Cyber News

Cybersecurity Alert – AI-Driven Web3 Scam Targets Users with Fake Platforms to Harvest Credentials

A sophisticated cybercriminal group known as LARVA-208 has launched a new campaign targeting Web3 developers through an elaborate phishing scheme involving fake AI workspace platforms.

The operation represents a significant evolution in the group’s tactics, shifting from targeting traditional IT staff to exploiting the growing Web3 developer community.

The threat actors have created a convincing replica of the legitimate AI workspace platform “Teampilot” under the domain “norlax.ai,” branded as “Norlax AI.”

This fake service serves as the centerpiece of a multi-stage attack designed to harvest valuable cryptocurrency wallets, development credentials, and sensitive project data from unsuspecting victims.

Dual-Vector Attack Strategy

LARVA-208 employs two distinct approaches to lure victims into their trap. The first involves directly targeting developers who actively engage with Web3 and blockchain content on social media platforms like X (formerly Twitter) and Telegram.

Attackers approach these individuals with meeting links that disguise themselves as job interview opportunities or portfolio review sessions.

The second vector targets individuals who previously applied for Crypto Analyst positions on the remote job platform Remote3. Recognizing that the platform warns users against downloading suspicious files, LARVA-208 has adapted its approach.

Homepage of the Norlax AI service, created by impersonating the Teampilot service.

The attackers initiate legitimate Google Meet conversations before transitioning victims to their malicious Norlax AI platform, sharing the harmful links through chat during what appears to be a genuine interview process.

Technical Execution and Malware Deployment

Once victims access the fake meeting platform using attacker-generated email addresses and invitation codes, they encounter a sophisticated technical deception.

The platform displays a false error message claiming their audio drivers are outdated or missing, prompting them to download what appears to be a legitimate Realtek HD Audio Driver from “audiorealtek.com.”

This malicious file contains embedded PowerShell commands hidden within setup.dll, which establishes communication with the group’s command and control server at “cjhsbam.com.”

The attack deploys the Fickle stealer malware, which systematically harvests comprehensive system information including device specifications, installed programs, running processes, and geolocation data.

Infrastructure and Attribution

The stolen data is uploaded to servers branded as “SilentPrism,” allowing LARVA-208 to monitor victim information in real-time.

The group acquires its malicious domains through FFv2’s bulletproof hosting services, with intelligence suggesting connections to the broader Luminous Mantis cybercriminal community.

This campaign represents a notable shift in LARVA-208’s operational focus, moving from their traditional ransomware deployment model toward data exfiltration and credential harvesting for potential resale in illicit markets.

The sophisticated social engineering tactics, combined with the exploitation of emerging AI platform trends, highlight the evolving threat landscape facing Web3 developers and their high-value digital assets.

Security experts recommend enhanced verification procedures for meeting invitations and extreme caution when downloading software during virtual meetings, particularly in the rapidly expanding Web3 development sector.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago