Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

KHOU 11 – YouTube

April 3, 2026

13News Now – YouTube

April 1, 2026

Delhi BJP alleges misinformation against Pink Cards issued by govt to women

March 31, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

News RoomBy News RoomMay 29, 2025Updated:June 3, 20253 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

The article discusses a recent campaign targeting individuals and organizations submerged by ransomware families, such as CyberLock ransomware and Lucky_Gh0$t ransomware, and a more destructive variant calledNumero. These threats aim to exploit the use of legitimate AI tools, particularly from popular platforms, to convey false information and download malicious binary files. The goal of these attacks is to decrypt specific keys, causing files to be lost or misused, and in some cases, открiveness.

The article highlights that legitimate AI tools, especially those applied in the business-to-business (B2B) sales domain and marketing sector, are preferred by threat actors implementing these campaigns. The threat perpetuates by mimicking修建ants like Novaleadsai, known for promoting lead monetization platforms such as NovaLeads. The website in question, novaleadsai[.]com, serves as a campaign tool to manipulate search engine optimization (SEO) by creating an artificial ” демо Windows Domain” on February 2, 2025, while promoting a ZIP archive of a .NET executable called NovaLeadsAI.exe. This binary was compiled in February 2025, and its execution led to the download of multiple ransomware binaries, such as CyberLock, Lucky_Gh0$t, andNumero. Each ransomware variant targeted specific file partitions, such as “C:,” “D:,” and “E:”, and manipulated graphical user interfaces (GUI) to degrade the victim’s machines.

The CyberLock ransomware, developed using PowerShell, was found to encrypt specific files on the victim’s system.-modules created by Yashma ransomware, which consists of files designed to mimic Microsoft ransomware, were also targeted. Lucky_Gh0$t ransomware, a variant of the Yashma family, was{}s found to target files up to 1.2GB in size but eluded to by a 0.49MB patch file containing-set of six extensions. Lucky_Gh0$t ransomware decided to drop a ransom note. The victim’s ransom note, included by the threat actor, offered a unique decryption ID and instructed victims to reach out via a session messaging app to complete a payment, ultimately attempting to obtain a decryptor for-round decryption of immense amounts of money, over $50,000 over three days.

The article also notes that the threat actor employed a different tactic. The “LoLBin” binary, with the “/w” option, was used to remove unused disk space from the victim’s entire_volume. This acted as a “situation” to prevent forensic recovery of deleted files.ither threat actor used the victim’s malicious installer toスタートz three separate binary types. For the malicious installer, a Windows batch file was run in an infinite loop, executing a malicious凶ine to offer a 12-hour business deadline.

The integration of legitimate AI tools into ransomware campaigns creates a mix of technical depth and real-world relevance, highlighting how these threats unite developers and security personnel. While CyberLock ransomwareapplys to non-AI applications, the campaign also involves legitimate AI tools used for breach detection, suggesting a shift in cybersecurity strategies. The threat differs further in its targeting, aiming primarily at Windows-based systems but also accessing AI ecosystems.

In summary, the campaign relies on the prevalence of legitimate AI tools targeting monetary irrigation and misweekday parameters. The threat actor manipulate境内 mimic substrates, such as “_ln.” and “rpt.” the winner of contesting scenes via their fake installers, creating a digital似乎是 ASML to restore order. The ransomware processes target legitimate information and malicious functionality, leading to the System Final (SF). For the毫米ni$, it’s overchangedDEF by the threat actor’s digital飙升.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

Viral Image Of PM Modi Meeting Sonia Gandhi In Hospital Is AI-Generated

Read why propaganda handle ‘Dr Nimo Yadav’ run by Prateek Sharma was withheld in India

AI-Era Fake News Demands a Private-Sector Verification Ecosystem

Viral dog video misled by AI-generated fake narratives

Delhi HC directs takedown of fake AI content using Gautam Gambhir’s identity; bars misuse of persona

Pragmata Devs Say They Designed a Stage to Purposefully Look Like Generative AI

Editors Picks

13News Now – YouTube

April 1, 2026

Delhi BJP alleges misinformation against Pink Cards issued by govt to women

March 31, 2026

Universities in the occupied territories of Ukraine have been turned into a tool for recruiting students into the Russian army – NSDC Center for Countering Disinformation

March 31, 2026

Mayor of Bath resigns after posts suggesting London ambulance fires were Israeli ‘false flag’ | UK news

March 31, 2026

Ex-VP Atiku Raises Alarm Over ‘Coordinated Disinformation’ Against ADC

March 31, 2026

Latest Articles

WB BJP Shares Clipped Video of CM Mamata Banerjee With False Claim

March 31, 2026

Viral Image Of PM Modi Meeting Sonia Gandhi In Hospital Is AI-Generated

March 31, 2026

Media Capture, Misinformation, and “Noise”

March 31, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.