{"id":1577,"date":"2025-04-20T04:19:26","date_gmt":"2025-04-20T04:19:26","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=1577"},"modified":"2025-04-20T04:19:27","modified_gmt":"2025-04-20T04:19:27","slug":"look-out-capcut-copycats-are-on-the-prowl","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=1577","title":{"rendered":"Look out! CapCut copycats are on the prowl"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">Cybercriminals lure content material creators with guarantees of cutting-edge AI wizardry, solely to aim to steal their knowledge or hijack their gadgets as a substitute<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/christian-ali-bravo\/\" title=\"Christian Ali Bravo\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2023\/2023-8\/christian-ali-bravo.jpeg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2023\/2023-8\/christian-ali-bravo.jpeg\" alt=\"Christian Ali Bravo\"\/><\/picture><\/a><\/div>\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/tomas-foltyn\/\" title=\"Tom\u00e1\u0161 Folt\u00fdn\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" alt=\"Tom\u00e1\u0161 Folt\u00fdn\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>17 Apr 2025<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>3 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2025\/04-25\/capcut-fake-apps-dangers.png\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2025\/04-25\/capcut-fake-apps-dangers.png\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2025\/04-25\/capcut-fake-apps-dangers.png\" alt=\"CapCut copycats are on the prowl\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>The craze round generative AI instruments isn\u2019t simply reshaping industries \u2013 it additionally offers <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/beware-fake-ai-tools-masking-very-real-malware-threat\/\">fertile floor for cybercriminals<\/a>, who&#8217;re at all times fast to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/scammers-exploiting-deepseek-hype\/\" target=\"_blank\" rel=\"noopener\">piggyback on the attract<\/a> of the newest massive factor in tech. So what if, as a substitute of downloading an AI\u2011generated video from CapCut or one other comparable device, you had your knowledge stolen or gave management of your laptop to a stranger?<\/p>\n<p>The menace isn\u2019t hypothetical \u2013 safety researchers have beforehand <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cyble.com\/blog\/capcut-users-under-fire\/\" target=\"_blank\" rel=\"noopener\">noticed campaigns<\/a> that <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.broadcom.com\/support\/security-center\/protection-bulletin\/new-phishing-campaign-exploiting-capcut\" target=\"_blank\" rel=\"noopener\">exploited CapCut\u2019s recognition<\/a> to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/malware\/theyre-coming-data-infostealers-how-stay-safe\/\" target=\"_blank\" rel=\"noopener\">distribute a number of infostealers<\/a> and different malware. Let\u2019s now look briefly at one other marketing campaign that\u2019s focusing on individuals enthusiastic about AI-powered content material by promising premium variations of fashionable software program equivalent to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.capcut.com\/\" target=\"_blank\" rel=\"noopener\">CapCut<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.adobe.com\/express\/\" target=\"_blank\" rel=\"noopener\">Adobe Categorical<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.canva.com\/\" target=\"_blank\" rel=\"noopener\">Canva<\/a>.<\/p>\n<h2>The artwork of the lure<\/h2>\n<p>The instance beneath, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/g0njxa\/status\/1893794118490341772\" target=\"_blank\" rel=\"noopener\">noticed by X person g0njxa<\/a>, exhibits a web site that impersonates CapCut, a device usually utilized by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/08\/30\/tikshock-dont-get-caught-out-5-tiktok-scams\/\" target=\"_blank\" rel=\"noopener\">TikTok creators<\/a>, and purports to be CapCut\u2019s premium model. (Notice that the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.capcut.com\/activities\/subscribe\/\" target=\"_blank\" rel=\"noopener\">precise premium model<\/a> is named \u201cCapCut Professional\u201d or referred to easily as \u201cProfessional\u201d on the web site, not \u201cCapCutProAI&#8221; as within the screenshot.)<\/p>\n<p><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-1a.png\" alt=\"Figure 1a. Fake CapCut site - homepage\" width=\"\" height=\"\"\/><\/p>\n<p>After you land on the pretend website, you\u2019re requested to enter a immediate or add a reference file. When you comply, the location will mimic processing the request.<\/p>\n<p><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-1-1-2.png\" alt=\"Figure 1. Fake CapCut site\" width=\"\" height=\"\"\/><\/p>\n<p>As soon as the anticipation is constructed and the lure is sprung, you\u2019re prompted to obtain your shiny new &#8220;creation&#8221;. Needles to say, the file, known as <span style=\"font-family: courier new, courier, monospace;\">Creation_Made_By_CapCut.mp4 \u2013 CapCut.com<\/span>, is much from what it purports to be. In actuality, it\u2019s an executable for distant entry software program. Quick ahead just a few clicks and, until different safeguards kick in, you may be surrendering management of your gadget to crooks.<\/p>\n<p><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-2-1-2.png\" alt=\"Figure 2. Fake CapCut site\" width=\"\" height=\"\"\/><\/p>\n<p>Listed here are two extra websites that <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/scams\/many-faces-impersonation-fraud-spot-imposter-too-late\/\" target=\"_blank\" rel=\"noopener\">masquerade as the actual deal<\/a> and are <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/silentpush\/status\/1894235374828052575\" target=\"_blank\" rel=\"noopener\">a part of the identical marketing campaign<\/a>:<\/p>\n<p><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-3-1.png\" alt=\"Figure 3. Fake Adobe Express site\" width=\"\" height=\"\"\/><\/p>\n<p><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-4-1.png\" alt=\"Figure 4. Fake Canva site\" width=\"\" height=\"\"\/><\/p>\n<h2>Faraway, so shut<\/h2>\n<p>For context, whereas respectable distant entry instruments, equivalent to ConnectWise ScreenConnect, TeamViewer and AnyDesk, are invaluable for IT professionals offering technical assist, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/scams\/6-common-geek-squad-scams-how-defend\/\" target=\"_blank\" rel=\"noopener\">within the mistaken palms<\/a> they are often misused to take over management of your laptop for malicious ends. These embody <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/06\/27\/5-ways-cybercriminals-steal-credit-card-details\/\">knowledge theft<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/12\/23\/7-ways-malware-can-get-your-device\/\" target=\"_blank\" rel=\"noopener\">set up of ransomware or different malware<\/a>, and utilizing the compromised machine as a launch pad for assaults at different gadgets.<\/p>\n<p>These sorts of threats additionally loom giant on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/techniques\/T1219\/\" target=\"_blank\" rel=\"noopener\">company networks<\/a>, as menace actors can, for instance, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-025a\" target=\"_blank\" rel=\"noopener\">distribute moveable, self-contained executables<\/a> for respectable distant monitoring and administration (RMM) software program that circumvents admin privileges and obviates the necessity for full software program set up.<\/p>\n<p>\u201cMost distant management purposes include the choice to generate a preconfigured executable to connect with a selected IP deal with or person. That is helpful for distant help, but in addition for attackers. The sufferer merely has to open the file, and in a few clicks, they could unwittingly give management of their laptop to a cybercriminal,\u201d says Martina L\u00f3pez, a safety researcher with ESET\u2019s lab in Latin America.<\/p>\n<h2>Phrase to the clever<\/h2>\n<p>A\u00a0few easy steps will go a\u00a0great distance towards maintaining you secure:<\/p>\n<ul>\n<li>When <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/05\/16\/you-may-not-care-where-download-software-malware-does\/\" target=\"_blank\" rel=\"noopener\">downloading new software program<\/a>, be certain that to get it from the respectable supply, usually the writer\u2019s official web site<\/li>\n<li>Keep away from <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/scams\/dear-all-what-are-some-common-subject-lines-in-phishing-emails\/\" target=\"_blank\" rel=\"noopener\">clicking on unsolicited hyperlinks<\/a> in electronic mail or social media messages that usually declare to result in such web sites \u2013 the messages could also be pretend<\/li>\n<li>The identical goes for adverts \u2013 you\u2019re higher off navigating to the web site straight by typing it in your browser or trying to find it (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/watch-out-traps-lurking-search-results\/\">with a important eye<\/a>, although) in your search engine of alternative<\/li>\n<li>Examine the web site\u2019s URL \u2013 software program makers don\u2019t usually sport numerous oddball extensions in URLs or sneaky \u201calternate\u201d variations (suppose \u201cCapCutProAI\u201d)<\/li>\n<li>Ensure your working system, browser, and different software program <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/10\/24\/5-reasons-keep-software-devices-up-to-date\/\">are updated<\/a> to guard towards recognized vulnerabilities<\/li>\n<li>Use multi-layered safety software program, in addition to keep on with different fundamental cybersecurity hygiene practices, equivalent to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/01\/02\/most-common-passwords-what-do-if-yours-list\/\" target=\"_blank\" rel=\"noopener\">sturdy and distinctive passwords<\/a> and enabling <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2019\/12\/13\/2fa-double-down-your-security\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a> on all of your on-line accounts<\/li>\n<\/ul>\n<p>For sure, that is neither the primary nor final time CapCut customers have been focused by cybercriminals, and these examples simply present that cybercriminals are at all times keen to take advantage of belief and the newest massive factor in tech.<\/p>\n<p>The excellent news is that that whereas these ploys are sometimes slick, they\u2019re not invincible. Your vigilance is your finest defend towards scammers\u2019 ways.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals lure content material creators with guarantees of cutting-edge AI wizardry, solely to aim to steal their knowledge or hijack their gadgets as a substitute 17 Apr 2025 \u00a0\u2022\u00a0 , 3 min. learn The craze round generative AI instruments isn\u2019t simply reshaping industries \u2013 it additionally offers fertile floor for cybercriminals, who&#8217;re at all times [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1498,1499,1500],"class_list":["post-1577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-capcut","tag-copycats","tag-prowl"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1577"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1577\/revisions"}],"predecessor-version":[{"id":1578,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/1577\/revisions\/1578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/1579"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 20:24:31 UTC -->