<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI Malware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/ai-malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 03 Apr 2026 10:33:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>AI Malware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Malicious “ChatGPT Ad Blocker” Extension Steals User Data</title>
		<link>https://firsthackersnews.com/chatgpt-ad-blocker-malware/</link>
					<comments>https://firsthackersnews.com/chatgpt-ad-blocker-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:05:33 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#AdBlockerMalware]]></category>
		<category><![CDATA[#AIPrivacy]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChatGPTMalware]]></category>
		<category><![CDATA[#ChatGPTSecurity]]></category>
		<category><![CDATA[#ChromeExtension]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousExtension]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11551</guid>

					<description><![CDATA[<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It pretends to be a helpful tool designed to remove ads, but instead, it quietly collects sensitive data from ChatGPT sessions.</p>



<p>The extension takes advantage of user curiosity around ads in AI platforms, using a familiar name to appear trustworthy. Once installed, it monitors activity without interrupting the user experience, making it difficult to notice anything unusual.</p>



<p>It captures prompts, responses, and related metadata while continuing to behave like a normal extension on the surface.</p>



<h3 class="wp-block-heading">Behind the Operation</h3>



<p>After installation, the extension runs silently in the background and maintains persistence through scheduled activity. It regularly connects to a remote configuration hosted on GitHub, allowing attackers to change how it behaves without requiring any update from the user side.</p>



<p>When a user visits ChatGPT, the extension injects hidden scripts into the webpage. Instead of performing any ad-blocking function, it extracts the content of the page by removing styling and media elements while preserving the actual text of conversations.</p>



<p>This data is then compiled into a file and transmitted externally through a Discord webhook controlled by the attacker. The process is automated, meaning stolen conversations are continuously delivered without user awareness.</p>



<p>Investigators also observed suspicious activity linked to the developer account behind the extension. After years of inactivity, the account suddenly became active again, shifting focus toward JavaScript-based behavior. The same developer is connected to other AI-related services, raising broader concerns around data exposure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">What This Means for Users</h3>



<ul class="wp-block-list">
<li>Conversations on ChatGPT can be silently captured</li>



<li>Prompts, responses, and session data are exposed</li>



<li>Data is sent to external servers without visibility</li>



<li>Remote control allows attackers to modify behavior anytime</li>



<li>Associated services may carry similar risks</li>
</ul>



<p>This incident shows how easily malicious tools can blend into everyday usage. Even simple extensions can operate quietly in the background while collecting valuable data.</p>



<p>Being cautious with browser extensions, especially those linked to popular platforms, is essential. Trust should not be based on names or claims alone, but on verified sources and transparency.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-ad-blocker-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MS-Agent Flaw Allows Remote Hijacking of AI Agents</title>
		<link>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/</link>
					<comments>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 09:04:49 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIVulnerability]]></category>
		<category><![CDATA[#CommandInjection]]></category>
		<category><![CDATA[#CVE20262256]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MSAgent]]></category>
		<category><![CDATA[#PromptInjection]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11317</guid>

					<description><![CDATA[<p>A serious security issue has been found in the MS-Agent framework. The flaw, tracked as CVE-2026-2256, allows attackers</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/">MS-Agent Flaw Allows Remote Hijacking of AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious security issue has been found in the MS-Agent framework. The flaw, tracked as CVE-2026-2256, allows attackers to take control of AI agents and potentially the<a href="https://firsthackersnews.com/oneuptime-command-injection-vulnerability/"> entire system they run on</a>.</p>



<h2 class="wp-block-heading"><strong>What Is the Issue?</strong></h2>



<p>MS-Agent is a lightweight framework used to build autonomous AI agents. One of its built-in features is the Shell tool, which lets the agent run command-line instructions on the operating system.</p>



<p>While this makes the agent powerful, it also creates risk if commands are not properly checked before execution.</p>



<p>Vulnerability details:</p>



<ul class="wp-block-list">
<li>CVE ID: CVE-2026-2256</li>



<li>Type: Command Injection / Remote Code Execution (RCE)</li>



<li>Affected Software: ModelScope MS-Agent</li>



<li>Vulnerable Component: Shell tool (check_safe() method)</li>
</ul>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The problem comes from how MS-Agent validates input. It uses a method called check_safe() that blocks dangerous commands using a denylist.</p>



<p>A denylist only blocks known bad words or patterns. Attackers can bypass this using prompt injection. They hide malicious commands inside normal-looking content such as:</p>



<ul class="wp-block-list">
<li>Documents the AI is asked to summarize</li>



<li>Code the AI is asked to analyze</li>



<li>Text that appears harmless</li>
</ul>



<p>Because denylists can be tricked with alternate spelling, encoding, or different formats, harmful commands can pass through and get executed by the Shell tool.</p>



<h2 class="wp-block-heading"><strong>What Attackers Can Do</strong></h2>



<p>If exploited, attackers can execute operating system commands with the same permissions as the MS-Agent process.</p>



