A Seamless Trap: The Google Bard Malware Campaign
Google Bard has become a lucrative target for cybercriminals. Attackers are creating misleading ads, disguised as genuine promotions for Google Bard. But when unsuspecting users click on these ads, instead of being directed to an official Google page, they find themselves on a malware infected website.
These malicious ads were initially spotted by security experts from Essential Security against Evolving Threats (ESET). They noticed inconsistencies, including poor grammar, spelling mistakes, and a writing style that did not match Google’s standards, as reported by TechRadar.
A particularly alarming revelation was that the ads directed users to a Dublin-based domain, rebrand.ly, instead of a Google-owned domain. This presents a potential risk: if a user accesses such websites while logged into their browser, their private data could be at risk.
What’s more, these ads don’t just mislead – they actively harm. Clicking on the ad’s download button gets users a malware file misleadingly titled GoogleAIUpdate.rar.
ChatGPT: Another Victim of Digital Deceit
ChatGPT had its own share of malicious attacks. Dominic Alvieri, a security researcher, spotted a malware called Redline being distributed through a fake website that mimicked ChatGPT branding. This site, chat-gpt-pc.online, was falsely advertised on Facebook as an official OpenAI link, misleading users to download infected files.
Furthermore, bogus ChatGPT apps made their way to Google Play and other third-party app stores. These counterfeit apps could potentially infect devices with malware once downloaded. ChatGPT’s recent introduction of a $20 monthly premium tier only seemed to amplify its appeal to cybercriminals. Some bad actors went to extreme lengths, repurposing the ChatGPT technology to generate harmful content, including phishing emails and malware scripts.
AI: A Growing Target for Cybercrime
It’s not just Google Bard or ChatGPT that are facing the brunt. Cybercriminals are capitalizing on the burgeoning interest in AI. A campaign on Facebook leveraged AI-based ads to trick users into downloading a malicious Chrome extension. This extension’s primary goal? To steal users’ credentials and eventually gain control of business accounts. The cybercriminals were sophisticated, using encrypted archives to bypass antivirus detection.
Staying Safe in the Digital Landscape
So, how can users safeguard themselves? First, a heightened sense of awareness is essential. Users should be wary of ads that seem too good to be true or offer services that seem disproportionately cheap or free. Key indicators of fraudulent campaigns can include overly polished landing sites, promises of exclusive access to limited AI tools, inconsistencies in promotional content, and unusual password-protected downloadable files.
As AI continues to evolve, its allure for both genuine developers and malicious actors will grow. Users must remain vigilant, always double-checking the sources of downloads and keeping their software updated.
Sources: