{"id":24937,"date":"2025-11-21T12:04:45","date_gmt":"2025-11-21T17:04:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24937"},"modified":"2025-12-17T17:19:15","modified_gmt":"2025-12-17T13:19:15","slug":"syncro-remote-admin-tool-on-ai-generated-fake-websites","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/24937\/","title":{"rendered":"Attacks using Syncro &amp; AI-generated websites"},"content":{"rendered":"<p>We recently detected a new malicious campaign that employs a rather intriguing approach. The actor creates their own signed builds of a legitimate remote access tool (RAT). To distribute them, they use an AI-powered service to mass-generate malicious webpages that convincingly masquerade as the official sites of various applications.<\/p>\n<p>Read on to find out how this attack works, why it\u2019s particularly dangerous for users, and how to protect yourself.<\/p>\n<h2>How the attack works<\/h2>\n<p>It appears that the malicious actor is utilizing several launchpad options for their attacks. First, they\u2019re clearly banking on a significant number of users landing on their fake pages through simple Google searches. This is because the fake sites normally have addresses that match\u00a0\u2014 or are very close to\u00a0\u2014 what users are searching for.<\/p>\n<div id=\"attachment_54816\" style=\"width: 1892px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21212331\/syncro-remote-admin-tool-on-AI-generated-fake-websites-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54816\" class=\"size-full wp-image-54816\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21212331\/syncro-remote-admin-tool-on-AI-generated-fake-websites-1.png\" alt=\"Fake Polymarket sites in Google search results \" width=\"1882\" height=\"1228\"><\/a><p id=\"caption-attachment-54816\" class=\"wp-caption-text\">Looking through Google search results, you can sometimes catch a bunch of Pok\u00e9mon fake sites masquerading as legitimate ones. In this case, we\u2019re looking at Polymarket clones.<\/p><\/div>\n<p>Second, they employ malicious email campaigns as an alternative. In this scenario, the attack kicks off with the user receiving an email that contains a link to a fake website. The content might look something like this:<\/p>\n<p><code>Dear $DOP holders,<br>\nThe migration window from DOP-v1 to DOP-v2 has officially closed, with over 8B+ tokens successfully migrated.<br>\nWe're excited to announce that the DOP-v2 Claim Portal is now OPEN!<br>\nAll $DOP holders can now visit the portal to securely claim their tokens and step into the next phase of the ecosystem.<br>\nClaim Your DOP-v2 Tokens Now\u00a0https:\/\/migrate-dop[dot]org\/<br>\nWelcome to DOP-v2\u00a0\u2014 a stronger, smarter, and more rewarding chapter begins today.<br>\nThank you for being part of this journey.<br>\nThe DOP Team<\/code><\/p>\n<p>Some of the malicious pages we discovered in this campaign masquerade as the websites of antivirus or password management applications. Their content is clearly designed to scare the user with fake warnings about some kind of security issue.<\/p>\n<div id=\"attachment_54817\" style=\"width: 1585px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21212347\/syncro-remote-admin-tool-on-AI-generated-fake-websites-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54817\" class=\"wp-image-54817 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21212347\/syncro-remote-admin-tool-on-AI-generated-fake-websites-2.jpg\" alt=\"Fake Avira antivirus site \" width=\"1575\" height=\"865\"><\/a><p id=\"caption-attachment-54817\" class=\"wp-caption-text\">A fake Avira website warns of a vulnerability and advises downloading its \u201cupdate\u201d<\/p><\/div>\n<p>So, the attackers are also leveraging a well-known tactic known as <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-scareware\/52921\/\" target=\"_blank\" rel=\"noopener nofollow\">scareware<\/a>: foisting an unsafe application on users under the guise of protection against an imaginary threat.<\/p>\n<div id=\"attachment_54818\" style=\"width: 1652px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211526\/syncro-remote-admin-tool-on-AI-generated-fake-websites-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54818\" class=\"wp-image-54818 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211526\/syncro-remote-admin-tool-on-AI-generated-fake-websites-3.jpg\" alt=\"Fake Dashlane password manager website \" width=\"1642\" height=\"815\"><\/a><p id=\"caption-attachment-54818\" class=\"wp-caption-text\">A fake Dashlane page warns of a \u201chigh-severity encryption-metadata exposure affecting cloud relay synchronization\u201d \u2014 whatever that\u2019s supposed to mean. And of course, you can\u2019t fix it unless you download something<\/p><\/div>\n<h2>Fake websites built with Lovable<\/h2>\n<p>Despite differences in content, the fake websites involved in this malicious campaign share several common features. For starters, most of their addresses are constructed according to the formula <em>{popular app name} + desktop.com<\/em>\u00a0\u2014 an URL that closely matches an obviously common search query.<\/p>\n<p>Besides, the fake pages themselves look quite professional. Interestingly, the appearance of the fake sites doesn\u2019t exactly replicate the design of the originals\u00a0\u2014 these aren\u2019t direct clones. Rather, they\u2019re very convincing variations on a theme. As an example, we can look at some fake versions of the Lace crypto wallet page. One of them looks like this:<\/p>\n<div id=\"attachment_54819\" style=\"width: 1517px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211542\/syncro-remote-admin-tool-on-AI-generated-fake-websites-4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54819\" class=\"size-full wp-image-54819\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211542\/syncro-remote-admin-tool-on-AI-generated-fake-websites-4.jpg\" alt=\"Fake Lace crypto wallet website \" width=\"1507\" height=\"753\"><\/a><p id=\"caption-attachment-54819\" class=\"wp-caption-text\">The first variant of the fake Lace website<\/p><\/div>\n<p>Another looks like this:<\/p>\n<div id=\"attachment_54820\" style=\"width: 1584px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211557\/syncro-remote-admin-tool-on-AI-generated-fake-websites-5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54820\" class=\"size-full wp-image-54820\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211557\/syncro-remote-admin-tool-on-AI-generated-fake-websites-5.png\" alt=\"Another fake Lace website \" width=\"1574\" height=\"807\"><\/a><p id=\"caption-attachment-54820\" class=\"wp-caption-text\">The second variant of the fake Lace website<\/p><\/div>\n<p>These fakes look a lot like the original Lace website, but they still differ from it in many obvious ways:<\/p>\n<div id=\"attachment_54821\" style=\"width: 2714px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211621\/syncro-remote-admin-tool-on-AI-generated-fake-websites-6.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54821\" class=\"wp-image-54821 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211621\/syncro-remote-admin-tool-on-AI-generated-fake-websites-6.png\" alt=\"The real Lace website \" width=\"2704\" height=\"1688\"><\/a><p id=\"caption-attachment-54821\" class=\"wp-caption-text\">The fake versions are similar in some ways to the genuine Lace website, while dissimilar in others. <a href=\"https:\/\/www.lace.io\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>It turns out the attackers have weaponized an AI-powered web builder to create fake pages. Because the attackers cut corners and inadvertently left a few tell-tale artifacts, we managed to identify the exact service they are leveraging: Lovable.<\/p>\n<p>Using an AI tool allowed them to significantly reduce the time required to create a fake site \u2014 and churn out forgeries on an industrial scale.<\/p>\n<h2>Syncro remote administration tool<\/h2>\n<p>Another common feature of the fake sites involved in this campaign is that they all distribute the exact same payload. The malicious actor neither created their own Trojan nor bought one off the black market. Instead, they are using their own build of a perfectly legitimate remote access tool, Syncro.<\/p>\n<p>The original app facilitates centralized monitoring and remote access for corporate IT support teams and managed service providers (MSPs). Syncro services are relatively inexpensive, starting at $129 per month with an unlimited number of managed devices.<\/p>\n<div id=\"attachment_54822\" style=\"width: 1690px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211638\/syncro-remote-admin-tool-on-AI-generated-fake-websites-7.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54822\" class=\"size-full wp-image-54822\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211638\/syncro-remote-admin-tool-on-AI-generated-fake-websites-7.jpg\" alt=\"Fake Yoroi crypto wallet site \" width=\"1680\" height=\"895\"><\/a><p id=\"caption-attachment-54822\" class=\"wp-caption-text\">Fake Yoroi crypto wallet site<\/p><\/div>\n<p>At the same time, the tool possesses serious capabilities: in addition to screen sharing, the service also provides remote command execution, file transfer, log analysis, registry editing, and other background actions. However, Syncro\u2019s main appeal is a simplified installation and connection process. The user\u00a0\u2014 or, in this case, the victim\u00a0\u2014 only has to download and run the installation file.<\/p>\n<p>From that point, the installation runs completely in the background, secretly loading a malicious Syncro build onto the computer. Because this build has the attacker\u2019s CUSTOMER_ID hardcoded, they instantly gain full control over the victim\u2019s machine.<\/p>\n<div id=\"attachment_54823\" style=\"width: 1180px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211652\/syncro-remote-admin-tool-on-AI-generated-fake-websites-8.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54823\" class=\"size-full wp-image-54823\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211652\/syncro-remote-admin-tool-on-AI-generated-fake-websites-8.png\" alt=\"Syncro installer window \" width=\"1170\" height=\"518\"><\/a><p id=\"caption-attachment-54823\" class=\"wp-caption-text\">The Syncro installer window flashes on the screen for mere seconds, and only a keen-eyed user might notice that the wrong software is being set up.<\/p><\/div>\n<p>Once Syncro is installed on the victim\u2019s device, the attackers gain full access and can use it to achieve their objectives. Given the context, these appear to be stealing crypto wallet keys from victims and siphoning off funds to the attackers\u2019 own accounts.<\/p>\n<div id=\"attachment_54824\" style=\"width: 1589px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211717\/syncro-remote-admin-tool-on-AI-generated-fake-websites-9.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54824\" class=\"wp-image-54824 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211717\/syncro-remote-admin-tool-on-AI-generated-fake-websites-9.jpg\" alt=\"Fake Liqwid DeFi protocol site \" width=\"1579\" height=\"869\"><\/a><p id=\"caption-attachment-54824\" class=\"wp-caption-text\">Another fake site, this time for the Liqwid DeFi protocol. Although Liqwid offers only a web application, the fake site allows users to download versions for Windows, macOS, and even Linux<\/p><\/div>\n<h2>How to protect yourself against these attacks<\/h2>\n<p>This malicious campaign poses a heightened threat to users for two main reasons. First, the fake sites crafted with the AI service look quite professional, and their URLs aren\u2019t overly suspicious. Of course, both the design of the fake pages and the domains used differ noticeably from the real ones, but this only becomes apparent in direct comparison. At a glance, however, it\u2019s easy to mistake the fake for the original.<\/p>\n<p>Second, the attackers are using a legitimate remote access tool to infect users. This means that detecting the infection can be difficult.<\/p>\n<p>Our <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">security solution<\/a> has a special verdict, <a href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" target=\"_blank\" rel=\"noopener nofollow\">Not-a-virus<\/a>, for cases like this. This verdict is assigned, among other things, when various remote access tools \u2014 including the legitimate Syncro \u2014 are detected on the device. As for Syncro builds used for malicious purposes, <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">our security solution<\/a> detects them as <em>HEUR:Backdoor.OLE2.RA-Based.gen<\/em>.<\/p>\n<p>It\u2019s important to remember that an antivirus won\u2019t block all legitimate remote administration tools by default to avoid interfering with intentional usage. Therefore, we recommend that you pay close attention to notifications from your security solution. If you see a warning that <strong>Not-a-virus<\/strong> software has been detected on your device, take it seriously and, at the very least, check which application triggered it.<\/p>\n<p>If you have <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> installed, use the <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.23\/236630\" target=\"_blank\" rel=\"noopener\">Remote Access Detection feature<\/a>, and, if necessary, the app removal option, that come with your premium subscription. This feature detects around 30 of the most popular legitimate remote access applications, and if you know you didn\u2019t install any of them yourself, that\u2019s cause for concern.<\/p>\n<div id=\"attachment_54829\" style=\"width: 2323px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211734\/syncro-remote-admin-tool-on-AI-generated-fake-websites-10-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54829\" class=\"size-full wp-image-54829\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/21211734\/syncro-remote-admin-tool-on-AI-generated-fake-websites-10-EN.jpg\" alt=\"Kaspersky Premium detects (and allows you to remove) even legitimate versions of Syncro and other remote access applications. \" width=\"2313\" height=\"399\"><\/a><p id=\"caption-attachment-54829\" class=\"wp-caption-text\">Kaspersky Premium detects (and allows you to remove) even legitimate versions of Syncro and other remote access applications.<\/p><\/div>\n<p>Further recommendations:<\/p>\n<ul>\n<li>Don\u2019t download applications from dubious sources \u2014 especially on devices with financial or crypto apps installed.<\/li>\n<li>Always double-check the addresses of the pages you\u2019re visiting before performing any potentially dangerous actions like downloading an app or entering personal data.<\/li>\n<li>Pay close attention to warnings from the antivirus and anti-phishing defenses built into <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">our security solutions<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).<\/p>\n","protected":false},"author":2706,"featured_media":24941,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1481,111,1422,714,700,97,521],"class_list":{"0":"post-24937","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-ai","9":"tag-attacks","10":"tag-not-a-virus","11":"tag-rat","12":"tag-research","13":"tag-security-2","14":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/24937\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/29867\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/29758\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/28806\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/31687\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/30330\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/40930\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/14055\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/54808\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/23433\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/24542\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/32954\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/syncro-remote-admin-tool-on-ai-generated-fake-websites\/29978\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/rat\/","name":"RAT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24937"}],"version-history":[{"count":7,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24937\/revisions"}],"predecessor-version":[{"id":25122,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24937\/revisions\/25122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24941"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}