This content is viewable by Everyone

Nov 2025: AI-GENERATED CONTACT FORMS

AI Generated Contact Forms Lure Red Flags

Threat Alert: BENEFIT ELECTION ACCOUNT COMPROMISE

  • Threat actors create impersonation websites or fake company domains, then use contact forms to start conversations with targets. Once they receive a response, they send the target files that lead to decoy documents and a new form of malware.
  • The actors use AI-generated content in emails, documents, and websites to make their communications more convincing.

How is it used in the wild?

  • Threat actors create fake business domains or clone existing websites to establish a seemingly legitimate business presence.
  • Actors initiate contact through contact forms to purportedly elicit business and engage in social engineering conversations to build trust with the targets.
  • After establishing contact, the actor sends Dropbox links that contain decoy and malicious files that execute an obfuscated PowerShell script.
  • The script downloads a new malware, AliveBeacon, which is a backdoor that establishes persistence and periodically 
    polls command and control (C2) infrastructure for commands.

Key Action: Stay Alert!

  • Keep in mind that cybercriminals regularly abuse legitimate services like Dropbox. Abusing legitimate services gives cybercriminals and their lures an additional air of legitimacy.
  • If you see an unexpected email linking you to Dropbox, it should be regarded as potentially malicious.
  • Always verify new business contacts through alternative channels.
  • Report ANY suspicious emails via Phish Alarm.