Description

Cybercriminals are using fake AI image and video generators to distribute Lumma Stealer and AMOS, two types of information-stealing malware targeting Windows and macOS, respectively. These malware variants steal sensitive data, including login credentials, cryptocurrency wallets, cookies, passwords, and browsing history from popular browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox. The stolen data is sent to remote servers controlled by attackers, who can use it for further attacks or sell it on dark web marketplaces. Over the past month, attackers have set up fraudulent websites mimicking a legitimate AI tool called EditPro. These sites are promoted through search engine results and social media ads, often featuring deepfake videos, such as one showing political figures Biden and Trump. Clicking on these ads leads to counterfeit EditProAI download pages. The sites look legitimate, featuring professional designs and cookie consent banners, but downloading the application triggers the installation of malware. For Windows users, the malicious file is called Edit-ProAI-Setup-newest_release.exe, while for macOS users, it’s EditProAi_v.4.36.dmg. The Windows version is signed with a stolen certificate from Softwareok.com, a legitimate utility developer. Once installed, the malware steals sensitive information and sends it back to the attacker. If you've downloaded these files, assume your passwords and cryptocurrency wallets are compromised. Immediately reset your passwords and enable multi-factor authentication (MFA) on sensitive accounts. Stay cautious when downloading software from untrusted sources to protect your data from these growing threats.