Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

Deputy CM’s Office Flags Misinformation On Road Works, Cites Quality Checks

April 11, 2026

‘Baseless:’ Baltics deny Ukraine is their using airspace to attack Russia – TVP World

April 11, 2026

Democrats mock Karoline Leavitt’s ‘cursed energy’ in brutal misinformation post

April 11, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

News RoomBy News RoomJuly 20, 2025Updated:July 21, 20254 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

The financially motivated threat actor known as EncryptHub-Moon (also referred to as LARVA-208 or Water Gamayun) has evolved its tactics and is targeting Web3 developers to inject information stealer malware into their systems. This MH’s development and the use of stealer malware indicate a shift toward advanced decryption and automated security measures that bypass traditional defenses. In a recent update shared with The Hacker News, PRODAFT confirmed that severalaloads have been leveraging fake AI platforms, such as Norlax AI, to attract victims with job offers or portfolio review requests. This underscores the MH’s ability to manipulateryptocurrency wallets and disrupt decentralized skill-hubbing setups on platforms like Remote3, which explicitly warns of risks to job seekers who bypass these services.

The MH’s focus on Web3 Developers is strategic, as these individuals often operate across multiple decentralized projects, use tools like Pointers++ and OrсьLLM, and may not be adequately protected by conventional enterprise security controls. This decentralization presents an attractive target for ransomware and data theft, as it prevents attackers from using brute-force methods or centralizing resources.

The MH has involved multiple platforms, including ChatGPT, where the threat actors have instructed victims to resume interviews or discussions on fake platforms such as Norlax AI. Once users click on the meeting links, details about their invites are enhanced and then delivered as malicious software. The stealer malware in question, Fickle, is a co-branded solution that mounts after learning about certain files being encrypted on shared network drives. This approach highlights the MH’s ability to undercut security protocols by leveraging legitimate Windows tools, such as svchost.exe and bcdedit.exe, to bypass system recovery processes and obtain credentials.

The recent incident has also highlighted the MH’s ability to evolve quickly, using stolen devices and interacting with users in a way that defers traditional response approaches. For instance, when the MH used the Secure Web3 Lab to send meeting links to applicants, the attackers were instructed to use a fake chat system to bypass moderation and proceed with interviews. Once the meeting took place, users were sent to a virtual meeting room, only to be asked to enter their email address and invite code. This process resulted in malicious software downloading, which feeds back into a network where affected users were then instantiated as退款 requests and eventually deleted from their records of activity.

The MH’s role in shaping Web3 infrastructure has extreme consequences for businesses and developers. For many of the victims, this meant being risks away from their systems—iffebile and[idemodal—but for the MH themselves, this enabled advanced decryption mechanisms. These mechanisms have been classified under the Cybercrime Division’s Stealer malware framework, indicating a broader trend toward misuse at scale.

In addition to EncryptHub-Moon, the MH has been involved in other ransomware incidents, including variations named KAWA4096 and Crux, as well as the Trend ransomware. These attacks have also highlighted the MH’s financial motivation, with KAWA4096 reported to have targeted 11 companies reaching as far as the United States and Japan, while Crux detected on July 4 and 13, 2025. The MH’s use of legitimate computer tools and processes, such as RDP and the RAIN system, has been deemed suspicious by ransomware researchers.

One notable feature of the MH’s attacks is the use of stolen systems to bypass traditional security safeguards. While this can be effective, it also offers opportunities for attackers to exploit a variety of vulnerabilities anddlwn threats, such as Windows modified to run slower orjack-case systems. The MH’s reliance on legitimate tools suggests a potential risk of information leakage or data compromise, but it also underscores the MH’s ability to use stolen resources to their advantage.

Overall, the MH has evolved into a more sophisticated and highly advanced threat actor, using sophisticated tools and tactics to exploit the vulnerabilities of Web3 and decentralized systems. Their ability toSplit by their internal conversation flow and manipulate like aforwarder of eavesdropping attempts has made them a focal point of cybercriminal interest globally. As ransomware continues to proliferate, understanding the MH’s mechanisms and advanced decryption capabilities is becoming increasingly crucial for developers and defenders of Web3 infrastructure.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

Fake AI Photo of F-15 Crew Rescue in Iran Spreads Across Social Media

Viral image of Tinubu, Sowore handshake is AI-generated

Fact Check: Photo Of PM Modi Holding A Coconut And Getting Photographed Is Fake And AI Generated

Shashi Tharoor slams AI, deepfake videos of him as ‘fake news’, defines ‘rule of thumb’| India News

Image claiming to show US airman rescued in Iran is fake. Here’s the proof

It’s finally happened: I’m now worried about AI. And consulting ChatGPT did nothing to allay my fears | Emma Brockes

Editors Picks

‘Baseless:’ Baltics deny Ukraine is their using airspace to attack Russia – TVP World

April 11, 2026

Democrats mock Karoline Leavitt’s ‘cursed energy’ in brutal misinformation post

April 11, 2026

McGill briefly evacuated after false reports of gunshots, students reportedly slamming doors – CTV News

April 11, 2026

Sadiq Khan Slams Social Media Over London Disinformation

April 11, 2026

Police deploy enhanced security measures in Taraba, warn against misinformation

April 11, 2026

Latest Articles

The Russian Playbook: Viktor Orbán Wants to Win the Elections with Bots, Clones, and Disinformation

April 11, 2026

Indian media exposed over misinformation on Islamabad talks – World

April 11, 2026

California Rep Eric Swalwell denies former staffer sexual misconduct allegations

April 11, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.