Close Menu
economyuae.comeconomyuae.com
    What's Hot

    Client Challenge

    October 6, 2025

    Client Challenge

    October 6, 2025

    UAE launches Entrepreneurship Programme to train 10,000 Emiratis through DIFC’s Ignyte platform

    October 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    economyuae.comeconomyuae.com
    Subscribe
    • Home
    • MARKET
    • STARTUPS
    • BUSINESS
    • ECONOMY
    • INTERVIEWS
    • MAGAZINE
    economyuae.comeconomyuae.com
    Home » AI-powered malware PromptLock signals a new era of cyber risk
    BUSINESS

    AI-powered malware PromptLock signals a new era of cyber risk

    Arabian Media staffBy Arabian Media staffSeptember 29, 2025No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Qrator Labs’ CTO Andrey Leskin

    Qrator Labs’ CTO Andrey Leskin/Image: Supplied

    The cybersecurity industry is facing a seismic shift with the emergence of PromptLock, the world’s first adaptive AI-powered virus. Built on open-source models, PromptLock can reconfigure itself each time it runs, making it virtually impossible to detect through traditional antivirus methods. It targets critical system files across Windows, macOS, and Linux, encrypting them for ransom while behaving differently on every machine. For small and mid-sized businesses in particular, this raises profound questions about resilience, cost, and strategy.

    In an exclusive interview with Gulf Business, Qrator Labs’ CTO Andrey Leskin unpacks how AI is reshaping the malware landscape, why legacy defences are no longer enough, and what practical steps enterprises and SMEs alike must take to stay ahead of the threat.

    Signature-based detection is obsolete

    Traditional cybersecurity relies heavily on signatures — static patterns embedded in executables that allow antivirus engines to flag malicious software. PromptLock’s adaptive design undermines this approach.

    “Traditional signature-based detection relies on static patterns in executables — for example, looking for embedded cryptographic modules or techniques used to hide resident processes,” said Leskin. “AI-driven malware like PromptLock undermines this model because the malicious code is not hardcoded in the binary. Instead, it is generated dynamically at runtime by the AI model.”

    This dynamism makes detection nearly impossible. Even when antivirus engines can identify AI components, their ubiquity in everyday applications blurs the line between legitimate and malicious use. “The real difference lies in the prompts fed to the model — but unpacking or analyzing them is an extremely complex task,” Leskin explained. As a result, behaviour-based and intent-focused detection is emerging as the only sustainable path forward.

    AI-driven DDoS: indistinguishable from real users

    Another alarming dimension is how AI enables large-scale Distributed Denial of Service (DDoS) attacks. Traditionally, botnets flood systems with uniform traffic, which defenders can filter out. AI now makes it possible for bots to emulate human-like browsing at scale.

    “When generating prompts targeting a specific website — for example, an online shop — attackers can instruct one bot to search for groceries, another to browse for home care products, and so on,” said Leskin. “Because AI is inherently non-deterministic, every request looks slightly different, emulating genuine user behaviour at scale.”

    The implications are stark. Web application firewalls and anti-DDoS systems that depend on signatures or CAPTCHAs cannot distinguish this traffic. “Modern AI can now solve such challenges with ease,” Leskin warned.

    For defenders, the traditional reliance on network telemetry has lost much of its utility. Encrypted sessions look legitimate, making it nearly impossible to flag anomalies at the packet level. Leskin argues the solution lies in profiling authentic user behaviour.

    “Behavioural baselining becomes the only effective countermeasure: profiling how genuine users interact with the site, identifying normal patterns, and flagging deviations,” he said. By focusing on whether activity aligns with meaningful goals, rather than raw traffic volume, enterprises can filter out AI-driven bots that otherwise appear indistinguishable from real customers.

    While large enterprises may afford advanced defences, smaller businesses remain especially vulnerable. Leskin points out that antivirus-heavy strategies are no longer viable on their own. “The priority for SMEs is to strengthen the fundamentals. Four measures stand out: strong access control, user-action monitoring, anti-phishing measures, and reliable backups,” he said.

    Backups are non-negotiable: “Even if malware succeeds in encrypting files and databases, recovery is still possible, turning a crisis into a temporary setback.”

