<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft]]></title><description><![CDATA[<p>(trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft</p><p>Threat actors are abusing Kuse.ai, a trusted AI workplace platform, to host phishing documents and harvest credentials via Vendor Email Compromise (VEC).</p><p>In brief - Cybercriminals exploited Kuse.ai’s legitimate file-sharing features to distribute malicious Markdown (.md) files, redirecting victims to a fake Microsoft login page. This attack highlights the risks of AI platforms being weaponized for social engineering and the need for phishing-resistant MFA and real-time URL inspection.</p><p>Technically - The attack chain involved a compromised vendor mailbox sending phishing emails with a Kuse.ai-hosted .md file (app[.]kuse[.]ai). The file used a blurred preview to lure clicks, redirecting to a credential-harvesting page (hxxps://onlineapp[.]ooraikaoo[.]info). The use of .md files evaded signature-based detection, while VEC and platform legitimacy increased deception. IoCs include the malicious domain and Kuse.ai URL. Mitigations require sandboxing, advanced email filtering, and phishing-resistant MFA.</p><p>Source: <a href="https://www.trendmicro.com/en_us/research/26/d/kuse-web-app-abused-to-host-phishing-document.html" rel="nofollow noopener"><span>https://www.</span><span>trendmicro.com/en_us/research/</span><span>26/d/kuse-web-app-abused-to-host-phishing-document.html</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/cb23e7f7-e59a-4044-a0c1-c088030be03d/trendmicro.com-abuse-of-kuse.ai-how-threat-actors-exploit-ai-platforms-for-phishing-and-credential-theft</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:54:32 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/cb23e7f7-e59a-4044-a0c1-c088030be03d.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 13:52:45 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to (trendmicro.com) Abuse of Kuse.ai: How Threat Actors Exploit AI Platforms for Phishing and Credential Theft on Wed, 29 Apr 2026 14:10:52 GMT]]></title><description><![CDATA[<p><span><a href="/user/orlysec%40swecyb.com" rel="nofollow noopener">@<span>orlysec</span></a></span> <span><a href="/user/deepthoughts10%40infosec.exchange">@<span>deepthoughts10</span></a></span> here’s a fun one.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/badsamurai/statuses/116488395332427382</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/badsamurai/statuses/116488395332427382</guid><dc:creator><![CDATA[badsamurai@infosec.exchange]]></dc:creator><pubDate>Wed, 29 Apr 2026 14:10:52 GMT</pubDate></item></channel></rss>