AI cloaking technology helps cybercriminals bypass security scanners

https://www.profitableratecpm.com/f4ffsdxe?key=39b1ebce72f3758345b2155c98e6709c

NEWYou can now listen to Fox News articles!

Cybercriminals are continuously looking for new ways to expose you to phishing and scam sites designed to steal your identification information or install malware that can compromise your personal data and system. Although browsers and search engines like Chrome and Google are actively looking for and actively take measures against spam and malicious sites, they count on automated tools to manage the huge volume of threats.

Recently, pirates have developed masking software powered by AI which allows them to bypass these scanners by displaying benign pages with security systems while revealing harmful content only to real users. This advanced camouflage technique considerably increases the effectiveness and sustainability of phishing and malware sites, which makes traditional detection methods more difficult to protect you.

Register for my free cyberguy report
Get my best technological advice, my urgent safety alerts and my exclusive offers delivered directly in your reception box. In addition, you will have instant access to my survival guide at the ultimate – free swindle when you join my Cyberguy.com/newsletter

How the chatbots help the pirates to target your bank accounts

Google Chrome

A phone with Google Chrome Open (Kurt “Cyberguy” KTUSSON)

Web camouflage powered by AI is there to deceive you

As researchers from Slashnet discovered, cybercriminals adopt a new tactic that makes scam websites almost invisible to security systems intended to stop them. Known as web camouflage, the technique uses artificial intelligence to hide phishing pages, false windows and delivery sites of malware for automated scanners while showing them only to human victims.

What is artificial intelligence (AI)?

Platforms like Hoax Tech and JS Click Cloaker emerge as key players in this trend. Although the two occur as traffic filtering tools for digital marketing specialists, they are also used to protect criminal infrastructure. These services use advanced fingerprints, automatic learning and real -time decision -making to control what each visitor sees.

Google on a laptop

A laptop with Google Chrome Open (Kurt “Cyberguy” KTUSSON)

How the masking tools exceed detection systems

Hoax Tech Analysis of hundreds of data points to create a digital digital imprint of each visitor, their configuration of browser and their plugins to their geographic location and their intellectual property history. The company’s AI engine, called Matchex, compares this data to a massive database of known robots and security scanners. If the system detects a suspicious visitor, it redirects them to a clean and harmless site. If he identifies the visitor as legitimate, he displays the content of the real scam.

Get Fox Affairs on the move by clicking here

JS Click Cloaker adopts a similar approach but claims to assess more than 900 parameters per visit. The system analyzes behavioral anomalies and uses historic click data to decide to allow access to the actual page. It also includes features such as traffic fractionation and A / B tests, giving its users a series of tools more commonly seen in professional marketing software.

At the heart of the two platforms is the “White Page” and “Black Page” system. The system displays security scanners The blank page, which seems benign and takes the exam. It serves human victims the black page, which contains the scam or the malicious payload. This selective targeting allows phishing campaigns And fraudulent sites to stay live longer and avoid detection.

Google Chrome search

A laptop with Google Chrome Open (Kurt “Cyberguy” KTUSSON)

6 ways to stay away from masked scam sites

Cybercriminals are increasingly adopting advanced masking tools to escape detection, which makes people more difficult for people to identify malicious websites. However, there are measures that you can take to reduce your risks:

1. Start in sources of trust: Avoid clicking on links from unknown shippers or summary websites, even if they appear in advertisements or publications on social networks. Type the URLs directly when possible.

2. Use strong antivirus software: Strong antivirus software can help analyze the links and suspect sites before opening them.

Get my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices Cyberguy.com/lockupyourtech

3. Use security -oriented browsers: Protections integrated into browsers like Firefox and Brave can help block suspect scripts and trackers.

4. Keep your software up to date: The regular updates of your browser, your operating system and your antivirus software assure you the latest security fixes.

5. Be careful with the connection pages: If a site requests your identification information unexpectedly, carefully check the URL and the domain name. Massive phishing pages may seem almost identical to the real thing.

6. Activate two -factors (2FA) authentication: Even if your identification information is stolen, 2fa Can act as a final line of defense against account repurchase by demanding a PIN code that is generated via an authenticator or sent to your phone or e-mail.

Click here to obtain the Fox News app

Kurt de Kurt to remember

The camouflage powered by AI makes it increasingly difficult to follow and dismantle malware. The result is a fast growing market for which is essentially camoured as a service. These tools are inexpensive, easy to use and designed to operate on a large scale. For cybercriminals, camouflage is no longer a marginal tactic but an essential part of their toolbox. Although you are still not aware of these tools, they already reshape the operation of digital fraud behind the scenes.

Do you think that browsers and search engines are enough to protect you from advanced scams like these? Let us know by writing to Cyberguy.com/contact

Register for my free cyberguy report
Get my best technological advice, my urgent safety alerts and my exclusive offers delivered directly in your reception box. In addition, you will have instant access to my survival guide at the ultimate – free swindle when you join my Cyberguy.com/newsletter

Copyright 2025 cyberguy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button