Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Posted on May 28, 2025May 28, 2025 By CWS

Over the previous 12 months, a risk actor has been banking on the wild reputation of AI instruments to lure pc customers to faux content material creation web sites and infect their methods with malware, Mandiant experiences.

Utilizing faux web sites masquerading as legit AI video generator instruments, Mandiant is warning that the ‘UNC6032’ hacking group out of Vietnam is pushing data stealers and backdoors to victims throughout totally different geographies and industries.

The widespread marketing campaign has been energetic since at the least mid-2024, luring the unsuspecting victims to the faux web sites by way of hundreds of advertisements on social media platforms reminiscent of Fb and LinkedIn, and sure on different platforms as properly.

Many of the advertisements ran on Fb, being revealed utilizing both attacker-created Fb pages or compromised Fb accounts. Meta began eradicating among the malicious advertisements, domains, and accounts in 2024, earlier than Mandiant notified it of its findings.

Mandiant mentioned it recognized over 30 totally different faux web sites posing as in style instruments reminiscent of Luma AI, Canva Dream Lab, and Kling AI, which have been promoted by way of a community of greater than 120 deceptive social media advertisements that reached thousands and thousands of customers, together with over 2.3 million within the European Union.

Promising text-to-video or image-to-video technology capabilities, the faux web sites would current the identical immediate to any customer, after which serve a ZIP archive that’s supplied for obtain as soon as the faux video creation course of is supposedly accomplished.

In response to Mandiant, the an infection chain it noticed depends closely on DLL side-loading, course of injection, and in-memory droppers, and makes use of AutoRun registry keys to attain persistence.

The ZIP archive incorporates a double-extension executable that delivers the Rust-based Starkveil dropper to the victims’ machines. The dropper then executes the Coilhatch launcher, which deploys the XWorm and Frostrift .NET backdoors, together with the .NET downloader Grimpull.Commercial. Scroll to proceed studying.

A separate report from Morphisec notes that the malicious AI output served by the faux web sites dropped the Noodlophile Stealer, generally bundled with the XWorm backdoor.

Mandiant noticed each XWorm and Frostrift accumulating system data, together with usernames, OS particulars, {hardware} identifiers, and anti-virus particulars. XWorm also can log keystrokes, whereas Frostrift checks for sure messaging functions, browsers, and browser extensions.

“As AI has gained super momentum lately, our analysis highlights among the methods wherein risk actors have taken benefit of it. These AI instruments now not goal simply graphic designers; anybody could be lured in by a seemingly innocent advert. We advise customers to train warning when participating with AI instruments and to confirm the legitimacy of the web site’s area,” Mandiant added.

Associated: Ongoing Marketing campaign Makes use of 60 NPM Packages to Steal Knowledge

Associated: MITRE Hackers’ Backdoor Has Focused Home windows for Years

Associated: Enhanced Model of ‘BPFDoor’ Linux Backdoor Seen within the Wild

Security Week News Tags:AIThemed, Distribute, Fake, Hackers, Malware, Vietnamese, Websites

Post navigation

Previous Post: New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto
Next Post: Cerby Raises $40 Million for Identity Automation Platform

Related Posts

ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities Security Week News
Columbia University Data Breach Impacts 860,000 Security Week News
Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome Security Week News
Pharmaceutical Company Inotiv Confirms Ransomware Attack Security Week News
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems Security Week News
Adobe Patches Critical Code Execution Bugs Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News