Original Article Text

Click to Toggle View

Fake AI editor ads on Facebook push password-stealing malware. ​A Facebook malvertising campaign targets users searching for AI image editing tools and steals their credentials by tricking them into installing fake apps that mimic legitimate software. The attackers exploit the popularity of AI-driven image-generation tools by creating malicious websites that closely resemble legitimate services and trick potential victims into infecting themselves with information stealer malware, as Trend Micro researchers who analyzed the campaign found. The attacks start with phishing messages sent to Facebook page owners or administrators, which will send them to fake account protection pages designed to trick them into providing their login information. After stealing their credentials, the threat actors hijack their accounts, take control of their pages, publish malicious social media posts, and promote them via paid advertising. "We discovered a malvertising campaign involving a threat actor that steals social media pages (typically related to photography), changing their names to make them seem connected to popular AI photo editors," said Trend Micro threat researcher Jaromir Horejsi. "The threat actor then creates malicious posts with links to fake websites made to resemble the actual website of the legitimate photo editor. To increase traffic, the perpetrator then boosts the malicious posts via paid ads." ​Facebook users who click the URL promoted in the malicious ad are sent to a fake web page impersonating legitimate AI photo editing and generating software, where they are prompted to download and install a software package. However, instead of AI image editing software, the victims install the legitimate ITarian remote desktop tool configured to launch a downloader that automatically deploys the Lumma Stealer malware. The malware then quietly infiltrates their system, allowing the attackers to collect and exfiltrate sensitive information like credentials, cryptocurrency wallet files, browser data, and password manager databases. This data is later sold to other cybercriminals or used by the attackers to compromise the victims' online accounts, steal their money, and promote further scams. "Users should enable multi-factor authentication (MFA) on all social media accounts to add an extra layer of protection against unauthorized access," Horejsi advised. "Organizations should educate their employees on the dangers of phishing attacks and how to recognize suspicious messages and links. Users should always verify the legitimacy of links, especially those asking for personal information or login credentials." In April, a similar Facebook malvertising campaign promoted a malicious page impersonating Midjourney to target almost 1.2 million users with the Rilide Stealer Chrome browser extension.

Daily Brief Summary

MALWARE // Malicious Facebook Ads Trap Users with Fake AI Editing Tools

A malvertising campaign on Facebook targets individuals searching for AI image editing tools, leading to credential theft.

Attackers create fake websites mimicking legitimate AI tools, deceiving users into downloading information-stealing malware.

The campaign initiates with phishing messages directed at Facebook page owners, luring them to counterfeit account protection pages.

Upon gaining access to user credentials, attackers hijack social media accounts to post and promote malicious content using paid ads.

Victims are tricked into installing what appears to be legitimate software but is, in fact, a remote desktop tool used to deploy Lumma Stealer malware.

The malware harvests sensitive data such as credentials, cryptocurrency wallets, and password manager databases, which are sold or used in further scams.

The incident highlights the necessity of enabling multi-factor authentication and educating users on recognising phishing attempts and suspicious links.

Researchers point to similar previous campaigns that compromise user security and promote fraudulent activities through seemingly legitimate channels.