Article Details
Scrape Timestamp (UTC): 2024-11-16 20:15:26.607
Original Article Text
Click to Toggle View
Fake AI video generators infect Windows, macOS with infostealers. Fake AI image and video generator websites target Windows and macOS users with the Lumma Stealer and AMOS information-stealing malware, which are used to steal credentials and cryptocurrency wallets from infected devices. Lumma Stealer is a Windows malware and AMOS is for macOS, but both steal cryptocurrency wallets and cookies, credentials, passwords, credit cards, and browsing history from Google Chrome, Microsoft Edge, Mozilla Firefox, and other Chromium browsers. This data is collected into an archive and sent back to the attacker, where they can use the information in further attacks or sell it on cybercrime marketplaces. Fake AI image generators push Lumma Stealer Over the past month, threat actors have created fake websites that impersonate an AI video and image editor called EditPro. As discovered by cybersecurity researcher g0njxa, the sites are promoted through search results and advertisements on X that share deepfake political videos, such as President Biden and Trump enjoying ice cream together. Clicking the images brings you to fake websites for the EditProAI application, with editproai[.]pro created to push Windows malware and editproai[.]org to push macOS malware. The sites are professional-looking and even contain the ubiquitous cookie banner, making them look and feel legitimate. However, clicking the "Get Now" links will download an executable pretending to be the EditProAI application. For Windows users, the file is called "Edit-ProAI-Setup-newest_release.exe" [VirusTotal] and for macOS, it is named "EditProAi_v.4.36.dmg" [VirusTotal]. The Windows malware is signed by what appears to be a stolen code signing certificate from Softwareok.com, a freeware utility developer. G0njxa says that malware uses a panel at "proai[.]club/panelgood/" to send stolen data, which can then be retrieved at a later time by the threat actors. An AnyRun report shows the execution of the Windows variant, with the sandbox service detecting the malware as Lumma Stealer. If you have downloaded this program in the past, you should consider all of your saved passwords, cryptocurrency wallets, and authentications compromised and immediately reset them with unique passwords at every site you visit. You should also enable multi-factor authentication at all sensitive sites, such as cryptocurrency exchanges, online banking, email services, and financial services. Information-stealing malware has seen massive growth over the last few years, with threat actors conducting massive global operations to steal people's credentials and authentication tokens. Other campaigns recently pushing infostealers include the use of zero-day vulnerabilities, fake fixes to GitHub issues, and even fake answers on StackOverflow. The stolen credentials are then used to breach corporate networks, conduct data theft campaigns like we saw with the massive SnowFlake account breaches, and cause chaos by corrupting network routing information.
Daily Brief Summary
Fake AI image and video generator websites are infecting Windows and macOS users with Lumma Stealer and AMOS infostealers.
These malwares steal sensitive data including cryptocurrency wallets, credentials, and browsing histories primarily from popular browsers like Google Chrome and Firefox.
Cybercriminals promote these fake sites through search results and ads, using deepfake content such as humorous political videos to lure users.
Upon clicking download links on these legitimate-looking sites, users unintentionally download malware-infected executables.
The downloaded files for Windows and macOS are disguised as applications from a fake AI editor platform, EditProAI, and include stolen software certificates to appear trustworthy.
Data stolen by these malwares is compiled, archived, and sent back to the attackers' servers for further illicit use or sale on cybercrime marketplaces.
Security professionals warn that any interaction with these fake sites should prompt users to reset their passwords and enable multi-factor authentication across sensitive accounts.
The rise in information-stealing malware is part of broader global cybercrime trends targeting personal and corporate data.