Close Menu
DISADISA
  • Home
  • News
  • Social Media
  • Disinformation
  • Fake Information
  • Social Media Impact
Trending Now

Wartime Reporting: The Erosion of Journalistic Integrity

May 14, 2025

India’s Countering of Drone Threats and Disinformation Campaigns

May 14, 2025

India Restricts Access to X for Chinese and Turkish News Outlets

May 14, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
DISADISA
Newsletter
  • Home
  • News
  • Social Media
  • Disinformation
  • Fake Information
  • Social Media Impact
DISADISA
Home»Fake Information»Malicious Actors Deploy Counterfeit AI Tools in Facebook Campaign to Distribute Noodlophile Malware, Compromising Over 62,000 Accounts.
Fake Information

Malicious Actors Deploy Counterfeit AI Tools in Facebook Campaign to Distribute Noodlophile Malware, Compromising Over 62,000 Accounts.

Press RoomBy Press RoomMay 14, 2025
Facebook Twitter Pinterest LinkedIn Tumblr Email

Cybercriminals Exploit AI Hype with Deceptive "Noodlophile" Malware Campaign

In the ever-evolving landscape of cyber threats, a new campaign has emerged, exploiting the burgeoning public interest in artificial intelligence. This campaign uses the allure of AI-powered tools to trick unsuspecting users into downloading a malicious information-stealing malware dubbed "Noodlophile." Rather than relying on traditional phishing tactics or compromised software websites, these threat actors have adopted a more sophisticated approach, creating convincing fake AI platforms advertised through seemingly legitimate Facebook groups and viral social media campaigns. This strategy effectively targets individuals seeking AI tools for various creative purposes, such as video and image editing.

The deceptive campaign employs social media posts that have garnered significant attention, with some exceeding 62,000 views. This high engagement underscores the widespread interest in AI tools and the potential reach of this malicious campaign. Several fake social media pages have been identified, including "Luma Dreammachine Al," "Luma Dreammachine," and "gratistuslibros," all designed to lure users into the trap. These pages advertise links to fictitious AI-powered content creation services, promising the generation of videos, logos, images, and even entire websites. One such fraudulent website mimics the legitimate CapCut AI, an all-in-one video editor, offering users enticing "new AI features."

The unsuspecting user, drawn by the promise of AI-powered content creation, uploads their image or video prompts to these fraudulent websites. They are then prompted to download the supposedly AI-generated content. However, instead of receiving the desired output, they unwittingly download a malicious ZIP archive named "VideoDreamAI.zip." This archive contains a deceptively named executable file, "Video Dream MachineAI.mp4.exe," which initiates the infection chain. The malware cunningly launches a legitimate binary associated with ByteDance’s video editor, "CapCut.exe," using this trusted executable as a cover for its malicious activities.

This legitimate C++-based executable then executes a .NET-based loader, "CapCutLoader," which in turn downloads and executes a Python payload, "srchost.exe," from a remote server. This Python binary serves as the final stage of the infection process, deploying the Noodlophile Stealer malware onto the victim’s system. Noodlophile is designed to harvest a range of sensitive data, including browser credentials, cryptocurrency wallet information, and other valuable user data. In some instances, the stealer is also bundled with a remote access trojan (RAT) like XWorm, providing the attackers with persistent access to the compromised system.

Investigations into the developer of Noodlophile suggest a Vietnamese origin. The individual’s GitHub profile identifies them as a "passionate Malware Developer from Vietnam." The account, created in March 2025, further strengthens the link to Vietnam, a country known for its active cybercrime ecosystem and a history of distributing various stealer malware families targeting Facebook. This recent campaign aligns with previous trends, highlighting the continued exploitation of social media platforms for malware distribution.

The exploitation of public interest in AI technologies for malicious purposes is not a novel tactic. In 2023, Meta reported taking down over 1,000 malicious URLs shared across its platforms, all leveraging the popularity of OpenAI’s ChatGPT as bait to propagate around ten different malware families. This underscores the ongoing trend of cybercriminals capitalizing on emerging technologies to deceive unsuspecting users. The current Noodlophile campaign serves as a stark reminder of the need for vigilance and caution when engaging with online content, particularly those promising access to cutting-edge technologies.

This latest discovery coincides with CYFIRMA’s revelation of another .NET-based stealer malware family, codenamed "PupkinStealer." PupkinStealer, like Noodlophile, is designed to steal a wide range of data from compromised Windows systems, exfiltrating the stolen information to an attacker-controlled Telegram bot. However, unlike Noodlophile’s more complex infection chain utilizing legitimate software, PupkinStealer relies on simpler execution and low-profile behavior to evade detection. Its simplicity makes it an effective, albeit less sophisticated, method of data theft, leveraging common system behaviors and widely used platforms like Telegram for exfiltration. The emergence of both Noodlophile and PupkinStealer underscores the dynamic nature of the cyber threat landscape and the constant evolution of malware tactics. Users must remain vigilant and exercise caution when interacting with online content, especially when dealing with emerging technologies like AI.

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email

Read More

UP Police Suspends Forty Social Media Accounts for Disseminating False Information

May 14, 2025

Ministry Refutes Fabricated Radiological Safety Bulletin Circulating on Social Media

May 14, 2025

Public Warned of Fraudulent Data Dansal Links on Social Media

May 14, 2025

Our Picks

India’s Countering of Drone Threats and Disinformation Campaigns

May 14, 2025

India Restricts Access to X for Chinese and Turkish News Outlets

May 14, 2025

Responsibility for [Specific Issue]: A Comparative Analysis of Television Networks and Online Users

May 14, 2025

CIRA’s Award-Winning Podcast Returns to Examine Online Misinformation’s Impact (Season Three).

May 14, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Don't Miss

Fake Information

Malicious Actors Deploy Counterfeit AI Tools in Facebook Campaign to Distribute Noodlophile Malware, Compromising Over 62,000 Accounts.

By Press RoomMay 14, 20250

Cybercriminals Exploit AI Hype with Deceptive "Noodlophile" Malware Campaign In the ever-evolving landscape of cyber…

The Impact of Social Media on Mental Health

May 14, 2025

Access to Global Times Restricted in India Due to Dissemination of Misinformation

May 14, 2025

GardaĆ­ Condemn False Reports Concerning Officer’s Death on Social Media

May 14, 2025
DISA
Facebook X (Twitter) Instagram Pinterest
  • Home
  • Privacy Policy
  • Terms of use
  • Contact
© 2025 DISA. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.