By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: PromptLock Ransomware Is Just a Research Project, But It’s Still Disturbing
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > PromptLock Ransomware Is Just a Research Project, But It’s Still Disturbing
News

PromptLock Ransomware Is Just a Research Project, But It’s Still Disturbing

News Room
Last updated: 2025/09/04 at 9:05 PM
News Room Published 4 September 2025
Share
SHARE

Don’t miss out on our latest stories. Add PCMag as a preferred source on Google.


It turns out that an AI-powered ransomware discovered last week is actually a project from a team at New York University. Nevertheless, the research shows how open-source large language models could unleash new forms of disturbing and powerful ransomware attacks. 

Cybersecurity vendor ESET flagged the “PromptLock” ransomware by uncovering samples on VirusTotal, a Google-owned service that catalogs malware and checks them against antivirus engines. Following the discovery, the NYU Tandon School of Engineering claimed responsibility for the mysterious ransomware creation. 

According to the school, a team of six computer science professors and researchers developed PromptLock, but merely as a “proof-of-concept that is non-functional outside of the contained lab environment.” As part of their testing, the researchers also uploaded the ransomware to VirusTotal, but without indicating its “academic origin,” which led ESET to warn the public.

(Credit: Department of ECE, NYU Tandon School of Engineering)

Researchers call the prototype “Ransomware 3.0,” and published a 21-page paper going over their project, including the disturbing implications. The ransomware itself works as an “orchestrator” that can connect to one of OpenAI’s open-source large language models, which anyone can download and run over a server, including from a cloud provider. 

The orchestrator, which can operate from a malicious file, “delegates planning, decision-making, and payload generation to an LLM,” the paper says. “Once the orchestrator is launched, the attacker relinquishes control and the LLM drives the ransomware lifecycle.” This involves the malicious file communicating to the large language model simply through natural language prompts, and then running the generated computer code.

How the attack works

(Credit: Department of ECE, NYU Tandon School of Engineering)

“In our orchestrator design, we do not utilize any specific jailbreaking techniques. Instead, we phrase the prompts for each task such that it looks like a legitimate request,” the paper noted. “The LLM never sees the full orchestration, but only the specific task, so it is likely to comply. Despite that, some tasks, such as extract and destroy, face a few refusals.”


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Ransomware 3.0 operates by first identifying sensitive files on a computer, analyzing them, and then launching an attack, either by stealing loads of data, encrypting the files, or even destroying them. As a final step, the malware will create an extortion note for the victim. 

The team tested the attacks on a simulated server, Windows PC, and Raspberry Pi device and found that AI-powered ransomware often succeeded in generating and carrying out the malicious instructions.  

Recommended by Our Editors

Succces rate

(Credit: Department of ECE, NYU Tandon School of Engineering)

The paper also reveals that it would cost little to run the AI-powered ransomware. “Our prototype consumes 23,000 tokens per end-to-end run, costing about $0.70 at GPT-5 API rates; smaller open-weight models can drive this to zero,” it says. In addition, the ransomware can generate unique computer code, making it hard for antivirus software to detect. 

“Each execution produces unique attack code despite identical starting prompts, creating a major challenge for cybersecurity defenses,” the NYU Tandon School of Engineering added. “Traditional security software relies on detecting known malware signatures or behavioral patterns, but AI-generated attacks produce variable code and execution behaviors that could evade these detection systems entirely.”

ESET has since revised its report about PromptLock to note the academic nature behind the ransomware. “Nonetheless, our findings remain valid – the discovered samples represent the first known case of AI-powered ransomware,” the company said, underscoring how the theoretical threat could become real.

That said, the paper from the NYU team notes: “The prototype orchestrator abstracts away many dimensions of real-world ransomware campaigns… it does not implement persistence mechanisms, advanced evasion, privilege-escalation exploits, or lateral movements. The modular design, however, reveals the potential for powerful implementations.”

About Michael Kan

Senior Reporter

Michael Kan

I’ve been a journalist for over 15 years. I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017.

Read Michael’s full bio

Read the latest from Michael Kan

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nigeria’s Approovia targets Big Tech with no-code AI stack
Next Article Is SolMining a scam? The truth revealed by long-term user experience
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

New Linux Patches Enhance Intel Nested Virtualization Performance On Linux
Computing
Spike Lee’s New Crime Thriller With Denzel Washington Is Dominating Apple TV+ – BGR
News
China’s Manus enters AI video race with text-to-video tool · TechNode
Computing
Thanks to this fix, I can finally recommend my favorite Switch 2 case again
News

You Might also Like

News

Spike Lee’s New Crime Thriller With Denzel Washington Is Dominating Apple TV+ – BGR

4 Min Read
News

Thanks to this fix, I can finally recommend my favorite Switch 2 case again

7 Min Read
News

Deal: The mighty Samsung Galaxy S25 Ultra is $300 off!

4 Min Read
News

Nothing will premiere the Ear (3) wireless buds much sooner than anyone imagined

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?