• About
  • Advertise
  • Careers
  • Contact Us
Tuesday, June 17, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home Business Security

RedLine: Self-spreading Stealer Targets Gamers on YouTube

by Techeconomy
September 21, 2022
in Security
1
UBA
Advertisements

Kaspersky researchers spotted an unusual malicious bundle (a collection of malicious programs distributed in the form of a single installation file, self-extracting archive or other file with installer-type functionality) targeting gamers on YouTube.

https://techeconomy.ng/2022/08/youtube-debuts-page-for-podcasts-to-challenge-apple-spotify/

Its main payload is the widespread RedLine stealer, one of the most common Trojans used to steal passwords and credentials from browsers.

Cybercriminals actively hunt for gaming accounts and gaming computer resources. As Kaspersky experts noted in the recent overview of gaming-related cyberthreats, stealer-type malware is often distributed under the guise of game hacks, cheats and cracks.

This time, the researchers discovered another type of malicious activity linked to gaming: the attackers placed poisoned bundles on the victims’ YouTube channels under the guise of gaming-related content alongside a link to a self-extracting RAR archive in the video description. The archive contains several malicious files – a notorious RedLine stealer, among them.

The stealer can plunder usernames, passwords, cookies, bank card details and autofill data from Chromium- and Gecko-based browsers, data from cryptowallets, instant messengers and FTP/SSH/VPN clients, as well as files with particular extensions from devices.

In addition, RedLine can download and run third-party programs, execute commands in cmd.exe and open links in the default browser. The stealer spreads in various ways, including through malicious spam e-mails and third-party loaders.

In addition to the RedLine payload itself, the discovered bundle is of note for its ability for self-propagation. Several files, in the bundle in the description, are responsible for this.

They receive videos and post them to the infected users’ YouTube channels along with the links to a password-protected archive.

The videos advertise cheats and cracks and provide instructions on hacking popular games and software.

Among the games mentioned are APB Reloaded, CrossFire, DayZ, Dying Light 2, F1® 22, Farming Simulator, Farthest Frontier, FIFA 22, Final Fantasy XIV, Forza, Lego Star Wars, Osu!, Point Blank, Project Zomboid, Rust, Sniper Elite, Spider-Man, Stray, Thymesia, VRChat and Walken.

RedLine stealer on YouTube (1)
Advertisements
MTN ADS
Examples of videos spreading the bundle

Once the victims themselves download the original bundle, the RAR archive is self-extracting. It contains a number of malicious files, clean utilities and a script to automatically run the unpacked contents. Some of the files’ names include explicit language.

RedLine stealer on YouTube (2)
Contents of the self-extracting archive

Another element that caught the researchers’ eye, is a miner. It makes sense, since the main target audience, judging by the video, is gamers. They are likely to have video cards installed that can be used for mining.

“Gamers are one of the most popular groups targeted by cybercriminals. This time attackers used gaming related content as bait for stealing victims’ credentials as well as mining from their computers. Our advice would be to carefully pick the sources to quench your gaming thirst and do not download any suspicious archives from unreliable accounts,” comments Oleg Kupreev, senior security researcher at Kaspersky.

Loading

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: Redline stealerRedline Stealer Youtube
Techeconomy

Techeconomy

Next Post

Designing for Emerging Markets - Lessons from Nigeria

Comments 1

  1. Pingback: RedLine: Self-spreading Stealer Targets Gamers on YouTube - News Curators

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

Allianz Positioned as One of the World’s Strongest Brands

3 years ago
Stanbic IBTC and Africa' Energy innovation

Stanbic IBTC Spearheading Renewable Energy Innovation

9 months ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2017 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Mobility
      • Environment
      • Travel
      • StartUPs
    • Economy
    • TECHECONOMY TV
    • TBS
    • About Us
    • Contact Us

    © 2017 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »