AI-Driven Malware: How Fake Apps and CAPTCHAs Target Windows and macOS Users

Home  AI-Driven Malware: How Fake Apps and CAPTCHAs Target Windows and macOS Users

AI-Driven Malware: How Fake Apps and CAPTCHAs Target Windows and macOS Users

Cybersecurity researchers have flagged a surge in malware distribution tactics involving fake CAPTCHAs and counterfeit AI applications. This new wave of cyberattacks targets both Windows and macOS systems and is closely linked to malicious software strains like Lumma Stealer and AMOS.

These malware types are notorious for their ability to collect sensitive user data, including credentials, session cookies, and cryptocurrency wallet information.

Microsoft’s Digital Defense Report from October notes that over 600 million daily incidents now leverage automation. AI-generated phishing emails are harder to detect and bypass traditional security measures.

Russian-backed operations have used these tools to target Ukraine, blending traditional espionage with disruptive cyber tactics. Meanwhile, North Korea has expanded into AI-driven ransomware campaigns, and Iran has intensified cyber-influence operations across the Gulf region.

How Fake CAPTCHAs Have Become Malicious Entry Points

CAPTCHAs, once considered a basic tool to verify human interaction and block automated scripts, have been repurposed by attackers as a covert method for malware delivery. Security experts from Kaspersky report that since August 2024, cybercriminals have been embedding fake CAPTCHAs into sites ranging from file-sharing platforms to adult content hubs—areas notorious for lower security standards.

Lumma Stealer (aka LummaC2 Stealer), an information stealer written in C language is a primary payload seen in such fake CAPTCHA campaigns. The malware is engineered to search for files containing keywords linked to cryptocurrency wallets, passwords, and other sensitive data, which makes it particularly dangerous for users dealing with financial assets.

It can also access browser storage to collect saved passwords and cookies, allowing attackers to hijack active sessions and access user accounts without triggering alerts.

These counterfeit CAPTCHAs mimic legitimate verification steps but contain hidden scripts that, when triggered, initiate malicious processes. The unsuspecting user is typically asked to copy and paste commands that appear as standard verification steps but are actually obfuscated PowerShell scripts.

Obfuscation With Windows PowerShell

PowerShell, a powerful scrip-enabled tool included in Windows, has become a favorite tool for cybercriminals due to its ability to execute complex scripts directly within the operating system. Attackers often encode these scripts to mask their true purpose.

The scripts are often encoded in formats like Base64, a group of binary-to-text encoding schemes that transforms binary data into a sequence of printable characters, complicating detection and analysis by traditional security software.

Once executed, the scripts connect to remote command-and-control (C2) servers, downloading additional payloads and enabling more extensive system compromise. In many cases, the downloaded malware is disguised as legitimate software, such as BitLocker To Go, a tool known for encrypting removable storage.

This tactic exploits the built-in trust that users place in recognizable software names, allowing the malicious payload to operate with minimal suspicion. The use of trusted tools like PowerShell also complicates detection, as traditional antivirus programs may not flag these activities as harmful.

The Rise of Fake AI Tools in Malware Campaigns

The growing interest in artificial intelligence has given cybercriminals new avenues for attack. Fake AI-based applications, advertised as cutting-edge tools for tasks like video editing and image generation, are being used as bait.

One high-profile case involves EditProAI, a fraudulent video and image editing tool uncovered by cybersecurity researcher “g0njxa.” Promoted through social media ads featuring deepfake videos, EditProAI appeares legitimate and lures users into downloading malware-laden software.