
Weekly Cyber Briefing 01.09.2025
Cyber Intelligence Briefing: 01 Sep 2025.
Attackers are now using AI to make malware smarter and harder to stop.
Weekly Cyber Briefing 01.09.2025
Attackers are now using AI to make malware smarter and harder to stop.
This week’s Cyber Threat Intelligence Briefing is a weekly round-up of the latest cybersecurity news, trends, and indicators, curated by intelligence specialists.
APT28 has been using LameHug, a Python-based malware sent through spearphishing ZIP files against the Ukrainian government. Once opened, it connects to the Qwen 2.5-Coder-32B-Instruct model on Hugging Face to turn hidden prompts into live system commands, allowing attackers to steal data and move around without updating the payload [Cyber Security News].
ESET has also uncovered PromptLock, the first AI-powered ransomware. Written in Golang, it uses a locally hosted model through the Ollama API to generate Lua scripts that search, steal and encrypt files with SPECK-128. Researchers expect destructive features to follow [IT Pro].
Attackers are now using AI to make malware smarter and harder to stop. The best defence is to get ahead: strengthen email security, control what scripts and apps can run, limit unnecessary outbound traffic, keep backups safe, and test your defences through regular threat hunting. Here’s some recommended technical controls:
huggingface.co
and the specific IP ranges for Hugging Face’s API endpoints.Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging" -Name "EnableModuleLogging" -Value 1
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging\ModuleNames" -Name "*" -Value "*"
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1
ollama.exe
or the Go-generated PromptLock binary).%USERPROFILE%\Documents
, %USERPROFILE%\Downloads
, and company-shared folders.The risk here is simple. Names, emails and phone numbers are enough to launch convincing phishing campaigns. Lock down CRM access, review who can log in, enable MFA everywhere, and brief staff to expect targeted scams.
For more practical steps, we covered this in our August review: Cyber Intelligence Briefing