Dissecting YouTube's Malware Distribution Network
Check Point Research uncovered a sophisticated malware distribution campaign operating on YouTube, dubbed the YouTube Ghost Network. This network utilizes over 3,000 malicious videos to spread malware, primarily targeting users seeking game cheats and pirated software. The operation involves compromised accounts with specific roles: video uploaders, community posters, and interaction simulators. The network has been active since 2021, with a significant increase in activity in 2025. It mainly distributes infostealer malware, with Lumma and Rhadamanthys being prevalent. The campaign employs various tactics to evade detection, including password-protected archives and frequent updates to payloads and C2 infrastructure. This research highlights the evolving nature of malware distribution methods and the need for enhanced cybersecurity measures.
Indicators of Compromise
- hash: 5994143ba2cef357e43a12a84ae6d6a9
- hash: 6bfa52286ba1657796a3b20719bb036d
- hash: 7ba3b719d9215945fa02c9db891446c5
- hash: 02f2f15cbcda53414b11d3ac67023b03b9b5bb14
- hash: 0a42e8cc7705921aa46b14a98d3c01fd6dcf9d11
- hash: 9f7ff688ab6c0d3818e1683c21e9ab273723c79b
- hash: 19b6bb806978e687bc6a638343b8a1d0fbd93e543a7a6a6ace4a2e7d8d9a900b
- hash: 270121041684eab38188e4999cc876057fd7057ec4255a63f8f66bd8103ae9f2
- hash: 7d9e36250ce402643e03ac7d67cf2a9ac648b03b42127caee13ea4915ff1a524
- hash: 92c26a15336f96325e4a3a96d4206d6a5844e6a735af663ba81cf3f39fd6bdfe
- hash: ad81b2f47eefcdce16dfa85d8d04f5f8b3b619ca31a14273da6773847347bec8
- hash: b41fb6e936eae7bcd364c5b79dac7eb34ef1c301834681fbd841d334662dbd1d
- hash: b429a3e21a3ee5ac7be86739985009647f570548b4f04d4256139bc280a6c68f
- hash: da36e5ec2a8872af6e2f7e8f4d9fdf48a9c4aa12f8f3b3d1b052120d3f932f01
- ip: 178.16.53.236
- ip: 25.1.0.120
- ip: 5.252.155.231
- ip: 5.252.155.99
- ip: 94.74.164.157
- url: http://openai-pidor-with-ai.com:6343
- url: https://178.16.53.236:6343/gateway/pqnrojhl.adc7k
- url: https://5.252.155.231/gateway/3jw9q65j.b3tit
- url: https://5.252.155.99/gateway/r2sh55wm.a56d3
- url: https://94.74.164.157:8888/gateway/6xomjoww.1hj7n
- url: https://openai-pidor-with-ai.com:6343/gateway/pqnrojhl.adc7k
- domain: openai-pidor-with-ai.com
Dissecting YouTube's Malware Distribution Network
Description
Check Point Research uncovered a sophisticated malware distribution campaign operating on YouTube, dubbed the YouTube Ghost Network. This network utilizes over 3,000 malicious videos to spread malware, primarily targeting users seeking game cheats and pirated software. The operation involves compromised accounts with specific roles: video uploaders, community posters, and interaction simulators. The network has been active since 2021, with a significant increase in activity in 2025. It mainly distributes infostealer malware, with Lumma and Rhadamanthys being prevalent. The campaign employs various tactics to evade detection, including password-protected archives and frequent updates to payloads and C2 infrastructure. This research highlights the evolving nature of malware distribution methods and the need for enhanced cybersecurity measures.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/youtube-ghost-network"]
- Adversary
- null
- Pulse Id
- 68fa32c7a4263ce24950835d
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash5994143ba2cef357e43a12a84ae6d6a9 | — | |
hash6bfa52286ba1657796a3b20719bb036d | — | |
hash7ba3b719d9215945fa02c9db891446c5 | — | |
hash02f2f15cbcda53414b11d3ac67023b03b9b5bb14 | — | |
hash0a42e8cc7705921aa46b14a98d3c01fd6dcf9d11 | — | |
hash9f7ff688ab6c0d3818e1683c21e9ab273723c79b | — | |
hash19b6bb806978e687bc6a638343b8a1d0fbd93e543a7a6a6ace4a2e7d8d9a900b | — | |
hash270121041684eab38188e4999cc876057fd7057ec4255a63f8f66bd8103ae9f2 | — | |
hash7d9e36250ce402643e03ac7d67cf2a9ac648b03b42127caee13ea4915ff1a524 | — | |
hash92c26a15336f96325e4a3a96d4206d6a5844e6a735af663ba81cf3f39fd6bdfe | — | |
hashad81b2f47eefcdce16dfa85d8d04f5f8b3b619ca31a14273da6773847347bec8 | — | |
hashb41fb6e936eae7bcd364c5b79dac7eb34ef1c301834681fbd841d334662dbd1d | — | |
hashb429a3e21a3ee5ac7be86739985009647f570548b4f04d4256139bc280a6c68f | — | |
hashda36e5ec2a8872af6e2f7e8f4d9fdf48a9c4aa12f8f3b3d1b052120d3f932f01 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip178.16.53.236 | — | |
ip25.1.0.120 | — | |
ip5.252.155.231 | — | |
ip5.252.155.99 | — | |
ip94.74.164.157 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://openai-pidor-with-ai.com:6343 | — | |
urlhttps://178.16.53.236:6343/gateway/pqnrojhl.adc7k | — | |
urlhttps://5.252.155.231/gateway/3jw9q65j.b3tit | — | |
urlhttps://5.252.155.99/gateway/r2sh55wm.a56d3 | — | |
urlhttps://94.74.164.157:8888/gateway/6xomjoww.1hj7n | — | |
urlhttps://openai-pidor-with-ai.com:6343/gateway/pqnrojhl.adc7k | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainopenai-pidor-with-ai.com | — |
Threat ID: 68fb62139505544a4c4d5526
Added to database: 10/24/2025, 11:25:07 AM
Last updated: 10/25/2025, 3:08:29 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-10-24
MediumThe Smishing Deluge: China-Based Campaign Flooding Global Text Messages
MediumNewly Spotted Baohuo Android Backdoor Is Hijacking Telegram Accounts Through Fake Telegram X App
MediumGotta fly: Lazarus targets the UAV sector
MediumJewelbug: Chinese APT Group Widens Reach to Russia
MediumActions
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.