Connect with us

Technology

3,000+ YouTube videos deliver malware disguised as free software

Published

on

3,000+ YouTube videos deliver malware disguised as free software

NEWYou can now listen to Fox News articles!

YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.

Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.

META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

Advertisement

Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)

All about YouTube’s ghost network

According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.

The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.

Advertisement

Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.

What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted.

A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)

Inside the malicious campaigns

Two major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.

The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.

Advertisement

The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

One of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.

Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)

Advertisement

7 steps you can take to stay safe from YouTube’s ghost network

The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:

1) Avoid cracked software and cheat downloads

Most infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.

2) Use a strong antivirus

Make sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

3) Never disable your antivirus or Windows Defender

If a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.

4) Be cautious with YouTube links and download sources

Always inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.

5) Use a password manager and enable two-factor authentication (2FA)

Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

Advertisement

Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

6) Keep your operating system and apps updated

Software updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.

7) Use a trusted data removal service

Even after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaway

Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.

Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.com

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Disney is losing over $4 million a day in revenue on the YouTube TV blackout

Published

on

Disney is losing over  million a day in revenue on the YouTube TV blackout

Disney’s spat with Google’s YouTube TV over a new content distribution contract is costing the entertainment giant $4.3 million a day in lost revenue, Morgan Stanley estimates.

That’s $30 million a week as the blackout of channels including ABC and ESPN stretches into its 12th day, Variety reports, though the analysts expect Disney and Google to reach a resolution by the end of the week. The dispute is also costing Google — Variety reports that a Drive Research survey of 1,100 US consumers found 24 percent canceled or planned to cancel their subscriptions.

More than 20 Disney-owned channels went dark on YouTube TV after their contract expired at 11:59 PM ET on October 30th. While Google accuses Disney of pulling its channels from YouTube TV as a “negotiating tactic,” and says its terms would rise prices for YouTube TV customers, Disney says Google is “refusing to pay fair rates” for its content. Google has been giving $20 credits to its subscribers during the blackout, but it remains to be seen which will end first: the Disney-Google blackout or the government shutdown.

Continue Reading

Technology

VA issues overpayment scam alert for veterans

Published

on

VA issues overpayment scam alert for veterans

NEWYou can now listen to Fox News articles!

As the nation honors veterans for their service, the Department of Veterans Affairs is reminding the community to stay alert to a growing threat, the VA overpayment scam.

Reports show that fraudsters are contacting veterans through text, email and phone calls, pretending to be VA employees. They claim you were overpaid on your benefits and must send money or banking details to correct the issue.

These criminals often make their messages look official with VA logos, formal wording and even fake caller IDs. Once they gain your trust, they push for quick payment, hoping you act before verifying. Staying informed and cautious is the best way to protect your benefits and your identity.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

Advertisement

Scammers are claiming veterans were overpaid on their benefits by impersonating VA employees. (Kurt “CyberGuy” Knutsson)

How to spot a VA overpayment scam

Be on alert for these red flags:

  • Messages demanding urgent payment, especially by gift card, wire transfer or cryptocurrency.
  • Requests for your VA login or password.
  • Emails or texts with links that don’t lead to VA.gov.
  • Caller ID spoofing showing “VA” or “Debt Center” to look official.
  • Messages or letters that lack detailed explanations or account numbers.

If you spot any of these, don’t engage; instead, verify the communication directly through VA.gov or by calling the VA’s official number.

HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

Legitimate VA communications always direct veterans to VA.gov or the official Debt Management Center.  (Kurt “CyberGuy” Knutsson)

 How real VA overpayments work

When the VA determines an actual overpayment, it sends a formal letter explaining the amount and your options to appeal or set up a payment plan. You’ll never be told to pay through text or third-party apps, and you’ll never be asked to share login credentials or banking info outside VA.gov.

Advertisement

Real VA notices always direct you to official channels like VA.gov or the Debt Management Center (1-800-827-0648). If something feels off, it probably is, so always verify before taking action.

To protect your hard-earned VA benefits stay alert and verify messages through official channels.  (Kurt “CyberGuy” Knutsson)

Top ways to protect yourself from VA overpayment scams

Stay ahead of scammers by following these simple but powerful steps to protect your VA benefits.

1) Verify through your official VA.gov account

Whenever you receive a notice about an overpayment, log in to your VA.gov account directly instead of clicking any link or responding to a message. The site shows your current balance, payment status and any real debts.

2) Use official VA payment channels

If you discover a legitimate debt, handle it only through VA’s official payment options. Call the Debt Management Center at 1-800-827-0648 or make payments through your secure VA.gov dashboard. Avoid sending funds through apps, wire transfers, or prepaid cards as the VA will never ask for those.

Advertisement

3) Never share your login information

Your VA login and password are like your house keys. The VA will never ask for them, not by phone, email, or text. Anyone who requests them is a scammer. If you think your credentials were compromised, change your password immediately and enable multi-factor authentication (MFA) if available.

Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

Advertisement

4) Avoid suspicious links and attachments

Fraudsters often embed fake links in messages that look real at first glance. Hover over a link before clicking to preview the URL; if it doesn’t start with “https://www.va.gov,” it’s fake. Be equally cautious with attachments, as they can install malware designed to steal your personal data.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

5) Use a data removal service

Data brokers often publish your name, phone number and even veteran status online, information scammers use to target you. Personal data removal services can automatically request data removals from hundreds of broker sites, reducing your exposure and lowering the odds of being targeted.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

6) Watch out for unusual payment methods

Scammers love untraceable transactions. Any request for payment through gift cards, Bitcoin, prepaid debit cards, or wire transfers is an instant red flag. The VA does not and will not use these methods to collect payments.

7) Limit your social media exposure

Scammers sometimes gather information from social networks to make messages seem more personal. Review your friends and followers, tighten privacy settings and think twice before posting details about your military service or VA benefits.

Advertisement

8) Report suspected fraud immediately

If you think someone tried to scam you, contact the VA directly at 1-800-827-1000. You can also report incidents at VSAFE.gov or call (833) 38V-SAFE (833-388-7233). Reporting quickly helps protect others in the veteran community.

Kurt’s key takeaways

This Veterans Day is a time to reflect on service, sacrifice and strength, and that includes protecting what you have earned. Scammers may be persistent, but staying alert and using official VA resources gives you the upper hand. Your benefits represent more than money; they are recognition of your service. Keep them safe, stay skeptical of sudden messages and verify everything before you act.

How can technology companies and the government do a better job of protecting veterans online? Let us know your thoughts in the comments below. Let us know by writing to us at CyberGuy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.  

Continue Reading

Technology

Siri Shortcuts now works with Samsung SmartThings routines

Published

on

Siri Shortcuts now works with Samsung SmartThings routines

Samsung’s latest SmartThings update adds support for Siri Shortcuts. In a press release, Samsung announced that you can now use Siri to run SmartThings routines, allowing you to use Apple’s voice assistant to control your smart home.

Siri Shortcuts is a feature in iOS that lets you run automations by asking Siri. These can either be created by the user in the Shortcuts app or by the manufacturers in their app.

This update should make it easier to control your SmartThings home using your iPhone, HomePod, or other Apple device. For example, you can now call on Siri to trigger your “Good morning” routine through SmartThings that automatically adjusts the lights, turns on your coffee maker, and opens your blinds when you wake up.

Samsung is also enhancing its SmartThings app for Apple devices. On the Apple Watch, you can now see a full list of your devices, send commands, and carry out routines, while the SmartThings app for iOS gives you the ability to view and control up to five of your most recently used devices from your lock screen with Live Activities.

Continue Reading
Advertisement

Trending