<p>This may allow them to:</p>



<ul class="wp-block-list">
<li>Modify or delete system files</li>



<li>Steal sensitive information</li>



<li>Install malware or backdoors</li>



<li>Use the compromised system to attack others</li>
</ul>



<p>In severe cases, this could result in full system <a href="https://firsthackersnews.com/oneuptime-command-injection-vulnerability/">compromise</a>.</p>



<h2 class="wp-block-heading">Mitigation Steps</h2>



<p>There is currently no official patch available. Organizations using MS-Agent should take immediate precautions:</p>



<ul class="wp-block-list">
<li>Deploy MS-Agent only in controlled environments</li>



<li>Avoid processing untrusted input</li>



<li>Run agents inside secure sandboxes</li>



<li>Apply least-privilege access controls</li>



<li>Replace denylist filtering with strict allowlist validation</li>
</ul>



<p>Until a patch is released, isolation and strong input validation are essential.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/">MS-Agent Flaw Allows Remote Hijacking of AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenClaw Exploit Compromises Developer AI Agents</title>
		<link>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/</link>
					<comments>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 06:19:11 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIAssistant]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#BruteForceAttack]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunit]]></category>
		<category><![CDATA[#LocalhostExploit]]></category>
		<category><![CDATA[#OpenClaw]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ShadowAI]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#WebSocketVulnerability]]></category>
		<category><![CDATA[#WorkstationSecurity]]></category>
		<category><![CDATA[#ZeroClickExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11289</guid>

					<description><![CDATA[<p>OpenClaw, a popular open-source AI assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenClaw, a popular<a href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/"> open-source AI</a> assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that allowed malicious websites to silently take control of developer AI agents.</p>



<p>The vulnerability required no clicks, no extensions, and no user interaction. Simply visiting a malicious website could trigger the attack.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours.</p>



<h3 class="wp-block-heading">How the Attack Worked</h3>



<p>When a developer visited an attacker-controlled website, malicious JavaScript executed in the browser. That script initiated a WebSocket connection directly to the local OpenClaw gateway.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Because the gateway exempted localhost connections from rate limiting, attackers could perform rapid brute-force password attempts — often hundreds per second — significantly increasing the likelihood of bypassing human-created passwords.</p>



<p>Once authentication was successful, the malicious script silently registered itself as a trusted device. This bypassed normal user confirmation prompts and granted persistent access.</p>



<p>From there, the attacker effectively controlled the AI agent and the connected environment.</p>



<h3 class="wp-block-heading">What Attackers Could Do</h3>



<p>With gateway-level access, attackers could:</p>



<ul class="wp-block-list">
<li>Send instructions to the AI agent and retrieve responses</li>



<li>Access configuration data, including AI providers and integrations</li>



<li>Enumerate connected nodes and internal IP addresses</li>



<li>Read logs for operational and reconnaissance insights</li>



<li>Search Slack or messaging history for API keys and credentials</li>



<li>Extract sensitive files from the workstation</li>



<li>Execute shell commands on connected systems</li>
</ul>



<p>In practical terms, this equated to a full workstation compromise.</p>



<p>This incident highlights a growing cybersecurity concern: shadow AI. Developer-adopted AI tools often operate outside traditional IT visibility while maintaining deep access to local systems, credentials, APIs, and internal communications.</p>



<p>Earlier this year, OpenClaw’s ecosystem also faced issues with malicious community “skills” distributed through its marketplace. However, this newly discovered vulnerability was more severe because it resided in the core gateway architecture itself — not in third-party plugins.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours. Users and organizations must immediately upgrade to version 2026.2.25 or later to mitigate risk.</p>



<p>Beyond patching, enterprises should implement stronger governance, monitoring, and security controls for AI-powered developer tools. </p>



<p>As AI agents gain deeper system access, their compromise no longer represents just an application breach — it represents full environment exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacker Manipulates Claude AI to Steal Government Data</title>
		<link>https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/</link>
					<comments>https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 10:33:13 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AgenticAI]]></category>
		<category><![CDATA[#AIExploitation]]></category>
		<category><![CDATA[#AIJailbreakCyberattack]]></category>
		<category><![CDATA[#AIMisuse]]></category>
		<category><![CDATA[#ClaudeAI]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#GovernmentDataBreach]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11252</guid>

					<description><![CDATA[<p>A hacker reportedly manipulated Anthropic’s Claude AI to assist in a coordinated cyberattack against Mexican government agencies, exposing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/">Hacker Manipulates Claude AI to Steal Government Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A hacker reportedly manipulated Anthropic’s Claude AI to assist in a coordinated cyberattack against Mexican government agencies, exposing how AI tools can be misused in real-world operations.</p>



<h2 class="wp-block-heading"><strong>How the AI Was Jailbroken</strong></h2>



<p>Between December 2025 and January 2026, the attacker used repeated Spanish-language prompts to bypass Claude’s safety controls. By presenting the requests as part of a “bug bounty simulation” and asking the AI to role-play as an elite hacker, the threat actor gradually overcame built-in restrictions.</p>



<p>Once guardrails were bypassed, the AI generated detailed technical outputs that supported the attack lifecycle.</p>



<p>The attacker leveraged AI to:</p>



<ul class="wp-block-list">
<li>Identify vulnerabilities in legacy government systems</li>



