PromptFlux Malware Using Gemini API to Evade Detection and Enhance Attacks

PromptFlux is a sophisticated malware that has recently been observed leveraging the Gemini API to improve its evasion techniques and attack capabilities. This malware utilizes advanced methods to bypass traditional security measures, making it a significant threat to organizations worldwide. The integration of the Gemini API allows PromptFlux to execute commands and communicate stealthily, complicating detection efforts by cybersecurity teams. Analysts have noted that PromptFlux's use of this API represents a new trend in malware development, where threat actors exploit legitimate APIs to mask malicious activities. Organizations are advised to enhance their monitoring of API usage and implement robust endpoint protection to mitigate risks associated with such advanced threats. This article delves into the technical aspects of PromptFlux's operations, its impact on cybersecurity, and recommended defense strategies to counteract its effects.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 06 Nov 2025 06:01:45 +0000


Cyber News related to PromptFlux Malware Using Gemini API to Evade Detection and Enhance Attacks

Attackers Can Gain Control of Users' Queries and LLM Data Output - Gemini is Google's newest family of Large Language Models. The Gemini suite currently houses 3 different model sizes: Nano, Pro, and Ultra. Although Gemini has been removed from service due to politically biased content, findings from HiddenLayer ...
1 year ago Packetstormsecurity.com
Google Adds Gemini Pro API to AI Studio and Vertex AI - Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet. Starting Dec. 13, developers can use Google AI Studio and Vertex AI to build applications with the Gemini Pro API, which allows access to ...
1 year ago Techrepublic.com
PromptFlux Malware Using Gemini API to Evade Detection and Enhance Attacks - PromptFlux is a sophisticated malware that has recently been observed leveraging the Gemini API to improve its evasion techniques and attack capabilities. This malware utilizes advanced methods to bypass traditional security measures, making it a ...
6 days ago Cybersecuritynews.com
Google Rebrands Bard AI Chatbot As Gemini - Bard becomes Gemini, as Google rebrands chatbot and launches monthly subscription for access to more powerful AI system. Alphabet's Google has shaken up its artificial intelligence chatbot offering, as it seeks to take the fight to rival Microsoft. ...
1 year ago Silicon.co.uk
Google Launches Gemini, the Most Capable and Largest AI Model - In a groundbreaking revelation, Google has ushered in a new era of artificial intelligence with the introduction of Gemini, its most formidable and sophisticated AI model to date. This paradigm-shifting technology promises to redefine human-machine ...
1 year ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Google Uncovers PromptFlux Malware That Exploits AI Prompts to Spread - Google has recently uncovered a sophisticated malware campaign dubbed PromptFlux, which exploits AI-generated prompts to propagate itself across systems. This new malware leverages the increasing reliance on AI tools by embedding malicious code ...
1 week ago Thehackernews.com
Google Gemini's Astra (screen sharing) rolls out on Android for some users - According to a video shared by a Reddit user who owns a Xiaomi phone with a Gemini Advanced subscription, you can now share your phone's screen with Gemini Live and ask questions about it. At MWC 2025, Google confirmed it was working on screen and ...
7 months ago Bleepingcomputer.com
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution - A vulnerability in Google's Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers' computers using allowlisted programs. Tracebit found it's possible to hide malicious instructions in these files to ...
3 months ago Bleepingcomputer.com
Defining Good: A Strategic Approach to API Risk Reduction - A good API security strategy starts with a well thought out API security posture governance program that spans from design to deployment. That standard, if communicated and enforced effectively, will not only positively affect how a developer designs ...
1 year ago Securityboulevard.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 months ago Cybersecuritynews.com
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
6 months ago Cybersecuritynews.com Hunters
Salt Security Delivers API Posture Governance Engine - PRESS RELEASE. PALO ALTO, Calif., Jan. 17, 2024 /PRNewswire/ - Salt Security, the leading API security company, today announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt ...
1 year ago Darkreading.com
Gemini: Google Launches its Most Powerful AI Software Model - Google has recently launched Gemini, its most powerful generative AI software model to date. Since the model is designed in three different sizes, Gemini may be utilized in a variety of settings, including mobile devices and data centres. Google has ...
1 year ago Cysecurity.news
Sec-Gemini v1 - Google Released a New AI Model for Cybersecurity - The model draws on extensive data sources, including Google Threat Intelligence (GTI), the Open Source Vulnerabilities (OSV) database, and Mandiant Threat Intelligence, to deliver unparalleled performance in critical areas such as incident root cause ...
7 months ago Cybersecuritynews.com
Unified API Protection - A massive segment of organizations' digital footprint today is built around internal and external APIs. As more IT leaders realize and acknowledge the size of APIs' influence, it's become clear that new methods are needed to secure those APIs. While ...
2 years ago Cequence.ai
Top 10 Best Dynamic Malware Analysis Tools in 2025 - FireEye Malware AnalysisEnterprise-grade solution, zero-day detection, integration with threat intelligence, memory forensics.Enterprise-grade malware detection and forensicsPricing details not publicly available; contact for quote.Yes6. Detux ...
8 months ago Cybersecuritynews.com
MacOS info-stealers quickly evolve to evade XProtect detection - Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently. A report by SentinelOne highlights the problem through three ...
1 year ago Bleepingcomputer.com
Google Gemini flaw hijacks email summaries for phishing - Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings that direct users to phishing sites without using attachments or direct links. As many users are likely to ...
3 months ago Bleepingcomputer.com
Imperva Named an Overall Leader in the KuppingerCole Leadership Compass: API Security and Management Report - We're thrilled to share that Imperva has achieved the prestigious status of Overall Leader in the KuppingerCole Leadership Compass: API Security and Management report. A notable achievement is being recognized as one of the few non-gateway-first ...
1 year ago Imperva.com
Google Gemini for Workspace Vulnerability Lets Attackers Conceal Malicious Scripts in Emails - Cyber Security News - Security researchers have uncovered a significant vulnerability in Google Gemini for Workspace that enables threat actors to embed hidden malicious instructions within emails. The attack exploits the AI assistant’s “Summarize this ...
3 months ago Cybersecuritynews.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 year ago Pandasecurity.com
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets - Unit 42 researchers have observed threat actors using malicious JavaScript samples to steal sensitive information by abusing popular survey sites, low-quality hosting and web chat APIs. In this article, we'll describe some of the tactics used by ...
1 year ago Unit42.paloaltonetworks.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
1 year ago Pandasecurity.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
7 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)