Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads
Threat actors are leveraging the soaring popularity of AI tools like ChatGPT and Luma AI to distribute malware through deceptive websites.
Zscaler ThreatLabz researchers have uncovered a network of malicious AI-themed sites, often hosted on platforms like WordPress, that exploit Black Hat SEO techniques to poison search engine rankings.
These sites appear prominently in search results for trending AI keywords, such as “Luma AI blog,” tricking unsuspecting users into visiting them.

AI-Themed Websites
Once a user lands on such a page, a complex chain of malicious activities is triggered, ultimately delivering dangerous payloads like Vidar Stealer, Lumma Stealer, and Legion Loader.
The attack begins with a user clicking on a seemingly legitimate search result, leading to an AI-themed webpage embedded with malicious JavaScript hosted on trusted platforms like AWS CloudFront.
This script performs browser fingerprinting, collecting data such as browser version, window resolution, and user agent, which is then encrypted using XOR and sent to an attacker-controlled domain like gettrunkhomuto[.]info.
The server validates the data and initiates a multi-layered redirection process, often involving intermediate sites that check the victim’s public IP before directing them to the final malware download page.
Technical Breakdown of the Attack Chain
Notably, the JavaScript also detects ad blockers and DNS guards, halting the redirection if such protections are present, ensuring the attack remains undetected.
The malware payloads are often packaged in large installer files, such as 800MB NSIS installers for Vidar and Lumma Stealer, to bypass sandbox detection.

Legion Loader, on the other hand, is delivered via password-protected ZIP archives containing MSI files that deploy decoy software and execute malicious DLLs through techniques like process hollowing and DLL sideloading.
These payloads can steal sensitive data or install cryptocurrency-stealing browser extensions, posing significant risks to users.
The campaign’s sophistication extends to evasion tactics, including antivirus checks within NSIS scripts using Windows utilities like tasklist and findstr to terminate security processes from vendors like Quick Heal, Webroot, and Bitdefender.
Additionally, Legion Loader’s use of dynamic passwords retrieved from C2 servers and shellcode execution within hollowed-out explorer.exe processes highlights the attackers’ focus on stealth.
Zscaler’s multilayered cloud security platform has identified and mitigated these threats, detecting indicators for Lumma, Vidar, and Legion Loader under various threat names like Win32.PWS.Lumma and Win32.Dropper.LegionLoader.
Users are urged to exercise caution when searching for AI tools online, as the exploitation of trending topics for malware distribution continues to grow.
Below is a table of key Indicators of Compromise (IOCs) associated with this campaign for reference and mitigation purposes.
Indicators of Compromise (IOCs)
Indicator | Description |
---|---|
chat-gpt-5[.]ai | Malicious blog site related to AI |
luma-ai[.]com | Malicious blog site related to AI |
krea-ai[.]com | Malicious blog site related to AI |
llama-2[.]com | Malicious blog site related to AI |
C957ADB29755E586EE022244369C375D | Legion Loader password-protected ZIP |
14642E8FFD81298F649E28DC046D84BB | Legion Loader MSI file |
C53eaf734ecc1d81c241ea2ab030a87e | Lumma NSIS Installer file |
758625d112c04c094f96afc40eafa894 | Vidar NSIS Installer file |
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
Source link