Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook
Global Security

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

AdminBy AdminMay 12, 2025No Comments3 Mins Read
Fake AI Tools Used to Spread Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 12, 2025.Red LakshmananMalicious software / artificial intelligence

Fake AI tools used to distribute malware

Actors threats were observed for the use of fake tools that support artificial intelligence (AI) as a bait to attract users to download the theft of malicious software called Emergency.

‘Instead of relying on traditional phishing or hacked software sites, they build convincing AI-thematic platforms – Note In a report published last week.

Messages that are divided into these pages have been found to attract more than 62,000 views on one message, indicating that users looking for AI -to -editing tools are the goals of this company. Some of the fake pages in social media include Luma DreamMachine Al, Luma Dreammachine and Gratistuslibros.

Users who land in social media reports call for the translation of the AI ​​content creation services, including video, logos, images and even sites. One of the fictitious sites is masked as Capcut AI by offering users “video editor in one of the new AI features”.

Cybersecurity

Once the users do not suspect, load their images or videos on these sites, they are offered to load the intended AI content, at this point the malicious archive of ZIP (“Videodreamai.zip”).

The file presents a deceptive file called “Video Dream Machineai.mp4.exe”, which starts in the infection chain, launching a legitimate binary related to the video editor (“Capcut.exe”). This executable C ++ file is used to launch a .Net forking based on the name Capcutloader, which in turn eventually loads the useful load of Python (“Srchost.exe”) from the remote server.

Binary Python opens the way to deploy the theft of Noodlophile, which comes with the features for collecting credentials about the browser, information about cryptocurrency and other sensitive data. Selected specimens also complete with theft with remote Trojan as Xwormer For fixed access to the infected hosts.

Fake AI tools used to distribute malware

The developer Noodlophile is evaluated as a Vietnamese origin that is in your Github profile claim be “hot developer malicious programs from Vietnam.” The account was created on March 16, 2025. It is worth noting that the nation of South -East Asia resides for flowering ecosystem of cybercrime This has a history of distribution of different families by malicious theft programs aimed at Facebook.

Bad subjects that armed the public interest in AI technology is not a new phenomenon. In 2023 meta said this remove More than 1000 malicious URL -Drace URLs, which have been located in their services, which have been found to use Openai Chatpp as bait to distribute about 10 malicious programs since March 2023.

Cybersecurity

The disclosure of information occurs when Cyfirma talked about another new one. Net-family malicious programs based on .Net base.

“In the absence of a specific protection against analysis and mechanisms of perseverance, PupkinsteAlle depends on the simple performance and low content to avoid detecting during its work,” cybersecurity company, cybersecurity campaign – noted. “Pupkinstileler shows a simple but effective form of malware for theft of data that uses common system behavior and widely used platforms for the expulsion of sensitive information.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.