Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Home/Threats/AI Malicious Job Offers Deploy PureRAT via Threat Actors
Threats

AI Malicious Job Offers Deploy PureRAT via Threat Actors

A Vietnamese cybercrime group has leveraged artificial intelligence to craft malicious code. This code is central to an ongoing phishing campaign that distributes PureRAT malware via fraudulent job...

Jennifer sherman
Jennifer sherman
January 29, 2026 2 Min Read
1 0

A Vietnamese cybercrime group has leveraged artificial intelligence to craft malicious code. This code is central to an ongoing phishing campaign that distributes PureRAT malware via fraudulent job offers.

The campaign, initially detected in December 2025, represents a concerning evolution in threat actor capabilities, combining social engineering tactics with machine-generated attack tools to compromise organizations worldwide.

The attacks begin with phishing emails disguised as legitimate employment offers from well-known companies. These messages contain ZIP archives named after job-related topics, such as “New_Remote_Marketing_Opportunity_OPPO_Find_X9_Series.zip” or “Salary and Benefits Package.zip.”

When recipients open these archives, they trigger an infection chain that eventually installs PureRAT or other malicious payloads like hidden virtual network computing (HVNC) tools.

The campaign targets diverse organizations across multiple industries, suggesting the attackers may be selling access to compromised networks rather than conducting targeted espionage.

After analyzing the attack tools, Symantec researchers identified multiple indicators that the malicious scripts were created using artificial intelligence.

The batch files and Python code contained detailed Vietnamese-language comments explaining each step, numbered instructions, and even emoji symbols in code remarks—characteristics commonly associated with AI-generated programming.

This level of documentation is rarely seen in manually written malware scripts, making the AI authorship particularly evident.

The malicious archives typically contain legitimate executables repurposed for DLL sideloading attacks. Files such as “adobereader.exe” or “Salary_And_Responsibility_Table.exe” are used to load harmful DLLs including oledlg.dll, msimg32.dll, version.dll, and profapi.dll.

These DLLs act as loaders for the final payload, establishing persistence and maintaining stealth throughout the infection process.

How PureRAT Establishes Persistence

Once executed, the malicious batch script creates a hidden directory under the Windows %LOCALAPPDATA%Google Chrome folder to conceal its presence from users.

The script then renames benign-looking files like “document.pdf” and “document.docx” into archive formats, extracts the contents using embedded compression tools with the password “[email protected],” and executes a Python-based payload.

This payload fetches Base64-encoded malicious code from remote command-and-control servers operated by the attackers.

To maintain long-term access, the malware adds itself to the Windows Registry Run key under the name “ChromeUpdate,” ensuring it executes automatically every time the system starts.

After establishing persistence, the script opens a legitimate PDF document from the hidden directory to deceive victims into believing they simply opened a normal file.

This technique reduces suspicion and allows the malware to operate undetected while stealing data or providing remote access to the compromised system.

The Vietnamese origin of the threat actor is evident through multiple indicators beyond the language used in code comments. Passwords containing “@dev.vn” domains and GitLab accounts with Vietnamese usernames reinforce the attribution.

Symantec Endpoint products now detect and block the identified malicious files, providing protection against this evolving threat campaign.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

eSkimming Attacks: Persistent Threats & Unfinished Recovery

Next Post

Cal.com Broken Access Control Allows Account Take Controls Exposes

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
WatchGuard Agent Flaws Grant Full SYSTEM Privileges on
May 7, 2026
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us