Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

Posted on July 2, 2025July 2, 2025 By CWS

Jul 02, 2025Ravie LakshmananAI Safety / Phishing
Unknown risk actors have been noticed weaponizing v0, a generative synthetic intelligence (AI) device from Vercel, to design faux sign-in pages that impersonate their reliable counterparts.
“This statement alerts a brand new evolution within the weaponization of Generative AI by risk actors who’ve demonstrated a capability to generate a purposeful phishing website from easy textual content prompts,” Okta Menace Intelligence researchers Houssem Eddine Bordjiba and Paula De la Hoz stated.
v0 is an AI-powered providing from Vercel that permits customers to create fundamental touchdown pages and full-stack apps utilizing pure language prompts.

The identification companies supplier stated it has noticed scammers utilizing the expertise to develop convincing replicas of login pages related to a number of manufacturers, together with an unnamed buyer of its personal. Following accountable disclosure, Vercel has blocked entry to those phishing websites.
The risk actors behind the marketing campaign have additionally been discovered to host different assets such because the impersonated firm logos on Vercel’s infrastructure, seemingly in an effort to abuse the belief related to the developer platform and evade detection.
Not like conventional phishing kits that require some quantity of effort to set, instruments like v0 — and its open-source clones on GitHub — permits attackers spin up faux pages simply by typing a immediate. It is quicker, simpler, and does not require coding abilities. This makes it easy for even low-skilled risk actors to construct convincing phishing websites at scale.
“The noticed exercise confirms that immediately’s risk actors are actively experimenting with and weaponizing main GenAI instruments to streamline and improve their phishing capabilities,” the researchers stated.
“Using a platform like Vercel’s v0.dev permits rising risk actors to quickly produce high-quality, misleading phishing pages, rising the pace and scale of their operations.”

The event comes as dangerous actors proceed to leverage massive language fashions (LLMs) to help of their legal actions, constructing uncensored variations of those fashions which might be explicitly designed for illicit functions. One such LLM that has gained recognition within the cybercrime panorama is WhiteRabbitNeo, which advertises itself as an “Uncensored AI mannequin for (Dev) SecOps groups.”

“Cybercriminals are more and more gravitating in the direction of uncensored LLMs, cybercriminal-designed LLMs, and jailbreaking reliable LLMs,” Cisco Talos researcher Jaeson Schultz stated.
“Uncensored LLMs are unaligned fashions that function with out the constraints of guardrails. These techniques fortunately generate delicate, controversial, or doubtlessly dangerous output in response to consumer prompts. In consequence, uncensored LLMs are completely suited to cybercriminal utilization.”This matches an even bigger shift we’re seeing: Phishing is being powered by AI in additional methods than earlier than. Faux emails, cloned voices, even deepfake movies are exhibiting up in social engineering assaults. These instruments assist attackers scale up quick, turning small scams into massive, automated campaigns. It is not nearly tricking customers—it is about constructing entire techniques of deception.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Create, Cybercriminals, Fake, Login, Pages, Rapidly, Scale, Tool, Vercels, Weaponized

Post navigation

Previous Post: Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines
Next Post: TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections

Related Posts

How to Address the Expanding Security Risk The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News