- Cyber Syrup
- Posts
- Fake AI Tool Installers Used to Distribute Ransomware and Destructive Malware
Fake AI Tool Installers Used to Distribute Ransomware and Destructive Malware
Cybersecurity researchers have uncovered a growing wave of malicious campaigns exploiting the popularity of artificial intelligence (AI) tools to distribute a variety of ransomware and malware threats

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Find out why 1M+ professionals read Superhuman AI daily.
In 2 years you will be working for AI
Or an AI will be working for you
Here's how you can future-proof yourself:
Join the Superhuman AI newsletter – read by 1M+ people at top companies
Master AI tools, tutorials, and news in just 3 minutes a day
Become 10X more productive using AI
Join 1,000,000+ pros at companies like Google, Meta, and Amazon that are using AI to get ahead.
Fake AI Tool Installers Used to Distribute Ransomware and Destructive Malware

Cybersecurity researchers have uncovered a growing wave of malicious campaigns exploiting the popularity of artificial intelligence (AI) tools to distribute a variety of ransomware and malware threats. These campaigns use fake websites and malicious installers that impersonate legitimate platforms like OpenAI ChatGPT and InVideo AI to target users, particularly in the business-to-business (B2B) and marketing sectors.
According to research from Cisco Talos, the threats being deployed include the CyberLock and Lucky_Gh0$t ransomware strains, along with a newly discovered destructive malware named Numero.
Breakdown of the Malware Variants
1. CyberLock Ransomware
Developed in PowerShell
Encrypts specific file types across
C:\
,D:\
, andE:\
drivesUses elevated privileges to execute and encrypt targeted files
Demands a $50,000 ransom in Monero, claiming funds support humanitarian causes
Employs cipher.exe with the
/w
flag to wipe free disk space, complicating forensic recovery
2. Lucky_Gh0$t Ransomware
A variant of the Yashma ransomware, itself derived from the Chaos ransomware series
Distributed via a malicious self-extracting installer (SFX) posing as a premium ChatGPT tool
Targets files under 1.2 GB for encryption
Deletes volume shadow copies and backup data
Drops a ransom note with a unique decryption ID and communication instructions via the Session messaging app
3. Numero Malware
A 32-bit Windows malware written in C++
Manipulates the Graphical User Interface (GUI) of the operating system
Disrupts system functionality by replacing desktop elements with numeric strings
Includes anti-debugging and anti-analysis measures
Delivered via a counterfeit InVideo AI installer that includes:
A Windows batch script
A Visual Basic Script
The Numero executable
Executes in an infinite loop to ensure persistence
Delivery Tactics and Impersonation
Fake AI Websites
The threat actors have created fraudulent websites—such as novaleadsai[.]com
—designed to resemble legitimate AI platforms. These sites:
Offer seemingly free or trial access to premium AI tools
Use SEO poisoning to rank higher in search results
Deliver malware through ZIP files containing executables like
NovaLeadsAI.exe
Upon execution, the installer launches CyberLock ransomware, initiating file encryption and presenting a ransom demand with a humanitarian justification.
Malvertising Campaigns and Emerging Threats
Parallel research by Google Mandiant, Morphisec, and Check Point has revealed another malvertising campaign attributed to a threat group dubbed UNC6032, likely based in Vietnam. This campaign:
Uses fake ads on platforms like Facebook and LinkedIn
Redirects users to clone sites of legitimate AI services (e.g., Luma AI, Kling AI, Canva Dream Lab)
Distributes a Rust-based dropper named STARKVEIL
STARKVEIL and Its Payloads
Once downloaded, STARKVEIL installs a suite of malware:
GRIMPULL – A downloader using TOR tunnels to fetch .NET payloads
FROSTRIFT – A .NET backdoor that scans for:
System and software information
Password manager and cryptocurrency wallet extensions in Chromium browsers
XWorm – A known .NET remote access trojan (RAT) with capabilities like:
Keylogging
Command execution
Screen capture
Data exfiltration via Telegram
These payloads are launched using a Python-based dropper called COILHATCH, which performs DLL side-loading for stealthy execution.
Key Takeaways and Recommendations
Why It Matters
The use of fake AI tools highlights how threat actors are leveraging popular technology trends to reach a wide and unsuspecting audience. These attacks are no longer limited to IT professionals or developers—any user enticed by a new AI tool is now a potential target.
Mitigation Strategies
Only download AI tools from verified and official sources
Avoid clicking on sponsored ads or unfamiliar links in search results
Use endpoint detection tools capable of identifying behavior-based threats
Educate employees about social engineering and fake installers
Restrict the execution of scripts and installers from untrusted locations
"The temptation to try the latest AI tool can lead to anyone becoming a victim," warned Mandiant researchers. “These tools no longer target just graphic designers.”
Conclusion
The weaponization of fake AI tool installers for deploying ransomware and malware demonstrates a significant shift in cybercriminal tactics. With the line between innovation and exploitation becoming increasingly blurred, users must practice vigilance and organizations should reinforce security hygiene to prevent falling victim to AI-themed cyberattacks.