🎁 Airdrop Season 7 is LIVE - Answer Fun Questions to Earn $30K Prize Pool Rewards. JOIN NOW!

SilentCryptoMiner: YouTubers Blackmailed Into Spreading Crypto-Mining Malware

Key Takeaways

  • ​Cybercriminals blackmail YouTubers into adding crypto-mining malware links using false copyright claims;
  • SilentCryptoMiner spreads through YouTube tutorials, infecting thousands of devices;
  • The malware mines crypto in the background and is remotely controlled by attackers.

Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥

SilentCryptoMiner: YouTubers Blackmailed Into Spreading Crypto-Mining Malware

Cybercriminals are forcing YouTube creators to include hidden crypto-mining malware in their video descriptions.

According to a report from Kaspersky, these attackers use copyright complaints and other pressure tactics to trick content creators into adding harmful links that lead to malware-infected files.

The scam takes advantage of the increasing use of Windows Packet Divert drivers, especially in Russia. These drivers help users bypass internet restrictions, and their popularity has led to a rise in YouTube tutorials explaining how to install them.

What is a Crypto Wallet? (Explained With Animation)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

Attackers exploit this trend by inserting links to SilentCryptoMiner, a crypto-mining malware, into video descriptions. The malware is based on XMRig, an open-source mining tool used to generate cryptocurrencies such as Ethereum ETH $1,886.04 , Ethereum Classic ETC $17.57 , Ravencoin RVN $0.0122 , and Monero XMR $207.47 . It uses a method called process hollowing to run in the background without detection.

Kaspersky found that one YouTube creator with 60,000 subscribers had been targeted. As a result, a video with over 400,000 views contained a harmful link that led to an infected archive instead of a legitimate download. This file was downloaded more than 40,000 times, which exposed thousands of users to malware.

The security firm estimates that at least 2,000 computers in Russia have been infected through this method. However, the actual number may be much higher when factoring in similar campaigns spread through Telegram channels.

On February 24, Kaspersky researcher Georgy Kucherin reported that hackers had used a scheme called GitVenom. What is it? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

$600 WELCOME BONUS

Earn Huge Exclusive Binance Learners Rewards
5.0 Rating