Hackers Manipulate AI Tools to Distribute Infostealers

Share This Post

Cybersecurity Alert: Hackers Hijacking Google Search to Spread Infostealer Malware

The Dark Side of AI Enthusiasm

Threat actors are unleashing a sophisticated black hat SEO campaign that manipulates Google search results for popular AI tools like ChatGPT and Luma AI. This alarming trend, identified by Zscaler’s ThreatLabz, highlights a growing cyber threat where malicious actors capitalize on the rising interest in artificial intelligence.

A Clever Yet Sinister Scheme

This malicious operation strikes at the core of curiosity—exploiting the hype wave surrounding AI advancements. Attackers create AI-themed websites optimized for search rankings. When unsuspecting users click on these results, they are redirected into a complex web of fingerprinting scripts, cloaked download pages, and payloads containing some of the most notorious infostealers active today, including Vidar, Lumma, and Legion Loader.

From Search to Malware in Three Clicks

Users searching for terms like “Luma AI blog” or “Download ChatGPT 5” may unwittingly land on these perilous sites. Built on WordPress and utilizing classic black hat SEO techniques, these sites are designed solely to manipulate search algorithms.

Google Search Result SEO Poisoning
Example Google search result leading to malware (Source: Zscaler ThreatLabz)

Once on the page, JavaScript scripts are activated, fingerprinting the user’s browser to harvest data like user agents, cookies, and click behaviors. This stolen information is then sent, encrypted via XOR, to a remote server, gettrunkhomuto[.]info, where it is analyzed to determine the next steps.

The Mechanics Behind the Attack

Evasive Techniques Using Legitimate Infrastructure

The use of AWS CloudFront in this scheme provides a façade of legitimacy. This infrastructure choice helps bypass security scanners that might flag otherwise suspicious activity. Coupled with advanced techniques like browser fingerprinting and IP geolocation, it creates a sophisticated laundering operation that makes detection extremely challenging.

Interestingly, these scripts can identify if users employ ad blockers or security tools. If detected, they intelligently back off; if not, users are redirected to password-protected malware loaders disguised as software installers.

Analyzing the Malware Family: Vidar, Lumma, and Legion Loader

Once a user engages with the download page, they receive malware disguised in oversized (800MB+) installers. This hefty size is a deliberate tactic to evade detection by sandbox environments and antivirus engines.

How Do These Malware Stay Under the Radar?

  • Vidar and Lumma: Both are infamous for stealing sensitive data; they arrive within NSIS installer packages that appear innocuous yet contain hidden threats. These install scripts actively seek to disable antivirus processes before executing the final payload, facilitating browser credential theft and cryptocurrency wallet scraping.

  • Legion Loader: This malware package appears as a utility suite but operates with malicious intent. Once initiated, it executes DLLs through process hollowing, and deploys malicious browser extensions designed to siphon sensitive data, including cryptocurrency.

The Impending Threat Landscape

This campaign doesn’t merely represent a spike in malware distribution; it signifies an evolution in delivery methods. Attackers are leveraging the curiosity surrounding AI tools to draw in unsuspecting victims. Deepen Desai, CISO at Zscaler, notes that AI-related keywords drive significant search traffic, creating a lucrative opportunity for cybercriminals.

With the rapid adoption of AI tools and the general lack of scrutiny around unofficial downloads, the risk associated with these malicious schemes is likely to surge in the coming months.

Proactive Measures: What You Can Do

When searching for tools like “download ChatGPT desktop” or “Luma AI tools,” stay vigilant.

  • Avoid third-party downloads: Always prioritize direct downloads from official sites.
  • Scrutinize URLs: Pay attention to the links you click.
  • Beware of suspicious ZIP archives: Look out for password-protected files that could be hiding malware.

Recommendations for IT Defenders

For cybersecurity professionals:

  • Flag unusual traffic: Monitor connections to gettrunkhomuto[.]info and similar domains.
  • Integrate browser fingerprinting heuristics: These can provide additional layers of protection.

Wrapping Up: An Evolving Cyber Threat

In the age of AI, malware’s intelligence doesn’t necessarily manifest in complexity but rather in strategic placement. As cybercriminals capitalize on emerging trends, it is crucial for both users and defenders to remain informed and proactive.

Further Reading

If you wish to delve deeper into these security threats, check out these insightful resources:

Stay safe and vigilant in your digital ventures!

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Check all Categories of Articles

Do You Want To Boost Your Business?

drop us a line and keep in touch
franetic-agencia-de-marketing-digital-entre-em-contacto