Cryip
  • Home
  • News
    • Bitcoin News
    • Ethereum News
    • BNB News
    • DeFi News
  • Markets
  • Price Analysis
  • Guides
No Result
View All Result
Cryip
  • Home
  • News
    • Bitcoin News
    • Ethereum News
    • BNB News
    • DeFi News
  • Markets
  • Price Analysis
  • Guides
No Result
View All Result
Cryip
No Result
View All Result
Home News Security

DPRK Hackers Use AI Malware for Crypto Theft: Google Warns of New Threat

Google's Threat Intelligence Group (GTIG) Confirms North Korean Hackers Are Using Large Language Models (LLMs) to Create Dynamic, Evasive Malware and Targeted Phishing Scripts for Crypto Wallets, Marking a New Era of AI-Powered Cyber Crime.

Patrick SM by Patrick SM
November 7, 2025 2:27 pm
in Security
Reading Time: 3 mins read
0 0
google
Share on FacebookShare on Twitter

In a turning point in technological security history, hackers suspected of being affiliated with the North Korean government (DPRK) are using Large Language Models (LLMs) to refine their crypto theft operations, according to a warning issued by Google’s Threat Intelligence Group (GTIG). The use of AI to modify malware codes and generate phishing scripts indicates that the field of cyber crime has reached a new and complex stage.

While Artificial Intelligence is revolutionizing its common applications, concerns are mounting about how it is being utilized in the world of cyber crime. The Google report released this week confirms that criminal groups are now using AI models not just for generating text or images, but as a central component of live attack operations.

What is AI Malware? – A Shift in Attack Design

In traditional malware, all its logic is hard-coded. However, new AI-supported malware families have completely changed this method.

New Malware Techniques

GTIG has been tracking at least five distinct AI-enabled malware variants. These have the ability to modify themselves and bypass security tools.

  • Dynamic Code Generation: Instead of hard-coding parts of the programming code, these malware families use LLMs like Gemini or Qwen2.5-Coder to dynamically generate malicious scripts at runtime.
  • Obfuscation: These malware families use LLMs to obscure their own code to evade detection. This makes it difficult for security systems to identify them.

Just-in-Time Code Creation

GTIG refers to this method as “Just-in-Time Code Creation.” By outsourcing parts of its function to the AI model, the malware can continuously harden and mutate against security systems designed by protective tools. This capability makes dealing with these malware variants highly challenging.

The Threat of DPRK and Crypto Theft

Most concerning about this AI malware threat is the activity of the hacking group suspected of being linked to North Korea, known as UNC1069.

The Target – Crypto Wallets

The UN and several nations have long accused North Korean hacking groups of stealing billions of dollars by attacking cryptocurrency exchanges, DeFi platforms, and individual wallets globally. These thefts are believed to be used to fund North Korea’s nuclear weapons programs.

Utilization of Gemini

According to the Google report, the UNC1069 group directly utilized Google’s Gemini AI model to refine its attacks:

  • Analysis: They used Gemini to analyze crypto wallet data.
  • Script Generation: They used the AI to create highly believable and targeted Phishing scripts to deceive people.

This incident shows that AI models are no longer just “learning tools” but have become “generation tools” used to create highly sophisticated and targeted cyber attacks.

Social Media and Security Industry Reaction

Google’s report immediately sparked debate across the security sector and on social media.

Concern from Security Experts

Cybersecurity professionals (especially on platforms like X/Twitter and LinkedIn) debated that this development was “expected, yet unprecedented.”

  • Hyper-Speed Attack: They warn that AI malware has the ability to evolve and adapt many times faster than human threat analysts.
  • Arms Race: One security analyst noted that this will lead to an “arms race” between AI malware and AI-based security systems.

DPRK’s Cyber Strategy

DPRK groups, notably the Lazarus Group, are known for their innovative approaches to crypto theft. The use of AI models demonstrates that they are not hesitant to escalate their stealing capabilities.

Google’s Mitigation Steps and Ongoing Protection

Upon discovering this threat, Google took rapid steps to secure its platform.

Action Taken

Google immediately disabled the accounts used for the malicious activities. Furthermore, it has tightened the safeguards to restrict access to its AI model. The goal is to prevent humans from using these models for harmful activities.

Ethical Concerns

This usage of publicly available LLMs raises ethical concerns about AI companies. It emphasizes the need to combine legal and technical controls to ensure users do not misuse these models.

The New Security Domain

Google’s threat report marks the beginning of a new era in the cybersecurity world. AI-supported malware poses a massive challenge to traditional defense mechanisms. As crypto wallets and financial markets are increasingly targeted by such sophisticated attacks, it is essential for both institutions and individuals to update their security architecture. In the fight against hackers, the use of AI has become an inevitable new reality.

Tags: DPRK Hacking
Previous Post

Tenerife Council to Cash Out 2012 Bitcoin Investment Worth $9.8 Million

Next Post

Bitwise Spot Dogecoin ETF Could Launch in 20 Days Following New SEC Filing

Next Post
Bitwise Spot Dogecoin ETF Could Launch in 20 Days Following New SEC Filing

Bitwise Spot Dogecoin ETF Could Launch in 20 Days Following New SEC Filing

Recommended

Bitcoin Braces for Federal Reserve Balance-Sheet Change as Liquidity Cycle Shifts

Bitcoin Braces for Federal Reserve Balance-Sheet Change as Liquidity Cycle Shifts

October 31, 2025 3:36 pm
Bitcoin ETF Approvals: Their Impact on Crypto Market Dynamics

Bitcoin ETF Approvals: Their Impact on Crypto Market Dynamics

October 21, 2025 3:40 am
APT in Finance: Understanding the Multi-Factor Model for Asset Returns

APT in Finance: Understanding the Multi-Factor Model for Asset Returns

November 6, 2025 4:34 pm
Bitcoin Halving

Bitcoin Halving: Supply vs Demand Dynamics Explained

October 22, 2025 4:19 pm
Hyperliquid Token (HYPE) Crash

Hyperliquid Token (HYPE) Crashes 8% — Causes Explained

December 9, 2025 5:32 pm
Revolut Hungary Exit

Revolut Hungary Exit: Crypto Liquidation Deadline Set for December 18

December 9, 2025 4:58 pm
Zcash Proposes Dynamic Fee Plan to Keep Users Affordable

Zcash Proposes Dynamic Fee Plan to Keep Users Affordable

December 9, 2025 4:50 pm
Hashkey

Hong Kong’s First Crypto IPO: HashKey Targets New Capital

December 9, 2025 11:37 am
Cryip.com

Cryip.com is your trusted source for the latest crypto news, market updates, exchange insights, and blockchain analysis.

Read more »

Recent Posts

  • Hyperliquid Token (HYPE) Crashes 8% — Causes Explained
  • Revolut Hungary Exit: Crypto Liquidation Deadline Set for December 18
  • Zcash Proposes Dynamic Fee Plan to Keep Users Affordable

Categories

  • Adoption
  • AI News
  • Beginner
  • Business
  • Deep Dives
  • Exchanges
  • Interviews
  • Investing
  • Market Trends
  • Markets
  • NFTs
  • Onchain
  • Opinion
  • Platforms
  • Price Analysis
  • Projects
  • Regulation
  • Scams
  • Security
  • Security
  • Stablecoins
  • Technology
  • Tools
  • Trading
  • Wallets

Links

Sitemap

© 2025 Cryip - Crypto news & Web3 Insights Provider BlockChirp.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home

© 2025 Cryip - Crypto news & Web3 Insights Provider BlockChirp.