Do not download these AI video generators, they are malware that steals your data

Cybercriminals are exploiting the popularity of artificial intelligence with fake tools promising to create innovative videos and images. In reality, this software hides dangerous traps for your personal data. Here’s how to protect yourself.

Credits: 123RF

L’artificial intelligence revolutionizes many areas with tools like ChatGPT, MidJourney or DALL-Ecapable of generating text or images in seconds. These technologies are generating real enthusiasm among the general public. Unfortunately, this fascination has become a opportunity for hackerswho multiply scams usingIA as bait. Victims, lured by promises of impressive features, download software that turns out to be traps for steal their sensitive data.

Recently, cybersecurity researchers revealed a particularly dangerous campaign. Fake image and video generators, called “EditProAI“, appeared on fraudulent sites imitating legitimate platforms. These tools claim to offer video creation services et photo innovative. In reality, they hide spyware capable of stealing sensitive information, such as your passwords, your cryptocurrency wallets or your browsing histories.

EditProAI is a fake AI generator that infects your devices to steal your data

These fake software targets both users of Windows what of macOS. Once installed, they introduce specific malware, such as Lumma Stealer for Microsoft OS and AMOS for Apple. These programs collect your personal data : cookies, passwords, banking information and browsing histories. Hackers then send this data to servers they control, where it is exploited for future attacks or resold on illegal platforms.

This type of scam is not not new. In October 2024, a similar campaign used fake deepfake generators to infect devices. These fraudulent sites offered video editing toolsbut were actually spreading spyware like Redline Stealer. Today, “EditProAI” use this method by targeting curious or unsuspecting users. For avoid these pitfallsnever download software from an unknown source and always check the authenticity of the sites that you are visiting. If you have installed one of these programs, reset your passwords immediately and enable two-factor authentication on your sensitive accounts.

-

-

PREV A Chinese boat under surveillance after the rupture of two submarine cables in the Baltic Sea
NEXT Federal training: The new version of De Wever’s “super note” still does not appeal to Vooruit, the blockage continues