By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Caught on Camera: How AI Is Exposing Cybercriminal Attacks Using Their Own Screenshots
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Caught on Camera: How AI Is Exposing Cybercriminal Attacks Using Their Own Screenshots
News

Caught on Camera: How AI Is Exposing Cybercriminal Attacks Using Their Own Screenshots

News Room
Last updated: 2025/08/11 at 5:06 AM
News Room Published 11 August 2025
Share
SHARE

LAS VEGAS—People do strange things in the middle of a house robbery, like make a sandwich or take selfies. Is it all that odd, then, that an infostealer malware cyberattack might leave some selfies behind? It’s true: Many malware campaigns leave screenshots behind that the attackers use to sell the data they’ve stolen. But a presentation at the Black Hat cybersecurity conference in Las Vegas explored how LLMs (large language models) can process these images and other traces to understand infostealer attacks and ultimately prevent them.

Estelle Ruellan, threat intelligence researcher at cybersecurity company Flare, came up with the idea and built the LLMs to implement the analysis. She presented her research, backed by Olivier Bilodeau, Flare’s principal security researcher.


What Is Infostealer Malware?

Bilodeau first explained how infostealer malware works. “The user downloads malware, usually cracked software. That malware steals everything it can access. It doesn’t require admin rights, though if it gets that access, it can steal more. It grabs crypto wallets, password manager data, even the clipboard contents.” Sound familiar? It may be a new term, but you’re probably familiar with the type of attack.

(Credit: Flare)

“The malware packages up this data and uploads it to its command and control server,” he continued. “It often uses Telegram. Then the logs are resold to cyber criminals, again on Telegram. You buy a subscription, and the stealer campaign will send you logs daily.”

Bilodeau didn’t specify just how they did it, but the team acquired millions of these stolen information packages. “We are looking at these post-infection artifacts, and today we are focusing on screenshots,” he said. He explained that the campaigns take screenshots of their own activities to help do things like detect if they’re running in a sandbox. “They are taking selfies of a crime scene,” he said. “There’s so much info we can extract.”

“But analyzing a screenshot is time-consuming,” he continued. “There’s too much information. Hey, it’s 2025, everything is AI and large language models. This is where Estelle’s genius comes in.”


How Do PCs Get Infected With Infostealer Malware?

When it comes to how people end up getting this malware on their PCs, it turned out to be less about email attachments or random downloads. More often, it’s people hoping they’re grabbing a free or cheap copy of software they want, but ending up downloading malware. “We saw YouTube as a massive distribution system,” Ruellan said. “It works, and it’s free. Second was Google ads, leveraged to get the top spot. It’s a fast lane to the users’ trust.”


If it’s free and shady, you are likely the victim.

– Estelle Ruellan, Flare

Bilodeau presented two demos of the technique: a campaign promising free access to MidJourney and a Java campaign that they named Java Blitz (because it spread worldwide in a single weekend). “These two successful campaigns used simple tricks,” he noted. “Threat actors rely on simple psychological tactics because they still work.”


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!


Two LLMs Are Better Than One

“When I came to this project, I thought I’d just translate my thoughts to the LLM, as if it were a human,” said Ruellan. “It’s a simple task—identify the infection vector. But the LLM did not think or act like a human.”

Recommended by Our Editors

She found that the secret was to use two separate LLMs. The first would analyze each image and generate a formatted text description containing things like visible URLs, descriptions suggesting cracked software, and any text advising the victim to turn off antivirus software for proper installation.

Malware Advises Turning Off Antivirus

(Credit: Flare)

These formatted descriptions become the input to the second LLM. “The second layer identifies the vector as well as the theme of the campaign,” said Ruellan. “We were able to track the campaigns and, more important, see the tactics used to infect the most people.” She explained that cracked software proved to be a very popular lure, as all too many people would compromise their own security to get something for nothing.


It’s Up to Everyone to Protect Our Data

“Infostealers are quite the threat,” concluded Ruellan. “They are still super active. As long as they keep sharing screenshots, we will be able to track them.” She advised attendees to find ways they can apply their own analyst intuition to an LLM. Going forward, she plans to work on all the artifacts of the stealer logs.

Knowledge is power. By learning the details of infostealer campaigns, researchers can help foil them. The rest of us can do our part by paying attention, not trying to get something for nothing, and practicing good cybersecurity hygiene.

About Neil J. Rubenking

Principal Writer, Security

Neil J. Rubenking

When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that fateful meeting, I’ve become PCMag’s expert on security, privacy, and identity protection, putting antivirus tools, security suites, and all kinds of security software through their paces.

Before my current security gig, I supplied PCMag readers with tips and solutions on using popular applications, operating systems, and programming languages in my “User to User” and “Ask Neil” columns, which began in 1990 and ran for almost 20 years. Along the way I wrote more than 40 utility articles, as well as Delphi Programming for Dummies and six other books covering DOS, Windows, and programming. I also reviewed thousands of products of all kinds, ranging from early Sierra Online adventure games to AOL’s precursor Q-Link.

In the early 2000s I turned my focus to security and the growing antivirus industry. After years working with antivirus, I’m known throughout the security industry as an expert on evaluating antivirus tools. I serve as an advisory board member for the Anti-Malware Testing Standards Organization (AMTSO), an international nonprofit group dedicated to coordinating and improving testing of anti-malware solutions.

Read Neil J.’s full bio

Read the latest from Neil J. Rubenking

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article CBK fines 11 banks for lending, capital and governance breaches
Next Article UFC Fight Night: Dolidze vs Hernandez | Watch on iPhone, iPad, Mac, Apple TV
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Re-Enable GPT-4o Model in ChatGPT for Mac
News
NVIDIA reportedly to launch cut-down H20 chip for China as early as July: report · TechNode
Computing
What Does Palantir Actually Do?
Gadget
Oxford Nanopore co-founder to step down as chief executive – UKTN
News

You Might also Like

News

How to Re-Enable GPT-4o Model in ChatGPT for Mac

2 Min Read
News

Oxford Nanopore co-founder to step down as chief executive – UKTN

3 Min Read
News

Nvidia, AMD to Pay 15% of Revenue From China AI Chip Sales to US Government

6 Min Read
News

The 15-inch 2025 MacBook Air is down to a record-low price at Amazon

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?