Home OSINT News Signals
CYBER

AMOS and Amatera disguised as AI agents | Kaspersky official blog

🕓 1 min read

EXCLUSIVE: AI TOOLS HIJACKED IN GLOBAL MALWARE SUPPLY CHAIN ATTACK

A sinister new wave of cyberattacks is weaponizing the world's hunger for artificial intelligence. Threat actors are now running coordinated Google Ads campaigns that push malicious installation guides for coveted AI agents like Claude Code, OpenClaw, and Doubao. This is not a simple phishing scam; it's a sophisticated supply chain attack targeting the very tools driving modern productivity. The cybersecurity landscape has been breached by a new form of digital bait.

Our investigation reveals a chillingly precise operation. When users search for these AI assistants, paid advertisements at the top of Google results lead to fake documentation sites. These sites, often built on legitimate platforms like Squarespace to evade detection, provide terminal commands that promise to install the desired tool. In reality, they deploy infostealer malware. For macOS seekers, it's the AMOS stealer. For Windows users, it's the Amatera infostealer. This is a massive, ongoing data breach in the making, exploiting a critical vulnerability in human trust.

The implications are staggering for enterprise blockchain security and beyond. "Employees, eager to use the latest AI coding assistants without corporate approval, are walking straight into this trap," a senior threat intelligence analyst told us. "They're handing over system access and credentials, thinking they're getting a productivity boost. Instead, they're creating a zero-day event for their entire organization." This campaign turns a search for innovation into a gateway for ransomware and crypto theft.

This threat transcends individual users. Organizations that restrict official access to cutting-edge AI tools are inadvertently pushing their workforce toward these malicious search results. The exploit is psychological, preying on the desire to keep pace with technological change. Every unauthorized download is a potential endpoint compromise, opening the door to lateral movement and catastrophic data breach.

We predict a surge in similar attacks targeting AI and blockchain security tools throughout 2024, as threat actors capitalize on this fertile new attack vector. The era of AI has begun, and its first major lesson is in deception.

Your next Google search for an AI tool could bankrupt your company.

Telegram X LinkedIn
Back to News