Technology

AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays

2025-12-24 17:35
382 views
AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays

AI is no longer being used just to craft convincing phishing emails - it's being used to build ransomware.

  1. Pro
  2. Security
AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays News By Sead Fadilpašić published 24 December 2025

AI is no longer just being used to craft convincing phishing emails, experts warn

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. (Image credit: Shutterstock) Share Share by:
  • Copy link
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google
  • ESET discovers PromptLock, first AI-driven ransomware generating malicious scripts dynamically
  • PromptLock scans systems, exfiltrates, encrypts, or destroys data based on AI decisions
  • NFC malware also rising; experts urge updates, backups, and cautious handling of files/tools

Generative Artificial Intelligence (GenAI) is now being used to code ransomware encryptors, researchers have said, revealing how the technology is no longer solely used for crafting phishing and scam content.

ESET Research's latest Threat Report detailed PromptLock, the first known AI-driven ransomware, “capable of generating malicious scripts on the fly”, using an OpenAI model, via the Ollama API, to generate, and then execute, malicious scripts.

It contains two main components: a static main module that handles communication with the server running the AI model and carries hardcoded prompts, and cross-platform Lua scripts that are dynamically generated by the model via the prompts.

You may like
  • generative ai business use AI-driven cybersecurity threats are now hitting businesses from every angle - here's how to stay safe
  • IA y ciberseguridad When AI malware meets DDoS: a new challenge for online resilience
  • Restore files with AI in Google Drive Google VP says traditional approach to fighting ransomware falls short - points accusatory finger to 'persistent threat on Microsoft Windows and Microsoft Office'

How to stay safe

ESET found these scripts serve multiple functions, from enumerating the local filesystem, to exfiltrating data, and performing encryption. It also means PromptLock can scan victim systems on its own, and decide whether the identified data should be exfiltrated, encrypted, or simply destroyed.

At the moment, PromptLock is a proof-of-concept, ESET further stated, so the risk of running into it in the wild is relatively low - however its very existence should be cause for concern.

“The emergence of tools like PromptLock highlights a significant shift in the cyberthreat landscape,” said Anton Cherepanov, ESET Senior Malware Researcher.

“With the help of AI, launching sophisticated attacks has become dramatically easier, eliminating the need for teams of skilled developers. A well-configured AI model is now sufficient to create complex, self-adapting malware. If properly implemented, such threats could severely complicate detection and make the work of cybersecurity defenders considerably more challenging.”

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

Besides ransomware, NFC threats are also growing in both scale and sophistication, ESET warned. In the second half of the year, the researchers saw an 87% increase in telemetry, as well as “several” notable upgrades. NGate, for example, which was one of the first NFC-enabled malware, was upgraded to steal contacts, as well.

To stay safe as AI-powered threats emerge, users and organizations should focus on fundamentals that still work.

Keep operating systems, browsers, and security tools fully updated to reduce the attack surface, use reputable endpoint protection and enable behavioral detection, not just signature-based scanning.

They should also treat unexpected files, installers, and “tools” with caution, especially those claiming productivity or AI benefits, and limit admin privileges so malware cannot easily encrypt or destroy data. Regular, offline backups remain critical for ransomware resilience, as well, and so does employee education.

Best antivirus software headerThe best antivirus for all budgetsOur top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

TOPICS AI Malware Sead FadilpašićSocial Links Navigation

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Show More Comments

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more generative ai business use AI-driven cybersecurity threats are now hitting businesses from every angle - here's how to stay safe    IA y ciberseguridad When AI malware meets DDoS: a new challenge for online resilience    Restore files with AI in Google Drive Google VP says traditional approach to fighting ransomware falls short - points accusatory finger to 'persistent threat on Microsoft Windows and Microsoft Office'    Abstract image of cyber security in action. AI scams surge: how consumers and businesses can stay safe    Security padlock and circuit board to protect data Hackers are stealing the keys and walking through the front door, and AI is helping them turn the handle    Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration The power and potential of agentic AI in cybersecurity    Latest in Security DDoS Attack Suspected DDoS attack takes France’s post office offline    Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome. These malicious Google Chrome extensions have stolen data from over 170 sites - find out if you're affected    Trojan Dangerous WebRAT malware now being spread by GitHub repositories    World Password Day 2025 Aflac reveals personal data of 22.6 million people stolen in cyberattack - here's what we know    Nissan Titan Nissan says Red Hat breach affected thousands of customers    Christmas scams Phishing emails and fake adverts flood inboxes this Christmas - and they’re getting harder to detect than ever    Latest in News A foldable iPhone concept against a multi-colored background. This 3D-printed iPhone Fold mockup might be as close as you can come to holding the real thing    DJI Osmo Pocket 3 Another image of the DJI Osmo Pocket 4 leaks — and it could come with a mysterious new accessory    Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. AI-created ransomware and NFC attacks lead the surge in new cyberattacks - here's how you can stay safe this holidays    The two new variants of the Nitro Deck 2. This Switch 2 Joy-Con replacement was already my most anticipated accessory — and now it’s getting two new versions plus cool pre-order bonuses    Maingear BYO RAM scheme showing RAM sticks on a desk One PC building firm has an answer to harsh DRR5 price hikes: BYO RAM    Sony WF-1000XM5 Sony WF-1000XM6 earbuds leak again, this time with a release date hint    LATEST ARTICLES