Sunday, March 23, 2025
HomeCyber Security NewsNew DCRat Campaign Uses YouTube Videos to Target Users

New DCRat Campaign Uses YouTube Videos to Target Users

Published on

SIEM as a Service

Follow Us on Google News

A new campaign involving the DCRat backdoor has recently been uncovered, leveraging YouTube as a primary distribution channel.

Since the beginning of the year, attackers have been using the popular video-sharing platform to target users by creating fake or stolen accounts.

These malicious actors upload videos that appear to offer cheats, cracks, game bots, and other illicit software, enticing viewers to download these tools.

However, the downloads instead contain a password-protected archive housing the DCRat Trojan.

How the Malware is Spread

The attackers post videos on YouTube with enticing titles and descriptions that advertise cheats and cracks for popular games.

Advertising cheats and cracks on YouTube
Advertising cheats and cracks on YouTube

The video descriptions include a link to a legitimate file-sharing service where the malicious software is hosted.

Once downloaded, the user finds a password-protected archive with junk files and folders designed to convince the victim that the download is legitimate. However, upon extraction, the archive reveals the DCRat backdoor alongside decoy files.

DCRat Backdoor Details

DCRat, also known as Dark Crystal RAT, is a remote access Trojan (RAT) that has been in circulation since 2018.

Archives with a sample of DCRat disguised as a cheat and crack
Archives with a sample of DCRat disguised as a cheat and crack

This malware is capable of downloading additional modules, significantly expanding its capabilities.

According to the SecureList report, Researchers have identified 34 plugins for DCRat, which include dangerous features such as keystroke recording, webcam access, file downloading, and password exfiltration. These functionalities pose a significant threat to user privacy and security.

Plugins for DCRat builder in the service of attackers
Plugins for DCRat builder in the service of attackers

To support their operations, the attackers register second-level domains, primarily in the RU zone, and create third-level domains that function as command and control (C&C) servers.

Notably, these domains often include words like “nyashka” or “nyashkoon,” terms popular in anime and manga fan communities.

Since the start of 2025, the group has registered at least 57 new second-level domains, with five of them hosting more than 40 third-level domains as C&C servers.

Victim Demographics

Based on telemetry data, Russian users have been the most affected, with DCRat samples downloaded to their devices in 80% of cases.

A smaller number of users from Belarus, Kazakhstan, and China have also encountered the malware.

Kaspersky Lab products successfully detect the DCRat samples with the verdict “Backdoor.MSIL.DCRat.”

It is crucial for users to exercise caution when downloading software, especially from untrusted sources, as this campaign illustrates the growing trend of using legitimate platforms for malicious activities.

Users are advised to download game products only from trusted sources to avoid falling victim to such malware distribution tactics.

Moreover, the involvement of password-protected archives in spreading malware highlights the sophistication and adaptability of attackers in evading detection.

Besides DCRat, other malware types such as stealers, miners, and downloaders are also distributed via similar methods, emphasizing the need for vigilance and the use of reliable security software.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...