codenamed PromptSteal against Ukraine. APT28's use of PromptSteal was the first documented case of malware exploiting large language models (LLM) in real-world operations. This is stated in a new report by the Google Threat Intelligence Group (GTIG).

As experts explain, PromptSteal uses LLM to generate commands for the malware to execute, rather than hard-coding the commands directly into the software itself. PromptSteal masquerades as an "image generation" program that guides the user through a series of prompts to generate images while querying the Hugging Face API to generate commands to run in the background. Researchers suspect that PromptSteal uses stolen API tokens to make requests to the Hugging Face API.

The program specifically asks LLM to issue commands to generate system information, as well as to copy documents to the specified directory. The output of these commands is then blindly executed locally by PromptSteal before leaking the output.

"While PromptSteal is likely still in the research and development stage, this type of obfuscation method is an early and significant indicator of how attackers will likely supplement their campaigns with artificial intelligence in the future," GTIG emphasized. As a reminder, the new EvilAI malware family combines AI-generated code with traditional Trojan attack methods while maintaining an unprecedented level of stealth.