Search Inside Bitcoins

New Reports Details How Ransomware Is Concealed in YouTube Videos 

Lodi City Was Asked to Pay Ransom of 75 Bitcoins worth $400,000
Lodi City Was Asked to Pay Ransom of 75 Bitcoins worth $400,000

Every day, there’s a report detailing how ransomware is affecting the world. The attackers are also getting innovative in their attacks. Recently, Cybersecurity form ESET published an account about the Stantinko botnet, a popular mining malware that is now using YouTube pages to spread ransomware.

According to the report, the botnet, which has been operating since about 2012, has now affected up to half a million computers. Its primary targets are located in Russia, Ukraine, Belarus, and Kazakhstan. The malware operates a simple cryptojacking operation, although this time, it distributes a Monero-morning virus through pages on YouTube. 

Crypto hackers use codes to steal processing resources from unsuspecting users, disguising their nefarious activity with other processes, and using the computer’s computing power to mine cryptocurrencies.

ESET claimed that it had informed YouTube about the bot, and that all channels which contain traces of the Stantinko code have been removed from the platform. 

A Resurgent 2019 for Attackers Across the Board

Malware has been in rampant operation so far, as cryptocurrencies have been a particular target of attackers across the world. While ransomware operators prefer to get paid in crypto before releasing the data of their victims, crypto jackers just go for the jugular, using a network of computers to mine their favorite crypto assets and profiting off the resources owned by others.

On November 26, the Microsoft Defender ATP research team shared insights on a new form of crypto-stealing malware, which, as they estimated, has infected almost 80,000 computers. 

The malware, which they called Dexphot, has reportedly been in operation since October 2018, reaching its peak in June of this year. The code hijacks processes to disguise its activity, and when infected users try to remove the malware, monitoring services and scheduled tasks trigger the re-infection. 

“Dexphot is not the type of attack that generates mainstream media attention; it’s one of the countless malware campaigns that are active at any given time. Its goal is a very common one in cybercriminal circles — to install a coin miner that silently steals computer resources and generates revenue for the attackers,” the report states.

The attacks have gotten so sophisticated, that they now target the cryptocurrencies at source. Earlier this month, a Reddit post published by the Monero development team revealed that the software available for download on the company’s official website had been retrofitted to steal currency. 

Per the post, the Command Line Interface tools available at has been compromised, as the team discovered that the hash of the binaries available for download didn’t match the expected hashes. Government agencies in Finland are getting proactive in their fight against ransomware. Earlier this month, a government agency beefed up securities among its network of systems in preparation of an attack.

Read next

InsideBitcoins uses cookies to improve and customize your user experience. Learn more

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.