Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Posted on August 14, 2025August 14, 2025 By CWS

Cybercriminals have escalated their proxyjacking campaigns by exploiting professional consumer conduct round YouTube video downloads, based on a latest safety evaluation.

The assault leverages pretend YouTube obtain websites to distribute proxyware malware, particularly focusing on customers looking for free video conversion providers.

This refined marketing campaign represents a big evolution in bandwidth theft assaults, the place risk actors monetize stolen community assets from contaminated techniques with out consumer consent.

The malicious operation facilities round misleading web sites mimicking professional YouTube-to-MP4 conversion providers.

YouTube video obtain web page (Supply – ASEC)

When customers try to obtain movies by clicking the “Obtain Now” button, they’re redirected to promoting pages that immediate the set up of malicious executables.

The assault chain exploits consumer belief in seemingly professional obtain performance, making it notably efficient towards unsuspecting victims looking for free on-line providers.

ASEC analysts recognized that the identical risk actors beforehand concerned in DigitalPulse proxyware distribution campaigns have expanded their operations to incorporate these YouTube obtain websites.

The researchers found a number of an infection circumstances throughout South Korea, indicating a sustained and geographically centered marketing campaign.

The operation demonstrates outstanding persistence, with risk actors constantly adapting their distribution strategies whereas sustaining the core proxyjacking goal.

The marketing campaign has contaminated an estimated 400,000 Home windows techniques globally, producing substantial income for cybercriminals by means of unauthorized bandwidth utilization.

In contrast to conventional cryptojacking assaults that exploit computational assets for cryptocurrency mining, this proxyjacking variant monetizes community bandwidth, creating a gentle income stream from compromised techniques.

The assault’s monetary motivation drives its continued evolution and geographic enlargement.

An infection Chain and Persistence Mechanisms

The malware deployment follows a complicated multi-stage an infection course of designed to evade detection whereas establishing persistent system entry.

Flowchart of malware set up (Supply – ASEC)

Upon execution, the malicious installer masquerades as “QuickScreenRecoder” (quick-screen-recorder.exe) however instantly launches PowerShell scripts for payload supply.

The preliminary dropper performs complete setting checks, scanning for sandbox environments and digital machines earlier than continuing with the an infection chain.

# Activity registration for persistence
Activity Title: Defrag DiskCleanup
Executable: “C:Program Filesnodejsnode.exe”
Arguments: “C:f888a3fc-f6dd-427d-8667-b81ea3946b76-90.5.44709.2197c8c4ffcf-4b46-432f-b1d4-3383bf3fecf6.js” 9762

The persistence mechanism depends on Home windows Activity Scheduler registration beneath the misleading identify “Defrag DiskCleanup,” mimicking professional system upkeep duties.

This scheduled activity executes malicious JavaScript by means of NodeJS, establishing communication with command-and-control servers to obtain extra payload directions.

For Honeygain variant infections, the malware deploys “FastCleanPlus.exe” as a launcher, which calls the hgsdk_start() operate inside “hgsdk.dll” utilizing the risk actor’s API credentials, demonstrating the marketing campaign’s technical sophistication and adaptableness throughout a number of proxyware platforms.

Enhance your SOC and assist your group shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actors, Download, Malware, Proxyware, Site, Threat, Video, Weaponizing, YouTube

Post navigation

Previous Post: New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals
Next Post: How to Secure Your Online Banking Account

Related Posts

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
Windows Defender Enhancements for Advanced Threat Mitigation Cyber Security News
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction Cyber Security News
Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability Cyber Security News
Telecommunications Companies in Spain Experiencing Downtime Cyber Security News
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account
  • Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account
  • Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News