AI-Driven Phishing Campaign Uses Browser Permissions to Harvest Sensitive Data
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。 首先,我需要通读整篇文章,理解其主要内容。文章讲的是一个由AI驱动的新网络钓鱼活动,由Cyble的研究团队发现。这个活动从2026年初开始活跃,使用了多种社会工程诱饵,比如ID扫描、Telegram ID冻结和“健康基金AI”等主题。 攻击者通过这些诱饵让用户授予访问摄像头和麦克风的权限,然后收集大量的数据,包括图像、视频、音频、设备规格、联系人信息和地理位置等。这些数据通过Telegram机器人快速传输给攻击者。 此外,研究人员还发现攻击中使用了AI辅助代码生成,推测攻击者可能利用了生成式AI工具来加速开发。基础设施方面,主要使用edgeone.app平台来托管钓鱼页面,并模仿知名平台来获取用户信任。 攻击机制主要是通过JavaScript触发浏览器权限提示,一旦用户授权,就开始实时数据捕获。数据收集不仅限于媒体内容,还包括设备指纹和地理位置信息。 最后,文章提到这个活动对个人和企业的风险,包括身份盗窃、账户接管、绕过验证系统以及勒索等。同时指出攻击中使用了表情符号格式的代码,这可能与AI生成有关。 总结一下:这是一个利用AI技术的网络钓鱼活动,通过欺骗手段获取用户设备权限并收集大量敏感数据。攻击者利用Telegram进行数据传输,并且可能借助生成式AI工具提高效率。 现在需要将这些要点浓缩到100字以内。确保涵盖主要信息:AI驱动的钓鱼活动、社会工程诱饵、权限获取、数据收集范围、Telegram传输以及潜在风险。 最终的总结应该是简洁明了的。 </think> 一项新的AI驱动网络钓鱼活动被发现,该活动利用多种社会工程诱饵诱导用户授予设备权限,从而收集包括摄像头、麦克风数据在内的大量敏感信息,并通过Telegram快速传输给攻击者,对个人隐私和企业安全构成严重威胁。 2026-3-17 09:8:24 Author: thecyberexpress.com(查看原文) 阅读量:7 收藏

A new AI-driven phishing campaign, uncovered by Cyble Research & Intelligence Labs (CRIL) demonstrates how attackers are moving beyond traditional credential theft and adopting more invasive, technology-driven tactics. 

According to CRIL, the campaign has been active since early 2026 and relies on a wide range of social engineering lures, including themes like ID scanner, Telegram ID freezing, and “Health Fund AI.” These deceptive entry points are designed to trick users into granting access to hardware features such as cameras and microphones under the guise of verification or account recovery. 

Once permissions are granted, the malicious scripts begin collecting extensive data. This includes images, video recordings, microphone audio, device specifications, contact details, and approximate geographic location. The stolen data is then transmitted to attacker-controlled systems via Telegram bots, making exfiltration quick and efficient. 

Researchers also noted signs of AI-assisted code generation within the campaign’s infrastructure. Structured annotations and unusual emoji-based formatting embedded in the scripts suggest the use of generative AI tools to streamline development and deployment. 

Infrastructure and Attack Mechanism 

The campaign primarily uses the edgeone.app platform to host phishing pages, enabling scalable and low-cost deployment. These pages impersonate well-known platforms such as TikTok, Instagram, Telegram, Google Chrome, and even games like Flappy Bird to gain user trust. 

Campaign Overview
Campaign Overview (Source: Cyble)

Unlike traditional phishing attacks that rely on victims entering credentials, this AI-driven phishing campaign focuses on browser-level permissions. Once a user interacts with a phishing page, JavaScript code triggers permission prompts. If accepted, the script activates the device camera and begins capturing live data. 

report-ad-banner

JavaScript Implementation Used for Browser-Based Photo Capture
JavaScript Implementation Used for Browser-Based Photo Capture (Source: Cyble)

A key technique involves rendering a frame from a live video stream onto an HTML5 canvas using ctx.drawImage(), then converting it into a JPEG file via canvas.toBlob(). This file is immediately transmitted to attackers through the Telegram Bot API. The same process is used for video and audio recordings. 

Expanded Data Collection Capabilities 

The phishing framework goes beyond simple media capture. It performs extensive device fingerprinting using browser APIs such as: 

  • navigator.userAgent 
  • navigator.platform 
  • navigator.deviceMemory 
  • navigator.hardwareConcurrency 
  • navigator.connection 
  • navigator.getBattery 

Through these methods, attackers gather detailed information about the victim’s device, including operating system, browser version, CPU capacity, RAM, network type, and battery status. 

Additionally, the script retrieves the victim’s IP address via external services and enriches it with geolocation data such as country, city, latitude, and longitude. This information is aggregated and sent to attackers before further data collection begins. 

Script Fetching Victim IP and Geolocation via External APIs
Script Fetching Victim IP and Geolocation via External APIs (Source: Cyble)

The campaign also attempts to access contact lists using the browser’s Contacts Picker API. If users grant permission, names, phone numbers, and email addresses are extracted and transmitted. 

Role of Telegram in Data Exfiltration 

A notable aspect of this campaign is its reliance on Telegram for command-and-control (C2) operations. By using Telegram bots, attackers eliminate the need for complex backend infrastructure. Data such as images, videos, and audio files are sent directly via API methods like sendPhotosendVideo, and sendAudio. 

This approach simplifies operations while providing attackers with immediate access to stolen information. 

User Interface Deception 

To maintain credibility, phishing pages display realistic status messages such as “Capturing photo,” “Sending to server,” and “Photo sent successfully.” These prompts mimic legitimate verification workflows, reinforcing the illusion of authenticity. 

Once the data is captured and transmitted, the script shuts down the camera and resets the interface, leaving minimal visible traces of the attack. 

Risks and Business Impact 

The implications of this AI-driven phishing campaign are significant. By collecting biometric and contextual data, attackers gain powerful tools for: 

  • Identity theft and account takeover 
  • Bypassing video-based verification systems 
  • Targeted social engineering attacks 
  • Extortion using captured multimedia 

For example, images and audio recordings could be used to impersonate victims or bypass KYC (Know Your Customer) systems. Device and location data allow attackers to craft highly personalized attacks, increasing their success rate. 

Organizations face additional risks, including reputational damage, regulatory exposure, and financial losses. The use of impersonated brands further amplifies the threat by eroding trust in legitimate digital services. 

One of the more unusual findings in this campaign is the presence of emojis embedded within the script’s operational logic. While uncommon in manually written malware, such patterns are linked to AI-assisted code generation. This suggests attackers may be leveraging generative AI tools to accelerate development and scale their operations. 


文章来源: https://thecyberexpress.com/ai-driven-phishing-campaign/
如有侵权请联系:admin#unsafe.sh