Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

Students protest at Ravenshaw university against ‘false’ ragging case | Bhubaneswar News

July 21, 2025

Case of giving false information & fabricating evidence filed against Pune data scientist over bogus rape claim | Pune News

July 21, 2025

DHHS Explains Medicaid Rate Adjustment in Response to Provider Misinformation – KCSR / KBPY

July 21, 2025
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

News RoomBy News RoomJuly 20, 2025Updated:July 21, 20254 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

The financially motivated threat actor known as EncryptHub-Moon (also referred to as LARVA-208 or Water Gamayun) has evolved its tactics and is targeting Web3 developers to inject information stealer malware into their systems. This MH’s development and the use of stealer malware indicate a shift toward advanced decryption and automated security measures that bypass traditional defenses. In a recent update shared with The Hacker News, PRODAFT confirmed that severalaloads have been leveraging fake AI platforms, such as Norlax AI, to attract victims with job offers or portfolio review requests. This underscores the MH’s ability to manipulateryptocurrency wallets and disrupt decentralized skill-hubbing setups on platforms like Remote3, which explicitly warns of risks to job seekers who bypass these services.

The MH’s focus on Web3 Developers is strategic, as these individuals often operate across multiple decentralized projects, use tools like Pointers++ and OrсьLLM, and may not be adequately protected by conventional enterprise security controls. This decentralization presents an attractive target for ransomware and data theft, as it prevents attackers from using brute-force methods or centralizing resources.

The MH has involved multiple platforms, including ChatGPT, where the threat actors have instructed victims to resume interviews or discussions on fake platforms such as Norlax AI. Once users click on the meeting links, details about their invites are enhanced and then delivered as malicious software. The stealer malware in question, Fickle, is a co-branded solution that mounts after learning about certain files being encrypted on shared network drives. This approach highlights the MH’s ability to undercut security protocols by leveraging legitimate Windows tools, such as svchost.exe and bcdedit.exe, to bypass system recovery processes and obtain credentials.

The recent incident has also highlighted the MH’s ability to evolve quickly, using stolen devices and interacting with users in a way that defers traditional response approaches. For instance, when the MH used the Secure Web3 Lab to send meeting links to applicants, the attackers were instructed to use a fake chat system to bypass moderation and proceed with interviews. Once the meeting took place, users were sent to a virtual meeting room, only to be asked to enter their email address and invite code. This process resulted in malicious software downloading, which feeds back into a network where affected users were then instantiated as退款 requests and eventually deleted from their records of activity.

The MH’s role in shaping Web3 infrastructure has extreme consequences for businesses and developers. For many of the victims, this meant being risks away from their systems—iffebile and[idemodal—but for the MH themselves, this enabled advanced decryption mechanisms. These mechanisms have been classified under the Cybercrime Division’s Stealer malware framework, indicating a broader trend toward misuse at scale.

In addition to EncryptHub-Moon, the MH has been involved in other ransomware incidents, including variations named KAWA4096 and Crux, as well as the Trend ransomware. These attacks have also highlighted the MH’s financial motivation, with KAWA4096 reported to have targeted 11 companies reaching as far as the United States and Japan, while Crux detected on July 4 and 13, 2025. The MH’s use of legitimate computer tools and processes, such as RDP and the RAIN system, has been deemed suspicious by ransomware researchers.

One notable feature of the MH’s attacks is the use of stolen systems to bypass traditional security safeguards. While this can be effective, it also offers opportunities for attackers to exploit a variety of vulnerabilities anddlwn threats, such as Windows modified to run slower orjack-case systems. The MH’s reliance on legitimate tools suggests a potential risk of information leakage or data compromise, but it also underscores the MH’s ability to use stolen resources to their advantage.

Overall, the MH has evolved into a more sophisticated and highly advanced threat actor, using sophisticated tools and tactics to exploit the vulnerabilities of Web3 and decentralized systems. Their ability toSplit by their internal conversation flow and manipulate like aforwarder of eavesdropping attempts has made them a focal point of cybercriminal interest globally. As ransomware continues to proliferate, understanding the MH’s mechanisms and advanced decryption capabilities is becoming increasingly crucial for developers and defenders of Web3 infrastructure.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

MAGA AI bot network divided on Trump-Epstein backlash

Pattaya Mayor denies viral beach image, claims AI hoax by fake foreign YouTuber

Hijacked NZ website filled with AI-generated ‘coherent gibberish’

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

AI fake news surge tests EU Digital Services Act

Some YouTube channels he accused of ‘impersonating him’ have 1,000+ subscribers

Editors Picks

Case of giving false information & fabricating evidence filed against Pune data scientist over bogus rape claim | Pune News

July 21, 2025

DHHS Explains Medicaid Rate Adjustment in Response to Provider Misinformation – KCSR / KBPY

July 21, 2025

CT officials seek to weed out misinformation about chemical used to treat hydrilla

July 21, 2025

Menominee police warn against false reports after fake armed robbery claim

July 21, 2025

UK battles misinformation after child’s death

July 21, 2025

Latest Articles

Obama accused of deliberately creating false Russia narrative in political scandal – Fox News

July 21, 2025

Teenagers aren’t good at spotting misinformation online – research suggests why

July 21, 2025

Blumenthal, advocates push back on ‘misinformation’ over herbicide use in CT River

July 21, 2025

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2025 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.