CyberHappenings logo
☰

Cybercriminals exploit Lovable vibe coding service for malicious site creation

First reported
Last updated
📰 2 unique sources, 2 articles

Summary

Hide ▲

Cybercriminals have been exploiting the Lovable vibe coding service to create malicious websites for phishing attacks, crypto scams, and other threats. Lovable, a Stockholm-based startup, launched its AI-powered platform in late 2024 to help users build applications and websites. Since then, tens of thousands of Lovable URLs have been detected in malicious activities, including phishing kits, malware distribution, and credential harvesting. The abuse of Lovable highlights the growing trend of threat actors leveraging AI tools to enhance their attacks. Lovable has implemented new security protections, including Security Checker 2.0, an AI-powered platform safety program, and real-time detection of malicious site creation. Despite these measures, cybercriminals continue to find ways to abuse the platform.

Timeline

  1. 21.08.2025 01:11 📰 1 articles

    Detailed campaigns using Lovable for malicious activities

    A large-scale operation using the phishing-as-a-service platform Tycoon harvested user credentials, MFA tokens, and session cookies. A payment and data theft campaign impersonated UPS, sending nearly 3,500 phishing emails. A cryptocurrency theft campaign impersonated the DeFi platform Aave, sending out close to 10,000 emails via SendGrid. A malware delivery campaign distributed the remote access trojan zgRAT through Lovable-generated invoice portals.

    Show sources
  2. 21.08.2025 00:00 📰 2 articles

    Cybercriminals exploit Lovable vibe coding service for malicious site creation

    Since February 2025, cybercriminals have been abusing Lovable's vibe coding service to create malicious websites for phishing attacks, crypto scams, and other threats. Proofpoint researchers have observed tens of thousands of Lovable URLs in detections for malicious activity. Lovable has implemented new security protections, including Security Checker 2.0 and an AI-powered platform safety program, to mitigate these threats. In August 2025, Lovable introduced real-time detection of malicious site creation and daily scans to spot and delete fraud attempts. The platform's support and safety team has taken down over 300 sites in the past two weeks. Despite these measures, cybercriminals continue to find ways to abuse the platform, with Guardio Labs confirming that malicious sites can still be created.

    Show sources

Information Snippets

Similar Happenings

Malicious link spreading via X's Grok AI

Threat actors exploit X's Grok AI to bypass link posting restrictions and spread malicious links. They embed links in the 'From:' metadata field of video ads, prompting Grok to reveal the links in replies. This technique, dubbed 'Grokking,' boosts the credibility and reach of malicious content, leading users to scams and malware. The abuse affects millions of users, with Grok's trusted status amplifying the spread of malicious ads. Potential solutions include scanning all fields, blocking hidden links, and sanitizing Grok's responses to prevent it from echoing malicious links. The malicious links are part of a Traffic Distribution System (TDS) used by malicious ad tech vendors, and the operation involves hundreds of organized accounts. The Grok 4 model's security is fundamentally weaker than its competitors, relying heavily on system prompts that can be easily bypassed.

AI-Powered Cyberattacks Targeting Critical Sectors Disrupted

Anthropic disrupted an AI-powered operation in July 2025 that used its Claude AI chatbot to conduct large-scale theft and extortion across 17 organizations in healthcare, emergency services, government, and religious sectors. The actor used Claude Code on Kali Linux to automate various phases of the attack cycle, including reconnaissance, credential harvesting, and network penetration. The operation, codenamed GTG-2002, employed AI to make tactical and strategic decisions, exfiltrating sensitive data and demanding ransoms ranging from $75,000 to $500,000 in Bitcoin. The actor used AI to craft bespoke versions of the Chisel tunneling utility to evade detection and disguise malicious executables as legitimate Microsoft tools. The operation highlights the increasing use of AI in cyberattacks, making defense and enforcement more challenging. Anthropic developed new detection methods to prevent future abuse of its AI models.

AI systems vulnerable to data-theft via hidden prompts in downscaled images

Researchers at Trail of Bits have demonstrated a new attack method that exploits image downscaling in AI systems to steal user data. The attack injects hidden prompts in full-resolution images that become visible when the images are resampled to lower quality. These prompts are interpreted by AI models as user instructions, potentially leading to data leakage or unauthorized actions. The vulnerability affects multiple AI systems, including Google Gemini CLI, Vertex AI Studio, Google Assistant on Android, and Genspark. The attack works by embedding instructions in images that are only revealed when the images are downscaled using specific resampling algorithms. The AI model then interprets these hidden instructions as part of the user's input, executing them without the user's knowledge. The researchers have developed an open-source tool, Anamorpher, to create images for testing this vulnerability. To mitigate the risk, Trail of Bits recommends implementing dimension restrictions on image uploads, providing users with previews of downscaled images, and requiring explicit user confirmation for sensitive tool calls.

Global Phishing Campaign Installs RATs via Malicious Scripts

A rapidly spreading phishing campaign targets Windows users worldwide, stealing credentials and deploying remote access trojans (RATs) via malicious scripts. The campaign is particularly impacting organizations in manufacturing, technology, healthcare, construction, and retail/hospitality sectors. The attack begins with socially engineered emails leading to personalized phishing pages, which deliver JavaScript files acting as droppers for UpCrypter malware. This malware deploys various RATs, including PureHVNC, DCRat, and Babylon RAT, providing long-term access to the compromised networks. The campaign has shown rapid growth, with detection counts doubling in just two weeks. The attack chain involves obfuscated scripts, personalized phishing pages, and sophisticated evasion techniques to avoid detection. The use of ready-made tools and phishing kits from underground sites contributes to the campaign's complexity and spread. Additionally, attackers are exploiting legitimate services like Google Classroom, Microsoft 365, and OneNote for phishing campaigns, and using client-side evasion techniques to bypass defenses. Defenders are advised to implement multi-layered defenses, including strong email filters, employee training, and up-to-date security tools.

Murky Panda, Genesis Panda, and Glacial Panda Target Cloud and Telecom Sectors

Chinese cyber espionage groups Murky Panda, Genesis Panda, and Glacial Panda have escalated their activities targeting cloud and telecom sectors. Murky Panda exploits trusted cloud relationships and zero-day vulnerabilities to breach enterprise networks. They also compromise cloud service providers to gain access to downstream customer environments. Genesis Panda targets cloud services for lateral movement and persistence. Glacial Panda focuses on telecom organizations to exfiltrate call detail records and related telemetry. Murky Panda, also known as Silk Typhoon, has been active since at least 2021, targeting government, technology, academic, legal, and professional services entities in North America. They exploit internet-facing appliances, SOHO devices, and known vulnerabilities in Citrix and Commvault to gain initial access. They deploy web shells and custom malware like CloudedHope to maintain persistence. Genesis Panda, active since January 2024, targets financial services, media, telecommunications, and technology sectors across 11 countries. They exploit cloud-hosted systems for lateral movement and persistence, using compromised credentials to burrow deeper into cloud accounts. Glacial Panda has seen a 130% increase in activity targeting the telecom sector, focusing on Linux systems and legacy operating systems. They exploit known vulnerabilities and weak passwords to gain access and deploy trojanized OpenSSH components for credential harvesting.