Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Dissecting YouTube's Malware Distribution Network

0
Medium
Published: Thu Oct 23 2025 (10/23/2025, 13:51:01 UTC)
Source: AlienVault OTX General

Description

Check Point Research uncovered a sophisticated malware distribution campaign operating on YouTube, dubbed the YouTube Ghost Network. This network utilizes over 3,000 malicious videos to spread malware, primarily targeting users seeking game cheats and pirated software. The operation involves compromised accounts with specific roles: video uploaders, community posters, and interaction simulators. The network has been active since 2021, with a significant increase in activity in 2025. It mainly distributes infostealer malware, with Lumma and Rhadamanthys being prevalent. The campaign employs various tactics to evade detection, including password-protected archives and frequent updates to payloads and C2 infrastructure. This research highlights the evolving nature of malware distribution methods and the need for enhanced cybersecurity measures.

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/youtube-ghost-network"]
Adversary
null
Pulse Id
68fa32c7a4263ce24950835d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5994143ba2cef357e43a12a84ae6d6a9
hash6bfa52286ba1657796a3b20719bb036d
hash7ba3b719d9215945fa02c9db891446c5
hash02f2f15cbcda53414b11d3ac67023b03b9b5bb14
hash0a42e8cc7705921aa46b14a98d3c01fd6dcf9d11
hash9f7ff688ab6c0d3818e1683c21e9ab273723c79b
hash19b6bb806978e687bc6a638343b8a1d0fbd93e543a7a6a6ace4a2e7d8d9a900b
hash270121041684eab38188e4999cc876057fd7057ec4255a63f8f66bd8103ae9f2
hash7d9e36250ce402643e03ac7d67cf2a9ac648b03b42127caee13ea4915ff1a524
hash92c26a15336f96325e4a3a96d4206d6a5844e6a735af663ba81cf3f39fd6bdfe
hashad81b2f47eefcdce16dfa85d8d04f5f8b3b619ca31a14273da6773847347bec8
hashb41fb6e936eae7bcd364c5b79dac7eb34ef1c301834681fbd841d334662dbd1d
hashb429a3e21a3ee5ac7be86739985009647f570548b4f04d4256139bc280a6c68f
hashda36e5ec2a8872af6e2f7e8f4d9fdf48a9c4aa12f8f3b3d1b052120d3f932f01

Ip

ValueDescriptionCopy
ip178.16.53.236
ip25.1.0.120
ip5.252.155.231
ip5.252.155.99
ip94.74.164.157

Url

ValueDescriptionCopy
urlhttp://openai-pidor-with-ai.com:6343
urlhttps://178.16.53.236:6343/gateway/pqnrojhl.adc7k
urlhttps://5.252.155.231/gateway/3jw9q65j.b3tit
urlhttps://5.252.155.99/gateway/r2sh55wm.a56d3
urlhttps://94.74.164.157:8888/gateway/6xomjoww.1hj7n
urlhttps://openai-pidor-with-ai.com:6343/gateway/pqnrojhl.adc7k

Domain

ValueDescriptionCopy
domainopenai-pidor-with-ai.com

Threat ID: 68fb62139505544a4c4d5526

Added to database: 10/24/2025, 11:25:07 AM

Last updated: 10/25/2025, 3:08:29 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats