Your browser is obsolete!

The page may not load correctly.

Unexpected guests

Незваные гости

Other issues in this category (66)
  • add to favourites
    Add to Bookmarks

Gone down the tubes

Read: 1437 Comments: 9 Rating: 16

What do people often do at work aside from working? Some attend to their personal affairs. That, for example, may include playing video games online. How can this be dangerous?

The Russian anti-virus Dr.Web discovered a trojan that spreads via the YouTube comments section and steals confidential information from the infected devices.

As a rule, criminals post trojan download links in the comments section to video tutorials showing viewers how to use game-cheating software.

Attackers disguise the malicious program as a cheating application. When users try to open the link, they download a self-extracting RAR archive containing the trojan.

Source

So it appears if employees play video games during their working hours, they can also go to YouTube to learn how they can use a game-cheating program to beat the game more quickly. And attackers take advantage of it. Among other things, they can also promote their malware on YouTube.

A tutorial describing how to use a program that supposedly extracts cryptocurrencies from any BTC and ETH wallet is the second most-viewed video. Scammers assure viewers they only need to enter a desired amount and the sender address. Once the transaction charge is paid, the money is delivered to the specified wallet.

In addition to overtly fraudulent applications, the channel also promotes seemingly legitimate utilities, mostly trading bots. The same links to several file sharing platforms are posted under all the channel videos. They point users to a ZIP-archive containing three folders and the setup.exe file—the infostealer trojan Predator.

Source

And this is not the only danger. Criminals can use YouTube and other similar platforms to exchange data.

Following its most recent update, Astaroth now uses YouTube channel descriptions to hide the URL for its command and control (C2) servers.

According to Talos, after Astaroth infects a victim, the trojan connects to a YouTube channel, and from there it retrieves the channel description field. The field contains encrypted and base64-encoded text with the URLs of its command and control server. After decoding the text, Astaroth connects to these URLs to receive new instructions and send stolen information for future storage.

#drweb

Source

Astaroth uses YouTube and Facebook profiles to host and maintain the C2 configuration data. The data is within Facebook posts or the profile information of user accounts on YouTube.

Source

#botnet #malware #video_games #Office_Control #Parental_Control

Dr.Web recommends

We often emphasise employees' computers should only run the applications they need for their work. The posts we've quoted above demonstrate how important this requirement is.

The Parental Control can block access to potential sources of malware infection.

#drweb

Rate this issue and receive Dr.Weblings! (1 vote = 1 Dr.Webling)

Sign in and get 10 Dr.Weblings for sharing the link to this issue via social media.

[Twitter]

Unfortunately, due to Facebook's technical limitations, Dr.Weblings cannot be awarded. However, you can share this link with your friends for free.

Tell us what you think

Leave your comment on the day of publication and get 10 Dr.Weblings, or get 1 Dr.Webling for a comment posted any other day. Comments are published automatically and are reviewed by a moderator. Rules for leaving comments about Doctor Web news items.

To leave a comment, you need to log in under your Doctor Web site account. If you don't have an account yet, you can create one.

Comments