Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'

Portland, OR, USA - May 2, 2025: Assorted AI apps, including ChatGPT, Gemini, Claude, Perplexity, Meta AI, Microsoft Copilot, and Grok, are seen on the screen of an iPhone.
(Image credit: hapabapa via Getty Images)

AI has been up to some naughty things in the past few years. From ignoring copyright to producing pretty awful approximations of games, to being exploited to lock down your machine. It seems like, as AI gets smarter, it only gets easier to use in malicious ways. One piece of malware has even been spotted using AI to rewrite itself to avoid detection. Spooky stuff.

Google has recently warned "adversaries are no longer leveraging artificial intelligence (AI) just for productivity gains, they are deploying novel AI-enabled malware in active operations".

The report (via Bleeping Computer) says that, for the first time, Google "discovered a code family that employed AI capabilities mid-execution to dynamically alter the malware’s behaviour."

If you're worried about the potential of this tech (same), Google says DeepMind has used insights gained from the malware to strengthen security, both with "Google’s classifiers and the model itself." Reportedly, this should mean that the model refuses to help malware with these kinds of attacks going forward. AI fighting AI. So it begins.

Fallout hacking minigame

(Image credit: Bethesda)

Naturally, AI being so broad and having so many applications does often mean it's exploitable, and it wouldn't be the first time someone has got AI to act against its reported purpose.

In its latest report, Google has identified four other cases of AI malware that have popped up in 2025. They are:

  • Fruitshell: Establishes a remote connection which can execute arbitrary commands on a compromised system. This is designed to evade detection from LLM-powered security
  • Promptlock: This can use an LLM to generate and execute malicious scripts. It can extract data, encrypt files, and do "filesystem reconnaissance", though it's still experimental (this one was spotted a few months ago)
  • Promptsteal: A data miner that uses an API to query an LLM to generate one-line commands. Those commands may then collect information and steal from documents
  • Quietvault: A credential stealer that grabs data and puts it into a publicly accessible GitHub repository. This uses AI to search infected PCs and "search for other potential secrets"

Google says, "This marks a new operational phase of AI abuse, involving tools that dynamically alter behaviour mid-execution", and it's certainly worrisome to think of how smart these tools can get in the wrong hands.

Despite these worries, Google does clarify that its approach to AI must be "both bold and responsible", and publicly acknowledging both malware using its services and its response to said malware feels like a good step. Still, the idea of malware rewriting itself to avoid being caught is a little too close to fiction for comfort. Next, we just need a malware detector that also rewrites itself, and we can have the two fight it out for control of the game saves and terabytes of animal pictures on my gaming rig.

Razer Blade 16 gaming laptop
Best gaming rigs 2025

1. Best gaming laptop: Razer Blade 16

2. Best gaming PC: HP Omen 35L

3. Best handheld gaming PC: Lenovo Legion Go S SteamOS ed.

4. Best mini PC: Minisforum AtomMan G7 PT

5. Best VR headset: Meta Quest 3


👉Check out our list of guides👈

James Bentley
Hardware writer

James is a more recent PC gaming convert, often admiring graphics cards, cases, and motherboards from afar. It was not until 2019, after just finishing a degree in law and media, that they decided to throw out the last few years of education, build their PC, and start writing about gaming instead. In that time, he has covered the latest doodads, contraptions, and gismos, and loved every second of it. Hey, it’s better than writing case briefs.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.