Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Vercel’s V0AI tool weaponized by cybercriminals quickly creates fake login pages at scale
Identity

Vercel’s V0AI tool weaponized by cybercriminals quickly creates fake login pages at scale

userBy userJuly 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 2, 2025Ravi LakshmananAI Security/phishing

Vercel V0 AI Tool

The unknown threat actor has been observing V0 weaponizing Vercel’s generative artificial intelligence (AI) tool, and has designed fake sign-in pages that impersonate legal counterparts.

“This observation illustrates a new evolution in weaponization of generated AI by threat actors that demonstrated their ability to generate functional phishing sites from simple text prompts.”

V0 is an AI-driven offering from Vercel that allows users to create basic landing pages and full stack apps using natural language prompts.

Cybersecurity

The Identity Services Provider said it observed using the technology to create compelling replicas of login pages associated with multiple brands, including their own unnamed customers. Following responsible disclosure, Vercel has blocked access to these phishing sites.

Threat actors behind the campaign have also been found to exploit trust related to the developer platform and host other resources, perhaps the company’s logo that impersonates Vercel’s infrastructure, to avoid detection.

Unlike traditional phishing kits, which require some effort to set up, tools like V0 and open source clones of GitHub allow attackers to spin up fake pages simply by typing a prompt. It’s faster, easier, and no coding skills required. This makes it easier for even low-skilled threat actors to build compelling phishing sites at scale.

“The observed activities confirm that today’s threat actors are actively experimenting and weaponizing key genai tools to streamline and enhance their phishing capabilities,” the researchers said.

“Platforms like Vercel’s V0.Dev allow emerging threat actors to quickly generate high-quality, deceptive phishing pages, increasing the speed and scale of operations.”

Cybersecurity

Development arises as development leverages illegal language models (LLM) to support criminal activity and continues to build uncensored versions of these models, explicitly designed for illegal purposes. One such LLM that gained popularity in the cybercrime landscape is White Rabbitneo, promoting its status as “the uncensored AI model of the (developed) Secops team.”

“Cybercriminals are increasingly drawn to violating uncensored LLMs, cybercrime-designed LLMS, and legal LLMs,” said Jaeson Schultz, a researcher at Cisco Talos.

“Uncensored LLM is an unconforming model that operates without guardrail constraints. These systems are sensitive, controversial or potentially harmful output in response to user prompts. As a result, uncensored LLM is perfectly suited for cybercrime use.”

This fits in with the greater change we see. Fishing is more driven by AI than before. Fake emails, cloned voices, and even deepfake videos have appeared in social engineering attacks. These tools help attackers scale up quickly and turn small scams into large, automated campaigns. It’s no longer just cheating on users. It is to build an entire system of deception.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOrange County, Florida, uses the largest “sprol repair” code in the United States
Next Article Boulder eliminates city-wide parking minimal
user
  • Website

Related Posts

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

July 16, 2025

Fully patched Sonic Wall SMA 100 Series Device with UNC6148 Backdoor of Step Rootkit

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

GMC Hummer Ev surpassed Tesla Cybertruck’s last quarter

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.