Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      MTN to buy back its own towers in R35-billion deal - Ralph Mupita

      MTN to buy back its own cellular towers in R35-billion deal

      17 February 2026
      Icasa gears up for South Africa's next big spectrum auction - Tshiamo Maluleka-Disemelo

      Icasa gears up for South Africa’s next big spectrum auction

      17 February 2026
      Not enough: Eskom unions spurn above-inflation wage offer

      Not enough: Eskom unions spurn above-inflation wage offer

      17 February 2026
      SA firms turn to automated dispatch as crime perception soars

      SA firms turn to automated dispatch as crime perception soars

      17 February 2026
    • World
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
      Russia bans WhatsApp

      Russia bans WhatsApp

      12 February 2026
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
      Crypto firm accidentally sends R700-billion in bitcoin to its users

      Crypto firm accidentally sends R700-billion in bitcoin to its users

      8 February 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      A million reasons monopolies don't work - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Gen Digital: AI arms race fuels pharma fraud, ransomware, social scams

    Gen Digital: AI arms race fuels pharma fraud, ransomware, social scams

    Promoted | Cybercriminals are using technology smarter – and more personally – than ever before.
    By AvertIT Distribution18 August 2025
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Gen Digital: AI arms race fuels pharma fraud, ransomware, social scamsAs AI accelerates both innovation and risk, Gen Digital’s Q2 2025 Threat Report delivers a clear message: cybercriminals are using technology smarter – and more personally – than ever before. Their findings span AI-powered ransomware, pharmaceutical fraud, social media scams, and a surge in remote access attacks. Let’s unpack the most urgent threats facing consumers and organisations today.

    1. Pharma fraud – fakes masquerading as medicine

    Gen uncovered more than 5 000 fake pharmacy domains promoting high-demand medications – from antibiotics to weight-loss drugs and sexual health treatments. These pharma-fraud scams are sophisticated operations using polished websites, AI-generated review content, malicious code injection and search manipulation to appear legitimate.

    In the second quarter of 2025, Gen blocked a million attacks tied to these domains – exposing a global fraud scheme built to harvest financial and personal data under the guise of discounted prescriptions.

    2. AI-powered ransomware – the FunkSec case

    The report details the takedown of FunkSec, the first ransomware strain partially developed with generative AI. Despite its ability to encrypt data and extort users, Gen researchers uncovered a cryptographic weakness – one that allowed victims to recover their files without paying ransom. A free decryptor was released via Avast, and FunkSec has since gone silent.

    This case marks a milestone: even AI-enhanced malware can carry exploitable flaws, if diligently analysed.

    3. Surge in financial and sextortion scams

    From April to June 2025, financial scams surged 340%, many traced to fake ads and pages on Facebook using deepfake videos and chatbot forms to coax people into revealing sensitive information under the pretext of legal or investment help.

    Meanwhile, sextortion scams doubled, rivalling phishing in their growth and psychological impact. These scams increasingly targeted mobile users, using urgency and manipulatory scripts to extract compliance.

    4. Technical support scams via Facebook

    Technical support scams rose nearly 65% globally, with 14% of blocked threats linked to Facebook. Fake Messenger-style popups locked browsers, displaying urgent messages prompting users to call fake support lines. The reach and credibility of Facebook’s ad network made it fertile ground for fraud.

    5. The broader threat landscape

    Other ley metrics from the report include:

    • A 21% increase in data breach events, with breached e-mail counts up 16%;
    • A 317% spike in malicious push notifications disguised as system alerts;
    • A 62% rise in remote access attacks, led by Wincir RAT and misuse of cloud services like OneDrive; and
    • Persistence of the Lumma Stealer, which resurfaced after takedown attempts using new infrastructure for data exfiltration.

    Collectively, these figures reflect an increasingly automated, AI‑powered and socially engineered cybercrime ecosystem.

    …article continues below…

    Why the Q2 report matters

    • Personalisation enables persuasion: Threat actors now tailor scams using AI-generated content (health blogs, influencer endorsements, fabricated reviews), creating a veneer of credibility that lures victims into trusting and engaging.
    • AI accelerates scale – but leaves flaws: The FunkSec example demonstrates that AI can speed up malware development – but also generate errors that defenders can exploit. Continuous research and collaboration remain essential.
    • Social platforms amplify threat spread: Platforms like Facebook and YouTube are weaponised to launch fraud at scale. Fake profiles, malvertising, deepfakes and AI personas blur the lines – and amplify reach.

    How to stay protected

    • Question “too good to be true” offers online: Low-cost prescription drugs via unfamiliar pharmacies are often scams. Look for secure checkout, reputable contact info and legitimate payment methods.
    • Trust security tools: Decrypt your files yourself if caught by ransomware – tools like Avast’s FunkSec decryptor prove it’s possible.
    • Limit data exposure on social platforms: Don’t click ads promoting “legal services” or investment schemes on Facebook; turn off browser pop-ups and close suspicious windows.
    • Stay cautious with unsolicited tech support: Legitimate help won’t lock your browser or demand payment via phone.
    • Enable mobile protections: Push notifications are a common malware vector. Ensure your OS and security apps are up to date.
    • Use comprehensive security suites: Gen’s Norton and Avast brands, via tools like Norton Genie, offer AI‑powered scam detection and device protection.

