{"id":163518,"date":"2023-01-25T16:31:14","date_gmt":"2023-01-26T00:31:14","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=163518"},"modified":"2023-07-11T11:16:05","modified_gmt":"2023-07-11T18:16:05","slug":"the-rise-and-risks-of-ai-art-apps","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/","title":{"rendered":"The Rise and Risks of AI Art Apps"},"content":{"rendered":"<p>Authored by Fernando Ruiz<\/p>\n<p>The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d from Lensa, and the OpenAI service DALL-E 2 that generates them from text, have increased the mainstream interest of these tools. Users should be aware of those seeking to take advantage to distribute Potential Unwanted Programs (PUPs) or malware, such as through deceptive applications that promise the same or similar advanced features but are just basic image editors or otherwise repackaged apps that can drain your data plan and battery life with Clicker and HiddenAds behaviors, subscribe you to expensive services that provide little or no value over alternatives \u00a0(Fleeceware), or even <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/instagram-credentials-stealers-free-followers-or-free-likes\/\" target=\"_blank\" rel=\"noopener\">steal your social media account<\/a> credentials (FaceStealer).<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-163631\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE.jpg\" alt=\"\" width=\"573\" height=\"573\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE.jpg 573w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-129x129.jpg 129w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-48x48.jpg 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/DALLE-96x96.jpg 96w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/p>\n<p>Dozens of apps surface daily claiming to offer AI image creation. Some of them might be legitimate or based on open-source projects such as Stable Diffusion, but in the search for a free application that produces quality results, users might try new apps that could compromise their privacy, user experience, wallet and\/or security.<\/p>\n<p>The McAfee Mobile Research Team recently discovered a series of repackaged image editors on the Google Play app store which presented concerning behaviors. \u00a0McAfee Mobile Security products help protect against such apps, including those classified as Android\/FakeApp, Android\/FaceStealer, Android\/PUP.Repacked and Android\/PUP.GenericAdware.<\/p>\n<p>McAfee, a member of the <a href=\"https:\/\/appdefensealliance.dev\/\" target=\"_blank\" rel=\"noopener\">App Defense Alliance<\/a> focused on protecting users by preventing threats from reaching their devices and improving app quality across the ecosystem, reported the discovered apps to Google, which took prompt action and the apps are no longer available on Google Play.<\/p>\n<p>We now discuss various types of privacy and\/or security risks associated with the types of apps recently removed from the app store.<\/p>\n<h2>FaceStealer<\/h2>\n<p><span class=\"TextRun SCXW197973574 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW197973574 BCX0\">\u201cPista <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">&#8211; <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">Cartoon Photo <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">E<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">ffect\u201d<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> and \u201cNewProfilePicture\u201d<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">are<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> example<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">s<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">of app<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">s<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> that <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">offered <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">compelling visual<\/span> <span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW197973574 BCX0\">results<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW197973574 BCX0\">,<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> however<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">,<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">each<\/span> <span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW197973574 BCX0\">was <\/span><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW197973574 BCX0\">based on the sam<\/span><span class=\"NormalTextRun CommentHighlightPipeRest CommentHighlightRest SCXW197973574 BCX0\">e<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">image editor<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> with basic filters <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">and<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">trojanized<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> with Android\/<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">FaceStealer<\/span><span class=\"NormalTextRun CommentHighlightPipeRest SCXW197973574 BCX0\">,<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">which is <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">a well-known <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">malware<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> capable of <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">compromis<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">ing<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">a <\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">victim\u2019s Facebook<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> or Instagram<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\"> account.<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">The<\/span> <span class=\"NormalTextRun SCXW197973574 BCX0\">app<\/span><span class=\"NormalTextRun SCXW197973574 BCX0\">s<\/span> <span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW197973574 BCX0\">could<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> capture user <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">credentials <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">during a<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">Facebook login <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">by<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">embed<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">ding<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> a javascript function <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">loaded from <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">a <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">remote server<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> (to evade detection)<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> into a flutter webview activity that <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">displays <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">the <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">F<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\">acebook login<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW197973574 BCX0\"> screen<\/span><span class=\"NormalTextRun CommentHighlightPipeRest SCXW197973574 BCX0\">.