Friday, May 23, 2025
HomeComputer SecurityHackers using Malware that Steal Premium Users Credentials from Pornhub, XVideos to...

Hackers using Malware that Steal Premium Users Credentials from Pornhub, XVideos to sell it in Dark Web

Published on

SIEM as a Service

Follow Us on Google News

New Threat report revealed that Credential stealing malware were dramatically increased in 2018 that target the adult websites premium users credentials to selling it in dark web.

These credentials are most wanted data in underground market place in Dark web where cybercriminals selling these stolen data for thousands.

It very common that pornography website is associated with malware and sophisticated cyber threats since the platform contains a high traffic rate.

- Advertisement - Google News

For an example last year, a government employee who accessed around 9000 pornographic web pages in his workplace that leads to compromised his device and infected the entire government network.

One step ahead, malicious ads from adult website leads the victim to install the malicious applications on their devices and steal the banking related credentials.

Researchers from Kaspersky Lab discovered many of malicious samples that perform credential stealing activities from most popular pornographic websites.

Also, Researcher states that credentials to pornography website accounts are themselves quite a valuable commodity to be sold online both internet and dark web underground markets.

Some of the Facts in Last year Attack from Adult websites

Cybercriminals using a lot of technique to spreading their malware among pornography websites by promoting the porn related tags in Google search.

Kaspersky statement said The 20 most popular make up 80% of all malware disguised as porn. Overall, 87,227 unique users downloaded porn-disguised malware in 2018.

Nearly 650,000 users affected in 2018 that drops from the adult websites and most of the malware dropped intended to steal the premium porn website accounts.

Adult content websites premium accounts credentials price doubled last year and these credentials are highly demanded on the dark web underground market.

In 2018, Kaspersky Lab identified at least 642 families of PC threats disguised under one common pornography tag and 89% Android-based malware from porn website posed as adware.

In other ways, threat actors targeting users via phishing attack that posed as well known adult website such as xvideos, xnxx, pornhub where users trick to give away their information.

“According to Kaspersky research, Pornographic content phishing can also be used to install malicious software. For example, to access an alleged adult video, the phishing page requires the user to download and update a video player.”


“Whether it is worth it or not, some users agree that the price of premium accounts to popular pornography websites is rather high. For example, monthly memberships can vary from $20 to $30, and annual unlimited access costs might scale from $120 to $150. This is where cybercriminals enter the fray. kaspersky said. You can also read the detailed report here.

Awareness Tips

  • Before clicking any link, check the link address shown, even in the search results of trusted search engines. If the address was received in an e-mail, check if it is the same as the actual hyperlink.
  • Do not click on questionable websites when they are offered in search results and do not install anything that comes from them.
  • If you wish to buy a paid subscription to an adult content website – purchase it only on the official website. Double check the URL of the website and make sure it is authentic.
  • Check any email attachments with a security solution before opening them –especially from dark web entities (even if they are expected to come from an anonymous source).
  • Patch the software on your PC as soon as security updates for the latest bugs are available.
  • Do not download pirated software and other illegal content. Even if you were redirected to the webpage from a legitimate website.

Related Read

Hackers Launching Trickbot Malware That Steals VNC, PuTTY and RDP Credentials

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...