Threat actors have been utilizing YouTube channels to distribute the Lumma Stealer malware . This method is similar to a previous attack that used AI to spread tutorials on installing cracked software without a license . By leveraging open source platforms like GitHub and MediaFire , these attackers are able to elude web filters and distribute the malware. The YouTube videos feature content related to cracked applications and include malicious URLs in the descriptions .
When users click on these links, they are directed to a direct download of a new NET loader that fetches the final malware , Lumma Stealer  . This variant of the malware is specifically designed to target sensitive information such as user credentials and browser data. The attack begins with hackers breaching YouTube accounts and uploading videos with malicious URLs . These videos entice users to download a ZIP file that contains the malware . Within the ZIP file, there is an LNK file that calls PowerShell to download a NET execution file from GitHub repositories . To avoid detection, the malware incorporates various techniques to evade security measures.
Once launched, the malware establishes communication with a command-and-control server and sends stolen data back to the attackers . The campaign has updated its exfiltration method to leverage HTTPS for better evasion . In light of these developments, Fortinet advises caution when downloading applications from YouTube or other platforms . It is also recommended to provide basic cybersecurity training to employees in order to prevent the download of malicious files in corporate environments.
This method of using YouTube channels to distribute malware poses a significant threat to users’ sensitive information. It is crucial for individuals to exercise caution when downloading applications from YouTube or other platforms . Additionally, providing basic cybersecurity training to employees can help prevent the download of malicious files in corporate environments. As threat actors continue to evolve their techniques, it is important for individuals and organizations to stay vigilant and implement necessary security measures to protect against such attacks.