Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Mandiant warns that a Vietnamese hacking group tracked as UNC6032 is distributing malware via fake AI video generator websites.

Over the past year, a threat actor has been banking on the wild popularity of AI tools to lure computer users to fake content creation websites and infect their systems with malware, Mandiant reports.

Using fake websites masquerading as legitimate AI video generator tools, Mandiant is warning that the ‘UNC6032’ hacking group out of Vietnam is pushing information stealers and backdoors to victims across different geographies and industries.

The widespread campaign has been active since at least mid-2024, luring the unsuspecting victims to the fake websites via thousands of ads on social media platforms such as Facebook and LinkedIn, and likely on other platforms as well.

Most of the ads ran on Facebook, being published using either attacker-created Facebook pages or compromised Facebook accounts. Meta started removing some of the malicious ads, domains, and accounts in 2024, before Mandiant notified it of its findings.

Mandiant said it identified over 30 different fake websites posing as popular tools such as Luma AI, Canva Dream Lab, and Kling AI, which have been promoted through a network of more than 120 misleading social media ads that reached millions of users, including over 2.3 million in the European Union.

Promising text-to-video or image-to-video generation capabilities, the fake websites would present the same prompt to any visitor, and then serve a ZIP archive that is offered for download once the fake video creation process is supposedly completed.

According to Mandiant, the infection chain it observed relies heavily on DLL side-loading, process injection, and in-memory droppers, and uses AutoRun registry keys to achieve persistence.

The ZIP archive contains a double-extension executable that delivers the Rust-based Starkveil dropper to the victims’ machines. The dropper then executes the Coilhatch launcher, which deploys the XWorm and Frostrift .NET backdoors, along with the .NET downloader Grimpull.

Advertisement. Scroll to continue reading.

A separate report from Morphisec notes that the malicious AI output served by the fake websites dropped the Noodlophile Stealer, sometimes bundled with the XWorm backdoor.

Mandiant observed both XWorm and Frostrift collecting system information, including usernames, OS details, hardware identifiers, and anti-virus details. XWorm can also log keystrokes, while Frostrift checks for certain messaging applications, browsers, and browser extensions.

“As AI has gained tremendous momentum recently, our research highlights some of the ways in which threat actors have taken advantage of it. These AI tools no longer target just graphic designers; anyone can be lured in by a seemingly harmless ad. We advise users to exercise caution when engaging with AI tools and to verify the legitimacy of the website’s domain,” Mandiant added.

Related: Ongoing Campaign Uses 60 NPM Packages to Steal Data

Related: MITRE Hackers’ Backdoor Has Targeted Windows for Years

Related: Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.