APromptRiskDBThreat intelligence atlas
AI Case Study

Malware Prototype with Embedded Prompt Injection - AI Case Study

Check Point Research identified a prototype malware sample in the wild that contained a prompt injection, which appeared to be designed to manipulate LLM-based malware detectors and/or analysis tools. However, the researchers did not find the prompt injection to be effective on the models they tested. The malware sample, called Skynet, was uploaded to VirusTotal by a user in the Netherlands. It attempts several sa...

IncidentLLM malware detectors, LLM malware analysis and reverse engineering toolsUnknown Threat ActorResource DevelopmentDefense EvasionExecution

Overview

Case steps8Steps described in the case record.
Techniques8Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 8 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development2Defense Evasion2Execution1Credential Access1Collection1Exfiltration1
  1. Step 3

    Direct

    Execution

    When the LLM-based malware detection or analysis tool interacts with the Skynet malware binary, the prompt is executed.

  2. Defense Evasion

    The LLM-based malware detection or analysis tool could be manipulated into not reporting the Skynet binary as malware. Note: The prompt injection was not effective against the LLMs that Check Point Research tested.

  3. Exfiltration

    The Skynet malware sets up a Tor proxy to exfiltrate the collected files. Note: The collected files were only printed to stdout and not successfully exfiltrated.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.