AI-Generated TikTok Videos Distributing Infostealer Malware

Vijay Shekhawat
Vijay Shekhawat

Software Architect

 
May 27, 2025 3 min read

Cybersecurity researchers from Trend Micro have identified a troubling new malware campaign utilizing AI-generated videos on TikTok. This campaign represents a significant departure from traditional malware distribution methods, exploiting TikTok’s wide reach and algorithmic nature to share infostealing malware, specifically Vidar and StealC. Hackers are creating numerous videos that claim to provide legitimate software activations for Windows and Microsoft Office, or premium features in apps like Spotify and CapCut. Users are misled into executing PowerShell commands presented in the videos, believing they are activating software when, in fact, they are downloading malware. The videos are designed to bypass traditional security measures, as the instructions are delivered visually rather than through clickable links or embedded code. Trend Micro noted, “This attack uses videos (possibly AI-generated) to instruct users to execute PowerShell commands, which are disguised as software activation steps. TikTok's algorithmic reach increases the likelihood of widespread exposure, with one video reaching more than half a million views.” The researchers reported that the videos are often very similar, indicating that they were likely produced through automated processes.

TikTok Videos Deliver Malware via PowerShell

The TikTok logo with a person holding a phone in their hand is seen in Knurow, Poland, on April 20, 2025. Image courtesy of Mashable The latest campaign takes advantage of TikTok’s popularity, using social engineering tactics to spread malware directly through the platform without the need for additional malicious websites. Videos instruct users to input PowerShell commands that initiate a malware infection, which is a stark contrast to previous tactics that relied on links embedded in video descriptions or comments. The PowerShell commands are designed to download malicious scripts from various URLs, ultimately leading to the installation of the Vidar or StealC malware. These information stealers are capable of exfiltrating sensitive data, including screenshots, credit card information, and 2FA codes. Trend Micro emphasized that, “The commands are never embedded in text or links, making them harder for traditional security systems to detect.”

A Call for Smarter Defenses

The TikTok logo on a phone in a woman's hand Image courtesy of Lifehacker As the cybersecurity landscape evolves, so too must the defenses against such sophisticated attacks. Trend Micro advocates for the need to advance detection strategies beyond traditional methods, urging organizations to monitor social media platforms for high-engagement posts that may indicate malicious activity. Implementing behavioral detection tools is essential to catch unusual user actions, such as unexpected command-line executions. Education on recognizing and reporting deceptive video content is also critical, especially as these tactics become more prevalent. Cybersecurity marketers can leverage tools like GrackerAI to stay informed about emerging trends and threats in the landscape. GrackerAI’s AI-powered platform helps organizations transform security news into strategic content opportunities. By automating the generation of insights from industry developments, GrackerAI supports marketing teams in creating timely, relevant content that resonates with cybersecurity professionals and decision-makers. Explore how GrackerAI can enhance your cybersecurity marketing efforts at https://gracker.ai.

Latest Cybersecurity Trends & Breaking News

Operation Endgame: Global Crackdown on Malware Networks and Cybercrime Judges Consider Managing Their Own Security Force Due to Rising Threats

Vijay Shekhawat
Vijay Shekhawat

Software Architect

 

Principal architect behind GrackerAI's self-updating portal infrastructure that scales from 5K to 150K+ monthly visitors. Designs systems that automatically optimize for both traditional search engines and AI answer engines.

Related Articles

How Cybersecurity Teams Use AI to Analyze Compliance, Audits and Security Reports
Cybersecurity

How Cybersecurity Teams Use AI to Analyze Compliance, Audits and Security Reports

Discover how cybersecurity teams use AI to analyze compliance, audits, and security reports faster with better accuracy and less burnout.

By Govind Kumar December 24, 2025 6 min read
Read full article
Key Strategies That Support Long-Term SEO Growth for Online Platforms
SEO Strategy

Key Strategies That Support Long-Term SEO Growth for Online Platforms

Discover proven strategies for long-term SEO growth, including quality content, AI-driven SEO, technical optimization, audience research, and ethical link building.

By Ankit Agarwal December 24, 2025 6 min read
Read full article
How to Communicate Online in 2026: 9 Tools to Try
Business

How to Communicate Online in 2026: 9 Tools to Try

Discover 9 top online communication tools for 2026 to boost team collaboration, customer chats, and secure, seamless business communication.

By Pratham Panchariya December 24, 2025 7 min read
Read full article
How to Keep Your Personal Blog Fresh and SEO-Friendly?
SEO

How to Keep Your Personal Blog Fresh and SEO-Friendly?

Learn proven ways to update blogs with keywords, links, visuals, and FAQs to stay SEO-friendly, boost rankings, and attract new visitors.

By Pratham Panchariya December 24, 2025 6 min read
Read full article