Breaking news
the incredible CIA plan to save diplomats -
An Italian tennis legend on the roof of the world -
Russia fires intercontinental ballistic missile at Ukraine -
how an underdeveloped rural area took off -
a wanted notice and a search -
Weather alert: wind and high avalanche risk in Haute-Savoie -
Floods: the Department reimburses your insurance excess -

How this AI generator steals your data by pretending to create images

How this AI generator steals your data by pretending to create images
How this AI generator steals your data by pretending to create images

Fake AI applications are proliferating, targeting PCs and Macs to steal credentials and sensitive data. Be careful with suspicious links distributed via online searches and advertisements on social networks.

Tl;dr

  • Cybercriminals are using fake AI applications to steal data.
  • Malware attacks Chromium-based browsers.
  • It is imperative to secure your information and use reliable antiviruses.

Online scams: be careful with fake AI applications

In today’s digital world, a new threat is emerging: malicious actors exploit links to fake image and video generation AI applications to steal login credentials and browsing history from PCs Infected Windows and Macs.

According to BleepingComputer and cybersecurity researcher gonjxa, these fake apps, scattered across search results and advertisements on social media platforms, contain malicious links. These lead to professionally designed websites claiming to offer AI image and video editing software, EditProAi.

However, make no mistake. The download link for this fake AI application actually contains malware, specifically the Windows variant of Lumma Stealer on PC and the macOS version of AMOS on Apple computers.

What are the risks?

The malware attacks Chromium-based browsers to steal usernames, passwords, credit card data, cookies and browsing history, as well as cryptocurrencies. Google Chrome, Microsoft Edge, Mozilla Firefox, Opera and Samsung Internet are all affected.

The stolen data is then archived and sent back to the attackers, where it can be sold on the dark web or used for other attacks. “If you have downloaded and installed this program, all your authentications, saved passwords and cryptocurrency wallets should be considered compromised. »

It is imperative to secure your information using two-factor or multi-factor authentication, and to change all passwords of visited sites after installing this malicious application. Additionally, it is recommended to use a powerful antivirus on your PC or Mac to detect and block malware before it infects your machine.

Finally, it is advisable to favor known and reputable sites and services. “If something seems too good to be true, it almost certainly is. » Stay vigilant and protect your personal information on the Internet.

-

-

PREV this Hisense 4K TV designed for gaming benefits from a superb 23% discount
NEXT The Galaxy S25 could become a real gaming smartphone thanks to this new feature