<\/span><\/span><span class=\"EOP SCXW197973574 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-166897\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/Pista-ScreenShots.png\" alt=\"\" width=\"630\" height=\"717\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/Pista-ScreenShots.png 630w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/Pista-ScreenShots-264x300.png 264w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/Pista-ScreenShots-113x129.png 113w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/div>\n<p style=\"text-align: center;\">\u201cNewProfilePicture\u201d and \u201cPista \u2013 Cartoon Photo Effect\u201d are examples of FaceStealer malware that posed as a cartoon avatar creator.<\/p>\n<p><span class=\"TextRun SCXW167374174 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW167374174 BCX0\">The same <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">image<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\"> editor <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">which was <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">repackaged into the above two apps <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">has <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">also<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">been <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">repackaged<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">alternatively <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">with adware modules and distributed by <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">other<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\"> developers<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">under<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\"> other <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">app <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">names<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">,<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\"> such as \u201cCartoon Effect | Cartoon Photo<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW167374174 BCX0\">\u201d:<\/span> <\/span><span class=\"EOP CommentHighlightPipeRest SCXW167374174 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-163589\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-effect.png\" alt=\"\" width=\"465\" height=\"1008\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-effect.png 465w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-effect-138x300.png 138w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-effect-60x129.png 60w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><\/p>\n<h2>Fleeceware<\/h2>\n<p>Fleeceware refers to mobile apps that use various tactics to enroll users into subscriptions with high fees, typically after a free trial period, and often with little or no value to the subscriber beyond cheaper or free alternatives. If the user does not take care to cancel their subscription, they continue to be charged even after deleting the app.<\/p>\n<p>\u201cToonify Me\u201d, which is no longer available on the Play Store, cost $49.99 per week after 3 days \u2013 almost $2,600 per year \u2013 for what <span class=\"TextRun SCXW39860132 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW39860132 BCX0\">featured<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\"> AI-generated illustrations <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">in the app description<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">,<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\"> but<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\"> was<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\"> a<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">nother<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">repackaged<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">version of the same image <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">editor<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\"> functionality <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">found within <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW39860132 BCX0\">\u201cNewProfilePicture\u201d and \u201cPista \u2013 Cartoon Photo Effect\u201d<\/span><span class=\"NormalTextRun CommentHighlightPipeRest SCXW39860132 BCX0\">.<\/span><\/span><span class=\"EOP SCXW39860132 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-166911 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/ToonifyMe-Fleeceware.png\" alt=\"\" width=\"681\" height=\"754\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/ToonifyMe-Fleeceware.png 681w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/ToonifyMe-Fleeceware-271x300.png 271w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/ToonifyMe-Fleeceware-117x129.png 117w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/div>\n<p>In this case, the \u201cToonify Me\u201d app did not allow feature access without enrolling in the subscription, and the \u201cCONTINUE\u201d button which initiated the subscription was the only option to tap in the app once it was launched.<\/p>\n<h2>Adware<\/h2>\n<p><span class=\"TextRun SCXW155504599 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155504599 BCX0\">Promoted by ads<\/span> <span class=\"NormalTextRun SCXW155504599 BCX0\">that described<\/span> <span class=\"NormalTextRun SCXW155504599 BCX0\">it <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">as <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">capable of transforming<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\"> picture<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">s<\/span> <span class=\"NormalTextRun SCXW155504599 BCX0\">into<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\"> artistic draw<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">ings,<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\"> the \u201c<\/span><span class=\"NormalTextRun CommentStart CommentHighlightPipeRest CommentHighlightRest SCXW155504599 BCX0\">Fun Coloring \u2013 Paint by Number<\/span><span class=\"NormalTextRun CommentHighlightPipeRest SCXW155504599 BCX0\">\u201d<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\"> app <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">is an example of <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">a <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">repackaged <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">version of a different, legitimate<\/span> <span class=\"NormalTextRun SCXW155504599 BCX0\">pixel <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">painting <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">app<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">.\u00a0 It <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">lacked <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">the advertised AI effects and was <\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">plagued with adware-like behavior<\/span><span class=\"NormalTextRun SCXW155504599 BCX0\">.\u00a0<\/span><\/span><span class=\"EOP SCXW155504599 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-163547\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-yourself.jpg\" alt=\"\" width=\"425\" height=\"922\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-yourself.jpg 425w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-yourself-138x300.jpg 138w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/cartoon-yourself-59x129.jpg 59w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW262595887 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW262595887 BCX0\">Advertisement of \u201cFun Coloring \u2013 Paint by Number\u201d on social media which included app store link<\/span><\/span><span class=\"EOP SCXW262595887 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW237119291 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237119291 BCX0\">Consistent with many rev<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">iews complaining about unexpected ad<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">s <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">out of the context of the app<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, o<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">nce installed<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">,<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> the app <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">start<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">ed<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> a service <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">that <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">communicate<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">d<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> in the background with <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">F<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">acebook <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">G<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">raph <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">API<\/span> <span class=\"NormalTextRun SCXW237119291 BCX0\">every 5 seconds<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> and might pull ads based on received commands<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> after some time of execution<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW237119291 BCX0\">The app contained<\/span> <span class=\"NormalTextRun SCXW237119291 BCX0\">multiple <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">injected <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">SDK<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> modules from <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">AppsFlyer<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">Fyber<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">InMobi<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">IAB, <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">Mintegral<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">PubNative<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> and <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">Smaato<\/span> <span class=\"NormalTextRun SCXW237119291 BCX0\">(<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">none of which are <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">in the original app<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">,<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> which was repackaged<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> to <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">include these<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">)<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">, which would help<\/span><span class=\"NormalTextRun SCXW237119291 BCX0\"> monetize <\/span><span class=\"NormalTextRun SCXW237119291 BCX0\">installations without regard for user experience.<\/span><\/span><span class=\"EOP SCXW237119291 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Conclusion<\/h2>\n<p>When new types of apps become popular and new ones appear on the market to offer similar features, users should act with caution to avoid becoming victim to those wanting to exploit public interest.<\/p>\n<p>When installing an app that causes you doubt, make sure you:<\/p>\n<ul>\n<li>Read the pricing and other terms carefully<\/li>\n<li>Check those permissions requested are reasonable with the purpose of the app<\/li>\n<li>Look for consistently bad reviews describing unexpected or unwanted app behavior<\/li>\n<li>Verify if the developer has other apps available and their reviews<\/li>\n<li>Consider skipping the app download if you aren\u2019t convinced of its safety<\/li>\n<\/ul>\n<p>Even if an app is legitimate, we also encourage users to look closely before installation at any available privacy policy to understand how personal data will be treated.\u00a0 Your face is a biometric identifier that\u2019s not easy to change, and multiple pictures might be needed (and stored) to create your model.<\/p>\n<p>Artificial intelligence tools will continue to amaze us with their capabilities and probably will become more accessible and safer to use over time.\u00a0 For now, keep in mind that AI technology is still limited and experimental, and can be expensive to use \u2013 always consider any hidden costs.\u00a0 AI also will bring more challenges as we discussed on the <a href=\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\">2023 McAfee Threat Prediction<\/a> blog.<\/p>\n<h2>IDENTIFIED APPS<\/h2>\n<p>The following table lists the application package name, hash sum SHA256, the minimum number of installations on Google Play, and the type of detected threat. These apps were removed from Google Play, but some may remain available elsewhere.<\/p>\n<table style=\"height: 601px;\" width=\"1098\">\n<tbody>\n<tr>\n<td width=\"232\"><strong>Package Name<\/strong><\/td>\n<td width=\"249\"><strong>SHA256<\/strong><\/td>\n<td width=\"52\"><strong>Installs<\/strong><\/td>\n<td width=\"90\"><strong>Type<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.ayogamez.sketchcartoon<\/td>\n<td width=\"249\">9cb1d996643fbec26bb9878939735221dfbf639075ceea3abdb94e0982c494c1<\/td>\n<td width=\"52\">5M<\/td>\n<td width=\"90\">Adware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.rocketboosterapps.toonifyme<\/td>\n<td width=\"249\">3f45a38b103e1812146df8ce179182f54c4a0191e19560fcbd77240cbc39886b<\/td>\n<td width=\"52\">10K<\/td>\n<td width=\"90\">Fleeceware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.nhatanhstudio.cartoon.photoeffect<\/td>\n<td width=\"249\">2c7f4fc403d1449b70218624d8a409497bf4694493c7f4c06cd8ccecff21799a<\/td>\n<td width=\"52\">5K<\/td>\n<td width=\"90\">Repackaged Adware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.cambe.PhotoCartoon<\/td>\n<td width=\"249\">5327f415d0e9b21523f64403ec231e1fd0279c48b41f023160cd1d70dd733dbf<\/td>\n<td width=\"52\">10K<\/td>\n<td width=\"90\">Repackaged Adware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.chiroh.cartoon.prismaeffect<\/td>\n<td width=\"249\">18fef9f92639e31dd6566854feb30e1e4333b971b05ae9aba93ac0aa395c955b<\/td>\n<td width=\"52\">1K<\/td>\n<td width=\"90\">Repackaged Adware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">cartoon.photo.effect.editor.cartoon.maker.online.<br \/>\ncaricature.appanime.convert.photo.intocartoon<\/td>\n<td width=\"249\">3b941b7005572760b95239d73b8a8bbfdb81d26d405941171328daa8f3c01183<\/td>\n<td width=\"52\">50<\/td>\n<td width=\"90\">Repackaged Adware<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.waxwell.saunders.pistaphotoeditor<\/td>\n<td width=\"249\">489d4aaec3bc694ddd124ab8b4f0b7621a51aad13598fd39cd5c3d2067b950e5<\/td>\n<td width=\"52\">50<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.ashtoon.tooncool.skordoi<\/td>\n<td width=\"249\">980c090c01bef890ef74bd93e181d67a5c6cd1b091573eaaf2e1988756aacd50<\/td>\n<td width=\"52\">100K<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.faceart.savetoon.cartoonedit<\/td>\n<td width=\"249\">55ffc2e392280e8967de0857b02946094268588209963c6146dad01ae537daca<\/td>\n<td width=\"52\">100<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.okenyo.creatkartoon.studio<\/td>\n<td width=\"249\">e696d7304e5f56d7125dd54c853ff35a394a4175fcaf7785d332404e161d6deb<\/td>\n<td width=\"52\">500K<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.onlansuyanto.editor.bading<\/td>\n<td width=\"249\">59f9630c2ebe4896f585ec7722c43bb54c926e3e915dcfa4ff807bea444dc07b<\/td>\n<td width=\"52\">10K<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.madtoon.aicartoon.kiroah<\/td>\n<td width=\"249\">c29adfade300dde5e9c31b23d35a6792ed4a7ad8394d37b69b5cecc931a7ad9f<\/td>\n<td width=\"52\">100K<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.acetoon.studio.facephoto<\/td>\n<td width=\"249\">24cf7fcaefe98bc9db34f551d11906d3f1349a5b60adf5fa37f15a872b61ee95<\/td>\n<td width=\"52\">100K<\/td>\n<td width=\"90\">FaceStealer<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">com.funcolornext.beautyfungoodcolor<\/td>\n<td width=\"249\">b2cfa8b2eccecdcb06293512df0db463850704383f920e5782ee6c5347edc6f5<\/td>\n<td width=\"52\">100K<\/td>\n<td width=\"90\">Repackaged<br \/>\nAdware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as&#8230;<\/p>\n","protected":false},"author":695,"featured_media":163519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5091,15763,15920],"coauthors":[4136],"class_list":["post-163518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-ai","tag-ai-art","tag-art"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Rise and Risks of AI Art Apps | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise and Risks of AI Art Apps | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T00:31:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-11T18:16:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"The Rise and Risks of AI Art Apps\",\"datePublished\":\"2023-01-26T00:31:14+00:00\",\"dateModified\":\"2023-07-11T18:16:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\"},\"wordCount\":1293,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png\",\"keywords\":[\"AI\",\"AI Art\",\"art\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\",\"name\":\"The Rise and Risks of AI Art Apps | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png\",\"datePublished\":\"2023-01-26T00:31:14+00:00\",\"dateModified\":\"2023-07-11T18:16:05+00:00\",\"description\":\"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Rise and Risks of AI Art Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Rise and Risks of AI Art Apps | McAfee Blog","description":"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Rise and Risks of AI Art Apps | McAfee Blog","og_description":"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-01-26T00:31:14+00:00","article_modified_time":"2023-07-11T18:16:05+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"The Rise and Risks of AI Art Apps","datePublished":"2023-01-26T00:31:14+00:00","dateModified":"2023-07-11T18:16:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/"},"wordCount":1293,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png","keywords":["AI","AI Art","art"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/","name":"The Rise and Risks of AI Art Apps | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png","datePublished":"2023-01-26T00:31:14+00:00","dateModified":"2023-07-11T18:16:05+00:00","description":"Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the \u201cMagic Avatars\u201d","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/300x200_Blog_AI-Art-Apps.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-and-risks-of-ai-art-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Rise and Risks of AI Art Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/163518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=163518"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/163518\/revisions"}],"predecessor-version":[{"id":171482,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/163518\/revisions\/171482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/163519"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=163518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=163518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=163518"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=163518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}