Close Menu
    X (Twitter) LinkedIn
    CapitalAI DailyCapitalAI Daily
    X (Twitter) LinkedIn
    • Markets & Investments
    • Big Tech & AI
    • Fraud & Scams
    • Hacks
    • Banks
    • Crypto
    Sunday, October 5
    CapitalAI DailyCapitalAI Daily
    Home»Hacks»AI-Powered Malware EvilAI Steals Sensitive Google Chrome and Microsoft Edge User Data in US and Abroad, Warns Trend Micro

    AI-Powered Malware EvilAI Steals Sensitive Google Chrome and Microsoft Edge User Data in US and Abroad, Warns Trend Micro

    By Henry KanapiOctober 1, 20253 Mins Read
    Share
    Twitter LinkedIn

    A new wave of AI-powered malware is infiltrating organizations worldwide, disguised as legitimate software and carrying the potential for widespread disruption.

    Cybersecurity researchers at Trend Micro warn that the trojan, tracked as EvilAI, poses as productivity or AI-enhanced utilities with professional interfaces and valid digital signatures.

    The deception has enabled the malware to penetrate both corporate and personal systems across multiple continents. First detected in late August, EvilAI infections have already appeared in Europe, the Americas, and the AMEA region, with early telemetry showing more than 100 confirmed cases. India has reported 74 incidents, followed by the United States with 68 and France with 58.

    Source: Trend Micro

    The malware’s mechanics are rooted in mimicry. Malicious apps such as Recipe Lister and PDF Editor deliver functional features to gain trust, while simultaneously launching hidden JavaScript payloads via Node.js. Attackers further enhance credibility with stolen or newly registered code-signing certificates, making the software appear “verified” to end users.

    The scale is broad and indiscriminate, with industry telemetry showing manufacturing with 58 incidents, government services with 51, and healthcare with 48. Technology and retail sectors have also been hit, underscoring the malware’s reach.

    Trend Micro says the malware uses AES-encrypted channels to maintain real-time communication with C2 servers. Attackers can exfiltrate browser data, enumerate security tools via registry queries, and deploy additional payloads through persistent scheduled tasks that blend in with legitimate Windows processes.

    “Based on telemetry, the attacker created copies of both the ‘Web Data’ and ‘Preferences’ files from Microsoft Edge and Google Chrome browser profiles.”

    The campaign remains active and appears to be operating as a stager, establishing access for secondary infostealers that remain unidentified. Cybersecurity researchers caution that the sophistication and speed of EvilAI’s spread reflect the increasing weaponization of artificial intelligence by threat actors.

    “This lack of clarity poses a significant risk. Without knowing what’s being delivered post-infection, organizations cannot fully assess the damage or implement effective containment. It also suggests the campaign is still active and evolving, with attackers possibly testing or rotating payloads in real time.

    The rise of AI-powered malware like EvilAI underscores a broader shift in the threat landscape. AI is no longer just a tool for defenders – it’s now being weaponized by threat actors to produce malware that is smarter, stealthier, and more scalable than ever before. In this environment, familiar software, signed certificates, and polished interfaces can no longer be taken at face value.”

    Disclaimer: Opinions expressed at CapitalAI Daily are not investment advice. Investors should do their own due diligence before making any decisions involving securities, cryptocurrencies, or digital assets. Your transfers and trades are at your own risk, and any losses you may incur are your responsibility. CapitalAI Daily does not recommend the buying or selling of any assets, nor is CapitalAI Daily an investment advisor. See our Editorial Standards and Terms of Use.

    AI AI-powered malware Malware Trend Micro
    Previous ArticleJPMorgan Races Toward AI-Connected Future As Bank of America Rolls Out AI for Payments
    Next Article Arm CEO Rene Haas Names One AI Play That’s Going To Be Bigger Than Data Centers – And It’s Not Power

    Read More

    Deutsche Bank Warns AI Trade Flashing ‘Red Light’ Signals, Sees Investors Buying This Asset As Safe-Haven Hedge

    October 5, 2025

    Bank of America: Nvidia AI Boom Hitting a Hidden Bottleneck Most Investors Miss

    October 4, 2025

    Yale Finds No Proof AI Is Killing Jobs, Calls Labor Market Panic Premature

    October 4, 2025

    Google Gemini Traffic Surges 111% in a Year As ChatGPT Loses Ground, According to Similarweb

    October 4, 2025

    Goldman Sachs Pouring $6 Billion Into AI and Tech in 2025, Embraces Tools Like Cognition’s Devin

    October 4, 2025

    More Than Half of Adults Fail To Spot AI Scams, Leaving Accounts and Enterprises at Risk: Yubico Research

    October 4, 2025
    X (Twitter) LinkedIn
    • About
    • Author
    • Editorial Standards
    • Contact Us
    • Privacy Policy
    • Terms of Service
    • Opt-out preferences
    © 2025 CapitalAI Daily. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}