Cybercriminals Exploit AI Hype: Malicious Facebook Ads Target Millions

4 Sources

Share

Cybercriminals are using fake Facebook ads for AI video generators to spread malware, potentially affecting millions of users. The campaign, linked to a Vietnam-based group, impersonates legitimate AI tools to lure victims.

Cybercriminals Exploit AI Hype with Malicious Facebook Ads

In a concerning development at the intersection of artificial intelligence and cybersecurity, a widespread malware campaign has been uncovered that exploits the growing interest in AI tools. Cybercriminals are leveraging fake Facebook ads for AI video generators to distribute malware, potentially affecting millions of users worldwide

1

.

Source: PC Magazine

Source: PC Magazine

The Malware Campaign: UNC6032

Google's threat intelligence unit, Mandiant, has identified and tracked this malicious campaign under the name UNC6032. The operation, which has been active since mid-2024, is believed to have links to a Vietnam-based group

2

. The cybercriminals behind UNC6032 have been posting ads on social media platforms, primarily Facebook and to a lesser extent LinkedIn, that impersonate legitimate AI video generator tools such as Luma AI, Canva Dream Lab, and Kling AI

3

.

Modus Operandi and Reach

The attackers create convincing ads that, when clicked, redirect users to malicious websites. These fake sites then deploy various malware payloads, including Python-based infostealers and backdoors

1

. To evade detection by Meta (Facebook's parent company), the cybercriminals constantly modify their domains and publish new ads daily.

The scale of this operation is significant. Mandiant's investigation revealed ads for over 30 malicious websites, with a sample of 120 ads in the EU alone reaching over 2.3 million users

2

. This extensive reach underscores the potential impact of the campaign on both individual users and organizations.

Types of Data at Risk

The malware deployed in this campaign, known as STARKVEIL, is capable of stealing a wide range of sensitive information, including:

  1. Login credentials
  2. Cookies
  3. Credit card data
  4. Facebook account information

    4

Response and Mitigation Efforts

Both Meta and LinkedIn have been alerted to the campaign and have taken steps to combat it. Meta had already detected and removed a significant number of malicious ads before being notified by Mandiant in 2024

1

. However, the persistent nature of the threat means that new malicious ads and websites continue to appear daily.

Recommendations for Users

Source: TechRadar

Source: TechRadar

To protect against this and similar threats, cybersecurity experts advise users to:

  1. Exercise caution when engaging with AI tools advertised on social media
  2. Verify the legitimacy of AI tool websites before use
  3. Avoid clicking on suspicious ads, especially those promoting unfamiliar AI tools
  4. Perform independent searches for AI tools of interest, rather than relying on social media ads

    2

Broader Implications

This malware campaign highlights a growing trend in cybercrime where attackers exploit popular technology trends to deceive users. As AI continues to gain prominence, it's likely that similar scams will emerge, targeting both individuals and organizations attracted by the promise of cutting-edge AI capabilities

4

.

The incident serves as a reminder of the need for continued vigilance in the digital space, especially as new technologies capture public imagination and attention. As Yash Gupta, a senior manager at Mandiant, noted, "Criminals go where the attention is. Right now, that's AI."

4

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo