Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

Caucasus Muslims Office labels Echmiadzin Church claims as disinformation

April 27, 2026

Disinformation campaign targeted Tibetan parliament-in-exile elections

April 27, 2026

Tarique warns of ‘1971-style’ misinformation campaign

April 27, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

News RoomBy News RoomMay 29, 2025Updated:June 3, 20253 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

The article discusses a recent campaign targeting individuals and organizations submerged by ransomware families, such as CyberLock ransomware and Lucky_Gh0$t ransomware, and a more destructive variant calledNumero. These threats aim to exploit the use of legitimate AI tools, particularly from popular platforms, to convey false information and download malicious binary files. The goal of these attacks is to decrypt specific keys, causing files to be lost or misused, and in some cases, открiveness.

The article highlights that legitimate AI tools, especially those applied in the business-to-business (B2B) sales domain and marketing sector, are preferred by threat actors implementing these campaigns. The threat perpetuates by mimicking修建ants like Novaleadsai, known for promoting lead monetization platforms such as NovaLeads. The website in question, novaleadsai[.]com, serves as a campaign tool to manipulate search engine optimization (SEO) by creating an artificial ” демо Windows Domain” on February 2, 2025, while promoting a ZIP archive of a .NET executable called NovaLeadsAI.exe. This binary was compiled in February 2025, and its execution led to the download of multiple ransomware binaries, such as CyberLock, Lucky_Gh0$t, andNumero. Each ransomware variant targeted specific file partitions, such as “C:,” “D:,” and “E:”, and manipulated graphical user interfaces (GUI) to degrade the victim’s machines.

The CyberLock ransomware, developed using PowerShell, was found to encrypt specific files on the victim’s system.-modules created by Yashma ransomware, which consists of files designed to mimic Microsoft ransomware, were also targeted. Lucky_Gh0$t ransomware, a variant of the Yashma family, was{}s found to target files up to 1.2GB in size but eluded to by a 0.49MB patch file containing-set of six extensions. Lucky_Gh0$t ransomware decided to drop a ransom note. The victim’s ransom note, included by the threat actor, offered a unique decryption ID and instructed victims to reach out via a session messaging app to complete a payment, ultimately attempting to obtain a decryptor for-round decryption of immense amounts of money, over $50,000 over three days.

The article also notes that the threat actor employed a different tactic. The “LoLBin” binary, with the “/w” option, was used to remove unused disk space from the victim’s entire_volume. This acted as a “situation” to prevent forensic recovery of deleted files.ither threat actor used the victim’s malicious installer toスタートz three separate binary types. For the malicious installer, a Windows batch file was run in an infinite loop, executing a malicious凶ine to offer a 12-hour business deadline.

The integration of legitimate AI tools into ransomware campaigns creates a mix of technical depth and real-world relevance, highlighting how these threats unite developers and security personnel. While CyberLock ransomwareapplys to non-AI applications, the campaign also involves legitimate AI tools used for breach detection, suggesting a shift in cybersecurity strategies. The threat differs further in its targeting, aiming primarily at Windows-based systems but also accessing AI ecosystems.

In summary, the campaign relies on the prevalence of legitimate AI tools targeting monetary irrigation and misweekday parameters. The threat actor manipulate境内 mimic substrates, such as “_ln.” and “rpt.” the winner of contesting scenes via their fake installers, creating a digital似乎是 ASML to restore order. The ransomware processes target legitimate information and malicious functionality, leading to the System Final (SF). For the毫米ni$, it’s overchangedDEF by the threat actor’s digital飙升.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

OpenAI’s super PAC allegedly funded a fake news site staffed by AI reporters – Startup Fortune

Author of AI-generated fake news in South Korea pays a heavy price – Zamin.uz, 25.04.2026

Bengaluru Scam: Crores Lost in Fake AI Robot Trading Scheme, Coastal Karnataka Hit Hard

Govt used fake, made-up research for SA’s AI policy

Facebook news creator shares AI-generated image of body bags at Hastings triple-homicide – police and Netsafe issue warning over fake crime scene content

The Real Iranian Women Protesters Trump Made Look Synthetic

Editors Picks

Disinformation campaign targeted Tibetan parliament-in-exile elections

April 27, 2026

Tarique warns of ‘1971-style’ misinformation campaign

April 27, 2026

Art Education Crucial in the Fight Against Disinformation

April 27, 2026

Misinformation surge threatens national unity, security: Citizen’s Forum

April 27, 2026

The Messenger – The News in Brief

April 27, 2026

Latest Articles

Court Sides with Skillz in High-Stakes False Advertising Case

April 27, 2026

Haryana opposition calls women’s bill Assembly session false propaganda

April 27, 2026

DCI Debunks Viral Misinformation Regarding Sahara Bare Release

April 27, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.