Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

AMOS and Amatera disguised as AI agents | Kaspersky official blog

0
Medium
Vulnerability
Published: Thu Mar 12 2026 (03/12/2026, 15:56:27 UTC)
Source: Kaspersky Security Blog

Description

Threat actors are advertising pages featuring malicious instructions for installing AI agents like Claude Code, Doubao, and OpenClaw.

AI-Powered Analysis

AILast updated: 03/12/2026, 20:59:21 UTC

Technical Analysis

This threat involves malicious campaigns where threat actors advertise fake AI agents—Claude Code, Doubao, and OpenClaw—via Google Search ads to lure users into installing infostealer malware. When users search for these AI tools, sponsored ads lead them to counterfeit documentation pages that closely mimic legitimate installation guides. These pages are hosted on reputable platforms like Squarespace, helping them evade anti-phishing detection. The installation instructions prompt users to execute commands that deploy malware instead of genuine AI software. On macOS, the malware deployed is AMOS, a spyware infostealer previously documented by Kaspersky, which steals sensitive data. On Windows, the Amatera infostealer is installed using the mshta.exe utility, harvesting browser data, cryptocurrency wallet information, and user folder contents, then exfiltrating it to a remote server. This attack exploits the rising popularity of AI assistants and workflow automation tools in corporate environments, especially targeting employees who seek unauthorized access to these tools outside official channels. The campaign is a variant of the ClickFix/InstallFix attack pattern, using social engineering and trusted infrastructure to bypass security controls. Although no known exploits are currently widespread, the threat poses a medium severity risk due to its potential to compromise corporate secrets and user credentials. Mitigation requires a combination of user awareness training, endpoint security solutions, and policies restricting unauthorized AI tool usage.

Potential Impact

The impact of this threat is significant for organizations globally, particularly those with employees who actively seek AI assistants and workflow automation tools independently. Successful exploitation results in the installation of infostealer malware that compromises confidentiality by harvesting browser credentials, cryptocurrency wallets, and sensitive corporate files. This can lead to data breaches, intellectual property theft, financial losses, and reputational damage. The integrity of corporate projects may be undermined if source code or proprietary information is exfiltrated. Availability is less directly affected, but the presence of malware can degrade system performance and increase incident response costs. The attack leverages social engineering and trusted platforms, increasing the likelihood of successful infection. Organizations with lax controls on software installation or insufficient employee training are at higher risk. The threat also highlights risks associated with shadow IT and unauthorized use of AI tools, which can create new attack vectors. Although no active widespread exploitation is reported, the evolving nature of these campaigns suggests a growing threat landscape.

Mitigation Recommendations

1. Implement comprehensive security awareness training focused on the risks of downloading and installing unauthorized AI tools, emphasizing the dangers of following instructions from unverified sources or ads. 2. Enforce strict application whitelisting and endpoint protection policies that prevent execution of unauthorized scripts or commands, especially those involving curl or mshta.exe utilities. 3. Monitor and restrict employee access to AI assistants and workflow automation tools, providing approved alternatives and official channels to reduce shadow IT usage. 4. Deploy advanced threat detection solutions capable of identifying infostealer behaviors, such as unusual data exfiltration or suspicious command execution patterns. 5. Regularly audit and monitor network traffic for connections to known malicious IP addresses, such as the one used by Amatera (144.124.235.102). 6. Use multi-factor authentication and strong credential management to limit the impact of stolen browser and crypto-wallet data. 7. Collaborate with security vendors to stay updated on emerging threats related to AI tool exploitation and incorporate threat intelligence into security operations. 8. Educate employees on verifying URLs and recognizing legitimate documentation sites, especially when searching for new software tools. 9. Consider deploying browser security extensions or DNS filtering to block access to known malicious domains or phishing sites. 10. Establish incident response procedures specifically addressing malware infections originating from social engineering campaigns involving AI tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/fake-ai-agents-infostealers/55412/","fetched":true,"fetchedAt":"2026-03-12T20:59:04.642Z","wordCount":1083}

Threat ID: 69b329192f860ef943f5f8c5

Added to database: 3/12/2026, 8:59:05 PM

Last enriched: 3/12/2026, 8:59:21 PM

Last updated: 3/14/2026, 12:29:21 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses