Cybercriminals Exploit TikTok with AI Videos to Infect Devices with Stealers

Cybercriminals are leveraging TikTok’s massive user base to spread information-stealing malware through a novel and effective vector: AI-generated tutorial videos.

Research from TrendMicro reveals that these malicious actors are producing convincing, AI-powered videos purporting to show users how to unlock pirated software.

In reality, the so-called “tutorials” are designed to trick unsuspecting viewers into running PowerShell commands, which then download info-stealers such as Vidar, StealC, and Lumma, directly onto their devices.

These videos are not fringe threats; some have amassed nearly half a million views, highlighting the immense reach and potential impact of this campaign.

While the exact number of compromised users remains unclear, the scale of the operation, as indicated by popular TikTok videos and subsequent malware downloads, raises serious concerns for the security of social media users worldwide.

Malicious Infrastructure

According to Censys Report, the attack infrastructure underpinning this campaign is multifaceted and resilient.

Digging deeper beyond TrendMicro’s initial indicators of compromise (IOCs), further analysis shows that the primary malicious domains (amssh[.]co and allaivo[.]me) have leveraged overlapping IP addresses, notably 91.92.46.76 and 91.92.46.219 both linked to additional PowerShell script variants not previously mentioned.

These scripts, detected openly on exposed web services, referenced different domains and payloads, such as winbox[.]ws, further expanding the malware distribution chain.

TikTok
HTTP response body

Despite many of the central domains going offline, historical DNS and network data provide a window into the attackers’ operations.

Notably, the malicious ecosystem is propped up by a newly registered bulletproof hosting provider, AS214196 (operating as “PrivateNetwork[.]ltd”), which offers anonymous, no-KYC (“Know Your Customer”) virtual servers.

The associated netblocks (91.92.46.0/24 and 166.88.225.0/24) and its unique upstream connection to the equally new AS213887 (“WAIcore”) suggest the attackers are intentionally leveraging networks with minimal oversight and rapid churn.

Incidentally, forensic analysis of the retrieved malware samples and PowerShell scripts has confirmed multiple info-stealing families at play and a broader infrastructure footprint than initially reported.

Dynamic analysis showed that Lumma Stealer samples attempted callbacks to the malicious hosts previously identified by TrendMicro, such as hxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php, and to newly uncovered domains.

TikTok
domains have had two overlapping

New IOCs Expand Understanding of the Campaign

Further investigations into the historical activity of the campaign’s infrastructure unearthed more IPs (147.45.44.233 and 176.98.186.23), alternate versions of the PowerShell scripts, and additional malware delivery URLs.

While some of these hosts are now offline, the cumulative evidence paints a picture of a highly adaptive, opportunistic threat actor using rapid domain and IP rotation to evade detection and takedown.

This campaign exemplifies the growing sophistication of cybercriminals who blend modern AI tools, social engineering, and bulletproof hosting to maximize the effectiveness and persistence of their malware distribution operations.

Security professionals and everyday users alike should remain vigilant, as the abuse of trusted platforms like TikTok for malicious ends becomes increasingly prevalent.

Updated Indicators of Compromise (IOC)

TypeValue
Hash3bb81c977bb34fadb3bdeac7e61193dd009725783fb2cf453e15ced70fc39e9b
Hashafc72f0d8f24657d0090566ebda910a3be89d4bdd68b029a99a19d146d63adc5
Hashb8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886
Hash56ce9b8314d4cf1240ab7ce06fa77a8d153742be3bf0167312f3827eb9cc2656
Hash530ac7b77d252f2b62befff3a1bad47ada3ad3f528a897aae74391e64d9e907e
URLhxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php
URLhxxps://allaivo[.]me/spotify
URLhxxps://amssh[.]co/file[.]exe
URLhxxps://amssh[.]co/script[.]ps1
URLhxxps://steamcommunity[.]com/profiles/76561199846773220
URLhxxps://t[.]me/v00rd
URLhxxps://winbox[.]ws/crypted[.]exe
URLhxxps://winbox[.]ws/script[.]ps1
IP49[.]12[.]113[.]201
IP116[.]202[.]6[.]216
IP91[.]92.46.76
IP91[.]92.46.219
IP147[.]45.44.233
IP176[.]98.186.23
IP91[.]92.46.70
CIDR91.92.46.0/24 (bulletproof hosting provider)
CIDR166.88.225.0/24 (bulletproof hosting provider)
ASN214196 (bulletproof hosting provider)

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here