Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware

Posted on October 25, 2025October 25, 2025 By CWS

A complicated malware distribution marketing campaign leveraging over 3,000 malicious YouTube movies has been uncovered, concentrating on customers searching for pirated software program and recreation cheats.

The YouTube Ghost Community represents a coordinated ecosystem of compromised accounts that exploit platform options to distribute information-stealing malware whereas creating false belief by way of fabricated engagement.

Lively since 2021, the community has dramatically escalated operations in 2025, with malicious video manufacturing tripling in comparison with earlier years.

The marketing campaign primarily focuses on two high-traffic classes: recreation modifications and cracked software program functions.

Probably the most seen malicious video advertises Adobe Photoshop, accumulating 293,000 views and 54 feedback, whereas one other selling FL Studio reached 147,000 views.

These movies direct victims to file-sharing platforms the place password-protected archives containing malware await obtain. Frequent passwords embody “1337” and “2025”, with directions constantly advising customers to disable Home windows Defender earlier than execution.

Test Level researchers recognized the community’s operational construction, revealing three distinct account roles working in coordination.

Video-accounts add misleading content material with obtain hyperlinks embedded in descriptions or pinned feedback.

Put up-accounts preserve group messages containing exterior hyperlinks and archive passwords, often updating them to evade detection.

Work together-accounts generate synthetic legitimacy by posting encouraging feedback and likes, manipulating victims into believing the software program features as marketed.

The distributed malware consists primarily of infostealers, with Lumma dominating till its disruption between March and Might 2025.

YouTube Ghost Community operation (Supply – Test Level)

Following this takedown, risk actors pivoted to Rhadamanthys as their most popular payload. The most recent Rhadamanthys variant (v0.9.2) communicates with command-and-control servers together with hxxps://94.74.164[.]157:8888/gateway/6xomjoww.1hj7n, exfiltrating credentials and delicate consumer information.

Detection Evasion By way of Technical Sophistication

The marketing campaign employs a number of layers of evasion to bypass safety measures and preserve persistence.

Attackers host recordsdata on professional platforms akin to MediaFire, Dropbox, and Google Drive, exploiting consumer belief in these companies.

Massive archive recordsdata exceeding 189MB forestall automated virus scanning on Google Drive, whereas password safety blocks safety options from analyzing contents.

Shortened URLs conceal true locations, and phishing pages hosted on Google Websites additional legitimize the operation.

The malware infrastructure demonstrates fast adaptability, with actors updating payloads each three to 4 days and rotating command-and-control servers with every launch.

MSI installer recordsdata exhibit low detection charges, with current samples evading 57 of 63 safety distributors on VirusTotal.

Marketing campaign updates preserve timestamps indicating steady operation, with current variants compiled on September 21 and 24.

One analyzed archive contained HijackLoader because the preliminary payload, subsequently delivering Rhadamanthys with communication to hxxps://5.252.155[.]99/gateway/r2sh55wm.a56d3.

This short-lived construct technique prevents reputation-based blocking mechanisms from accumulating adequate information to determine threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Deploy, Ghost, Malicious, Malware, Network, Users, Videos, YouTube

Post navigation

Previous Post: Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments
Next Post: AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization

Related Posts

Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos Cyber Security News
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Cyber Security News
Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Cyber Security News
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News