<li>Generate exploit code for SQL injection and network scanning</li>



<li>Assist with credential stuffing techniques</li>



<li>Provide structured, step-by-step attack guidance</li>
</ul>



<p>When Claude reached usage limits, the operator allegedly pivoted to another AI model to continue planning lateral movement and evasion strategies.</p>



<p>The campaign focused on outdated infrastructure and unpatched web applications. Approximately 20 vulnerabilities were exploited, leading to the theft of nearly 150GB of sensitive data, including taxpayer records, voter information, and government employee credentials.</p>



<p>Security researchers noted that the AI significantly lowered the technical barrier required to execute complex attacks, enabling a single operator to conduct a large-scale campaign without advanced infrastructure.</p>



<p>Anthropic has since banned the related accounts and enhanced monitoring mechanisms to detect misuse. While investigations continue, the incident highlights the growing risk of AI-assisted cybercrime and the urgent need for stronger patch management and AI interaction monitoring across government environments.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/">Hacker Manipulates Claude AI to Steal Government Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Tools Help Hacker Breach 600+ FortiGate Devices</title>
		<link>https://firsthackersnews.com/ai-driven-fortigate-attack-600-devices/</link>
					<comments>https://firsthackersnews.com/ai-driven-fortigate-attack-600-devices/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 18:19:58 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#ActiveDirectory]]></category>
		<category><![CDATA[#AIAttack]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FortiGate]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#RansomwareRisk]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11235</guid>

					<description><![CDATA[<p>A financially motivated threat actor used commercial generative AI tools to compromise more than 600 FortiGate devices across</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-fortigate-attack-600-devices/">AI Tools Help Hacker Breach 600+ FortiGate Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A financially motivated threat actor used commercial generative AI tools to compromise more than 600 FortiGate devices across 55 countries. According to Amazon Threat Intelligence, the activity took place between January 11 and February 18, 2026.</p>



<p>Importantly, the attacker did not exploit any new FortiGate vulnerability. Instead, they targeted devices with exposed management ports and weak single-factor credentials. Basic security gaps — combined with AI assistance — allowed a relatively low-skilled actor to operate at large scale.</p>



<p>Amazon assessed that the attacker relied heavily on AI for planning attacks, generating commands, writing custom tools, and organizing operations. When one AI tool failed, another was used as backup. Researchers described the setup as an “AI-powered assembly line” for cybercrime.</p>



<h2 class="wp-block-heading"><strong>How the Attacks Worked</strong></h2>



<p>The campaign focused on internet-exposed FortiGate management interfaces on common ports such as 443 and 8443. The attacker scanned for accessible devices and attempted logins using commonly reused credentials. Once inside, full device configurations were extracted, exposing credentials, network details, and VPN access.</p>



<p>After gaining VPN entry, the attacker moved deeper into networks. In several cases, Active Directory environments were compromised and credential databases were stolen. Backup systems were also targeted, suggesting possible ransomware preparation.</p>



<h3 class="wp-block-heading"><strong>Key Post-Compromise Activities</strong></h3>



<ul class="wp-block-list">
<li>Extracted FortiGate configuration files and credentials</li>



<li>Performed DCSync attacks to gain domain-level access</li>



<li>Used pass-the-hash and NTLM relay for lateral movement</li>



<li>Scanned networks with tools like Nuclei</li>



<li>Targeted Veeam backup servers and known vulnerabilities</li>



<li>Deployed AI-assisted custom reconnaissance tools</li>
</ul>



<p>Interestingly, when facing hardened environments with proper security controls, the attacker often abandoned the target and shifted to easier victims. This reinforces that the campaign relied on automation and scale rather than advanced exploitation skills.</p>



<p>The compromised organizations were spread across South Asia, Latin America, Northern Europe, West Africa, Southeast Asia, and the Caribbean.</p>



<h2 class="wp-block-heading"><strong>The Bigger Picture</strong></h2>



<p>This case highlights a growing trend: AI is lowering the barrier to entry for cybercrime. Tools that once required experienced teams can now be assembled and executed by smaller groups using AI support.</p>



<p>The lesson is clear. Organizations must close exposed management ports, enforce multi-factor authentication, rotate credentials, secure backup infrastructure, and maintain strong patch management.</p>



<p>As AI-assisted attacks increase, strong security fundamentals remain the best defense.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-fortigate-attack-600-devices/">AI Tools Help Hacker Breach 600+ FortiGate Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ai-driven-fortigate-attack-600-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</title>
		<link>https://firsthackersnews.com/google-blocks-malicious-apps-2025/</link>
					<comments>https://firsthackersnews.com/google-blocks-malicious-apps-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sat, 21 Feb 2026 06:13:24 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIinSecurity]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwarePrevention]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#PlayStore]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#SecurityNews]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11225</guid>

					<description><![CDATA[<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025. Over 80,000 developer accounts were also banned to prevent repeat abuse.</p>



<p>The company credits stronger, multi-layered protections and AI-powered reviews for discouraging attackers from targeting the Play Store in the first place.</p>



