PromptLock: The First Glimpse of AI-Powered Ransomware - IT Support
All dispatches
Cyber Security2025-08-277 min read

PromptLock: The First Glimpse of AI-Powered Ransomware - IT Support

🐑
Rodney
Head of Tech Realism · Black Sheep Support
Share this dispatch

The landscape of cybersecurity is shifting beneath our feet. For years, UK SMEs have been battling ransomware that follows a predictable, albeit devastating, script: infiltrate, encrypt, and demand payment. However, the recent discovery by ESET researchers of "PromptLock"—the first identified instance of AI-powered ransomware—signals that the era of static, rule-based malware is drawing to a close. While PromptLock is currently viewed as a proof-of-concept rather than a widespread weapon, its existence is a watershed moment. It demonstrates that cybercriminals are no longer just using AI to write phishing emails; they are integrating large language models (LLMs) directly into the malware’s decision-making process. For business owners and IT managers across the UK, this serves as a definitive wake-up call: the tools we use to defend our networks must evolve just as rapidly as the threats designed to breach them.

Understanding the Mechanics of PromptLock

To understand why PromptLock is causing such alarm among cybersecurity professionals, one must look at how it differentiates itself from traditional ransomware. Standard ransomware relies on pre-programmed instructions—a "if this, then that" logic that security software (like antivirus and EDR) can easily identify through signature matching.

PromptLock, conversely, leverages the gpt-oss-20b model running locally via the Ollama API. By executing AI code directly on an infected machine, the malware can generate malicious Lua scripts dynamically. This means the ransomware does not need to carry a heavy payload of pre-written instructions. Instead, it can "think" on its feet, deciding which files are most valuable to encrypt or exfiltrate based on the environment it finds itself in.

Why Go (Golang) is the Language of Choice

The fact that PromptLock is written in Go is no coincidence. Go is a cross-platform language that allows malware developers to write code once and deploy it across Windows, Linux, and macOS environments with minimal friction. For an SME, this means that a single infection vector could potentially compromise your entire heterogeneous IT estate, from your Windows-based workstations to your Linux-based back-end servers.

The Shift Toward Adaptive, Intelligent Threats

The danger of AI-driven malware lies in its adaptability. Traditional security measures are built on the assumption that a threat will behave in a recognizable, historical pattern. AI-powered malware flips this on its head.

The Problem with Static Defenses

If a piece of ransomware can adapt its tactics in real-time—for example, by changing its encryption method or evading specific file-path monitoring—it effectively renders many legacy signature-based antivirus solutions obsolete.

Real-Time Decision Making

Imagine a scenario where malware enters your system and, rather than immediately triggering an alarm by bulk-encrypting files, it uses an LLM to scan your documents. It intelligently identifies your most sensitive GDPR-regulated data (like customer databases or HR records) to exfiltrate them first. This "smarter" approach ensures that even if you have backups, the leverage held by the attacker is significantly higher because they have stolen your data, not just locked it.

Strengthening Your Defenses in an AI-Threat Era

While the emergence of AI-driven threats might feel overwhelming, the core principles of robust cybersecurity remain the most effective way to protect your business. You do not need to fight AI with AI; you need to fight it with rigorous, layered security hygiene.

1. Transition to Advanced EDR Solutions

Traditional antivirus is no longer enough. You need Endpoint Detection and Response (EDR) solutions that monitor for suspicious behaviour rather than just known malicious files. EDR tools look for anomalies—such as a process attempting to run an API call to an AI model or unexpected mass-file modifications—and can automatically isolate the infected device before the damage spreads.

2. Implement the 3-2-1 Backup Rule

No matter how sophisticated the ransomware, it cannot encrypt data that isn't connected to the network.

  • Three copies of data: Maintain your primary data and at least two backups.
  • Two different media: Store backups on different storage types (e.g., local server and cloud).
  • One off-site/offline: This is the most critical. An immutable, offline backup is your ultimate insurance policy against any ransomware, AI-powered or otherwise.

3. Adopt a Zero-Trust Mindset

The "perimeter" of your office network is gone. With remote and hybrid work, your staff are accessing data from everywhere. Implement Zero-Trust principles, where every user and device must be continuously verified, regardless of whether they are inside or outside the office walls. Use Multi-Factor Authentication (MFA) on every single account—if an attacker steals a password, they still shouldn't be able to access your systems.

Compliance and the UK Regulatory Landscape

For UK SMEs, the threat of ransomware isn't just about operational downtime; it is a significant regulatory risk. Under the UK GDPR, a ransomware attack that leads to the exfiltration of personal data must be reported to the Information Commissioner’s Office (ICO) within 72 hours.

If your systems are compromised because of preventable security lapses, the ICO has the authority to issue substantial fines. Aligning your business with the Cyber Essentials scheme is the best way to demonstrate to regulators, clients, and insurers that you take your security responsibilities seriously. Cyber Essentials covers the five fundamental technical controls that prevent the vast majority of commodity cyber-attacks. At Black Sheep Support, we strongly recommend that every UK SME makes achieving this certification a top priority for the coming year.

Building a Culture of Vigilance

Technology is only one half of the equation. Even the most secure network can be bypassed by human error. AI-driven tools are making phishing emails more convincing than ever, removing the typos and broken English that once served as a "tell" for malicious intent.

  • Regular Security Awareness Training: Conduct quarterly training sessions that simulate modern phishing attempts.
  • Establish Clear Verification Protocols: If an urgent email arrives—even from a known contact—requiring a password reset or a bank transfer, staff must have a secondary channel to verify the request.
  • Empower Your Team: Create a culture where "reporting" a suspicious email is praised, not punished. If an employee clicks a link, they should feel comfortable notifying IT immediately rather than hiding it out of fear.

Key Takeaways

The arrival of PromptLock is a clear signal that the cyber-threat landscape is entering a new, more automated phase. To stay ahead, keep these points in mind:

  • AI is a force multiplier for criminals: Expect ransomware to become faster, more adaptive, and better at identifying high-value data.
  • Signature-based security is failing: Move toward EDR solutions that focus on behavioural analysis and anomaly detection.
  • Backups are your lifeline: Ensure you have immutable, offline backups that are tested regularly.
  • Compliance is non-negotiable: Use frameworks like Cyber Essentials to ensure your baseline security meets UK standards and regulatory requirements.
  • Human vigilance is critical: Invest in regular staff training to counter the increasingly sophisticated social engineering attacks that often serve as the "front door" for ransomware.

We understand that for many business leaders, keeping up with the rapid pace of AI development and the associated security risks is a full-time job in itself. You don't have to navigate this complexity alone. At Black Sheep Support, we specialise in managing the IT and security infrastructure for UK SMEs, ensuring you have the tools, processes, and expertise to remain resilient against both today’s threats and tomorrow’s AI-driven risks.

To take the next step

Book a Discovery Call

Back to all dispatchesEnd of Intelligence · BSS Digital Dispatch