Malware Masquerade: Fake Kling AI Ads Trick Users with Sneaky Downloads
Cybercriminals are targeting Kling AI users with malware scams, posing as the popular generative AI platform. They use fake ads and cloned websites to trick users into downloading malicious files disguised as harmless images. Once installed, the malware can grant attackers full control of the compromised system. Stay cautious and verify sources!

Hot Take:
Seems like cybercriminals have found a new muse in the form of generative AI tools, and they’re crafting their own sinister ‘masterpieces’. It’s a reminder that while AI may be creating movies from our minds, it’s also starring in some real-life cyber drama. Remember, just because the site smells like Kling, doesn’t mean it’s not a clingy malware trying to stick onto your system!
Key Points:
- Cybercriminals posed as Kling AI to spread malware through fake ads and websites.
- Malicious files masqueraded as harmless image files to trick users.
- A remote access Trojan (RAT) was deployed to gain control over compromised systems.
- Indicators suggest Vietnam-based groups might be behind the campaign.
- Check Point Research warns users to verify the source of ads before downloading.
Already a member? Log in here