• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

YouTube Users Targeted By RedLine Self-Spreading Stealer

You are here: Home / General Cyber Security News / YouTube Users Targeted By RedLine Self-Spreading Stealer
September 15, 2022

Risk actors have executed a campaign relying on the RedLine stealer and focusing on YouTube consumers.

The information arrives from cybersecurity scientists at Kaspersky, who released an advisory about the campaign previously nowadays.

“Discovered in March 2020, RedLine is at this time a single of the most common Trojans utilized to steal passwords and qualifications from browsers, FTP purchasers and desktop messengers,” wrote Oleg Kupreev in the technological write–up.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“It is brazenly accessible on underground hacker community forums for just a couple of hundred pounds, a comparatively small price tag for malware.”

According to the security expert, RedLine can steal usernames, passwords, cookies, bank card particulars and autofill info from Chromium– and Gecko–based browsers. It is also able of obtaining data from crypto wallets, immediate messengers and FTP/SSH/VPN shoppers and documents with unique extensions from products. 

The malware can reportedly download and operate third–party software program tools, execute commands in cmd.exe and open one-way links through the default browser. 

“The stealer spreads in many ways, such as by way of destructive spam e–mails and third–party loaders,” Kupreev defined.

Further, in addition to the payload alone, Kaspersky noticed that the learned bundle experienced self–propagation functionalities. 

“Several files are accountable for this, which receive video clips and post them to the contaminated users’ YouTube channels alongside with the hyperlinks to a password–protected archive with the bundle in the description,” the advisory reads.

“The videos market cheats and cracks and supply guidance on hacking common games and program.”

From a specialized standpoint, the bundle is a self–extracting RAR archive made up of quite a few destructive data files, thoroughly clean utilities and a script programmed to routinely run the unpacked contents. 

Kaspersky reported that the self–spreading bundle with RedLine is a prime illustration of stealer–type malware remaining distributed below the guise of sport hacks.

“Cyber–criminals lure victims with adverts for cracks and cheats, as well as instructions on how to hack online games,” Kupreev mentioned.

“At the exact time, the self–propagation functionality is implemented using somewhat unsophisticated program, such as a custom-made open–source stealer. All this is more proof if any were being essential, that illegal application need to be dealt with with extreme warning.”

The Kaspersky advisory will come times right after a report by cybersecurity company Akamai recommended cyber–attacks in the gaming sector have greater by 167% in the last calendar year.

As for the RedLine stealer, the instrument was also spotted in a ModernLoader campaign uncovered by Cisco Talos past thirty day period.


Some elements of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «researchers warn of self spreading malware targeting gamers via youtube Researchers Warn of Self-Spreading Malware Targeting Gamers via YouTube
Next Post: Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve Persistence Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.