Leveraging AI to Steal Browser Data and Evade Detection

Leveraging AI to Steal Browser Data and Evade Detection

EvilAI, a new malware family tracked by Trend Research, has emerged in recent weeks disguised as legitimate AI-driven utilities.

These trojans sport professional user interfaces, valid code signatures, and functional features, allowing them to slip past both corporate and personal defenses undetected.

Leveraging lightweight installers and AI-generated code, EvilAI rapidly establishes persistent footholds while masquerading as productivity or AI-assist applications.

Trend Research began tracking EvilAI on August 29 and documented a global wave of infections within just one week. Europe leads with 56 reported incidents, followed by 29 each in the Americas and AMEA regions (Table 1).

Top affected countries include India (74), the United States (68), and France (58). This broad footprint underscores EvilAI’s indiscriminate targeting and sophisticated distribution tactics, suggesting a well-resourced threat actor behind the campaign.

Table 1. Top Regions by EvilAI Detections

Region Count
Europe 56
Americas 29
AMEA 29

Table 2. Top Countries by EvilAI Detections

Country Count
India 74
United States 68
France 58
Italy 31
Brazil 26
Germany 23
United Kingdom 14
Norway 10
Spain 10
Canada 8

Table 3. Top Industries by EvilAI Detections

Industry Count
Manufacturing 58
Government 51
Healthcare 48
Technology 43
Retail 31
Education 27
Financial Services 22
Construction 20
Non-profit 19
Utilities 9

Trojan Masquerade and Persistence

EvilAI installers adopt generic yet plausible names—such as App Suite, PDF Editor, and JustAskJacky—avoiding direct imitation of known brands to reduce suspicion.

Distribution occurs via newly registered spoof domains, malicious advertisements, and manipulated forum links.

EvilAI’s observed infection flow.

Once launched, the applications deliver genuine functionality—document handling, recipe management, or AI chat—while silently deploying a Node.js–based payload.

The installer drops an obfuscated JavaScript file (with a GUID-based name suffix) into the Temp directory and launches it via a minimized node.exe process.

Persistence is achieved through multiple mechanisms: a scheduled Windows task disguised as a system component, a shortcut in the Start Menu, and a Run-key registry entry.

The scheduled task, named sys_component_health_{UID}, executes the malware every four hours, while the Run key ensures execution on logon. This multi-pronged approach guarantees EvilAI’s survival across reboots and user sessions.

EvilAI’s codebase is generated with large language models, producing clean, modular JavaScript that evades static signature scanners.

Complex obfuscation—control flow flattening with MurmurHash3 loops and Unicode-encoded strings—thwarts analysis.

The malware establishes persistence by creating a scheduled task named sys_component_health_{UID}, disguised to look like a legitimate Windows process.

Scheduled task creation.
Scheduled task creation.

The malware further leverages WMI and registry queries to detect running Chrome and Edge processes, then forcefully terminates them to free handles for credential theft.

Sensitive browser data files—Web Data and Preferences—are duplicated with “Sync” suffixes in their original profile paths. These copies are later exfiltrated via encrypted HTTPS POSTs to the command-and-control (C&C) server.

C&C communication uses AES-256-CBC encryption with a session key derived from a unique instance ID. The malware continuously polls the server for commands, enabling dynamic payload delivery, registry modifications, and remote process execution.

Defending Against EvilAI

Defenders must combine rigorous cyber hygiene with advanced, AI-aware protections. Only trusted sources should be used for software installs, and code-signing certificates warrant scrutiny—even those from newly established entities.

Behavioral analytics and real-time monitoring can catch anomalous Node.js launches, unexpected scheduled tasks, and suspicious registry writes.

User training should emphasize that polished interfaces and valid signatures do not guarantee safety.

Finally, layered defenses—endpoint detection and response, network traffic analysis, and anomaly detection—are essential to counter threats that evolve through AI-driven innovation.

As AI becomes weaponized, malware families like EvilAI will blur the line between legitimate and malicious software.

Organizations that embrace adaptive, intelligence-driven security postures will be best positioned to detect and disrupt these sophisticated campaigns before data exfiltration and persistent breaches can occur.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.