A malware distribution campaign is targeting unsuspecting victims by impersonating the popular CapCut video editing tool. CapCut, an official video editor for TikTok developed by ByteDance, boasts over 500 million downloads on Google Play and receives millions of website hits monthly.
Due to bans in certain countries, users have turned to alternative sources for downloading the program, which threat actors exploit by creating fake CapCut websites that distribute malware. Cyble, a cybersecurity firm, discovered two campaigns distributing different malware strains through these deceptive websites. The first campaign employs fake CapCut sites featuring a download button that delivers the Offx Stealer malware to the victim’s computer.
Once executed, the malware operates in the background, attempting to extract passwords, cookies, and specific file types from the victim’s desktop folder, as well as data from messaging apps, cryptocurrency wallets, and remote access software.
The stolen data is saved in a randomly generated directory and sent to the attackers through a private Telegram channel. In the second campaign, a file named ‘CapCut_Pro_Edit_Video.rar’ drops a stealthy batch script triggering a PowerShell script that decrypts and loads the final payload, Redline Stealer.
This information-stealing malware targets web browsers and applications for data extraction, bypassing Windows security features. To stay protected from such malware campaigns, it is advised to download software only from official sources and avoid suspicious websites shared on forums or social media.
Additionally, caution should be exercised when clicking on promoted search results while searching for software tools on platforms like Google. Official sources like capcut.com, Google Play, and the App Store should be used to download CapCut securely.