    PromptLock’s ability to compromise multiple operating systems highlights a deeper challenge for endpoint protection. The best strategy, according to Leskin, is strict application control.

    “The most effective safeguard for organisations would be to strictly control what software can be installed and executed on endpoints,” he said. Only approved applications from corporate repositories should be allowed. BYOD cultures, where employees use personal laptops and smartphones, make this approach difficult. “Enterprises able to issue and manage all equipment — including corporate phones with enforced policies — should do so. Where this is not feasible, endpoint protection becomes effectively non-existent.”

    Surprisingly, Leskin believes large cloud and CDN providers face minimal risk from AI-powered DDoS attacks. “Large cloud and CDN providers are resilient enough and unlikely to be taken down,” he said. “In fact, for them such events may even drive short-term revenue.”

    The real burden falls on their customers, who may quickly hit capacity limits or face soaring bills. Smaller ISPs and CDN operators, meanwhile, are more exposed. “They will need to seek cybersecurity partnerships, expand capacity, or risk losing customers through deplatforming when attacks spill over,” Leskin cautioned.

    Information-sharing: awareness, not solutions

    While cyber threat intelligence (CTI) sharing is often touted as a solution, Leskin notes its limitations. “Information-sharing helps organisations at least become aware of emerging threats and attack vectors, which is valuable in itself. But coordinated threat intelligence has clear limits: practical defence strategies rarely transfer well between organisations with different infrastructures, products, and policies,” he said. For now, CTI serves mainly as early warning, not a direct line to ready-made solutions.

    With PromptLock built on open-source AI, questions inevitably arise about regulation and governance. Leskin is skeptical that bans or restrictions will work.

    “Attempts to restrict open-source models are unlikely to succeed. History shows it is nearly impossible to stop people from exchanging code, especially when some are willing to break the law to do so,” he said. “In practice, the Pandora’s box is already open and must be treated as such.”

    Instead, the focus must shift to resilience: encouraging information-sharing, publishing defensive guidelines, and fostering cross-industry collaboration. “It is too late to rely on bans; the more effective path is to strengthen defences,” Leskin concluded.

    The new normal

    PromptLock may be just the first of many AI-powered malware strains. Its polymorphic, adaptive design forces organisations to accept that antivirus-based security is no longer adequate. For businesses, the priority is now behavioural defences, resilient backups, strict access control, and pragmatic endpoint policies.

    For SMEs, that may feel like a steep climb — but as Leskin makes clear, it is the only way forward in a world where malicious AI is already rewriting the rules of cyber risk.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleUnderstanding the Ricardian Vice in Economics: Analyzing Oversimplification
    Next Article Oil Transport Industry and Market Dynamics
    Arabian Media staff
    • Website

    Related Posts

    More on Dubai’s newest shopping destination

    October 6, 2025

    Blackstone, Abu Dhabi’s Lunate form $5bn logistics platform

    October 6, 2025

    Trump, Democrats remain deadlocked as US shutdown drags into sixth day

    October 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    10 Trends From Year 2020 That Predict Business Apps Popularity

    January 20, 2021

    Shipping Lines Continue to Increase Fees, Firms Face More Difficulties

    January 15, 2021

    Qatar Airways Helps Bring Tens of Thousands of Seafarers

    January 15, 2021

    Subscribe to Updates

    Your weekly snapshot of business, innovation, and market moves in the Arab world.

    Advertisement

    Economy UAE is your window into the pulse of the Arab world’s economy — where business meets culture, and ambition drives innovation.

    Facebook X (Twitter) Instagram Pinterest YouTube
    Top Insights

    Top UK Stocks to Watch: Capita Shares Rise as it Unveils

    January 15, 2021
    8.5

    Digital Euro Might Suck Away 8% of Banks’ Deposits

    January 12, 2021

    Oil Gains on OPEC Outlook That U.S. Growth Will Slow

    January 11, 2021
    Get Informed

    Subscribe to Updates

    Your weekly snapshot of business, innovation, and market moves in the Arab world.

    @2025 copyright by Arabian Media Group
    • Home
    • Markets
    • Stocks
    • Funds
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.