What if Script Kiddies Start Demanding Ransom with AI?
- Aastha Thakker
- Oct 30, 2025
- 3 min read

What happens when artificial intelligence puts the power of sophisticated cybercrime into the hands of people who can barely write “Hello World”? Until recently, creating ransomware required years of programming expertise, deep understanding of cryptographic algorithms, and intimate knowledge of operating system vulnerabilities.
According to comprehensive reporting from The Hacker News, security researchers have documented the first confirmed case of ransomware developed with AI assistance, a malicious program dubbed PromptLock.
Multiple authoritative cybersecurity sources have independently verified this discovery:
Cybersecurity News provided detailed technical analysis of the malware’s AI-generated components
SecurityWeek confirmed the authenticity of the AI-assisted development process
ESET published extensive research validating the technical capabilities
TechRadar emphasized the broader implications for global cybersecurity
What Makes PromptLock Different
Security researchers identified PromptLock through unusual code patterns that suggested AI generation. The malware demonstrated several sophisticated capabilities:
Core Components
Advanced Encryption: Military-grade AES-256 implementation
Dynamic Messaging: Context-aware ransom notes in multiple languages
Evasion Techniques: Polymorphic code that changes signatures to avoid detection
Social Engineering: Professional phishing templates tailored by industry and region
Why This Changes Everything
Traditional ransomware development followed a predictable pattern: organized criminal groups or state-sponsored actors invested months or years developing sophisticated malware. This created a natural barrier that kept ransomware creation limited to elite cybercriminals.
Current Status:
No Active Deployments: ESET’s research confirms PromptLock has not been deployed in live attack scenarios
Proof-of-Concept Nature: The malware demonstrates capability rather than representing an immediate operational threat
Research Discovery: Identified through cybersecurity research and threat hunting, not incident response
The Attack Flow
AI-POWERED RANSOMWARE ATTACK LIFECYCLE (PromptLock Architecture)
==============================================================
PHASE 1: PREPARATION & DEPLOYMENT
├── Malware Distribution: Golang-compiled binary (Windows/Linux variants)
├── Local AI Setup: Deploys gpt-oss:20b model via Ollama framework
├── Network Configuration: Establishes local API endpoint (172.42.0.253:8443)
└── Environment Validation: Confirms AI model accessibility and responsiveness
PHASE 2: DYNAMIC CODE GENERATION
├── Prompt Injection: Sends hardcoded prompts via POST requests to Ollama API
├── Lua Script Generation: AI creates platform-specific malicious code
│ ├── Cross-platform compatibility (Windows/Linux/macOS)
│ ├── System enumeration functions (OS, username, hostname, directory)
│ └── Error handling and execution optimization
└── Code Validation: Verifies generated scripts before execution
PHASE 3: SYSTEM RECONNAISSANCE
├── Adaptive Scanning: Executes AI-generated Lua scripts for system discovery
├── Environment Mapping: Gathers OS type, user privileges, network configuration
├── Target Identification: Catalogs potential files containing PII/sensitive data
└── Capability Assessment: Determines encryption and exfiltration feasibility
PHASE 4: FILE SYSTEM ANALYSIS
├── Intelligent Scanning: AI-generated scripts analyze file contents contextually
├── Priority Ranking: Assigns value scores to discovered files based on content
├── Access Validation: Tests file permissions and encryption status
└── Exfiltration Planning: Determines optimal data transfer methods
PHASE 5: DYNAMIC ATTACK EXECUTION
├── Context-Aware Encryption: Generates tailored encryption routines per file type
├── Key Management: Implements secure key generation and remote storage
├── Adaptive Exfiltration: Selects appropriate data transfer protocols
└── Evidence Management: AI-generated cleanup and log manipulation scripts
PHASE 6: RANSOM DEPLOYMENT
├── Localized Communication: Generates region and language-appropriate ransom notes
├── Payment Integration: Creates cryptocurrency wallet instructions
├── Negotiation Automation: Deploys AI chatbots for victim communication
└── Deadline Management: Implements escalating pressure tactics
IOC MONITORING POINTS:
├── Network Traffic: Monitor for POST requests to 172.42.0.253:8443
├── Process Signatures: Watch for Golang binaries with Ollama API calls
├── File Hashes: Block known SHA1 signatures (see IoC section)
└── Behavioral Patterns: Detect dynamic Lua script generation and executionIndicators of Compromise (IoCs)
Malware Classification: Filecoder.PromptLock.A
SHA1 Hash Values:
24BF7B72F54AA5B93C6681B4F69E579A47D7C102
AD223FE2BB4563446AEE5227357BBFDC8ADA3797
BB8FB75285BCD151132A3287F2786D4D91DA58B8
F3F4C40C344695388E10CBF29DDB18EF3B61F7EF
639DBC9B365096D6347142FCAE64725BD9F73270
161CDCDB46FB8A348AEC609A86FF5823752065D2While PromptLock currently exists as a proof-of-concept rather than an active threat, its architecture reveals a turning point. The ability to weaponize AI for ransomware means the traditional barriers, years of coding expertise, cryptographic knowledge, and stealth development, are collapsing. What once took organized crime groups months could soon be replicated by individuals with minimal skill. This shift forces us to look beyond technical indicators and ask: how do we prepare for an era where AI itself becomes both the attacker and the defender?

Conclusion: The Future We Choose
The question isn’t whether AI will continue revolutionizing both beneficial and malicious applications. The question is whether we’ll guide this transformation or let it guide us.
AI represents the most powerful force multiplier in human history. It can accelerate medical breakthroughs, solve climate challenges, and unlock human potential in ways we’re only beginning to understand. But in the wrong hands, it can also democratize destruction and chaos.
AI is the future, but whether it’s our best future or worst future?
That’s on us.
See you next Thursday.



Comments