Tuesday, November 15, 2022
HomeHackerWatch out for Large YouTube Marketing campaign Aimed to Steal Login Credentials

Watch out for Large YouTube Marketing campaign Aimed to Steal Login Credentials


There was an intensive phishing marketing campaign that took benefit of YouTube as a automobile for selling the obtain and set up of cracked software program and free video games.

On this marketing campaign, attackers are abusing video tutorial that has the intention of tricking customers into believing that the hyperlink supplied within the video description is a hyperlink that may obtain the specified software program and that they will set up it by following the directions supplied within the video description.

In the course of the investigation, Cyble specialists found that a number of of the websites referred to within the video description had been phishing web sites.

Menace actors have created phishing pages which might be aimed toward rising the percentages of a profitable an infection. 

Furthermore, it’s potential to calculate the success of this marketing campaign based mostly on what number of views are being acquired by every of the movies which might be posted on this marketing campaign.

Campaigns Evaluation

These malicious campaigns primarily goal people who find themselves curious about acquiring free software program, akin to video games, applications, and so forth. in change for his or her e mail addresses.

In whole there are 4 campaigns that had been detected, and right here they’re:-

It was discovered that in marketing campaign 1, there was an image that signifies {that a} web site hosted on the URL: hxxps://teensoft[.]org/, was utilized by the YouTube video marketing campaign to distribute Information stealer.

The web site hosted on the URL: hxxps://wh1tesoftware[.]me/ is being utilized in marketing campaign 2 to ship stealer malware by malicious YouTube movies.

As a part of the third marketing campaign, the specialists discovered {that a} YouTube video marketing campaign was utilizing a web site hosted beneath the URL: http://hxxps://soft-exp[.]org/ to ship malicious information to customers who watched the video.

It goals to make folks install-info stealers on their computer systems by presenting quite a lot of sport apps, crack software program, plugins, Roblox scripts, and cheats as lures

.

Whereas the fourth marketing campaign concerned using a web site hosted by the URL: hxxps://appshigha[.]com/, whose objective was to ship malicious software program to the sufferer’s pc.

The web site accommodates a variety of free software program, which incorporates:-

  • Sapphire Plugin
  • Twixtor Plugin
  • Valorant Hack
  • GTA On-line Mod Menu
  • Microsoft Workplace
  • CCleaner PRO
  • AutoCAD

Vidar Stealer

As of December 2018, this model of the Arkei information stealer was recognized because the Vidar stealer. In on-line boards, there have been experiences that risk actors have been capable of buy Vidar for $250.

Nevertheless, there, the principle motive is to steal the next key knowledge and carry out illicit actions:-

  • Bank cards
  • Usernames
  • Passwords
  • Information
  • Taking screenshots
  • Stealing wallets for cryptocurrencies (Bitcoin and Ethereum)

RecordBreaker Stealer

For the reason that starting of 2019, a number of cybercrime boards have supplied malware as a service based mostly on the RecordBreaker stealer (aka Raccoon malware).

After one of many Raccoon Stealer’s senior builders died within the Ukraine-Russia conflict in March 2022, the group was disbanded. Based on the configuration settings within the stealer, it’s also potential for different malware payloads to be delivered by the stealer.

Suggestions

There isn’t a doubt that risk actors are continually enhancing their strategies for delivering malicious applications. So, it’s strongly advisable to stay cautious and conscious of such evolving TTPs to create the primary line of protection towards attackers.

Whereas to take action, cybersecurity specialists have advisable following the suggestions that they’ve supplied. Whereas we now have talked about all of the suggestions under:-

  • Ensure you don’t obtain pirated software program.
  • Don’t obtain something factor from unreliable web sites.
  • Make sure that you replace your passwords regularly.
  • Ensure you have a reputed anti-virus.
  • Make sure that e mail attachments and hyperlinks are genuine earlier than opening them.
  • Be sure you block URLs that could possibly be used to unfold malware.
  • Information exfiltration by malware or risk actors will be prevented by monitoring the beacon on the community stage.
  • Implement Information Loss Prevention (DLP) options.

Managed DDoS Assault Safety for Purposes – Obtain Free Information

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments