News: 1761228259

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Google nukes 3,000 YouTube videos that sowed malware disguised as cracked software

(2025/10/23)


Google has taken down thousands of YouTube videos that were quietly spreading password-stealing malware disguised as cracked software and game cheats.

Researchers at Check Point say the so-called "YouTube Ghost Network" hijacked and weaponized legitimate YouTube accounts to post tutorial videos that promised free copies of Photoshop, FL Studio, and Roblox hacks, but instead lured viewers into installing infostealers such as Rhadamanthys and [1]Lumma .

The campaign, which has been running since 2021, surged in 2025, with the number of malicious videos tripling compared to previous years. More than 3,000 malware-laced videos have now been scrubbed from the platform after Check Point worked with Google to dismantle what it called one of the most significant malware delivery operations ever seen on YouTube.

[2]

Check Point says the Ghost Network relied on thousands of fake and compromised accounts working in concert to make malicious content look legitimate. Some posted the "tutorial" videos, others flooded comment sections with praise, likes, and emojis to give the illusion of trust, while a third set handled "community posts" that shared download links and passwords for the supposed cracked software.

[3]

[4]

"This operation took advantage of trust signals, including views, likes, and comments, to make malicious content seem safe," said Eli Smadja, security research group manager at Check Point. "What looks like a helpful tutorial can actually be a polished cyber trap. The scale, modularity, and sophistication of this network make it a blueprint for how threat actors now weaponise engagement tools to spread malware."

Once hooked, victims were typically instructed to disable antivirus software, then download an archive hosted on Dropbox, Google Drive, or MediaFire. Inside was malware rather than a working copy of the promised program, and once opened, the infostealers exfiltrated credentials, crypto wallets, and system data to remote command-and-control servers.

[5]

One hijacked channel with 129,000 subscribers posted a cracked version of Adobe Photoshop that racked up nearly 300,000 views and more than 1,000 likes. Another targeted cryptocurrency users, redirecting them to phishing pages hosted on Google Sites.

As Check Point tracked the network, it found the operators frequently rotated payloads and updated download links to outpace takedowns, creating a resilient ecosystem that could quickly regenerate even when accounts were banned.

[6]SpaceX pulls plug on 2,500 Starlink terminals tied to Myanmar fraud farms

[7]Jaguar Land Rover cyber-meltdown tipped to cost the UK almost £2B

[8]Muji's minimalist calm shattered as ransomware takes down logistics partner

[9]Feds flag active exploitation of patched Windows SMB vuln

Check Point says the Ghost Network's modular design, with uploaders, commenters, and link distributors, allowed campaigns to persist for years. The approach mimics a separate operation the firm has dubbed the " [10]Stargazers Ghost Network " on GitHub, where fake developer accounts host malicious repositories.

While most of the malicious videos pushed pirated software, the biggest lure was gaming cheats – particularly for Roblox, which has an estimated 380 million monthly active players. Other videos dangled cracked copies of Microsoft Office, Lightroom, and Adobe tools. The "most viewed" malicious upload targeted Photoshop, drawing almost 300,000 views before Google's cleanup operation.

The surge in 2025 marks a sharp shift in how malware is being distributed. Where phishing emails and drive-by downloads once dominated, attackers are now exploiting the social credibility of mainstream platforms to bypass user skepticism.

[11]

"In today's threat landscape, a popular-looking video can be just as dangerous as a phishing email," Smadja said. "This takedown shows that even trusted platforms aren't immune to weaponization, but it also proves that with the right intelligence and partnerships, we can push back."

Check Point doesn't have concrete evidence as to who is operating this network. It said the primary beneficiaries currently appear to be cybercriminals motivated by profit, but this could change if nation-state groups use the same tactics and video content to attract high-value targets.

The YouTube Ghost Network's rise underscores how far online malware peddlers have evolved from spammy inbox bait. The ghosts may have been exorcised this time, but with engagement now an attack vector, the next haunting is only ever a click away. ®

Get our [12]Tech Resources



[1] https://www.theregister.com/2025/05/21/lumma_infostealer_service_busted/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aPpRExC6JDRJmtF5MO8WmQAAABE&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aPpRExC6JDRJmtF5MO8WmQAAABE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aPpRExC6JDRJmtF5MO8WmQAAABE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aPpRExC6JDRJmtF5MO8WmQAAABE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2025/10/23/spacex_starlink_myanmar/

[7] https://www.theregister.com/2025/10/22/jaguar_lander_rover_cost/

[8] https://www.theregister.com/2025/10/21/muji_askul_ransomware/

[9] https://www.theregister.com/2025/10/21/cisa_windows_smb_bug/

[10] https://research.checkpoint.com/2024/stargazers-ghost-network/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aPpRExC6JDRJmtF5MO8WmQAAABE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://whitepapers.theregister.com/



Google took 4 years to find this?

Scotthva5

Slow down there Turbo you're making me dizzy.

Re: Google took 4 years to find this?

Joe W

No. It took four years of people shouting at Google. They did not miracolously find it all of a sudden. They just don't care. Same with scammy ads. They don't care as long as they get paid. I wish them parody in minecraft and a happy friendship day.

JessicaRabbit

Doesn't seem like there's much hope of actually stopping this since they'll just keep creating new accounts and more content (plus now with added AI slop). On the other hand the victims are freetards and cheaters so fuck 'em.

Joe W

Ehm... well....

I totally agree with the first half of your comment. The second half reeks of "couldn't happen to me, 'cause I'm not stoopid / greedy / dumb". It can happen to anybody. Maybe not in that form. Maybe not by this delivery mechanism. While I sort of agree that not being greedy to get whatever software they promised should be the right thing, I'd look at the price tag for rent said programs. Some are ridicolously expensive, even for a student or academia license - which needs to be renewed annually, becasue we no longer buy software.

And...

IGotOut

...the scam ads? The fake claims companies, the crypto scammers, the "the government doesn't want you to know about this amazing device", the "Designed by ex NASA / Special Ops", deep fakes of famous and trusted people and on and on....

Oh I forgot, you get money for those. You are only slightly interested in scams that cost you money.

Scumbags, all of them.

I applaud taking down these videos, but...

VoiceOfTruth

I occasionally see very obviously fake ADVERTS on YouTube. I took a screenshot of an advert for a SanDisk device which does not exist. At least the item is nowhere to be found on SanDisk's web site, nor on Amazon. I had a tentative try to contact SanDisk, but as they make it all but impossible to actually contact them and not go through hoops for things, I gave up.

Meanwhile somebody is presumably paying YouTube for these fake adverts.

Life is a serious burden, which no thinking, humane person would
wantonly inflict on someone else.
-- Clarence Darrow