Saturday, June 14, 2025
Homecyber securityDCRat Malware Spreading via YouTube to Steal Login Credentials

DCRat Malware Spreading via YouTube to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have identified a renewed wave of attacks involving the Dark Crystal RAT (DCRat), a dangerous remote access Trojan that has resurfaced through a Malware-as-a-Service (MaaS) model.

Attackers are actively targeting gamers by distributing malicious software disguised as gaming cheats and cracks, primarily through YouTube.

Malware Distribution Exploits YouTube Platform

The attackers behind DCRat have turned to YouTube as their primary distribution channel. They create fake or hijacked accounts to upload videos promoting supposed gaming cheats, cracks, bots, and similar software.

- Advertisement - Google News

Each video description contains a download link pointing users to legitimate file-sharing services hosting password-protected archives.

YouTube video ad for a cheat and crack

The password itself is conveniently provided in the same description, making the process appear trustworthy.

However, instead of providing the promised gaming tools, these archives contain the DCRat malware hidden among various junk files and folders designed to distract victims.

DCRat, also known as Dark Crystal RAT, first emerged in 2018 and has since evolved into a sophisticated threat.

The malware operates as a backdoor, allowing attackers remote access to infected devices.

Additionally, DCRat supports modular plugins that significantly enhance its capabilities.

Researchers have identified 34 distinct plugins associated with this malware family, including dangerous functionalities like keystroke logging, webcam spying, file theft, and password exfiltration.

DCRat builder plugins on the attackers’ site

Infrastructure Leveraging Anime-Themed Domains

To host command-and-control (C2) servers, cybercriminals have registered numerous second-level domains—primarily within Russia’s “.ru” domain zone—and created multiple third-level domains for operational use.

Since early 2025 alone, at least 57 new second-level domains have been registered by the attackers.

Interestingly, these domains frequently contain anime-inspired slang terms such as “nyashka,” “nyashkoon,” and “nyashtyan,” which resonate with fans of Japanese pop culture.

C2 server addresses with characteristic naming approach

Telemetry data indicates that Russia is the primary target of this campaign, with approximately 80% of detected infections occurring there.

Additional affected regions include Belarus, Kazakhstan, and China.

Kaspersky security solutions detect this malware as “Backdoor.MSIL.DCRat.”

Experts strongly advise users to download game-related software exclusively from trusted sources to avoid infection risks associated with password-protected archives distributed via unofficial channels.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...