AI-Powered Trojan Horses: How LLMs Are Reviving Classic Cyber Threats

A new wave of trojan horses is emerging, challenging traditional defenses as they disguise themselves as legitimate applications like recipe savers and AI image enhancers. These threats embed malicious capabilities directly into their core functionality, making detection difficult.


For instance, the JustAskJacky app covertly executes code from a command-and-control (C2) server, while the TamperedChef app interprets whitespace in recipes as executable commands. These trojans have gone undetected by VirusTotal for weeks, highlighting a shift in how malware is integrated into functional applications.


The resurgence of these "true" trojans is largely due to the accessibility of Large Language Models (LLMs), which allow threat actors to create convincing applications and websites. LLMs also enable the generation of new, unpacked code that evades static scanners.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security
- Other (43)
- Ransomware (163)
- Events and News (27)
- Features (45)
- Security (492)
- Tips (79)
- Google (35)
- Achievements (12)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (55)
- Malware Alerts (248)
- Cyber Attack (327)
- Data Backup (14)
- Data Breach (159)
- Phishing (174)
- Securty Tips (3)
- Browser Hijack (21)
- Adware (15)
- Email And Password (74)
- Android Security (84)
- Knoweldgebase (38)
- Botnet (19)
- Updates (4)
- Alert (71)
- Hacking (76)
- Social Media (9)
- vulnerability (97)
- Hacker (51)
- Spyware (14)
- Windows (12)
- Microsoft (32)
- Uber (1)
- YouTube (2)
- Trojan (6)
- Website hacks (10)
- Paytm (1)
- Credit card scam (4)
- Telegram (4)
- RAT (9)
- Bug (3)
- Twitter (2)
- Facebook (10)
- Banking Trojan (13)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (12)
- IoT Security (3)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (3)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (4)
- Cloud malware (3)
- Cloud storage (2)
- Financial fraud (75)
- Impersonation phishing (1)
- DDoS (9)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (64)
-
Mobile Frauds
(26)
- WhatsApp (8)