Article Details
Scrape Timestamp (UTC): 2025-03-08 15:13:45.352
Original Article Text
Click to Toggle View
YouTubers extorted via copyright strikes to spread malware. Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos. The threat actors take advantage of the popularity of Windows Packet Divert (WPD) tools that are increasingly used in Russia as they help users bypass internet censorship and government-imposed restrictions on websites and online services. YouTube creators catering to this audience publish tutorials on how to use various WPD-based tools to bypass censorship and are being targeted by threat actors posing as the copyright holders of these tools. In most cases seen by Kaspersky, the threat actors claim to be the original developers of the presented restriction bypass tool, filing a copyright claim with YouTube and then contacting the creator to offer a resolution in the form of including a download link they provide. At the same time, they threaten that non-compliance will result in two more "strikes" on YouTube, which could lead to a channel ban based on the platform's "three strikes" policy. In other cases, the attackers contact the creator directly, impersonating the tool's developers and claiming that the original tool has a new version or new download link, asking the creator to change it on their video. The creators, fearing they will lose their channels, give in to the threat actors' demands, and agree to add links in their videos to GitHub repositories that host the said Windows Packet Divert (WPD) tools. However, these are trojanized versions that include a cryptominer downloader instead. Kaspersky has seen this promotion of laced WPD tools take place on a YouTube video that generated over 400,000 views, with the malicious link reaching 40,000 downloads before it got removed. A Telegram channel with 340,000 subscribers has also promoted the malware under the same disguise. "According to our telemetry, the malware campaign has affected more than 2,000 victims in Russia, but the overall figure could be much higher," warns Kaspersky. SilentCryptoMiner deployment The malicious archive downloaded from the GitHub repositories contains a Python-based malware loader that is launched using PowerShell via a modified start script ('general.bat'). If the victim's antivirus disrupts this process, the start script delivers a 'file not found' error message suggesting that the user disables their antivirus and re-download the file. The executable fetches the second-stage loader only for Russian IP addresses and executes it on the device. The second stage payload is another executable whose size was bloated to 690 MB to evade antivirus analysis, while it also features anti-sandbox and virtual machine checks. The malware loader turns off Microsoft Defender protections by adding an exclusion and creates a Windows service named 'DrvSvc' for persistence between reboots. Eventually, it downloads the final payload, SilentCryptoMiner, a modified version of XMRig capable of mining multiple cryptocurrencies, including ETH, ETC, XMR, and RTM. The coin miner fetches remote configurations from Pastebin every 100 minutes so it can be updated dynamically. For evasion, it is loaded into a system process like 'dwm.exe' using process hollowing and pauses mining activity when the user launches monitoring tools like Process Explorer and the Task Manager. Although the campaign discovered by Kaspersky primarily targets Russian users, the same tactics may be adopted for broader-scoped operations that also deliver higher-risk malware like info-stealers or ransomware. Users should avoid downloading software from URLs in YouTube videos or descriptions, especially from smaller to medium-sized channels that are more susceptible to scams and blackmail.
Daily Brief Summary
Cybercriminals are exploiting YouTube's copyright strike policy by fooling creators into promoting malware-laced Windows Packet Divert (WPD) tools.
Attackers pose as developers, threatening YouTube channel owners with channel strikes and takedown unless they comply by embedding specific malware links in their videos.
The malware, disguised as WPD tools, includes trojanized versions hosting a cryptominer downloader, primarily targeting Russian users.
Over 400,000 views were recorded on a compromised YouTube video, leading to around 40,000 downloads before the malicious link was removed.
The Python-based malware loader in the archive is designed to bypass antivirus detection and includes anti-sandbox and anti-VM capabilities.
Once installed, the malware disables Microsoft Defender, establishes persistence, and eventually downloads a cryptominer which mines various cryptocurrencies.
Kaspersky warns that such practices not only jeopardize user security but could lead to broader and more severe cyber threats.
Users are advised to refrain from downloading software from non-official URLs prompted in YouTube videos or descriptions to avoid falling victim to such schemes.