Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data

Posted on October 31, 2025October 31, 2025 By CWS

The explosive development of synthetic intelligence has created an sudden safety menace as cybercriminals exploit ChatGPT’s recognition by way of counterfeit cell purposes.

Latest safety analysis uncovered refined malicious apps masquerading as reliable ChatGPT interfaces, designed to reap delicate person knowledge and monitor digital actions with out consent.

These fraudulent purposes have infiltrated third-party app shops, focusing on customers looking for handy entry to AI-powered chatbots.

The malicious purposes make use of convincing branding strategies that mirror genuine ChatGPT interfaces, full with recognizable logos and practical designs.

As soon as put in, these trojanized apps execute hidden surveillance routines whereas sustaining the looks of working AI assistants.

The menace intensifies as tens of millions worldwide obtain unofficial AI purposes from unverified sources, unaware of embedded spy ware compromising their units.

Appknox analysts recognized these malicious ChatGPT clones throughout complete cell safety analysis analyzing AI-themed purposes throughout distribution platforms.

The safety group found that menace actors weaponize model belief as an assault vector, exploiting widespread ChatGPT familiarity to compromise person units.

Evaluation revealed these counterfeits implement full malware frameworks able to persistent surveillance and credential theft.

Technical examination confirmed community communications masked by way of area fronting utilizing reliable cloud infrastructure from Amazon Net Companies and Google Cloud.

This refined obfuscation permits malicious visitors to mix with regular communications, evading safety detection.

An infection Mechanism and Knowledge Exfiltration

The malware deployment begins with convincing app retailer listings that includes polished graphics and descriptions promising enhanced ChatGPT performance.

Upon set up, malicious purposes request intensive permissions together with SMS entry, contact databases, name logs, and account credentials.

These requests seem reliable, masking true surveillance capabilities. Evaluation revealed code obfuscation utilizing the Ijiami packer to encrypt malicious payloads.

Decompiled packages contained folders labeled “secondary-program-dex-jars” housing executables that decrypt after set up—attribute trojan loader signatures.

The malware maintains persistence by way of embedded native libraries making certain background execution continues after customers shut the interface.

Community logs demonstrated systematic exfiltration focusing on one-time passwords, banking verification codes, and deal with guide contents.

Stolen credentials allow attackers to intercept multi-factor authentication and infiltrate company programs. Researchers famous these strategies parallel established spy ware households together with Triout and AndroRAT.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Action, Apps, Beware, ChatGPT, Data, Malicious, Records, Sensitive, Steals, Users

Post navigation

Previous Post: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
Next Post: Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Related Posts

New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine Cyber Security News
ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer Cyber Security News
Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News