• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

Large language models can execute complete ransomware attacks autonomously, research shows

Simon Osuji by Simon Osuji
September 5, 2025
in Artificial Intelligence
0
Large language models can execute complete ransomware attacks autonomously, research shows
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter


Large language models can execute complete ransomware attacks autonomously, research shows
Ransomware 1.0/2.0 (left) vs. Ransomware 3.0 (Self Composing and LLM-orchestrated (right). Credit: arXiv (2025). DOI: 10.48550/arxiv.2508.20444

Criminals can use artificial intelligence, specifically large language models, to autonomously carry out ransomware attacks that steal personal files and demand payment, handling every step from breaking into computer systems to writing threatening messages to victims, according to new research from NYU Tandon School of Engineering posted to the arXiv preprint server.

Related posts

EveryPlate’s Meal Kit Offers Affordable Vegetarian Options

EveryPlate’s Meal Kit Offers Affordable Vegetarian Options

March 1, 2026
Area Man Accidentally Hacks 6,700 Camera-Enabled Robot Vacuums

Area Man Accidentally Hacks 6,700 Camera-Enabled Robot Vacuums

March 1, 2026

The study serves as an early warning to help defenders prepare countermeasures before bad actors adopt these AI-powered techniques.

A simulation malicious AI system developed by the Tandon team carried out all four phases of ransomware attacks—mapping systems, identifying valuable files, stealing or encrypting data, and generating ransom notes—across personal computers, enterprise servers, and industrial control systems.

This system, which the researchers call “Ransomware 3.0,” became widely known recently as “PromptLock,” a name chosen by cybersecurity firm ESET when experts there discovered it on VirusTotal, an online platform where security researchers test whether files can be detected as malicious.

The Tandon researchers had uploaded their prototype to VirusTotal during testing procedures, and the files there appeared as functional ransomware code with no indication of their academic origin. ESET initially believed they found the first AI-powered ransomware being developed by malicious actors. While it is the first to be AI-powered, the ransomware prototype is a proof-of-concept that is non-functional outside of the contained lab environment.

“The cybersecurity community’s immediate concern when our prototype was discovered shows how seriously we must take AI-enabled threats,” said Md Raz, a doctoral candidate in the Electrical and Computer Engineering Department who is the lead author on the Ransomware 3.0 paper the team published publicly.

“While the initial alarm was based on an erroneous belief that our prototype was in-the-wild ransomware and not laboratory proof-of-concept research, it demonstrates that these systems are sophisticated enough to deceive security experts into thinking they’re real malware from attack groups.”

The research methodology involved embedding written instructions within computer programs rather than traditional pre-written attack code. When activated, the malware contacts AI language models to generate Lua scripts customized for each victim’s specific computer setup, using open-source models that lack the safety restrictions of commercial AI services.

Each execution produces unique attack code despite identical starting prompts, creating a major challenge for cybersecurity defenses. Traditional security software relies on detecting known malware signatures or behavioral patterns, but AI-generated attacks produce variable code and execution behaviors that could evade these detection systems entirely.

Testing across three representative environments showed both AI models were highly effective at system mapping and correctly flagged 63%–96% of sensitive files depending on environment type. The AI-generated scripts proved cross-platform compatible, operating on (desktop/server) Windows, Linux, and (embedded) Raspberry Pi systems without modification.

The economic implications reveal how AI could reshape ransomware operations. Traditional campaigns require skilled development teams, custom malware creation, and substantial infrastructure investments. The prototype consumed approximately 23,000 AI tokens per complete attack execution, equivalent to roughly $0.70 using commercial API services running flagship models. Open-source AI models eliminate these costs entirely.

This cost reduction could enable less sophisticated actors to conduct advanced campaigns previously requiring specialized technical skills. The system’s ability to generate personalized extortion messages referencing discovered files could increase psychological pressure on victims compared to generic ransom demands.

The researchers conducted their work under institutional ethical guidelines within controlled laboratory environments. The published paper provides critical technical details that can help the broader cybersecurity community understand this emerging threat model and develop stronger defenses.

The researchers recommend monitoring sensitive file access patterns, controlling outbound AI service connections, and developing detection capabilities specifically designed for AI-generated attack behaviors.

More information:
Md Raz et al, Ransomware 3.0: Self-Composing and LLM-Orchestrated, arXiv (2025). DOI: 10.48550/arxiv.2508.20444

Journal information:
arXiv

Provided by
NYU Tandon School of Engineering

Citation:
Large language models can execute complete ransomware attacks autonomously, research shows (2025, September 5)
retrieved 5 September 2025
from https://techxplore.com/news/2025-09-large-language-ransomware-autonomously.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Previous Post

SARS’ VAT Modernisation Aims to Combat Tax Evasion!

Next Post

Uncovering John Njuguna’s Mysterious Death

Next Post
Uncovering John Njuguna’s Mysterious Death

Uncovering John Njuguna's Mysterious Death

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Race to save Marcel Breuer’s ‘magical’ retreat on Cape Cod

Race to save Marcel Breuer’s ‘magical’ retreat on Cape Cod

3 years ago
OpenAI Launches Africa’s First AI Academy at UNILAG, Signaling a New Era for Inclusive Innovation on the Continent

OpenAI Launches Africa’s First AI Academy at UNILAG, Signaling a New Era for Inclusive Innovation on the Continent

4 months ago
Bermuda Begins Second Public Consultation on Corporate Income Tax Proposal

Bermuda Begins Second Public Consultation on Corporate Income Tax Proposal

2 years ago
Misseriya, Dar Hamar Tensions Add Ethnic Dimension to Sudan War

Misseriya, Dar Hamar Tensions Add Ethnic Dimension to Sudan War

1 year ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • Mahama attends Liberia’s 178th independence anniversary

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.