Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

New emojis include Bigfoot, Orca whales, Treasure Chests and more

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Vercel’s V0AI tool weaponized by cybercriminals quickly creates fake login pages at scale
Identity

Vercel’s V0AI tool weaponized by cybercriminals quickly creates fake login pages at scale

userBy userJuly 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 2, 2025Ravi LakshmananAI Security/phishing

Vercel V0 AI Tool

The unknown threat actor has been observing V0 weaponizing Vercel’s generative artificial intelligence (AI) tool, and has designed fake sign-in pages that impersonate legal counterparts.

“This observation illustrates a new evolution in weaponization of generated AI by threat actors that demonstrated their ability to generate functional phishing sites from simple text prompts.”

V0 is an AI-driven offering from Vercel that allows users to create basic landing pages and full stack apps using natural language prompts.

Cybersecurity

The Identity Services Provider said it observed using the technology to create compelling replicas of login pages associated with multiple brands, including their own unnamed customers. Following responsible disclosure, Vercel has blocked access to these phishing sites.

Threat actors behind the campaign have also been found to exploit trust related to the developer platform and host other resources, perhaps the company’s logo that impersonates Vercel’s infrastructure, to avoid detection.

Unlike traditional phishing kits, which require some effort to set up, tools like V0 and open source clones of GitHub allow attackers to spin up fake pages simply by typing a prompt. It’s faster, easier, and no coding skills required. This makes it easier for even low-skilled threat actors to build compelling phishing sites at scale.

“The observed activities confirm that today’s threat actors are actively experimenting and weaponizing key genai tools to streamline and enhance their phishing capabilities,” the researchers said.

“Platforms like Vercel’s V0.Dev allow emerging threat actors to quickly generate high-quality, deceptive phishing pages, increasing the speed and scale of operations.”

Cybersecurity

Development arises as development leverages illegal language models (LLM) to support criminal activity and continues to build uncensored versions of these models, explicitly designed for illegal purposes. One such LLM that gained popularity in the cybercrime landscape is White Rabbitneo, promoting its status as “the uncensored AI model of the (developed) Secops team.”

“Cybercriminals are increasingly drawn to violating uncensored LLMs, cybercrime-designed LLMS, and legal LLMs,” said Jaeson Schultz, a researcher at Cisco Talos.

“Uncensored LLM is an unconforming model that operates without guardrail constraints. These systems are sensitive, controversial or potentially harmful output in response to user prompts. As a result, uncensored LLM is perfectly suited for cybercrime use.”

This fits in with the greater change we see. Fishing is more driven by AI than before. Fake emails, cloned voices, and even deepfake videos have appeared in social engineering attacks. These tools help attackers scale up quickly and turn small scams into large, automated campaigns. It’s no longer just cheating on users. It is to build an entire system of deception.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOrange County, Florida, uses the largest “sprol repair” code in the United States
Next Article Boulder eliminates city-wide parking minimal
user
  • Website

Related Posts

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

September 9, 2025

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

September 9, 2025

Raton Android Malware Detected with NFC Relay and ATS Banking Fraud Features

September 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

New emojis include Bigfoot, Orca whales, Treasure Chests and more

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.