Hackers Blackmail YouTubers to Spread Crypto Malware

Summary

  • Cybercriminals blackmail YouTubers using copyright strikes. Hackers force influencers to spread crypto-mining malware to avoid channel takedowns.

  • SilentCryptoMiner malware spreads through YouTube links. Viewers are tricked into downloading infected files disguised as useful software.

  • Kaspersky and Arkham Labs highlight growing influencer security threats. Experts warn of expanding tactics and introduce tools to track influencer crypto endorsements.

Cybercriminals use YouTube’s copyright system to blackmail influencers. They force them to spread crypto-mining malware called SilentCryptoMiner. Kaspersky, a cybersecurity firm, issued this warning.

Attackers blackmail YouTubers into spreading malware. They exploit YouTube’s copyright strikes. Creators are pressured to post malware links in video descriptions. Viewers then download infected files.

SilentCryptoMiner is a key part of this campaign. This malware mines cryptocurrencies secretly, including Ethereum and Monero. Hackers use it to hijack devices for crypto-mining. The malware hides its activity to avoid detection.

Kaspersky says hackers abuse YouTuber trust. They disguise malware as online bypass tools. Influencers are tricked into sharing them. One YouTuber with 60,000 subscribers unknowingly spread malware. They thought it was a real bypass tool. After finding out, they removed the link and warned users.

Hackers also falsely accuse YouTubers of copyright violations. They threaten to shut down channels if creators refuse to post malware links. Many influencers gave in to blackmail, fearing platform loss.

Copyright Blackmail Tactics Exploit YouTube Influencers

In six months, Kaspersky found over 2.4 million cases of network traffic manipulation by cybercriminals using Windows Packet Divert drivers. They disguise malware as useful programs. This lets them bypass security, change system files, and keep access to infected computers.

Experts warn these blackmail tactics might spread beyond YouTube. Platforms like Telegram are also at risk. Users should avoid downloading software from unverified sources. “Helpful” tools might hide threats.

This follows Kaspersky’s recent discovery of SparkCat. SparkCat has been a data-stealing Trojan on the App Store and Google Play since March 2024.

SparkCat uses machine learning to scan image galleries. It steals crypto wallet recovery phrases, passwords, and screenshots with sensitive data.

As YouTube influencers are targeted, Arkham, a blockchain intelligence platform, launched “KOL Label.” This new tracking feature monitors crypto wallets of influencers with over 100,000 followers on X. Investors can use it to check if influencer crypto promotions are genuine or paid ads.

Cybercriminals now use sophisticated social engineering against internet influencers in addition to copyright blackmail.

Phishing efforts targeting YouTube and other platform providers are rising. Attackers send emails and messages impersonating companies, sponsors, or platform support teams.

They send influencers fake links that steal login information or download malware. Influencers are high-value targets because of their public visibility and vast audience reach, say security experts.

Successful account hacks allow attackers to monetize the accounts and use the influencer’s trusted following to propagate frauds and viruses. Content makers must be more vigilant and secure due to this growing arsenal.

Also Read: Mac users warned of crypto wallet-stealing malware ‘Cthulhu’

Apple Mac users are being warned about a new malware variant called “Cthulhu Stealer,” which can capture personal information and target crypto wallets. The malware impersonates legitimate software like Adobe GenP and CleanMyMac, requiring users to enter their password to access the Ethereum wallet MetaMask. It also targets other popular crypto wallets like Binance, Atomic, Coinbase, Wasabi, and Blockchain Wallet. The malware stores stolen data in text files before fingerprinting the victim’s system to collect information like operating system version and IP address. The malware is similar to Atomic Stealer, which attacked Apple computers in 2023. Apple has… [Read More]

*Disclaimer*: We at Bitcoinleef.com present you with the latest information in the crypto market. However, this information should not be regarded as financial advice and viewers should consult their financial advisors before investing.