Researchers at eSentire Threat Response Unit (TRU) have identified an ongoing BatLoader campaign that leverages Google Search Ads to redirect victims to fake web pages promoting AI-based services like ChatGPT and Midjourney.
The campaign exploits the popularity of these AI services, which lack standalone apps, by driving users to imposter web pages advertising fake apps. In the observed campaign, threat actors use BatLoader, disguised as MSIX Windows App Installer files, to deliver the Redline Stealer. Victims searching for “chatbpt” on Google were redirected to a fraudulent download page for ChatGPT. By clicking on the download button, users were actually redirected to a BatLoader Payload site.
The installer, digitally signed by ASHANA GLOBAL LTD, executes both an executable (ChatGPT.exe) and a PowerShell script (Chat.ps1), ultimately fetching and executing the Redline Stealer from a remote server.
Another similar case was observed targeting Midjourney. The executable, ChatGPT.exe, uses Microsoft Edge WebView2 to display the genuine ChatGPT web page in a pop-up window, creating an illusion of a legitimate application installation. The experts are still investigating the full functionality of this executable.
In a separate instance, visitors downloading Midjourney-x64.msix were directed to a rogue page for Midjourney, using a similar infection scheme. The popularity of generative AI technologies and chatbots has made them attractive targets for threat actors, who exploit the desire for unrestricted access to these platforms.
Although Google has taken steps to mitigate ad abuse, this campaign highlights that malicious ads can still bypass moderation and deliver malware to unsuspecting victims.