Pretend AI picture and video mills infect Home windows and macOS with the Lumma Stealer and AMOS information-stealing malware, used to steal credentials and cryptocurrency wallets from contaminated units.
Lumma Stealer is a Home windows malware and AMOS is for macOS, however each steal cryptocurrency wallets and cookies, credentials, passwords, bank cards, and shopping historical past from Google Chrome, Microsoft Edge, Mozilla Firefox, and different Chromium browsers.
This information is collected into an archive and despatched again to the attacker, the place they will use the knowledge in additional assaults or promote it on cybercrime marketplaces.
Pretend AI picture mills push Lumma Stealer
Over the previous month, risk actors have created pretend web sites that impersonate an AI video and picture editor referred to as EditPro.
As found by cybersecurity researcher g0njxa, the websites are promoted by way of search outcomes and ads on X that share deepfake political movies, similar to President Biden and Trump having fun with ice cream collectively.
Clicking the photographs brings you to pretend web sites for the EditProAI software, with editproai[.]professional created to push Home windows malware and editproai[.]org to push macOS malware.
The websites are professional-looking and even comprise the ever-present cookie banner, making them feel and look legit.
Nonetheless, clicking the “Get Now” hyperlinks will obtain an executable pretending to be the EditProAI software. For Home windows customers, the file is named “Edit-ProAI-Setup-newest_release.exe” [VirusTotal] and for macOS, it’s named “EditProAi_v.4.36.dmg” [VirusTotal].
The Home windows malware is signed by what seems to be a stolen code signing certificates from Softwareok.com, a freeware utility developer.
G0njxa says that malware makes use of a panel at “proai[.]membership/panelgood/” to ship stolen information, which might then be retrieved at a later time by the risk actors.
An AnyRun report reveals the execution of the Home windows variant, with the sandbox service detecting the malware as Lumma Stealer.
When you’ve got downloaded this program prior to now, you need to think about your whole saved passwords, cryptocurrency wallets, and authentications compromised and instantly reset them with distinctive passwords at each web site you go to.
You must also allow multi-factor authentication in any respect delicate websites, similar to cryptocurrency exchanges, on-line banking, electronic mail companies, and monetary companies.
Info-stealing malware has seen huge development over the previous couple of years, with risk actors conducting huge international operations to steal folks’s credentials and authentication tokens.
Different campaigns just lately pushing infostealers embrace using zero-day vulnerabilities, pretend fixes to GitHub points, and even pretend solutions on StackOverflow.
The stolen credentials are then used to breach company networks, conduct information theft campaigns like we noticed with the large SnowFlake account breaches, and trigger chaos by corrupting community routing info.