AI

Fake AI Tools Are Spreading Noodlophile Malware

Hackers are now using fake AI platforms to deliver Noodlophile malware, a potent data-stealing tool that puts user credentials, cryptocurrency wallets, and personal data at risk.

How The Scam Works

According to Shmuel Uzan, a cybersecurity researcher at Morphisec, Noodlophile threat actors are shifting away from conventional phishing emails and cracked software distribution. Instead, they are building professional-looking websites and apps themed around AI.

Uzan explained:

“Instead of relying on traditional phishing or cracked software sites, they build convincing AI-themed platforms, often advertised via legitimate-looking Facebook groups and viral social media campaigns.”

 

Noodlophile & Other Fake AI Tools

Source: Morphisec

 

These fake tools are actively promoted in Facebook groups frequented by digital creators, AI enthusiasts, and freelancers. Once a user clicks on the promoted content, they are redirected to a website that mimics an AI service. There, they are prompted to upload an image or video, followed by a download prompt for a file named VideoDreamAI.zip.

What appears to be a creative tool is actually a trojan horse. The ZIP file contains malicious Python code that executes the Noodlophile Stealer, silently stealing sensitive data in the background.

 

Fake Pages Identified

The most popular social media platform being leveraged for this campaign is Facebook, which has billions of active users. Hackers are taking advantage of the platform’s wide reach to push fake AI tools to unsuspecting victims.

Some of the fraudulent Facebook pages involved include:

  • Luma Dreammachine AI

  • Luma Dreammaching

  • gratistuslibros

A single post from one of these pages has received over 62,000 views, underscoring the scale of exposure. These pages are often filled with polished visuals and enticing claims about revolutionary AI tools, making them hard to distinguish from real startups.

 

Malware-As-A-Service

Noodlophile Stealer is actually part of broader Malware-as-a-Service (MaaS) schemes. Sellers on these underground platforms bundle the malware with tools labeled “Get Cookie + Pass,” which are explicitly designed for account takeover and credential theft.

Once the malware is active on a victim’s system, it communicates with the attacker through Telegram bots, serving as a covert command-and-control channel. Telegram’s encrypted messaging and large user base, over 900 million daily users, make it a preferred medium for cybercriminals.

These bots silently exfiltrate browser credentials, saved passwords, session cookies, and even cryptocurrency wallet information to the attacker, all without the victim knowing.

 

Links To Vietnam & Telegram

There is strong evidence suggesting that the origins of Noodlophile can be traced back to Vietnam, where exploitation of old routers and similar equipment are common.

A GitHub page tied to the malware references a “passionate malware developer from Vietnam,” and the same individual was seen interacting with related Facebook content.

Southeast Asia, particularly Vietnam, has been identified as a hotspot for cybercrime activity, where platforms like Facebook are frequently used to spread stealer software and promote illicit software tools.

 

Mario Nawfal Warning

Source: X (@MarioNawfal)

 

Elsewhere, Telegram founder Pavel Durov commented on the entire ordeal, saying:

“In its 12-year history, Telegram has never disclosed a single byte of private messages.”

He emphasized that even under pressure, Telegram will comply only with court orders under the EU Digital Services Act and will not reveal message content, just IP addresses and phone numbers of suspects.

 

How To Stay Vigilant

The rise of AI-themed malware campaigns like Noodlophile serves as a harsh reminder that cybercriminals are constantly evolving their tactics. With tools like Noodlophile Stealer, attackers are targeting people’s curiosity and trust in emerging technologies to steal sensitive data.

Users can protect themselves in the following ways:

  • Avoid downloading AI tools from unknown sources, especially links shared in Facebook groups.

  • Use updated antivirus software that can detect Python-based malware.

  • Never run ZIP files from unverified platforms, no matter how legitimate they appear.

  • Be wary of Facebook pages with few followers but high engagement, as these are often part of coordinated scams.

As AI tools become more integrated into our daily workflows, it’s critical to approach new platforms with caution and skepticism.

AIFake ToolsNoodlophileSecurity

Join Our FREE Newsletter

Subscribe to stay informed and receive latest updates on the latest happenings in the crypto world!


By submitting this form, you are consenting to receive marketing emails from: Crypto Weekly. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Haider Jamal

Content Strategist

Haider is a fintech enthusiast and Content Strategist at CryptoWeekly with over four years in the Crypto & Blockchain industry. He began his writing journey with a blog after graduating from Monash University Malaysia. Passionate about storytelling and content creation, he blends creativity with insight. Haider is driven to grow professionally while always seeking the next big idea.

Read More >

Join Our FREE Newsletter

Subscribe to stay informed and receive latest updates on the latest happenings in the crypto world!


By submitting this form, you are consenting to receive marketing emails from: Crypto Weekly. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Search

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

News: