Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Posted on August 14, 2025August 14, 2025 By CWS

Cybercriminals have escalated their proxyjacking campaigns by exploiting professional consumer conduct round YouTube video downloads, based on a latest safety evaluation.

The assault leverages pretend YouTube obtain websites to distribute proxyware malware, particularly focusing on customers looking for free video conversion providers.

This refined marketing campaign represents a big evolution in bandwidth theft assaults, the place risk actors monetize stolen community assets from contaminated techniques with out consumer consent.

The malicious operation facilities round misleading web sites mimicking professional YouTube-to-MP4 conversion providers.

YouTube video obtain web page (Supply – ASEC)

When customers try to obtain movies by clicking the “Obtain Now” button, they’re redirected to promoting pages that immediate the set up of malicious executables.

The assault chain exploits consumer belief in seemingly professional obtain performance, making it notably efficient towards unsuspecting victims looking for free on-line providers.

ASEC analysts recognized that the identical risk actors beforehand concerned in DigitalPulse proxyware distribution campaigns have expanded their operations to incorporate these YouTube obtain websites.

The researchers found a number of an infection circumstances throughout South Korea, indicating a sustained and geographically centered marketing campaign.

The operation demonstrates outstanding persistence, with risk actors constantly adapting their distribution strategies whereas sustaining the core proxyjacking goal.

The marketing campaign has contaminated an estimated 400,000 Home windows techniques globally, producing substantial income for cybercriminals by means of unauthorized bandwidth utilization.

In contrast to conventional cryptojacking assaults that exploit computational assets for cryptocurrency mining, this proxyjacking variant monetizes community bandwidth, creating a gentle income stream from compromised techniques.

The assault’s monetary motivation drives its continued evolution and geographic enlargement.

An infection Chain and Persistence Mechanisms

The malware deployment follows a complicated multi-stage an infection course of designed to evade detection whereas establishing persistent system entry.

Flowchart of malware set up (Supply – ASEC)

Upon execution, the malicious installer masquerades as “QuickScreenRecoder” (quick-screen-recorder.exe) however instantly launches PowerShell scripts for payload supply.

The preliminary dropper performs complete setting checks, scanning for sandbox environments and digital machines earlier than continuing with the an infection chain.

# Activity registration for persistence
Activity Title: Defrag DiskCleanup
Executable: “C:Program Filesnodejsnode.exe”
Arguments: “C:f888a3fc-f6dd-427d-8667-b81ea3946b76-90.5.44709.2197c8c4ffcf-4b46-432f-b1d4-3383bf3fecf6.js” 9762

The persistence mechanism depends on Home windows Activity Scheduler registration beneath the misleading identify “Defrag DiskCleanup,” mimicking professional system upkeep duties.

This scheduled activity executes malicious JavaScript by means of NodeJS, establishing communication with command-and-control servers to obtain extra payload directions.

For Honeygain variant infections, the malware deploys “FastCleanPlus.exe” as a launcher, which calls the hgsdk_start() operate inside “hgsdk.dll” utilizing the risk actor’s API credentials, demonstrating the marketing campaign’s technical sophistication and adaptableness throughout a number of proxyware platforms.

Enhance your SOC and assist your group shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actors, Download, Malware, Proxyware, Site, Threat, Video, Weaponizing, YouTube

Post navigation

Previous Post: New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals
Next Post: How to Secure Your Online Banking Account

Related Posts

Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware Cyber Security News
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
CISOs Guide to Navigating the 2025 Threat Landscape Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account
  • Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware
  • New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals
  • Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account
  • Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware
  • New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals
  • Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News