• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
popular youtube channel caught distributing malicious tor browser installer

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

You are here: Home / General Cyber Security News / Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
October 4, 2022

A common Chinese-language YouTube channel has emerged as a usually means to distribute a trojanized variation of a Windows installer for the Tor Browser.

Kaspersky dubbed the campaign OnionPoison, with all of the victims situated in China. The scale of the attack remains unclear, but the Russian cybersecurity firm claimed it detected victims showing up in its telemetry in March 2022.

The malicious version of the Tor Browser installer is being dispersed via a backlink current in the description of a video clip that was uploaded to YouTube on January 9, 2022. It has been considered more than 64,500 instances to date.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The channel hosting the online video has 181,000 subscribers and statements to be dependent in Hong Kong. The video clip is nevertheless out there to look at on the social media platform as of producing.

The attack financial institutions on the point that the real Tor Browser site is blocked in China, therefore tricking unsuspecting customers seeking for “Tor浏览器” (i.e., Tor Browser in Chinese) on YouTube into perhaps downloading the rogue variant.

Clicking on the backlink redirects the consumer to a 74MB executable that, the moment put in, is designed to retail outlet users’ searching heritage and data entered into site types.

“Extra importantly, just one of the libraries bundled with the destructive Tor Browser is contaminated with spyware that collects different particular data and sends it to a command-and-manage server,” Kaspersky scientists Leonid Bezvershenko and Georgy Kucherin said.

The malicious freebl3.dll library achieves this by creating make contact with with a remote server that responds back again with a second-stage payload containing the spyware, but only when the IP deal with of the sufferer originates from China.

CyberSecurity

The spyware module further more supplies the operation to exfiltrate a record of set up software program and working processes, browser histories, victims’ WeChat and QQ account IDs, in addition to executing arbitrary shell instructions on the sufferer device.

What’s notable about the command-and-manage server (torbrowser[.]io) is that it truly is a visible duplicate of the authentic Tor Browser internet site and its down load back links direct to the genuine Tor Browser web page.

The progress echoes yet another campaign in which avid gamers looking for cheats and cracks on YouTube are getting directed to video clips that contains backlinks to a malicious archive file distributing information stealers and crypto miners. Google has because terminated the hacked channels.

The Hacker News has attained out to the internet giant for comment regarding the hottest results, and we will update the tale if we hear again.

Found this post interesting? Abide by THN on Facebook, Twitter  and LinkedIn to browse a lot more exclusive material we publish.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «researchers report supply chain vulnerability in packagist php repository Researchers Report Supply Chain Vulnerability in Packagist PHP Repository
Next Post: Optus Confirms Hack Exposed Data of Nearly 2.1 Million Australians Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.