    Final thoughts: the AI/cybersecurity paradox

    Gen Digital’s Q2 2025 Threat Report underscores a worrying reality: cyberthreats are evolving faster and are getting smarter and more dangerous, fuelled by AI tools that empower criminals to personalise, scale and evade detection.

    Yet the same technologies also empower defenders. From decrypting AI-built ransomware to blocking scams before they reach users, proactive defence strategies are working – and proving effective.

    Avast and AVG’s role in protecting against evolving threats

    As cyberthreats continue to grow in complexity, Avast and AVG stand at the forefront of providing reliable, cutting-edge protection for businesses and individuals. With AI-powered threat detection, real-time security monitoring and robust defences against ransomware, scams and APTs, both Avast and AVG ensure that your digital environment remains secure.

    For IT service providers and managed service providers, Avast and AVG offer tailored solutions through the Avast Business Hub, an all-in-one platform that simplifies security management. This platform is designed to protect users and devices from emerging threats, while reducing overhead and enhancing operational efficiency.

    By combining advanced AI technology, machine learning capabilities and a team of global cybersecurity experts, Avast and AVG help you stay one step ahead of attackers, safeguarding your business against the evolving threat landscape.

    About Avert IT Distribution
    Partnering with Avert IT Distribution means investing in your success and growth. As a world-class distributor, we offer a superior range of cybersecurity solutions to protect your clients and your reputation. Founded in 2004, AvertITD has continued to expand and evolve. We are proud to serve partners across Africa, prioritising accountability, integrity and commitment in all that we do. These principles are embedded in everything you, as a reseller, offer to your customers.

    To become an AvertITD reseller, complete this form or contact sales on +27(0)10-007-4430 (Johannesburg) or +27(0)21-007-2655 (Cape Town), or e-mail [email protected]. Find AvertITD on LinkedIn. Or send us a message on WhatsApp.

    Contact AvertITD via WhatsApp
    Our new WhatsApp support channel enables instant communication for partners and customers. Whether you need quick assistance, have questions about Avast or AVG licences, or want to discuss business requirements, you can now reach out directly for immediate help. This service ensures rapid responses across Africa, eliminating the need for lengthy e-mails or waiting for callback appointments.

    Real-time support through live chat
    In addition to WhatsApp, AvertITD has introduced a live chat feature on its updated website. This allows you to connect instantly with knowledgeable representatives who can answer your questions, assist with Avast and AVG solutions, and offer personalised guidance. The chat feature ensures you receive fast and efficient support without having to navigate through complex menus. By combining WhatsApp and live chat, AvertITD guarantees that partners and customers can easily access expert support, whenever they need it.

    About Gen
    Gen is a global company dedicated to powering digital freedom with a family of trusted brands including Norton, Avast, LifeLock, Avira, AVG, ReputationDefender and CCleaner. Our trust-based solutions help protect nearly 500 million users in more than 150 countries.

    • Read more articles by Avert IT Distribution on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Protect what matters with AVG and Avast



    Avast Avast Business Avert IT Distribution AvertITD Gen Gen Digital Norton
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleWhy African mines are turning to battery storage
    Next Article MTN’s Mupita backs Vodacom-Maziv fibre deal

    Related Posts

    How Avast and Gen Digital are raising the bar in cybersecurity

    How Avast and Gen Digital are raising the bar in cybersecurity

    10 February 2026
    How Norton is protecting digital lives in a hostile online world - Avert ITD Avert IT Distribution

    How Norton is protecting digital lives in a hostile online world

    20 January 2026
    Avast Business: a complete, modern security stack - Avert ITD Avert IT Distribution

    Avast Business: a complete, modern security stack

    11 November 2025
    Add A Comment

    Comments are closed.

    Company News
    Scaling modern, data-driven farming across Africa - Chris Duvenage

    Scaling modern, data-driven farming across Africa

    17 February 2026
    Why getting your small business online costs less than you think

    Why getting your small business online costs less than you think

    17 February 2026
    Oni-Tel set to reinvigorate dark fibre in South Africa

    Oni-Tel set to reinvigorate dark fibre in South Africa

    17 February 2026
    Opinion
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Prominent Southern African journalist targeted with Predator spyware

    Prominent Southern African journalist targeted with Predator spyware

    18 February 2026
    MTN to buy back its own towers in R35-billion deal - Ralph Mupita

    MTN to buy back its own cellular towers in R35-billion deal

    17 February 2026
    Icasa gears up for South Africa's next big spectrum auction - Tshiamo Maluleka-Disemelo

    Icasa gears up for South Africa’s next big spectrum auction

    17 February 2026
    Not enough: Eskom unions spurn above-inflation wage offer

    Not enough: Eskom unions spurn above-inflation wage offer

    17 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}