ViqusViqus
Navigate
Company
Blog
About Us
Contact
System Status
Enter Viqus Hub

Nation-State Actors Weaponize LLMs: New Malware Emerges from ChatGPT

AI Malware APT28 Ukraine LLMs Cybersecurity Hugging Face Threat Intelligence AI Security
August 13, 2025
Viqus Verdict Logo Viqus Verdict Logo 9
Evolving Threat: The Rise of AI-Powered Cybercrime
Media Hype 8/10
Real Impact 9/10

Article Summary

Russia’s advanced persistent threat (APT) group, APT28, is actively leveraging large language models (LLMs) to create and deploy sophisticated malware against Ukraine, marking a concerning escalation in cyber warfare. This new malware, dubbed LAMEHUG, utilizes stolen Hugging Face API tokens to query AI models in real-time, displaying distracting content to victims while engaging in reconnaissance. Researchers at Cato Networks, led by Vitaly Simonovich, revealed that this isn't an isolated incident; APT28 is weaponizing LLMs to probe Ukrainian cyber defenses, a tactic that poses a direct threat to enterprises worldwide. The chilling aspect of this development is how easily a consumer AI tool like ChatGPT-4o, Microsoft Copilot, or DeepSeek-V3 can be transformed into a functional password stealer in under six hours – a process driven by a novel 'Immersive World' technique. This demonstrates a fundamental weakness in current LLM safety controls, as sustained 'storytelling' can bypass guardrails. The availability of this capability at a monthly fee of $250, facilitated through underground platforms like Xanthrox AI and Nytheon AI, highlights the emergence of a 'malware-as-a-service' economy. This rapid convergence of nation-state actors and accessible LLM capabilities represents a significant expansion of the attack surface and a critical challenge for enterprise security teams.

Key Points

  • APT28 is deploying LLM-powered malware (LAMEHUG) against Ukraine, demonstrating a new cyber warfare tactic.
  • Consumer AI tools, like ChatGPT, can be rapidly transformed into functional malware using the 'Immersive World' technique.
  • The availability of LLM-powered malware at a $250 monthly subscription price signifies the rise of 'malware-as-a-service' and a dangerous new threat landscape.

Why It Matters

This news is critical for enterprise security leaders because it reveals a fundamental vulnerability in the rapidly expanding ecosystem of AI tools. Traditional security measures, focused on known malware signatures and behaviors, are proving inadequate against this novel approach. The ease with which a sophisticated attack can be created using readily available LLMs – and the fact that nation-state actors are deploying this capability – underscores the urgent need for proactive defenses. This isn't just about protecting Ukraine; it’s about recognizing a global shift in the cyber landscape and preparing for an escalating level of complexity and sophistication in attacks.

You might also be interested in