Fake YouTube copyright notices can steal your Google login
A phishing campaign targets YouTube creators by sending fake copyright strike notifications that appear personalized using real channel data. The attack uses a Browser-in-the-Browser technique to display a fake Google sign-in page, capturing victims' credentials. This phishing-as-a-service operation involves multiple attackers sharing infrastructure and rotating domains to avoid detection. Successful credential theft leads to full Google account takeover, enabling hijackers to rebrand channels and livestream cryptocurrency scams. Channels with over three million subscribers are exempted to reduce detection risk by security teams.
AI Analysis
Technical Summary
This campaign employs sophisticated phishing tactics against YouTube creators by generating fake copyright strike notices that incorporate real channel details such as profile pictures, subscriber counts, and recent videos to increase credibility. Victims are then subjected to a Browser-in-the-Browser attack, which simulates a legitimate Google login prompt within the browser, capturing their Google credentials. The infrastructure is shared among multiple attackers who rotate domains to evade detection. Compromised accounts allow attackers to fully control the Google account, rebrand the YouTube channel, and conduct cryptocurrency scams via livestreams. The phishing kit excludes channels with more than three million subscribers to avoid attracting attention from security teams.
Potential Impact
Successful exploitation results in complete Google account takeover of targeted YouTube creators. Attackers gain control over the victim's YouTube channel, enabling them to rebrand it and livestream fraudulent cryptocurrency scams to the channel's audience. This can lead to financial losses for viewers and reputational damage for the victims. The campaign's evasion techniques, including domain rotation and selective targeting, increase its persistence and effectiveness.
Mitigation Recommendations
No official patch or fix is applicable as this is a phishing campaign rather than a software vulnerability. Defenders should educate YouTube creators about this phishing tactic, emphasizing caution with copyright strike notifications and verifying URLs before entering credentials. Use of multi-factor authentication (MFA) on Google accounts is strongly recommended to reduce the risk of account takeover. Monitoring for suspicious login activity and promptly reporting phishing domains to relevant authorities can help mitigate impact. Since the campaign uses rotating domains, blocking known malicious domains listed (e.g., blacklivesmattergood4.com, dmca-notification.info) can assist in detection and prevention.
Indicators of Compromise
- domain: blacklivesmattergood4.com
- domain: dmca-notification.info
- domain: dopozj.net
- domain: ec40pr.net
- domain: xddlov.net
Fake YouTube copyright notices can steal your Google login
Description
A phishing campaign targets YouTube creators by sending fake copyright strike notifications that appear personalized using real channel data. The attack uses a Browser-in-the-Browser technique to display a fake Google sign-in page, capturing victims' credentials. This phishing-as-a-service operation involves multiple attackers sharing infrastructure and rotating domains to avoid detection. Successful credential theft leads to full Google account takeover, enabling hijackers to rebrand channels and livestream cryptocurrency scams. Channels with over three million subscribers are exempted to reduce detection risk by security teams.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This campaign employs sophisticated phishing tactics against YouTube creators by generating fake copyright strike notices that incorporate real channel details such as profile pictures, subscriber counts, and recent videos to increase credibility. Victims are then subjected to a Browser-in-the-Browser attack, which simulates a legitimate Google login prompt within the browser, capturing their Google credentials. The infrastructure is shared among multiple attackers who rotate domains to evade detection. Compromised accounts allow attackers to fully control the Google account, rebrand the YouTube channel, and conduct cryptocurrency scams via livestreams. The phishing kit excludes channels with more than three million subscribers to avoid attracting attention from security teams.
Potential Impact
Successful exploitation results in complete Google account takeover of targeted YouTube creators. Attackers gain control over the victim's YouTube channel, enabling them to rebrand it and livestream fraudulent cryptocurrency scams to the channel's audience. This can lead to financial losses for viewers and reputational damage for the victims. The campaign's evasion techniques, including domain rotation and selective targeting, increase its persistence and effectiveness.
Mitigation Recommendations
No official patch or fix is applicable as this is a phishing campaign rather than a software vulnerability. Defenders should educate YouTube creators about this phishing tactic, emphasizing caution with copyright strike notifications and verifying URLs before entering credentials. Use of multi-factor authentication (MFA) on Google accounts is strongly recommended to reduce the risk of account takeover. Monitoring for suspicious login activity and promptly reporting phishing domains to relevant authorities can help mitigate impact. Since the campaign uses rotating domains, blocking known malicious domains listed (e.g., blacklivesmattergood4.com, dmca-notification.info) can assist in detection and prevention.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securityboulevard.com/2026/04/fake-youtube-copyright-notices-can-steal-your-google-login/"]
- Adversary
- null
- Pulse Id
- 69dfc7cd3be10faa299f8741
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainblacklivesmattergood4.com | — | |
domaindmca-notification.info | — | |
domaindopozj.net | — | |
domainec40pr.net | — | |
domainxddlov.net | — |
Threat ID: 69dfc80282d89c981f7dd9c8
Added to database: 4/15/2026, 5:16:50 PM
Last enriched: 4/15/2026, 5:32:00 PM
Last updated: 4/16/2026, 7:12:59 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.