Cyble Research Labs (CRL) specifies that the stealers such as PennyWise and RedLine are increasing and spreading through YouTube campaigns. In their analysis, they have identified more than 5,000 PennyWise Stealer executable samples in the last 3 months alone.
The ‘PennyWise stealer’ is an evasive info stealer leveraging YouTube to infect users. It is built using an unknown crypter which makes the debugging process tedious. It uses multithreading to steal user data and creates over 10 threads, enabling faster execution and stealing.
The ‘RedLine stealer’ is an information stealing malware family that is widely advertised for sale within underground forums.
Threat actors upload video tutorials on how to download and install particular software and guide users to get paid subscriptions for free, which tricks the users into installing the malicious software. The link to this software (which is actually malware) will be available in the YouTube video description.
The link will redirect to free cloud storage and file hosting services like Mega, Mediafire, OneDrive, Discord, and Github, where threat actors have hosted malicious Windows executable files using password-protected archive files. Experts say these YouTube campaigns mainly spread stealer and miner categories of malware.
In this case, threat actors target users who are interested in getting paid subscriptions for free such as games, programs, or anti-virus software. Generally, people search keywords like “software cracks,” “keygens,” etc. That time, the users are redirected to these YouTube videos which have malicious links.
“We observed sudden changes in the video upload frequency and the kind of videos uploaded on these YouTube channels. This led us to suspect that the YouTube channels used for these campaigns are either compromised accounts or created specifically for the purpose of spreading stealer malware”, Cyble Research Labs.
Further, the researchers noticed YouTube channel regularly uploads videos related to singing and fun activities and has unexpectedly started posting videos related to software cracks/hacks. Also, these channels have thousands of subscribers.
Therefore, the threat actors are utilizing compromised Google accounts to deliver malware payloads through YouTube videos. So these compromised Google accounts can also be leveraged for other malicious purposes, such as hosting malicious data on Google Drive or can send phishing spam emails from the victim’s Gmail accounts.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates
A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability…
A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…
A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…
The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…
A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for…
Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…