Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
  • The Hacker News

Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages

[email protected] The Hacker News Published: April 9, 2025 | Updated: April 9, 2025 4 min read
1 views
Lovable AI VibeScamming

Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been found to be the most susceptible to jailbreak attacks, allowing novice and aspiring cybercrooks to set up lookalike credential harvesting pages.

“As a purpose-built tool for creating and deploying web apps, its capabilities line up perfectly with every scammer’s wishlist,” Guardio Labs’ Nati Tal said in a report shared with The Hacker News. “From pixel-perfect scam pages to live hosting, evasion techniques, and even admin dashboards to track stolen data — Lovable didn’t just participate, it performed. No guardrails, no hesitation.”

The technique has been codenamed VibeScamming – a play on the term vibe coding, which refers to an AI-dependent programming technique to produce software by describing the problem statement in a few sentences as a prompt to a large language model (LLM) tuned for coding.

The abuse of LLMs and AI chatbots for malicious purposes is not a new phenomenon. In recent weeks, research has shown how threat actors are abusing popular tools like OpenAI ChatGPT and Google Gemini to assist with malware development, research, and content creation.

Cybersecurity

What’s more, LLMs like DeepSeek have also been found susceptible to prompt attacks and jailbreaking techniques like Bad Likert Judge, Crescendo, and Deceptive Delight that allow the models to bypass safety and ethical guardrails and generate other prohibited content. This includes creating phishing emails, keylogger and ransomware samples, albeit with additional prompting and debugging.

In a report published last month, Broadcom-owned Symantec revealed how OpenAI’s Operator, an AI agent that can carry out web-based actions on behalf of the user, could be weaponized to automate the whole process of finding email addresses of specific people, creating PowerShell scripts that can gather system information, stashing them in Google Drive, and drafting and sending phishing emails to those individuals and trick them into executing the script.

Lovable AI VibeScamming

The rising popularity of AI tools also means that they could significantly reduce the barriers to entry for attackers, enabling them to harness their coding capabilities to craft functional malware with little-to-no technical expertise of their own

A case in example is a new jailbreaking approach dubbed Immersive World that makes it possible to create an information stealer capable of harvesting credentials and other sensitive data stored in a Google Chrome browser. The technique “uses narrative engineering to bypass LLM security controls” by creating a detailed fictional world and assigning roles with specific rules so as to get around the restricted operations.

Guardio Labs’ latest analysis takes a step further, uncovering that platforms like Lovable and Anthropic Claude, to a lesser extent, could be weaponized to generate complete scam campaigns, complete with SMS text message templates, Twilio-based SMS delivery of the fake links, content obfuscation, defense evasion, and Telegram integration.

Lovable AI VibeScamming

VibeScamming begins with a direct prompt asking the AI tool to automate each step of the attack cycle, assessing its initial response, and then adopting a multi-prompt approach to gently steer the LLM model to generate the intended malicious response. Called “level up,” this phase involves enhancing the phishing page, refining delivery methods, and increasing the legitimacy of the scam.

Lovable, per Guardio, has been found to not only produce a convincing looking login page mimicking the real Microsoft sign-in page, but also auto-deploys the page on a URL hosted on its own subdomain (“i.e., *.lovable.app”) and redirects to office[.]com after credential theft.

On top of that, both Claude and Lovable appear to comply with prompts seeking help to avoid the scam pages from being flagged by security solutions, as well as exfiltrate the stolen credentials to external services like Firebase, RequestBin, and JSONBin, or private Telegram channel.

Cybersecurity

“What’s more alarming is not just the graphical similarity but also the user experience,” Tal said. “It mimics the real thing so well that it’s arguably smoother than the actual Microsoft login flow. This demonstrates the raw power of task-focused AI agents and how, without strict hardening, they can unknowingly become tools for abuse.”

“Not only did it generate the scampage with full credential storage, but it also gifted us a fully functional admin dashboard to review all captured data – credentials, IP addresses, timestamps, and full plaintext passwords.”

In conjunction with the findings, Guardio has also released the first version of what’s called the VibeScamming Benchmark to put the generative AI models through the wringer and test their resilience against potential abuse in phishing workflows. While ChaGPT scored an 8 out of 10, Claude scored 4.3, and Lovable scored 1.8, indicating high exploitability.

“ChatGPT, while arguably the most advanced general-purpose model, also turned out to be the most cautious one,” Tal said. “Claude, by contrast, started with solid pushback but proved easily persuadable. Once prompted with ‘ethical’ or ‘security research’ framing, it offered surprisingly robust guidance.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Qevlar AI Raises $10 Million for Autonomous Investigation Platform
Next: AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

Author's Other Posts

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Related Stories

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
nist-cve.jpg
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

[email protected] The Hacker News April 17, 2026 0 1
europol.jpg
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

[email protected] The Hacker News April 17, 2026 0 0

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.