Cybercriminals lure content material creators with guarantees of cutting-edge AI wizardry, solely to aim to steal their information or hijack their gadgets as an alternative
17 Apr 2025
•
,
3 min. learn

The craze round generative AI instruments isn’t simply reshaping industries – it additionally offers fertile floor for cybercriminals, who’re at all times fast to piggyback on the attract of the newest large factor in tech. So what if, as an alternative of downloading an AI‑generated video from CapCut or one other comparable instrument, you had your information stolen or gave management of your pc to a stranger?
The risk isn’t hypothetical – safety researchers have beforehand noticed campaigns that exploited CapCut’s recognition to distribute a number of infostealers and different malware. Let’s now look briefly at one other marketing campaign that’s concentrating on individuals inquisitive about AI-powered content material by promising premium variations of well-liked software program akin to CapCut, Adobe Categorical and Canva.
The artwork of the lure
The instance under, noticed by X consumer g0njxa, exhibits a web site that impersonates CapCut, a instrument typically utilized by TikTok creators, and purports to be CapCut’s premium model. (Be aware that the precise premium model is named “CapCut Professional” or referred to easily as “Professional” on the web site, not “CapCutProAI” as within the screenshot.)
After you land on the pretend web site, you’re requested to enter a immediate or add a reference file. For those who comply, the location will mimic processing the request.
As soon as the anticipation is constructed and the lure is sprung, you’re prompted to obtain your shiny new “creation”. Needles to say, the file, known as Creation_Made_By_CapCut.mp4 – CapCut.com, is way from what it purports to be. In actuality, it’s an executable for distant entry software program. Quick ahead just a few clicks and, until different safeguards kick in, you could be surrendering management of your system to crooks.
Listed below are two extra websites that masquerade as the true deal and are a part of the identical marketing campaign:
Faraway, so shut
For context, whereas reliable distant entry instruments, akin to ConnectWise ScreenConnect, TeamViewer and AnyDesk, are invaluable for IT professionals offering technical help, within the fallacious fingers they are often misused to take over management of your pc for malicious ends. These embody information theft, set up of ransomware or different malware, and utilizing the compromised machine as a launch pad for assaults at different gadgets.
These sorts of threats additionally loom massive on company networks, as risk actors can, for instance, distribute moveable, self-contained executables for reliable distant monitoring and administration (RMM) software program that circumvents admin privileges and obviates the necessity for full software program set up.
“Most distant management purposes include the choice to generate a preconfigured executable to connect with a selected IP deal with or consumer. That is helpful for distant help, but in addition for attackers. The sufferer merely has to open the file, and in a few clicks, they could unwittingly give management of their pc to a cybercriminal,” says Martina López, a safety researcher with ESET’s lab in Latin America.
Phrase to the clever
A few easy steps will go a great distance towards retaining you secure:
- When downloading new software program, ensure that to get it from the reliable supply, sometimes the writer’s official web site
- Keep away from clicking on unsolicited hyperlinks in e-mail or social media messages that always declare to result in such web sites – the messages could also be pretend
- The identical goes for advertisements – you’re higher off navigating to the web site immediately by typing it in your browser or looking for it (with a essential eye, although) in your search engine of alternative
- Examine the web site’s URL – software program makers don’t usually sport varied oddball extensions in URLs or sneaky “alternate” variations (assume “CapCutProAI”)
- Be sure your working system, browser, and different software program are updated to guard towards recognized vulnerabilities
- Use multi-layered safety software program, in addition to stick with different fundamental cybersecurity hygiene practices, akin to sturdy and distinctive passwords and enabling two-factor authentication on all of your on-line accounts
Evidently, that is neither the primary nor final time CapCut customers have been focused by cybercriminals, and these examples simply present that cybercriminals are at all times keen to use belief and the newest large factor in tech.
The excellent news is that that whereas these ploys are sometimes slick, they’re not invincible. Your vigilance is your greatest defend towards scammers’ ways.