<p>Every app submitted to Google Play now goes through more than 10,000 automated and human safety checks before publication, followed by continuous monitoring after it goes live. Google has also added generative AI models to help reviewers detect complex malware, fraud schemes, hidden subscriptions, and misuse of user data.</p>



<h2 class="wp-block-heading"><strong>Privacy, Reviews, and Child Safety &#8211; Google malicious apps</strong></h2>



<p>Beyond blocking malicious apps, Google strengthened privacy and trust controls across the platform.</p>



<p><strong>Key highlights from 2025:</strong></p>



<ul class="wp-block-list">
<li>1.75+ million apps rejected for malware, fraud, hidden charges, or data misuse</li>



<li>80,000+ bad developer accounts banned</li>



<li>255,000 apps restricted from accessing excessive sensitive data</li>



<li>160 million fake or abusive ratings and reviews blocked</li>



<li>Extra protections added to prevent children from accessing high-risk apps</li>
</ul>



<p>Tools like Play Policy Insights and the Data Safety section help developers fix privacy issues before submission, reducing accidental violations.</p>



<h2 class="wp-block-heading"><strong>On-Device Protection with Play Protect</strong></h2>



<p>Security doesn’t stop at the Play Store. Google Play Protect now scans over 350 billion apps daily, including sideloaded apps installed outside the store.</p>



<p><strong>In 2025:</strong></p>



<ul class="wp-block-list">
<li>27 million new malicious sideloaded apps detected</li>



<li>Expanded fraud protection to 185 markets (2.8+ billion devices)</li>



<li>266 million risky installation attempts blocked</li>



<li>872,000 high-risk scam apps stopped</li>



<li>New in-call scam protection prevents users from disabling Play Protect during social-engineering attacks</li>
</ul>



<h2 class="wp-block-heading"><strong>How Google Strengthened Play Store Security in 2025</strong></h2>



<p>Developers made over 20 billion daily integrity checks using the Play Integrity API to protect apps from abuse and spoofing. Hardware-backed security signals and improved account verification are also being expanded, including limited distribution accounts for students and hobbyists.</p>



<p>Looking ahead, Google plans deeper AI integration, stricter verification, and new Android 16 protections such as built-in defenses against tapjacking.</p>



<p>Together, these measures show Google’s broader strategy: block malicious apps at scale, reduce fraud and privacy abuse, and strengthen trust across the Android ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/google-blocks-malicious-apps-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PromptSpy: Android Malware Uses Google Gemini AI</title>
		<link>https://firsthackersnews.com/promptspy/</link>
					<comments>https://firsthackersnews.com/promptspy/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 05:54:19 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AccessibilityAbuse]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalForensics]]></category>
		<category><![CDATA[#EmergingThreats]]></category>
		<category><![CDATA[#GeminiAI]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#MobileThreats]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#PlayProtect]]></category>
		<category><![CDATA[#PromptSpy]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#RemoteAccessTrojan]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VNC]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11210</guid>

					<description><![CDATA[<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions on infected devices.</p>



<p>Instead of using fixed screen coordinates or simple automation rules, PromptSpy sends Gemini a natural-language request along with an XML snapshot of the current screen. This snapshot includes details about visible elements such as text, type, and screen position.</p>



<p>Gemini analyzes the screen content and responds with JSON instructions telling the malware what action to perform — such as tap, long-press, or swipe — and exactly where to do it.</p>



<p>The main goal is persistence. PromptSpy uses this AI-driven method to keep its malicious app pinned in the Recent Apps list, even when the user tries to close it.</p>



<p>The malware runs in a loop. It executes Gemini’s instructions using Android’s Accessibility Service, captures the updated screen, and sends it back to Gemini. This continues until the AI confirms the app is successfully pinned. Because it relies on AI analysis instead of hardcoded rules, it works across different devices, Android versions, and manufacturer customizations.</p>



<p>Security researchers at ESET describe PromptSpy as the first known Android malware to directly integrate generative AI into its execution flow. The focus is stealthy persistence and maintaining control over the device.</p>



<h3 class="wp-block-heading">Android AI Malware Capabilities</h3>



<p>Beyond AI-based persistence, PromptSpy also acts as a powerful remote access tool.</p>



<p>It includes a built-in VNC component that allows attackers to control the infected phone in real time. Once the victim grants Accessibility permissions, attackers can:</p>



<ul class="wp-block-list">
<li>View the device screen live</li>



<li>Simulate taps and gestures</li>



<li>Perform actions as if physically holding the phone</li>
</ul>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1024" height="768" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png" alt="" class="wp-image-11211" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-200x150.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-300x225.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-400x300.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-600x450.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-768x576.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-800x600.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Android/Phishing.Agent.M UI showing the same fake site as the PromptSpy dropper (Source: ESET).</figcaption></figure>



<p>The malware can capture lockscreen credentials, gather device information, take screenshots, record screen activity as video, and monitor which app is currently in use.</p>



<p>It communicates with a hardcoded command-and-control server using the VNC protocol, protected by AES encryption. The server can also send a Gemini API key and additional task instructions to the malware.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="968" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png" alt="" class="wp-image-11212" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-200x212.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-284x300.png 284w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-400x423.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-600x635.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-768x813.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-800x846.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png 968w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1200x1270.png 1200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1452x1536.png 1452w" sizes="(max-width: 968px) 100vw, 968px" /><figcaption class="wp-element-caption">Malware screen prompting installation of the PromptSpy payload (Source: ESET).<br></figcaption></figure>



<p>PromptSpy also actively blocks removal attempts. It abuses Accessibility permissions to place invisible overlays on important system buttons, including those used to uninstall the app or disable its privileges.</p>



<p>These transparent overlays intercept user taps on “Uninstall” or “Stop,” preventing normal removal.</p>



<p>Technical analysis shows that PromptSpy is delivered through a dropper app. The malicious payload (app-release.apk) is embedded inside the dropper’s assets directory.</p>



<h2 class="wp-block-heading"><strong>Campaign Spread and Target Regions</strong></h2>



<p>ESET connects PromptSpy to a multi-stage, financially driven campaign mainly targeting users in Argentina.</p>



<p>An earlier variant, VNCSpy, was uploaded from Hong Kong in January 2026. More advanced PromptSpy samples appeared from Argentina in February 2026.</p>



<p>The malware spread through domains such as mgardownload[.]com and m-mgarg[.]com, which imitated JPMorgan Chase branding under the name “MorganArg” using Spanish banking lures.</p>



<p>Analysis of the same infrastructure revealed another Android phishing trojan signed with the same certificate and using the same fake banking site, likely acting as the initial infection stage before deploying PromptSpy.</p>



<p>Although PromptSpy has not appeared widely in ESET telemetry and may still be in limited testing, the active domains confirm some real-world use.</p>



<p>Code findings, including simplified Chinese debug strings and references to Chinese Accessibility events, suggest development in a Chinese-speaking environment, even though current targets are in Latin America.</p>



<p>PromptSpy is not available on Google Play, and Google Play Protect now detects known variants.</p>



<p>This campaign follows ESET’s 2025 discovery of PromptLock, an AI-powered ransomware prototype, highlighting the growing use of generative AI in malware operations.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>SHA-1</strong></th><th><strong>Filename</strong></th><th><strong>Detection</strong></th><th><strong>Description</strong></th></tr></thead><tbody><tr><td>6BBC9AB132BA066F63676E05DA13D108598BC29B</td><td>net.ustexas.myavlive.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>375D7423E63C8F5F2CC814E8CFE697BA25168AFA</td><td>nlll4.un7o6.q38l5.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>3978AC5CD14E357320E127D6C87F10CB70A1DCC2</td><td>ppyzz.dpk0p.ln441.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>E60D12017D2DA579DF87368F5596A0244621AE86</td><td>mgappc-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>9B1723284E311794987997CB7E8814EB6014713F</td><td>mgappm-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>076801BD9C6EB78FC0331A4C7A22C73199CC3824</td><td>mgappn-0.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>8364730E9BB2CF3A4B016DE1B34F38341C0EE2FA</td><td>mgappn-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>F8F4C5BC498BCCE907DC975DD88BE8D594629909</td><td>app-release.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy.</td></tr><tr><td>C14E9B062ED28115EDE096788F62B47A6ED841AC</td><td>mgapp.apk</td><td>Android/Phishing.Agent.M</td><td>Android phishing malware.</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/promptspy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer</title>
		<link>https://firsthackersnews.com/chatgpt-grok-google-ads-macos-amos-stealer/</link>
					<comments>https://firsthackersnews.com/chatgpt-grok-google-ads-macos-amos-stealer/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 10:40:19 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[MacOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AMOSStealer]]></category>
		<category><![CDATA[#AtomicStealer]]></category>
		<category><![CDATA[#ChatGPT]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#GoogleAds]]></category>
		<category><![CDATA[#GrokAI]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#macOS]]></category>
		<category><![CDATA[#MacSecurity]]></category>
		<category><![CDATA[#MalwareCampaign]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11156</guid>

					<description><![CDATA[<p>Threat actors are evolving — and they’re doing it on trusted platforms. A recent campaign shows attackers abusing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-grok-google-ads-macos-amos-stealer/">Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Threat actors are evolving — and they’re doing it on trusted platforms.</p>



<p>A recent campaign shows attackers abusing shareable ChatGPT and Grok conversations, then promoting those links through Google Search ads. The goal? Convince macOS users to run Terminal commands that quietly install the Atomic macOS Stealer (AMOS).</p>



<p>This isn’t traditional malware distribution. It’s credibility-based delivery.</p>



<h2 class="wp-block-heading">The Shift: Malware Hidden Behind Trust</h2>



<p>Instead of hosting malware on suspicious domains, attackers are:</p>



<ul class="wp-block-list">
<li>Publishing malicious “how-to” conversations on legitimate AI platforms</li>



<li>Boosting those pages using Google Ads</li>



<li>Framing the instructions as helpful troubleshooting steps</li>
</ul>



<p>For example, a user searching for something harmless like “clear disk space on macOS” may encounter a sponsored AI chat result. The page looks legitimate. The domain is trusted. The instructions appear technical and helpful.</p>



<p>But the recommended Terminal command downloads and executes malicious code.</p>



<p>No fake installer.<br>No cracked software.<br>Just copy, paste, and compromise.</p>



<p>The malicious instructions are hosted on legitimate AI domains via public sharing links. That removes the psychological red flag users often rely on.</p>



<p>Paid ads further amplify visibility, placing these AI-hosted pages at the top of search results — sometimes ahead of legitimate support content.</p>



<p>This is social engineering layered with platform trust.</p>



<h2 class="wp-block-heading">The Target: Cryptocurrency and Browser Data</h2>



<p>macOS infostealers like AMOS are part of a growing underground economy. Their primary targets include:</p>



<ul class="wp-block-list">
<li>Saved browser credentials</li>



<li>Apple Keychain secrets</li>



<li>Cryptocurrency wallets and seed phrases</li>



<li>Chrome crypto extensions (over 100 reported targets)</li>



<li>Wallet-themed phishing tied to brands like Ledger, Trezor, and Exodus</li>
</ul>



<p>Some operators even advertise affiliate-style revenue sharing for crypto theft, highlighting how organized this ecosystem has become</p>



<h2 class="wp-block-heading"><strong>What defenders should watch for</strong></h2>



<ul class="wp-block-list">
<li>Users copying Terminal commands from web pages</li>



<li>Scripts that download and execute immediately</li>



<li>Signed apps requesting unexpected permissions</li>



<li>Unusual outbound traffic to crypto-related infrastructure</li>
</ul>



<p>The bigger pattern is clear.</p>



<p>Modern macOS attacks don’t rely on obvious red flags anymore.</p>



<p>They rely on trusted platforms, legitimate domains, paid visibility, and signed applications to remove the moment where a user might hesitate.</p>



<p>That’s the shift defenders need to understand.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-grok-google-ads-macos-amos-stealer/">Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-grok-google-ads-macos-amos-stealer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Next Generation of Malware: AI-Enabled and Adaptive Threats </title>
		<link>https://firsthackersnews.com/promptflux-and-quietvault/</link>
					<comments>https://firsthackersnews.com/promptflux-and-quietvault/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 14:37:29 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[PROMPTFLUX]]></category>
		<category><![CDATA[QuietVault]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11117</guid>

					<description><![CDATA[<p>Recent research from Google’s Threat Intelligence Group reveals that adversaries are now building malware that&#160;actively&#160;leverages&#160;artificial intelligence (AI)&#160;during execution,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptflux-and-quietvault/">The Next Generation of Malware: AI-Enabled and Adaptive Threats </a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recent research from Google’s Threat Intelligence Group reveals that adversaries are now building malware that&nbsp;<em>actively&nbsp;leverages&nbsp;artificial intelligence (AI)</em>&nbsp;<strong>during execution</strong>, not just during development or planning. This is a major evolution: malicious code is now capable of adapting itself dynamically at runtime, making it harder to detect and prevent using traditional defenses.&nbsp;</p>



<p>Two of the most notable families&nbsp;identified&nbsp;are&nbsp;<strong>PromptFlux</strong>&nbsp;and&nbsp;<strong>QuietVault</strong>. These samples highlight how attackers are moving beyond static malware into&nbsp;<em>self-modifying</em>&nbsp;and&nbsp;<em>AI-assisted</em>&nbsp;malware — a trend that has serious implications for defenders.&nbsp;</p>



<h2 class="wp-block-heading"><strong>1.&nbsp;PromptFlux&nbsp;— Self-Modifying AI Malware</strong>&nbsp;</h2>



<p><strong>PromptFlux</strong>&nbsp;represents&nbsp;one of the earliest examples of malware that uses an AI model to update&nbsp;<em>its own code on the fly</em>:&nbsp;</p>



<p><strong>What It Is</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>A VBScript-based dropper that uses API calls to large language models like&nbsp;<strong>Google Gemini</strong>&nbsp;to generate obfuscated VBScript code.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>It rewrites itself dynamically, effectively evading static signature detection and making each variant slightly unique.&nbsp;</li>
</ul>



<p><strong>How It Works</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>PromptFlux&nbsp;includes a&nbsp;component&nbsp;known as the&nbsp;<strong>“Thinking Robot.”</strong>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>This module sends prompts to the AI model asking it to produce obfuscated code that performs the same malicious function but looks different.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The malware then writes this regenerated code to the system and uses it for its operations.&nbsp;</li>
</ul>



<p><strong>Persistence and Spread</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>The regenerated code is saved to locations such as the Windows&nbsp;<strong>Startup folder</strong>&nbsp;to ensure it runs after a reboot.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>It also&nbsp;attempts&nbsp;to copy itself to removable drives (USB) and network shares to spread to other systems.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Why&nbsp;It’s&nbsp;Dangerous</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Each run can generate a new variant that signature-based antivirus tools&nbsp;won’t&nbsp;recognize.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>This makes it significantly harder for traditional detection methods to keep up.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>2.&nbsp;QuietVault&nbsp;— AI-Assisted Credential Stealer</strong>&nbsp;</h2>



<p><strong>QuietVault</strong>&nbsp;uses AI in&nbsp;a different way&nbsp;— to enhance credential harvesting and token theft.&nbsp;</p>



<p><strong>What It Is</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>A JavaScript-based malware designed to steal credentials — especially&nbsp;<strong>GitHub tokens, NPM authentication tokens, and cloud service secrets</strong>.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Instead of relying on static routines, it uses available AI tools on the host system (CLI-based AI tools) to expand its search.&nbsp;</li>
</ul>



<p><strong>How It Uses AI</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>QuietVault&nbsp;formulates AI prompts that instruct the local AI model to help it search for&nbsp;additional&nbsp;sensitive data on the compromised system.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>This means the malware is not limited to predefined searches — it can&nbsp;adjust&nbsp;what&nbsp;it’s&nbsp;looking for based on the system context.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4e4.png" alt="📤" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Data Exfiltration</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Once credentials are collected, they are exfiltrated to attacker-controlled locations, such as&nbsp;<strong>public GitHub repositories</strong>, making tracking more difficult.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>Additional Emerging AI-Involved Malware</strong>&nbsp;</h2>



<p>Beyond these two families, researchers have&nbsp;identified&nbsp;other proofs-of-concept that illustrate similar trends:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>PromptSteal</strong>&nbsp;— Uses AI models to generate advanced reconnaissance commands.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>FruitShell</strong>&nbsp;— A reverse shell that blends malicious traffic with legitimate system processes.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>PromptLock</strong>&nbsp;— A&nbsp;concept&nbsp;ransomware that uses AI to customize encryption logic. (Still experimental&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>Why AI-Based Malware Matters</strong>&nbsp;</h2>



<p>These malware families highlight a new era of threats:&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Evasion Through Adaptation</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Malware that rewrites itself at runtime can avoid static detection and slow down security responses.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Dynamic&nbsp;Behavior</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Instead of fixed routines, AI-assisted malware can change structure, payloads, or behavior based on system context or attacker goals.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Automation of Complex Tasks</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>AI enables attackers to automate parts of malware development and execution that previously required manual scripting, reducing operational effort.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Increased Detection Challenges</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Traditional indicators of compromise (IOCs), such as file hashes or static code signatures, become less reliable.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Behavioral and AI-aware detection methods&nbsp;become&nbsp;essential.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>How Defenders Must Respond</strong>&nbsp;</h2>



<p>To defend against these evolving threats, organizations need to rethink detection and response:&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f538.png" alt="🔸" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Behavioral Monitoring</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Look for unusual script activity, unexpected API calls, and dynamic code execution.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Watch for frequent code rewrites or execution patterns that change at runtime.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f538.png" alt="🔸" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Memory-Based Detection</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Since these threats often avoid writing files to disk, detection must include memory behavior analysis.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f538.png" alt="🔸" class="wp-smiley" style="height: 1em; max-height: 1em;" /> AI-Aware Defense</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Security tools should incorporate AI-aware heuristics capable of understanding anomalous AI model queries or usage patterns within a host.&nbsp;</li>
</ul>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f538.png" alt="🔸" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Threat Intelligence</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Organizations must stay current with emerging malware families and indicators published by reputable sources such as Google, Microsoft, and CERTs.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>How 𝗶𝟲 Helps Organizations Defend Against AI-Driven Malware</strong>&nbsp;</h2>



<p>Threats like&nbsp;<strong>PromptFlux</strong>&nbsp;and&nbsp;<strong>QuietVault</strong>&nbsp;show that attackers are no longer relying on static malware. They are using AI, scripting, memory execution, and legitimate system tools to stay hidden. This means traditional defenses alone are not enough.&nbsp;</p>



<p><strong>𝗶𝟲</strong>&nbsp;helps organizations prepare for this new generation of threats through:&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f50d.png" alt="🔍" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Advanced Threat Detection</strong>&nbsp;<br>Behavior-based monitoring to&nbsp;identify&nbsp;suspicious scripting, abnormal process behavior, and in-memory execution that signature tools may miss.&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Threat Hunting &amp; Intelligence</strong>&nbsp;<br>Proactive hunting for stealth techniques such as&nbsp;LOLBin&nbsp;abuse, dynamic code execution, and unusual AI or scripting activity within enterprise environments.&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Endpoint &amp; Network Security Hardening</strong>&nbsp;<br>Strengthening system configurations, reducing attack surfaces, and implementing controls that limit misuse of built-in tools and scripts.&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4ca.png" alt="📊" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Incident Response Readiness</strong>&nbsp;<br>Rapid investigation and containment support when advanced malware activity is suspected, minimizing impact and dwell time.&nbsp;</p>



<p><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f510.png" alt="🔐" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Security Strategy for Emerging Threats</strong>&nbsp;<br>Helping organizations adapt their defenses to modern risks — including AI-assisted malware, fileless attacks, and modular backdoors.&nbsp;</p>



<p>As malware becomes smarter and more adaptive, defense must become smarter too.&nbsp;</p>



<p>&nbsp;<br><strong>𝗶𝟲 focuses on visibility, behavior, and resilience — the key pillars for stopping modern, stealth-driven attacks.</strong>&nbsp;</p>



