3,000+ YouTube videos deliver malware disguised as free software

YouTube, a platform synonymous with entertainment and education, has recently come under scrutiny due to a troubling report from Check Point Research. This investigation has unveiled a sophisticated malware distribution network operating within the site, cleverly disguised as legitimate content. Cybercriminals are leveraging compromised accounts and social engineering tactics to propagate information-stealing malware through over 3,000 videos that masquerade as software cracks and game hacks.

Victims often fall prey to this scheme while searching for free software or cheat tools, unwittingly stepping into the traps laid by what has been dubbed the Ghost Network. This network has been active since 2021, with its operations surging dramatically in 2025. It employs a blend of social manipulation and technical stealth, targeting users looking for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

All about YouTube’s ghost network

The Ghost Network’s strategy hinges on creating a false sense of security. Videos in this network often feature positive comments and engagement from compromised or fake accounts, tricking viewers into believing the content is trustworthy. This fabricated social proof allows the operation to persist even when individual videos or channels are removed by YouTube. The network’s resilience is further bolstered by its modular structure, where banned accounts are swiftly replaced, ensuring continuity of operations.

Once users click on links provided in these videos, they are typically redirected to file-sharing services or phishing sites hosted on platforms like Google Sites or Dropbox. The files are often password-protected, complicating antivirus scans. Victims are frequently instructed to disable their antivirus software before installation, effectively disarming their defenses against the malware that follows.

The malware distributed by this network includes notorious programs like Lumma Stealer, Rhadamanthys, StealC, and RedLine, which harvest sensitive information such as passwords and browser data, sending it back to the attackers’ servers. The network’s role-based structure enhances its effectiveness; each compromised account has a specific function, from uploading malicious videos to boosting credibility through engagement.

Inside the malicious campaigns

Check Point’s investigation highlighted two significant campaigns. The first involved the Rhadamanthys infostealer, disseminated through a compromised channel with nearly 10,000 subscribers. Attackers uploaded fake cryptocurrency videos and utilized phishing pages to distribute malicious archives, misleading viewers into disabling their antivirus protections.

The second campaign was more extensive, leveraging a channel with around 129,000 subscribers. This operation offered cracked versions of popular software, with one video amassing over 291,000 views and numerous positive comments. The malware was cleverly hidden within a password-protected archive linked through community posts, using HijackLoader to install the payload while evading detection.

7 steps you can take to stay safe from YouTube’s ghost network

To safeguard against the Ghost Network’s tactics, users can adopt several proactive measures:

  1. Avoid cracked software and cheat downloads: These files are often hosted on unregulated sites and can harbor malware.
  2. Use a strong antivirus: A reliable antivirus solution provides real-time protection and can detect suspicious downloads.
  3. Never disable your antivirus or Windows Defender: If prompted to do so, consider it a red flag and delete the file immediately.
  4. Be cautious with YouTube links and download sources: Always inspect links before clicking, avoiding unfamiliar domains.
  5. Use a password manager and enable two-factor authentication (2FA): This adds an extra layer of security to your accounts.
  6. Keep your operating system and apps updated: Regular updates fix security flaws that malware can exploit.
  7. Use a trusted data removal service: These services can help monitor and remove your personal information from the web.

By adopting these practices, users can significantly reduce their risk of falling victim to the Ghost Network and similar cyber threats. The evolving landscape of cybercrime necessitates vigilance and proactive security measures to protect personal information and digital assets.

Tech Optimizer
3,000+ YouTube videos deliver malware disguised as free software