Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Home/CyberSecurity News/Vibe-Coded” Malware Uses Fake Tools & Campaign CDNs
CyberSecurity News

Vibe-Coded” Malware Uses Fake Tools & Campaign CDNs

AI-assisted coding offers significant value to developers globally, yet it simultaneously creates new exploitation avenues for cybercriminals. A concept known as “vibe coding” — where users simply...

Sarah simpson
Sarah simpson
March 19, 2026 3 Min Read
0 0

AI-assisted coding offers significant value to developers globally, yet it simultaneously creates new exploitation avenues for cybercriminals.

A concept known as “vibe coding” — where users simply describe what they want and AI models write the code for them — has now been turned against everyday internet users.

Threat actors are leaning on this technique to build malware faster and with far less skill, making it easier than ever to launch a dangerous campaign.​

In January 2026, a large-scale malware campaign came to light. More than 443 malicious ZIP files were found in the wild, each disguised as something users might actually want — AI image generators, voice-changing tools, game hacks, Roblox script executors, VPN software, graphics card drivers, ransomware decryptors, and even infostealer tools.

These files were hosted on widely-used platforms including Discord, SourceForge, FOSSHub, MediaFire, and a site at mydofiles.com.

Attack Vector (Source - McAfee)
Attack Vector (Source – McAfee)

McAfee analysts identified the campaign and noted that early signs of this threat trace back to December 2024, with AI-generated scripting elements appearing more recently.

Researchers uncovered 48 unique variants of a file called WinUpdateHelper.dll — the malicious engine behind every infection.

These 48 variants break into 17 distinct kill chains, each with its own command-and-control infrastructure, yet sharing cryptocurrency wallet credentials, a mistake that allowed researchers to follow the money.​

The campaign reached users across multiple countries, with the United States seeing the highest rate of infection, followed by the United Kingdom, India, Brazil, France, Canada, and Australia.

Geographical Prevalence (Source - McAfee)
Geographical Prevalence (Source – McAfee)

Seven Bitcoin wallets tied to the operation held roughly 4,536 USD at the time of writing, with total received funds reaching nearly 11,498 USD.

Since most mining targets privacy-focused coins like Monero and Zephyr, the true financial impact is likely considerably higher.​

More than 100 URLs were actively serving this malware at the time of discovery, with around 61 hosted on Discord, 17 on SourceForge, and 15 on mydofiles.com — a wide distribution footprint that makes this campaign hard to contain through takedown alone.​

Inside the Infection Chain

When a user opens one of the trojanized ZIP archives and runs the executable inside, a malicious DLL — WinUpdateHelper.dll — is quietly loaded alongside it.

Files within the ZIP archive (Source - McAfee)
Files within the ZIP archive (Source – McAfee)

The executable is clean and passes basic security checks. The DLL then opens the victim’s browser and redirects it to a page claiming the user is missing a critical dependency.

The victim is directed to download DependencyCore.zip, which installs unrelated third-party software — in one confirmed case, iTop Easy Desktop — purely as a distraction.​

While the victim is distracted by the fake installer, WinUpdateHelper.dll has already connected to a command-and-control server.

The C2 domain is generated dynamically using the system’s UNIX timestamp and refreshes every 58 days, making it difficult to block in advance.

Malicious code within WinUpdateHelper.dll (Source - McAfee)
Malicious code within WinUpdateHelper.dll (Source – McAfee)

To keep hold on the system, the malware registers a Windows service named “Microsoft Console Host,” set to run at every system boot. The PowerShell script it pulls down then executes entirely in memory — a fileless method that keeps it invisible to tools that scan files on disk.​

The PowerShell script carries out a chain of harmful actions once running. It removes older persistence entries to avoid conflicts, then adds the ProgramData folder to Windows Defender’s exclusion list so further payloads can be dropped without detection.

Two coin miners are then deployed: one uses the CPU to mine Zephyr, the other uses the GPU to mine Ravencoin, with rewards converted to Bitcoin before payout.

In certain infections, the final payload is SalatStealer or a Mesh Agent remote access tool. Users should avoid downloading software from unofficial sources, regularly review active Windows services for unexpected entries, and treat unsolicited dependency prompts as a warning sign.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareransomwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical Claude Vulnerabilities Exfiltrate Data & Redirect Users

Next Post

Critical Ubiquiti UniFi Vulnerabilities Allow Attackers to Seize

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us