Syncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
Attackers are building fake websites with Lovable and using these to distribute a trojanized version of the Syncro remote access tool (RAT).
AI Analysis
Technical Summary
This threat involves a malicious campaign where attackers create trojanized versions of the legitimate Syncro remote access tool (RAT) and distribute them via AI-generated fake websites built using the Lovable web builder service. The attackers exploit AI to rapidly produce convincing fake sites that mimic popular applications, including antivirus and password managers, often employing scareware tactics to coerce users into downloading the malicious payload. The fake websites use domain names closely resembling legitimate ones, often following the pattern {popular app name} + desktop.com, making them appear credible in search engine results. The campaign also uses phishing emails with links to these fake sites, targeting users with messages related to cryptocurrency token migrations or security warnings. Once the victim downloads and runs the trojanized Syncro installer, which runs mostly in the background, the attacker gains full remote access to the victim's device via a hardcoded CUSTOMER_ID in the Syncro build. This allows attackers to perform screen sharing, remote command execution, file transfers, registry editing, and other administrative actions. The primary motive appears to be theft of cryptocurrency wallet keys and unauthorized fund transfers. Detection is challenging because Syncro is a legitimate tool, and antivirus solutions may classify it as 'Not-a-virus' to avoid false positives. Kaspersky detects these malicious builds heuristically as HEUR:Backdoor.OLE2.RA-Based.gen. The campaign's use of AI to mass-produce fake sites increases its scale and efficiency, posing a significant risk to users, especially those involved in crypto activities. The attack vector relies on user interaction (downloading and running the installer) and social engineering via phishing and scareware tactics.
Potential Impact
European organizations and users, particularly those involved in cryptocurrency trading, DeFi, and digital asset management, face significant risks from this campaign. The trojanized Syncro RAT grants attackers full remote control over infected systems, enabling data theft, credential harvesting, and financial fraud. The use of legitimate remote administration software complicates detection and response, increasing dwell time and potential damage. Organizations with employees who handle crypto wallets or sensitive financial data are at heightened risk of direct financial losses. Additionally, managed service providers (MSPs) and IT support teams using Syncro legitimately could be targeted or impersonated, leading to supply chain risks. The campaign's reliance on phishing and search engine manipulation means that even well-protected organizations could be vulnerable if end users are not adequately trained. The medium severity reflects the combination of social engineering, legitimate tool abuse, and potential for significant financial impact, especially in European countries with high crypto adoption and digital service usage.
Mitigation Recommendations
1. Implement strict policies to prevent downloading and installation of software from untrusted or unofficial sources, especially on devices handling financial or crypto-related applications. 2. Educate users to carefully verify URLs, looking for subtle differences in domain names and website design, and to be wary of unsolicited emails urging urgent action or software downloads. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of heuristic detection of suspicious remote access tools and unusual network activity. 4. Configure antivirus and anti-phishing tools to alert on 'Not-a-virus' detections related to remote access tools and investigate promptly. 5. Use multi-factor authentication (MFA) and hardware wallets for cryptocurrency management to reduce the impact of credential theft. 6. Monitor network traffic for unusual outbound connections from endpoints to detect potential RAT command and control communications. 7. Regularly audit and restrict the use of legitimate remote administration tools within the organization, ensuring only authorized builds and configurations are used. 8. Collaborate with threat intelligence providers to stay updated on emerging phishing campaigns and fake website domains related to this threat. 9. Consider deploying browser security solutions that can detect and block access to known malicious or suspicious domains generated by AI tools. 10. For MSPs and IT support teams, verify the integrity and source of remote access tools and educate clients about this threat vector.
Affected Countries
Germany, United Kingdom, France, Netherlands, Belgium, Switzerland, Italy, Spain, Poland
Syncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
Description
Attackers are building fake websites with Lovable and using these to distribute a trojanized version of the Syncro remote access tool (RAT).
AI-Powered Analysis
Technical Analysis
This threat involves a malicious campaign where attackers create trojanized versions of the legitimate Syncro remote access tool (RAT) and distribute them via AI-generated fake websites built using the Lovable web builder service. The attackers exploit AI to rapidly produce convincing fake sites that mimic popular applications, including antivirus and password managers, often employing scareware tactics to coerce users into downloading the malicious payload. The fake websites use domain names closely resembling legitimate ones, often following the pattern {popular app name} + desktop.com, making them appear credible in search engine results. The campaign also uses phishing emails with links to these fake sites, targeting users with messages related to cryptocurrency token migrations or security warnings. Once the victim downloads and runs the trojanized Syncro installer, which runs mostly in the background, the attacker gains full remote access to the victim's device via a hardcoded CUSTOMER_ID in the Syncro build. This allows attackers to perform screen sharing, remote command execution, file transfers, registry editing, and other administrative actions. The primary motive appears to be theft of cryptocurrency wallet keys and unauthorized fund transfers. Detection is challenging because Syncro is a legitimate tool, and antivirus solutions may classify it as 'Not-a-virus' to avoid false positives. Kaspersky detects these malicious builds heuristically as HEUR:Backdoor.OLE2.RA-Based.gen. The campaign's use of AI to mass-produce fake sites increases its scale and efficiency, posing a significant risk to users, especially those involved in crypto activities. The attack vector relies on user interaction (downloading and running the installer) and social engineering via phishing and scareware tactics.
Potential Impact
European organizations and users, particularly those involved in cryptocurrency trading, DeFi, and digital asset management, face significant risks from this campaign. The trojanized Syncro RAT grants attackers full remote control over infected systems, enabling data theft, credential harvesting, and financial fraud. The use of legitimate remote administration software complicates detection and response, increasing dwell time and potential damage. Organizations with employees who handle crypto wallets or sensitive financial data are at heightened risk of direct financial losses. Additionally, managed service providers (MSPs) and IT support teams using Syncro legitimately could be targeted or impersonated, leading to supply chain risks. The campaign's reliance on phishing and search engine manipulation means that even well-protected organizations could be vulnerable if end users are not adequately trained. The medium severity reflects the combination of social engineering, legitimate tool abuse, and potential for significant financial impact, especially in European countries with high crypto adoption and digital service usage.
Mitigation Recommendations
1. Implement strict policies to prevent downloading and installation of software from untrusted or unofficial sources, especially on devices handling financial or crypto-related applications. 2. Educate users to carefully verify URLs, looking for subtle differences in domain names and website design, and to be wary of unsolicited emails urging urgent action or software downloads. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of heuristic detection of suspicious remote access tools and unusual network activity. 4. Configure antivirus and anti-phishing tools to alert on 'Not-a-virus' detections related to remote access tools and investigate promptly. 5. Use multi-factor authentication (MFA) and hardware wallets for cryptocurrency management to reduce the impact of credential theft. 6. Monitor network traffic for unusual outbound connections from endpoints to detect potential RAT command and control communications. 7. Regularly audit and restrict the use of legitimate remote administration tools within the organization, ensuring only authorized builds and configurations are used. 8. Collaborate with threat intelligence providers to stay updated on emerging phishing campaigns and fake website domains related to this threat. 9. Consider deploying browser security solutions that can detect and block access to known malicious or suspicious domains generated by AI tools. 10. For MSPs and IT support teams, verify the integrity and source of remote access tools and educate clients about this threat vector.
Affected Countries
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/syncro-remote-admin-tool-on-ai-generated-fake-websites/54808/","fetched":true,"fetchedAt":"2025-11-21T17:12:57.371Z","wordCount":1678}
Threat ID: 69209d99d229a3709c4237c4
Added to database: 11/21/2025, 5:12:57 PM
Last enriched: 12/6/2025, 4:44:46 AM
Last updated: 1/7/2026, 5:24:07 AM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-06
MediumUnpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
LowTwo Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
LowCritical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers
CriticalFake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.