Skip to main content

Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators

Medium
Published: Wed May 28 2025 (05/28/2025, 17:57:41 UTC)
Source: AlienVault OTX General

Description

A hacking group with alleged ties to Vietnam has been exploiting social media ads promoting AI video generators to distribute malware since mid-2024. The campaign, discovered by Mandiant, uses fake websites mimicking legitimate AI tools to deploy payloads including Python-based infostealers and backdoors. The group, tracked as UNC6032, has reached millions of users through Facebook and LinkedIn ads, primarily targeting EU countries and the US. The malware distributed includes STARKVEIL, XWORM, FROSTRIFT, and GRIMPULL, designed for information theft and capable of downloading additional plugins. The attackers employ a multi-payload mechanism for resilience against detection. Users are advised to exercise caution when engaging with AI tools and verify website legitimacy.

AI-Powered Analysis

AILast updated: 06/27/2025, 22:26:18 UTC

Technical Analysis

The threat involves a hacking group identified as UNC6032, allegedly linked to Vietnam, conducting a widespread malware distribution campaign since mid-2024. This campaign exploits social media advertising on platforms such as Facebook and LinkedIn to promote fake AI video generator tools. These malicious ads redirect users to counterfeit websites that mimic legitimate AI video generation services, tricking victims into downloading malware payloads. The malware suite includes Python-based infostealers and backdoors such as STARKVEIL, XWORM, FROSTRIFT, and GRIMPULL. These payloads are designed primarily for information theft, enabling attackers to exfiltrate sensitive data including credentials, intellectual property, and potentially financial information. The attackers use a multi-payload mechanism, deploying multiple malware components that can download additional plugins to extend functionality, enhancing resilience against detection and removal. The campaign has reportedly reached millions of users, focusing primarily on European Union countries and the United States. The attack techniques align with MITRE ATT&CK tactics such as social engineering (T1566), command and scripting interpreter usage (T1059), and use of web services for command and control (T1102). Notably, the attack vector relies on social engineering and fake websites rather than exploiting software vulnerabilities, and no known exploits in the wild have been reported for specific software flaws. The campaign’s scale and sophistication indicate a well-resourced adversary capable of sustained operations targeting a broad user base by capitalizing on the growing interest and trust in AI tools.

Potential Impact

For European organizations, the impact of this threat can be significant. The malware’s primary function as an infostealer and backdoor compromises confidentiality by exfiltrating sensitive corporate and personal data, including credentials, intellectual property, and financial information. The presence of backdoors allows persistent unauthorized access, increasing the risk of further exploitation such as lateral movement, espionage, or ransomware deployment. The multi-payload approach complicates detection and remediation efforts, potentially leading to prolonged system compromise. Given the targeting of EU countries, organizations in sectors with high-value data—such as finance, healthcare, technology, and government—are at elevated risk. The campaign’s use of social media ads to reach users also increases the likelihood of infection among remote workers and employees who may use AI tools for content creation, thereby expanding the attack surface. The reputational damage and regulatory consequences under GDPR for data breaches could further amplify the impact on affected organizations, including potential fines and loss of customer trust.

Mitigation Recommendations

European organizations should implement targeted measures beyond generic advice: 1) Conduct specialized user awareness training focusing on the risks of downloading software from unverified sources, emphasizing the dangers of fake AI tools promoted via social media platforms. 2) Deploy advanced email and web filtering solutions capable of detecting and blocking malicious domains and URLs, including those mimicking legitimate AI services such as klingxai.com. 3) Implement Endpoint Detection and Response (EDR) solutions that can identify behaviors associated with Python-based infostealers and backdoors, including unusual script execution and network connections. 4) Enforce strict application whitelisting policies to prevent unauthorized execution of unknown or suspicious binaries and scripts. 5) Monitor social media ad campaigns actively and collaborate with platform providers to report and remove malicious advertisements promptly. 6) Regularly update threat intelligence feeds to include indicators related to UNC6032 and associated malware families for proactive defense. 7) Encourage and enforce multi-factor authentication (MFA) to limit the impact of credential theft. 8) Establish and regularly test incident response plans that include procedures for rapid containment, eradication, and recovery from multi-payload malware infections. 9) Conduct regular audits of network traffic and endpoint behavior to detect anomalies indicative of backdoor activity or data exfiltration.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.infosecurity-magazine.com/news/vietnam-hackers-malware-fake-ai"]
Adversary
UNC6032
Pulse Id
68374e952dc88d3f07834f91
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainklingxai.com

Threat ID: 68377588182aa0cae25c6578

Added to database: 5/28/2025, 8:43:52 PM

Last enriched: 6/27/2025, 10:26:18 PM

Last updated: 8/1/2025, 4:29:23 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats