Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google rolls out AI ‘flight ticket’ tool globally, adds new travel features to search

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

PowerLattice attracts investment from former Intel CEO Pat Gelsinger for power-saving chiplets

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Large-scale ghost network operation exposes 3,000 YouTube videos as malware traps
Identity

Large-scale ghost network operation exposes 3,000 YouTube videos as malware traps

userBy userOctober 24, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 24, 2025Rabi LakshmananMalware/Hacking News

Malicious networks of YouTube accounts have been observed publishing and promoting videos that lead to malware downloads, essentially exploiting the popularity and trust associated with video hosting platforms to propagate malicious payloads.

The network, which has been active since 2021, has published more than 3,000 malicious videos to date, with the amount of such videos increasing three times since the beginning of the year. It is codenamed YouTube Ghost Network by Check Point. Google then stepped in to remove the majority of these videos.

The campaign takes hacked accounts and replaces their content with “malicious” videos centered around pirated software and Roblox game cheats, infecting unsuspecting users searching for them with stealer malware. Some of these videos have racked up hundreds of thousands of views, ranging from 147,000 to 293,000.

“This operation used trust signals such as views, likes, and comments to make malicious content appear safe,” said Eli Smadja, security research group manager at Check Point. “What looks like a helpful tutorial could actually be a sophisticated cyber trap. The scale, modularity, and sophistication of this network creates a blueprint for how threat actors weaponize their engagement tools to spread malware.”

The use of YouTube to distribute malware is not a new phenomenon. Over the years, threat actors have been observed to hijack legitimate channels or use newly created accounts to publish tutorial-style videos with instructions pointing to malicious links that, when clicked, lead to malware.

DFIR retainer service

These attacks are part of a broader trend in which attackers repurpose legitimate platforms for malicious purposes, turning them into effective vehicles for malware distribution. Some campaigns have exploited legitimate advertising networks, such as those associated with search engines such as Google and Bing, while others, like the case of Stargazers Ghost Network, have utilized GitHub as a delivery vehicle.

One of the main reasons Ghost Networks has become so popular is that it can be used not only to amplify the legitimacy of shared links, but also to maintain continuity of operations even if an account is banned or deleted by the platform owner due to its role-based structure.

“These accounts leverage various platform features such as videos, descriptions, posts (a lesser-known YouTube feature similar to Facebook posts), and comments to promote malicious content and distribute malware while creating a false sense of trust,” security researcher Antonis Telefos said.

“A large portion of the network is made up of compromised YouTube accounts, which, once added, are assigned specific operational roles. This role-based structure allows for stealthier distribution by allowing banned accounts to be quickly replaced without disrupting overall operations.”

There are certain types of accounts –

Video account that uploads the phishing video and provides a description with a link to download the advertised software (or the link is shared as a pinned comment or provided directly within the video as part of the installation process) Post account: is responsible for publishing posts that include community messages and links to external sites Interact account: posts encouraging comments and likes with the aim of giving the video a semblance of trustworthiness and authenticity

The link directs users to phishing pages hosted on a wide range of services including MediaFire, Dropbox, and Google Drive, as well as Google Sites, Blogger, and Telegraph, which contain links to download the supposed software. In many of these cases, URL shorteners are used to hide the link and hide its actual destination.

CIS build kit

Malware families distributed via the YouTube Ghost Network include Lumma Stealer, Rhadamanthys Stealer, StealC Stealer, RedLine Stealer, Phemedrone Stealer, and other Node.js-based loaders and downloaders.

A channel named @Sound_Writer (9,690 subscribers) has been compromised for over a year for uploading videos of cryptocurrency software for deploying Rhadamanthys. A channel named @Afonesio1 (129,000 subscribers) was compromised on December 3, 2024 and January 5, 2025, uploading videos promoting a cracked version of Adobe Photoshop and distributing an MSI installer that deploys Rhadamanthys. Hijack the loader and deliver Rhadamanthys

Check Point said, “The continued evolution of malware distribution methods demonstrates the incredible adaptability and resourcefulness of threat actors in evading traditional security defenses.” “Adversaries are increasingly moving to more sophisticated platform-based strategies, particularly the deployment of ghost networks.”

“These networks leverage the inherent trust of legitimate accounts and the engagement mechanisms of popular platforms to orchestrate large-scale, persistent, and highly effective malware campaigns.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEgypt joins the Horizon Europe program
Next Article Global study highlights inequalities in cancer treatment for women
user
  • Website

Related Posts

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

November 17, 2025

Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

November 17, 2025

5 reasons why attackers phish through LinkedIn

November 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google rolls out AI ‘flight ticket’ tool globally, adds new travel features to search

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

PowerLattice attracts investment from former Intel CEO Pat Gelsinger for power-saving chiplets

Luminal raises $5.3 million to build a better GPU code framework

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.