Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

Russia fabricates exchange narrative to discredit Ukraine

June 8, 2025

Russian hybrid warfare: Ukraine’s success offers lessons for Europe

June 8, 2025

Cyber Police Kashmir warns against spread of misinformation; legal action to be taken – Rising Kashmir

June 8, 2025
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

News RoomBy News RoomMay 29, 2025Updated:June 3, 20253 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

The article discusses a recent campaign targeting individuals and organizations submerged by ransomware families, such as CyberLock ransomware and Lucky_Gh0$t ransomware, and a more destructive variant calledNumero. These threats aim to exploit the use of legitimate AI tools, particularly from popular platforms, to convey false information and download malicious binary files. The goal of these attacks is to decrypt specific keys, causing files to be lost or misused, and in some cases, открiveness.

The article highlights that legitimate AI tools, especially those applied in the business-to-business (B2B) sales domain and marketing sector, are preferred by threat actors implementing these campaigns. The threat perpetuates by mimicking修建ants like Novaleadsai, known for promoting lead monetization platforms such as NovaLeads. The website in question, novaleadsai[.]com, serves as a campaign tool to manipulate search engine optimization (SEO) by creating an artificial ” демо Windows Domain” on February 2, 2025, while promoting a ZIP archive of a .NET executable called NovaLeadsAI.exe. This binary was compiled in February 2025, and its execution led to the download of multiple ransomware binaries, such as CyberLock, Lucky_Gh0$t, andNumero. Each ransomware variant targeted specific file partitions, such as “C:,” “D:,” and “E:”, and manipulated graphical user interfaces (GUI) to degrade the victim’s machines.

The CyberLock ransomware, developed using PowerShell, was found to encrypt specific files on the victim’s system.-modules created by Yashma ransomware, which consists of files designed to mimic Microsoft ransomware, were also targeted. Lucky_Gh0$t ransomware, a variant of the Yashma family, was{}s found to target files up to 1.2GB in size but eluded to by a 0.49MB patch file containing-set of six extensions. Lucky_Gh0$t ransomware decided to drop a ransom note. The victim’s ransom note, included by the threat actor, offered a unique decryption ID and instructed victims to reach out via a session messaging app to complete a payment, ultimately attempting to obtain a decryptor for-round decryption of immense amounts of money, over $50,000 over three days.

The article also notes that the threat actor employed a different tactic. The “LoLBin” binary, with the “/w” option, was used to remove unused disk space from the victim’s entire_volume. This acted as a “situation” to prevent forensic recovery of deleted files.ither threat actor used the victim’s malicious installer toスタートz three separate binary types. For the malicious installer, a Windows batch file was run in an infinite loop, executing a malicious凶ine to offer a 12-hour business deadline.

The integration of legitimate AI tools into ransomware campaigns creates a mix of technical depth and real-world relevance, highlighting how these threats unite developers and security personnel. While CyberLock ransomwareapplys to non-AI applications, the campaign also involves legitimate AI tools used for breach detection, suggesting a shift in cybersecurity strategies. The threat differs further in its targeting, aiming primarily at Windows-based systems but also accessing AI ecosystems.

In summary, the campaign relies on the prevalence of legitimate AI tools targeting monetary irrigation and misweekday parameters. The threat actor manipulate境内 mimic substrates, such as “_ln.” and “rpt.” the winner of contesting scenes via their fake installers, creating a digital似乎是 ASML to restore order. The ransomware processes target legitimate information and malicious functionality, leading to the System Final (SF). For the毫米ni$, it’s overchangedDEF by the threat actor’s digital飙升.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

Lawyers could face ‘severe’ penalties for fake AI-generated citations, UK court warns

UK judge warns of risk to justice after lawyers cited fake AI-generated cases in court

IMLS Updates, Fake AI-Generated Reading Recs, and More Library News

AI can both generate and amplify propaganda

Microsoft-backed AI startup collapses after faking AI services

False SA school calendar goes viral – from a known fake news website

Editors Picks

Russian hybrid warfare: Ukraine’s success offers lessons for Europe

June 8, 2025

Cyber Police Kashmir warns against spread of misinformation; legal action to be taken – Rising Kashmir

June 8, 2025

Wall Street Journal: Pentagon used UFO myths to hide weapons work

June 8, 2025

Ukraine’s culture ministry flags disinformation on Volyn exhumations

June 8, 2025

Pro-government media intensify anti-Western narratives since the start of protests in Serbia

June 8, 2025

Latest Articles

How the Liverpool car-ramming sparked a wave of online misinformation – Yahoo News UK

June 8, 2025

Bulgaria is close to joining the euro currency but faces disinformation and fear | International

June 8, 2025

CBS Errs as It Airs Radical Professor on ‘Misinformation’

June 8, 2025

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2025 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.