Description

EvilAI is a sophisticated malware campaign that marks a new chapter in cyberthreat evolution by leveraging artificial intelligence to enhance its stealth and effectiveness. Unlike conventional malware, EvilAI masquerades as legitimate productivity tools—such as “Recipe Lister,” “Manual Finder,” and “PDF Editor”—offering real functionality and polished interfaces. These applications are digitally signed and appear trustworthy, allowing them to bypass user suspicion while executing malicious payloads in the background. This dual-purpose approach enables the malware to remain undetected for extended periods, increasing its persistence across infected systems. The campaign has achieved global penetration, affecting critical sectors like healthcare, manufacturing, and government services. Europe has reported the highest number of incidents, followed by the Americas and AMEA regions. Within just one week, EvilAI demonstrated rapid geographic spread, underscoring its aggressive nature and the effectiveness of its deceptive tactics. Researchers emphasize that the use of AI-generated code makes EvilAI particularly difficult to detect, as the code appears clean and benign to traditional static analysis tools. EvilAI’s infection begins when users launch one of the disguised applications, triggering a hidden Node.js execution chain. This process runs JavaScript payloads from temporary directories via Windows command line, all without user awareness. To maintain persistence, the malware creates scheduled tasks that mimic legitimate system processes, modifies registry entries, and adds Start Menu shortcuts to reinforce its legitimacy. To further evade detection, EvilAI uses MurmurHash3-based anti-analysis loops that simulate infinite execution cycles, misleading static analysis tools while executing only once. Its JavaScript files follow consistent naming patterns with GUID suffixes, adding another layer of obfuscation. By creating entirely new applications instead of mimicking existing ones, EvilAI bypasses signature-based defenses, making it one of the most elusive and advanced threats seen to date.