Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Posted on May 28, 2025May 28, 2025 By CWS

Over the previous 12 months, a risk actor has been banking on the wild reputation of AI instruments to lure pc customers to faux content material creation web sites and infect their methods with malware, Mandiant experiences.

Utilizing faux web sites masquerading as legit AI video generator instruments, Mandiant is warning that the ‘UNC6032’ hacking group out of Vietnam is pushing data stealers and backdoors to victims throughout totally different geographies and industries.

The widespread marketing campaign has been energetic since at the least mid-2024, luring the unsuspecting victims to the faux web sites by way of hundreds of advertisements on social media platforms reminiscent of Fb and LinkedIn, and sure on different platforms as properly.

Many of the advertisements ran on Fb, being revealed utilizing both attacker-created Fb pages or compromised Fb accounts. Meta began eradicating among the malicious advertisements, domains, and accounts in 2024, earlier than Mandiant notified it of its findings.

Mandiant mentioned it recognized over 30 totally different faux web sites posing as in style instruments reminiscent of Luma AI, Canva Dream Lab, and Kling AI, which have been promoted by way of a community of greater than 120 deceptive social media advertisements that reached thousands and thousands of customers, together with over 2.3 million within the European Union.

Promising text-to-video or image-to-video technology capabilities, the faux web sites would current the identical immediate to any customer, after which serve a ZIP archive that’s supplied for obtain as soon as the faux video creation course of is supposedly accomplished.

In response to Mandiant, the an infection chain it noticed depends closely on DLL side-loading, course of injection, and in-memory droppers, and makes use of AutoRun registry keys to attain persistence.

The ZIP archive incorporates a double-extension executable that delivers the Rust-based Starkveil dropper to the victims’ machines. The dropper then executes the Coilhatch launcher, which deploys the XWorm and Frostrift .NET backdoors, together with the .NET downloader Grimpull.Commercial. Scroll to proceed studying.

A separate report from Morphisec notes that the malicious AI output served by the faux web sites dropped the Noodlophile Stealer, generally bundled with the XWorm backdoor.

Mandiant noticed each XWorm and Frostrift accumulating system data, together with usernames, OS particulars, {hardware} identifiers, and anti-virus particulars. XWorm also can log keystrokes, whereas Frostrift checks for sure messaging functions, browsers, and browser extensions.

“As AI has gained super momentum lately, our analysis highlights among the methods wherein risk actors have taken benefit of it. These AI instruments now not goal simply graphic designers; anybody could be lured in by a seemingly innocent advert. We advise customers to train warning when participating with AI instruments and to confirm the legitimacy of the web site’s area,” Mandiant added.

Associated: Ongoing Marketing campaign Makes use of 60 NPM Packages to Steal Knowledge

Associated: MITRE Hackers’ Backdoor Has Focused Home windows for Years

Associated: Enhanced Model of ‘BPFDoor’ Linux Backdoor Seen within the Wild

Security Week News Tags:AIThemed, Distribute, Fake, Hackers, Malware, Vietnamese, Websites

Post navigation

Previous Post: New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto
Next Post: Cerby Raises $40 Million for Identity Automation Platform

Related Posts

The UK Brings Cyberwarfare Out of the Closet Security Week News
Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty Security Week News
Cisco Warns of Hardcoded Credentials in Enterprise Software Security Week News
How to Close the AI Governance Gap in Software Development Security Week News
Report Links Chinese Companies to Tools Used by State-Sponsored Hackers Security Week News
Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News