LameHug: World’s First AI Malware Uses ChatGPT-like Tech to Hack Computers, Exposed by Ukraine Cybersecurity Team

LameHug is the world’s first AI-powered malware using ChatGPT-like technology. Detected by Ukraine's CERT-UA, it's linked to Russian hacker group APT-28 and poses a serious global cybersecurity threat.

LameHug: The World’s First AI-Based Malware Using ChatGPT-Like Technology

Artificial Intelligence has revolutionized everything from productivity to creativity — but it also comes with serious risks. A dangerous new malware named LameHug has been discovered, and it’s unlike anything we’ve seen before. What makes it unique is that it doesn’t rely on traditional malware tactics. Instead, it uses advanced AI language models like those behind ChatGPT, Gemini, and Claude to carry out cyberattacks.

The malware has been identified by Ukraine’s national cybersecurity team CERT-UA, and initial findings link it to the Russian cyber threat group APT-28, also known as Fancy Bear. Let’s take a deeper look into how LameHug operates and why it may signal a new era of AI-driven cyber threats.

Who is behind LameHug?

According to CERT-UA, the malware attacks originated from APT-28, a state-sponsored Russian hacker group known for launching large-scale cyber-espionage operations globally. In this incident, the hackers targeted Ukrainian government officials by impersonating ministry personnel through phishing emails.

Also Read:  OPPO Reno 14, and Reno 14 Pro India Launch Tipped: Specs, Pricing and More Inside

How does LameHug work?

LameHug is written in Python and uses the Hugging Face API along with an open-source language model named Qwen-2.5-Coder-32B-Instruct, developed by Alibaba Cloud. This combination allows the malware to act intelligently — generating shell commands and interacting with the host system without the need for hardcoded logic.

Instead of static instructions, LameHug leverages AI to understand its environment and take dynamic actions, much like how ChatGPT can respond to user queries with tailored outputs.

It steals sensitive data from your computer

Using the same language model principles that allow AI tools to convert text prompts into code, LameHug converts simple prompts into executable system commands. It quietly extracts files from Windows PCs — targeting folders like Documents, Downloads, and Desktop — then transfers them to a remote command-and-control server.

Also Read:  Vivo T4R 5G Launching Soon in India: Expected Price, Design, Specs & More

This makes detection extremely difficult since it behaves like a human-in-the-loop system rather than conventional malware.

How was the attack delivered?

Hackers used phishing emails sent to Ukrainian officials, pretending to be from a government ministry. The emails contained a ZIP file disguised as a legitimate tool. Inside were two files: AI_generator_uncensored_Canvas_PRO_0.9.exe and image.py.

Once executed, the malware activated and allowed remote access to system information. It quietly began scanning the infected system for files and uploading the data to a hacker-controlled server.

No more need for writing malware manually

According to cybersecurity platform IBM X-Force Exchange, this is the first documented case of LLMs being used to generate malware commands on-the-fly. This shift means attackers no longer need to develop complex custom malware to infiltrate systems.

Also Read:  Vivo Y50 5G, Y50m 5G launched with 6000mAh battery, 12GB RAM, 90Hz display under ₹14,000

This approach also enables them to bypass traditional antivirus programs and forensic tools, since no recognizable malware signatures are involved — only dynamically generated AI instructions.

What does this mean for the future?

The emergence of LameHug signals a new frontier in cybersecurity threats — where AI not only assists defenders but also empowers attackers. This AI-powered malware can operate intelligently, adapt to the system environment, and steal data with minimal human intervention.

Cybersecurity experts believe that this could be the beginning of a wave of AI-driven cyber threats. If left unaddressed, tools like LameHug could be used to orchestrate stealthier, more damaging, and harder-to-trace attacks on organizations worldwide.

Share Your Love

Leave a Reply

Your email address will not be published. Required fields are marked *