<h2 class="wp-block-heading"><strong>Final Thought</strong>&nbsp;</h2>



<p>The discovery of&nbsp;<strong>PromptFlux</strong>&nbsp;and&nbsp;<strong>QuietVault</strong>&nbsp;represents&nbsp;a&nbsp;<strong>paradigm shift</strong>&nbsp;in malware development. What was once theoretical — malware that uses AI&nbsp;<em>during execution</em>&nbsp;— is now real.&nbsp;</p>



<p>This is not a distant future threat. It’s here. And it challenges defenders to move beyond static detection toward adaptive, behavior-centric security models. </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptflux-and-quietvault/">The Next Generation of Malware: AI-Enabled and Adaptive Threats </a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/promptflux-and-quietvault/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI-Driven Phishing Kit Targets Microsoft Accounts</title>
		<link>https://firsthackersnews.com/ai-driven-phishing-kit/</link>
					<comments>https://firsthackersnews.com/ai-driven-phishing-kit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 30 Dec 2025 07:03:04 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email servers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[account takeover]]></category>
		<category><![CDATA[ai phishing]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[microsoft security]]></category>
		<category><![CDATA[outlook phishing]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing Kit]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10878</guid>

					<description><![CDATA[<p>Since March 2025, attackers running a Spanish-language phishing campaign have been going after Microsoft Outlook accounts. The phishing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-phishing-kit/">AI-Driven Phishing Kit Targets Microsoft Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Since March 2025, attackers running a Spanish-language phishing campaign have been going after Microsoft Outlook accounts. The phishing tool they use appears advanced and likely built with help from AI.</p>



<h2 class="wp-block-heading"><strong>AI-Driven Phishing Kit </strong></h2>



<p>Researchers track the activity using a small but unusual clue: four mushroom emojis hidden inside the text “OUTL.” So far, this marker has been linked to more than 75 separate attack setups.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1020" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1020x1024.png" alt="" class="wp-image-10879" srcset="https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-66x66.png 66w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-150x150.png 150w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-200x201.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-300x300.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-400x402.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-600x602.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-768x771.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-800x803.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1020x1024.png 1020w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12-1200x1205.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/12/image-12.png 1280w" sizes="(max-width: 1020px) 100vw, 1020px" /><figcaption class="wp-element-caption"><em>Source – The Sage Hollow</em></figcaption></figure>



<p>The attackers collect stolen email usernames and passwords, along with the victim’s IP address and location. This information is then sent to the attackers using Telegram and Discord.</p>



<p>To trick users, the phishing page copies the Outlook login screen and displays prompts in Spanish, making it look legitimate to victims.</p>



<p>After a victim enters their login details, the phishing tool quickly adds extra context to the stolen data. It checks the user’s IP address using api.ipify.org and pulls location details from ipapi.co.</p>



<p>This data collection happens instantly, before the stolen credentials are sent to the attackers.</p>



<p>The campaign shows careful planning. Even though the attackers change how the code is hidden, the way the operation runs stays mostly the same.</p>



<p>Sage Hollow researchers first spotted the activity by noticing the repeated mushroom emoji marker, which helped them trace more related attacks.</p>



<p>Over time, the phishing kit has appeared in multiple versions. Some use heavy obfuscation and anti-analysis tricks, while others are left completely open and resemble AI-generated code. The latest version, <strong>disBLOCK.js</strong>, uses clean formatting, clear function names, and Spanish comments explaining each step — signs that the code was likely generated with AI rather than written fully by hand.</p>



<h2 class="wp-block-heading"><strong>How the Phishing Kit Works</strong></h2>



<p>The phishing tool is designed with separate pieces, keeping its settings away from the main logic. In earlier versions, a file called <em>xjsx.js</em> was used to store Telegram bot details with only basic hiding techniques.</p>



<p>When someone enters their login details on the fake page, the tool runs through a set process. It checks whether the email address is valid, then reaches out to external services to collect IP and location information.</p>



<p>All stolen data is bundled into a standard message format and sent over regular HTTPS connections. The attackers use either Telegram bots or Discord webhooks to receive this information.</p>



<p>Newer samples rely more on Discord webhooks because they work as one-way channels. Even if the link is discovered, past data cannot be viewed.</p>



<p>This setup points to a shared phishing platform, where multiple attackers reuse the same toolkit across different campaigns.</p>



<h2 class="wp-block-heading"><strong>Security Recommendations</strong></h2>



<ul class="wp-block-list">
<li>Organizations should enable phishing-resistant MFA on Microsoft accounts to reduce the impact of stolen passwords.</li>



<li>Email gateways should be tuned to detect look-alike Outlook login pages and block messages that redirect users to external authentication sites.</li>



<li>Security teams should monitor outbound traffic for suspicious connections to Telegram bot APIs and Discord webhooks, especially from user workstations.</li>



<li>User awareness remains critical. Employees should be reminded to verify login pages and avoid entering credentials through email links.</li>



<li>Incident response teams should reset affected credentials immediately and review sign-in logs for abnormal locations and IP addresses.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ai-driven-phishing-kit/">AI-Driven Phishing Kit Targets Microsoft Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ai-driven-phishing-kit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
