🔥 BitDegree partnered with Ogvio - a free international money transfer service! Join the waitlist & grab Rewards! 🎁

Google Exposes AI-Powered Malware Behind North Korea’s Crypto Attacks

Key Takeaways

  • Google found that North Korean hackers are using AI tools to modify malware code and steal cryptocurrency from exchanges;
  • GTIG identified five malware types that use AI models like Gemini and Qwen to create or hide harmful code while running;
  • One North Korean group, UNC1069, used Gemini to gather wallet data and craft phishing emails targeting crypto workers.​

Stop overpaying - start transferring money with Ogvio. Join the waitlist & grab early Rewards NOW! 🎁

Google Exposes AI-Powered Malware Behind North Korea’s Crypto Attacks

Google has found that North Korean hackers are using artificial intelligence (AI) to support cryptocurrency theft.

In a recent report, the company’s Threat Intelligence Group (GTIG) explained that several malware programs rely on large language models (LLMs) to write or change code while running.

GTIG said it has observed at least five types of AI-powered malware active in current attacks.

Crypto Fees Explained: How Not to Overpay? (Animated)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

Unlike traditional malware, which contains fixed instructions, these new programs can use models like Gemini or Qwen2.5-Coder to create or hide harmful code when needed. This approach, called "just-in-time code creation", lets the malware adjust itself and avoid detection systems.

Two examples from the report, PROMPTFLUX and PROMPTSTEAL, show how attackers are combining AI with hacking operations.

PROMPTFLUX contacts the Gemini API every hour to rewrite parts of its VBScript code, while PROMPTSTEAL, linked to Russia’s APT28 group, uses the Qwen model on Hugging Face to generate Windows commands during attacks.

The report also highlights a North Korean group known as UNC1069, or Masan. According to Google, this group is known for stealing cryptocurrency through social engineering.

Investigators found that UNC1069 used Gemini to look up wallet data, write scripts that reach encrypted files, and create phishing emails in several languages aimed at crypto exchange employees.

Recently, GTIG identified a new tactic used by North Korean hackers, known as "EtherHiding". What is it? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

GET EARLY REWARDS

Join Ogvio Waitlist
Rating
5.0