Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft

(trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft

    Threat actors are abusing Kuse.ai, a trusted AI workplace platform, to host phishing documents and harvest credentials via Vendor Email Compromise (VEC).

    In brief - Cybercriminals exploited Kuse.ai’s legitimate file-sharing features to distribute malicious Markdown (.md) files, redirecting victims to a fake Microsoft login page. This attack highlights the risks of AI platforms being weaponized for social engineering and the need for phishing-resistant MFA and real-time URL inspection.

    Technically - The attack chain involved a compromised vendor mailbox sending phishing emails with a Kuse.ai-hosted .md file (app[.]kuse[.]ai). The file used a blurred preview to lure clicks, redirecting to a credential-harvesting page (hxxps://onlineapp[.]ooraikaoo[.]info). The use of .md files evaded signature-based detection, while VEC and platform legitimacy increased deception. IoCs include the malicious domain and Kuse.ai URL. Mitigations require sandboxing, advanced email filtering, and phishing-resistant MFA.

    Source: https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html

    #Cybersecurity #ThreatIntel

    badsamurai@infosec.exchangeB 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • orlysec@swecyb.comO orlysec@swecyb.com

      (trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft

      Threat actors are abusing Kuse.ai, a trusted AI workplace platform, to host phishing documents and harvest credentials via Vendor Email Compromise (VEC).

      In brief - Cybercriminals exploited Kuse.ai’s legitimate file-sharing features to distribute malicious Markdown (.md) files, redirecting victims to a fake Microsoft login page. This attack highlights the risks of AI platforms being weaponized for social engineering and the need for phishing-resistant MFA and real-time URL inspection.

      Technically - The attack chain involved a compromised vendor mailbox sending phishing emails with a Kuse.ai-hosted .md file (app[.]kuse[.]ai). The file used a blurred preview to lure clicks, redirecting to a credential-harvesting page (hxxps://onlineapp[.]ooraikaoo[.]info). The use of .md files evaded signature-based detection, while VEC and platform legitimacy increased deception. IoCs include the malicious domain and Kuse.ai URL. Mitigations require sandboxing, advanced email filtering, and phishing-resistant MFA.

      Source: https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html

      #Cybersecurity #ThreatIntel

      badsamurai@infosec.exchangeB This user is from outside of this forum
      badsamurai@infosec.exchangeB This user is from outside of this forum
      badsamurai@infosec.exchange
      wrote last edited by
      #2

      @orlysec @deepthoughts10 here’s a fun one.

      1 Reply Last reply
      1
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups