Fake Kling AI Ads on Facebook Spread Malware Through Bogus Websites
How the ruse starts on social media
Early this year, Facebook and Instagram users began seeing what looked like perfectly normal sponsored posts for Kling AI, an image-and-video generator launched by Beijing-based Kuaishou Technology in June 2024. The service has drawn more than 22 million users as of April 2025, so seeing a few ads in their feeds did not seem out of place. Yet many of those promotions were anything but legitimate. Investigators at Check Point say at least 70 different paid posts funneled people to counterfeit Kling AI pages that copied the companyâs logo, color scheme and marketing tone almost to the pixel.
Clicking an ad brought visitors to web addresses such as klingaimedia[.]com or klingaistudio[.]com. Each site promised the same enticing service: âCreate stunning AI images and videos right in your browserâno download required.â In reality, no media would ever be produced. The sites asked newcomers to start a project and then offered a download link, claiming the file contained their freshly generated artwork. The promised picture or clip was actually a Windows program disguised with a misleading double extension and hidden characters so that casual onlookers would see only something like holiday_photo.jpg.exe.
A closer look at the malware chain
The file arrived inside a ZIP archive. The moment an unsuspecting user ran it, the program quietly loaded a second piece of codeâa remote-access trojan (RAT) known as PureHVNCâwhile also dropping a data-stealing tool. Before doing so, the loader checked whether tools such as Wireshark, Process Monitor or OllyDbg were running, an attempt to dodge security researchers who might be watching in a virtual lab. It also altered the Windows Registry so the malware would relaunch every time the computer rebooted.
To hide from antivirus engines, the loader injected its follow-up payload into trusted Microsoft binaries like âCasPol.exeâ or âInstallUtil.exe.â Those files are part of the .NET Framework and generally allowed to run without restrictions, giving the intruder a free pass. The embedded PureHVNC backdoor, protected with the commercial obfuscator .NET Reactor, then reached out to a command-and-control server at 185.149.232[.]197. Once connected, the attackers could take over the machine, browse the file system, or siphon off anything they found interesting.
What the crooks are after
The operationâs main goal appears to be credential theft. PureHVNC is built to comb through Chromium-based browsers, hunting for saved passwords, cookies and tokens that keep people logged in to sites. It pays special attention to crypto-currency wallet extensions. If the victim opens a banking portal or wallet service, the malware grabs a screenshot so the intruders can see balances or transaction details in real time. With full remote-desktop access, the attackers can also plant additional malware or use the computer in other crimes.
Check Pointâs analysts note that the whole setup follows a plug-in model. Different modules handle screenshot capture, browser harvesting and wallet scraping, letting the criminals switch tactics without rewriting the core code. This flexibility makes the threat hard to predict and easy to update.
Signs point toward Vietnam
Researchers have not pinned down a specific hacking crew, but several clues hint at a Vietnamese connection. Snippets of Vietnamese text were buried in the websitesâ source code and appeared in some advertisement templates. Moreover, Facebook malvertising campaigns tied to stealer-style malware have frequently originated from Vietnam over the past two years. In one recent case, security firm Morphisec linked a separate fake-AI scamâthis one branded as âNoodlophileââto actors speaking the same language.
Part of a bigger social-media scam wave
The Kling AI hoax is only one piece of a widening puzzle. A Wall Street Journal investigation this spring called the situation an âepidemic of scamsâ on Meta platforms, with fraud rings running romance swindles, bogus bargains and counterfeit giveaways from countries including China, Sri Lanka, Vietnam and the Philippines. Meanwhile, nonprofit outlet Rest of World reported that deceptive job ads on Telegram and Facebook are luring young Indonesians into human-trafficking rings tied to Southeast Asian scam compounds, where victims are forced to run investment cons.
Why everyday users should care
Generative-AI brands are popping up faster than most of us can track, and that hype makes them perfect bait. A polished logo and a blue âSponsoredâ tag can trick even cautious users into lowering their guard. If you stumble on an ad for the next hot AI tool, double-check the URL, look for the official verification badge on its social accounts, and be skeptical of any site that suddenly asks you to download an executable fileâespecially one claiming to be an image or video.
Meta says it removes malicious ads once they are reported, but the volume means some inevitably slip through. Until social platforms tighten their screening, the safest move is to visit the genuine Kling AI siteâor any other legitimate serviceâby typing the address yourself rather than trusting the first shiny button in your feed.
At a glance, the Kling AI impostor scheme may seem like just another phishing ploy, yet it shows how quickly cybercriminals innovate. By blending slick marketing with sophisticated malware loaders and remote-access tools, they can pivot from brand to brand, trend to trend, catching people who simply wanted to try a cool new app. Staying safe now means treating every ad, deal and download with a little healthy doubt.