skip to content

How Russian hackers used deepfake nude “generator” sites to spread malware

A notorious Russian hacking group, FIN7, has been caught running a network of fake deepfake nude “generator” websites designed to infect users with malware.

These sites, which claimed to use AI technology to generate fake nude images of individuals from clothed photos, were lured to spread malicious software.

FIN7, known for its expertise in cybercrime, has been active since 2013 and has strong ties to ransomware gangs, including DarkSide, BlackMatter, and BlackCat.

FIN7’s deepfake malware trap
FIN7’s new tactic involves websites offering what they call AI-powered “deepfake nude generators.” These sites claim to allow users to upload photos and generate fake nude images, a controversial technology that has caused harm to many by creating explicit photos without consent. Despite being outlawed in various regions, interest in this technology remains high, which hackers have now exploited.

The deepfake nude websites created by FIN7 are essentially honeypots, drawing in users who are interested in creating non-consensual explicit images of others. These sites promise a free trial or download, but instead, they trick visitors into downloading malware.

According to cybersecurity firm Silent Push, FIN7 operated sites under names like “aiNude[.]ai”, “easynude[.]website”, and “nude-ai[.]pro.” Each site featured a similar design and offered the same fake service.

After users upload their photos, they are redirected to another page, where they are prompted to download the “generated” image. They are then given a password-protected file from a third-party link, such as Dropbox.

However, the downloaded file contains malware instead of the promised deepfake nude. The malicious software, called Lumma Stealer, is an information-stealing tool that siphons sensitive data such as saved passwords and cookies from web browsers and cryptocurrency wallets. Other variations of these sites have been found to distribute malware, such as Redline Stealer and D3F@ck Loader, both notorious for stealing personal data from compromised computers.

FIN7’s broader campaigns
While Silent Push reported that all the known deepfake nude sites have since been taken down, FIN7’s malicious activities don’t end there. The group has been involved in various other cyber campaigns, including distributing malware like NetSupport RAT by tricking users into installing malicious browser extensions. FIN7 has also been caught spoofing popular brands and applications such as Zoom, Fortnite, Canon, and others, distributing malware through SEO tactics and online advertising.

The hacking group was recently exposed for selling a custom-built tool called “AvNeutralizer” to other criminals. This tool was used to disable endpoint detection and response (EDR) software during cyberattacks. FIN7 continues to pose a significant threat to businesses and individuals, linked to phishing attacks targeting IT staff and ransomware attacks on large organizations.

This recent deepfake scam is just one example of how cybercriminals evolve their tactics, exploiting controversial technologies and human curiosity to launch more sophisticated attacks.

Share your love
Facebook
Twitter
LinkedIn
WhatsApp

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Unauthorized Content Copy Is Not Allowed