Technology & Innovation

More than 3,000 YouTube videos spread malware disguised as fake software downloads


newYou can now listen to Fox News articles!

YouTube is arguably the most popular and most visited platform for entertainment, education, and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike, or need help with work or school. But recent research by Check Point reveals a dark side: a sprawling malware distribution network quietly operating within the platform. Hackers use compromised accounts, fake interactions, and clever social engineering to spread information-stealing malware disguised in more than 3,000 software hacks and game hacking videos.

Most victims start by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity of “free” software opens the door to ghost network traps.

META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

Sign up for my free CyberGuy report
Get the best tech tips, breaking security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – for free when you join my site CyberGuy.com Newsletter.

Cybercriminals are taking advantage of YouTube’s popularity by hiding malware inside fake “how-to” videos and “freeware.” (Kurt “CyberGuy” Knutson)

All about ghost network on YouTube

According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity tripling in 2025. It is built on a simple but effective formula, mixing social manipulation with technical stealth. The primary targets of the network are people searching for “game hacks/cheats” and “software hacks/piracy”.

Researchers discovered that these videos often contained positive community comments, likes, and posts from hacked or fake accounts. This coordinated sharing gives potential victims a false sense of security.

Fake social proof, likes, comments, and subscriber activity play a major psychological role. They trick viewers into believing that the content is legitimate and widely trusted, allowing the process to continue even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

Once a user clicks on the links provided, they are typically taken to file sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. Associated files are often password-protected archives, which makes it difficult for antivirus tools to scan them. Victims are then prompted to disable Windows Defender before installation, effectively disabling their protection before the malware runs.

Check Point found that the majority of these attacks introduce information-stealing malware such as Lumma Stealer, Rdhamanthys, StealC, and RedLine. These programs collect passwords, browser data, and other sensitive information, and send them back to the attacker’s command and control servers.

What makes the network particularly flexible is its role-based structure. Each hacked YouTube account performs a specific function; Some upload malicious videos, others post download links, and a third group boosts credibility by commenting and liking the content. When an account is banned, it is quickly replaced, allowing the process to continue largely uninterrupted.

YouTube.com displayed on a laptop

One click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutson)

Inside malicious campaigns

Two main campaigns stood out in the Check Point investigation. The first concerns Rhadamanthys’ information theft, which was posted via a hacked YouTube channel called @Sound_Writer, which has nearly 10,000 subscribers.

The attackers uploaded fake cryptocurrency videos and used phishing pages on Google sites to distribute the malicious archives. These pages instructed viewers to “temporarily turn off Windows Defender,” assuring them that it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which was connected to multiple control servers to filter the stolen data.

The second campaign, which included HijackLoader and Radamanthys, leveraged a much larger channel, @Afonesio1, with about 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

Microsoft is sounding the alarm when hackers turn the Teams platform into a “real risk” for users

One such video has received over 291,000 views and dozens of glowing comments claiming that the program works perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop Rhadamanthys’ payload, which then contacted the spinner’s control servers every few days to avoid detection.

Even if you never complete the installation, you could still be at risk. Simply visiting phishing or file hosting sites could expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking on the wrong link may compromise your login data before installing any software.

Youtube smartphone

Strong passwords, two-factor authentication, and regular security checks are the best defense against the YouTube Ghost Network. (Cyberguy.com)

7 steps you can take to stay safe from the YouTube ghost network

The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “freeware” or “game hacks,” and relies on users clicking before thinking. Protecting yourself means adopting habits that make it harder for attackers to trick you. Here are seven steps to stay safe:

1) Avoid downloading broken and cheated software

Most infections start with people trying to download pirated or modified software. These files are often hosted on unregulated file sharing sites where anyone can upload malicious content. Even if a YouTube video looks polished or is full of positive comments, that doesn’t mean it’s safe. Official software developers and game studios do not distribute downloads through YouTube links or third-party sites.

Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals an ideal delivery channel for malware.

2) Use a strong antivirus

Make sure you have reliable antivirus software installed and always running. Real-time protection can detect suspicious downloads and block malicious files before they do any damage. Schedule regular system scans and keep your antivirus software updated so it can recognize the latest threats.

The best way to protect yourself from malicious links that install malware, and potentially access your private information, is to install strong antivirus software on all your devices. This protection can also alert you to phishing emails and ransomware, keeping your personal information and digital assets safe.

Get my picks for the best antivirus protection winners of 2025 for Windows, Mac, Android, and iOS at Cyberguy.com

What really happens on the dark web, and how to stay safe

3) Never disable your antivirus or Windows Defender

If the tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There is no legitimate reason to turn off protection, even temporarily. The moment the file asks you to do so, delete it immediately.

4) Be careful with YouTube links and download sources

Always scan links before clicking on them. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true purpose. Downloads hosted on unfamiliar domains or file sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open source communities.

5) Use a password manager and enable two-factor authentication (2FA)

Playing 2FA For important accounts it adds another layer of protection, ensuring that even if someone gets your password, they won’t be able to access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them more difficult to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

Next, check if your email has been exposed in previous breaches. Our #1 password manager (see CyberGuy.com) Choice includes a built-in penetration scanner that checks if your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

6) Keep your operating system and applications updated

Software updates not only provide new features but also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infection.

7) Use a reliable data removal service

Even after your system is secured, your personal information may already be circulating online due to previous breaches. A reliable data removal service can constantly scan your data and request its deletion from headhunting sites and brokers, making it difficult for cybercriminals to exploit your exposed information.

While no service can guarantee complete removal of your data from the Internet, a data removal service is truly a smart choice. It’s not cheap, and neither is your privacy. These services do all the work for you by systematically monitoring and scraping your personal information from hundreds of websites. This gives me peace of mind and has proven to be the most effective way to clear your personal data from the Internet. By limiting the information available, you reduce the risk of fraudsters cross-referencing data from breaches to information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free check to see if your personal information really exists on the web by visiting CyberGuy.com

Get a free check to see if your personal information is already on the web: CyberGuy.com

Click here to download the FOX NEWS app

Key takeaway for Kurt

Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and sharing, they created a scalable, self-sufficient system for distributing malware. Frequent file updates, password-protected payloads, and variable control servers make it difficult for YouTube and security vendors to detect and stop these campaigns.

Do you think YouTube is doing enough to stop the distribution of malware on its platform? Let us know by writing to us at CyberGuy.com

Sign up for my free CyberGuy report
Get the best tech tips, breaking security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – for free when you join my site CyberGuy.com Newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *