Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lovable ai found most vulnerable to vibescamming – allowing anyone to build live scam pages
Global Security

Lovable ai found most vulnerable to vibescamming – allowing anyone to build live scam pages

AdminBy AdminApril 9, 2025No Comments4 Mins Read
Lovable AI VibeScamming
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Love AI Vibescamming

LovableIt was recognized that the platform with generative artificial intelligence (AI), which allows to create full-color web applications using text tips, most sensitive to prison attacks, allowing newcomers and beginners to create pages to procure confidence.

“As a specially built tool for creating and deploying web applications, its capabilities are perfectly rises through a list of wishes of each cheaters,” “Tal” Guardio Labs – Note In a report that shared with Hacker News. “From Pixel-Pixel Perfect Afrages to live hosting, evasion methods and even administrator dashboards to track stolen data-miles did not just participate.

The technique has been named Vibescamming .

LLMS abuse and AI chatbots for malicious purposes are not a new phenomenon. In recent weeks, research has shown how the threatening subjects abuse popular tools like Openai Chatgpt and Google Gemini To assist in the development of malware, research and content.

Cybersecurity

Moreover, LLM as Deepseek were also recognized as sensitive to Operational attacks and Prison methods allegedly Bad Judge Likert. Kresendand Deceptive admiration This allows models to bypass the safety and ethical fences and create another forbidden content. Here comes in creating Physhing -leaves, Keylogger and Ransomware samples, albeit with additional suggestion and debug.

In a report published last month, Symantec owned by Broadcom disclosed As Openai OperatorThe AI ​​AI agent, which can carry out a web action on the username, can be armed to automate the entire e-mail search process, the creation of PowerShell scenarios, which can collect system information, restrain them in Google Drive, as well as develop and send phishing emails and cheat them in execution.

Love AI Vibescamming

Growing up the popularity of AI tools also means that they can significantly reduce the entry barriers for attackers, allowing them to use their coding capabilities to create functional malicious programs

In example – a new approach to a prison called Exciting world This allows you to create an information theft capable of collecting credentials and other sensitive data stored in Google Chrome browser. Technique “Uses narrative engineering Bypassing LLM security control “by creating a detailed fictional world and giving roles with certain rules to bypass limited operations.

The latest Guardio Labs analysis takes a step further, revealing these platforms such as cute and anthropic Claude can be less armed to create full companies scams, complete with SMS text message templates, SMS based on Twilio, fake connection, content, elimination Integration of telegrams.

Love AI Vibescamming

Vibescamming starts with a direct request that asks in the AI ​​instrument to automate each stage of the attack, evaluating its original response, and then taking a multiple approach to gently control the LLM model to create the estimated malicious answer. This stage is called “Up” level, improving the phishing page, refinement of delivery methods and increasing the legitimacy of the scam.

It has been found that the cute guard not only produces a convincing entry page that mimics the real Microsoft entry page, but also automatically removes the page on the URL located on its own pallet (“ie, *.lovable.App”) and redirects to the office () com after capture.

In addition, both Claude and cute, which correspond to the tips, seek help to avoid the fact that the pages of the scam are marked with security solutions, as well as exfiltrate in stolen powers to external services such as Firebase, Request, and JSONBIN, or Private Telegram.

Cybersecurity

“What is more alarming is not only a graphic resemblance, but also a user experience,” Tal said. “It is so good at imitating the true thing that it may be more smooth than the actual microsoft flow.

“This not only created splits with a full accounting storage, but also gave us a fully functional instrument panel for consideration of all the captured data – accounting, IP -attractions, temporary tags and full passwords.”

In conjunction with Guardio’s findings, the first version of what is called Vibescamming Benchmark to put AI generative models through Wringer and check your resistance to potential abuse in phishing processes. While Chagpt scored 8 out of 10, Claude scored 4.3, and Lovable scored 1.8, which testified to high operation.

“Chatgpt, while perhaps the most advanced model of the general purpose, was also the most careful,” Tal said. “Claude, on the contrary, began with a solid lapel, but proved that it was easily convincing. After suggesting” ethical “or” security research “, he offered surprisingly reliable recommendations.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.