Cybercriminals are using a clever new tactic to spread malware: they’re disguising it as legitimate AI-powered applications. This campaign, which security researchers have dubbed EvilAI, is designed to trick users into downloading malicious software that looks and acts like real productivity tools. Once installed, these trojans can go unnoticed, giving attackers a foothold in corporate and personal systems across the globe.
The EvilAI campaign is widespread, affecting a diverse range of industries, including manufacturing, government, healthcare, technology, and retail. Researchers have observed infections in numerous countries across Europe, the Americas, and the AMEA region, with a particularly high concentration in the United States, India, France, and Italy. This broad geographical spread suggests the campaign is highly active and rapidly evolving, posing a significant and ongoing threat to organizations worldwide.
What makes this campaign so dangerous is the high degree of sophistication in its deceptive techniques. The attackers have created professional-looking interfaces for their fake applications and are even using valid digital signatures to make them appear authentic. To further evade detection, they are using disposable companies to obtain signing certificates, ensuring that even if one signature is revoked, they can quickly acquire another. This careful attention to detail makes it extremely difficult for standard security tools to differentiate between the malicious software and a legitimate application.
The primary goal of these attacks is to gain a strong foothold in a compromised system. The malicious software acts as a “stager,” gaining initial access, establishing persistence, and performing extensive reconnaissance on the victim’s network. It is also designed to exfiltrate sensitive data, such as browser information, and maintain a secure, encrypted connection to its command-and-control servers. From there, the attackers can receive commands and deploy additional malicious payloads, further expanding their control over the infected system.
To distribute the malware, the cybercriminals are using a variety of clever propagation methods. These include creating new websites that mimic legitimate vendor portals, manipulating search engine results, running malicious advertisements, and promoting download links on social media and forums. This multi-pronged approach helps the attackers reach a wide audience, increasing the likelihood that unsuspecting users will download and install the deceptive software. By blurring the line between authentic and malicious applications, the EvilAI campaign represents a new and highly effective strategy for cybercriminals to infiltrate corporate and personal networks without arousing suspicion.
Reference: