{"id":23880,"date":"2025-03-05T16:34:45","date_gmt":"2025-03-05T12:34:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23880"},"modified":"2025-03-05T16:34:45","modified_gmt":"2025-03-05T12:34:45","slug":"miner-disguised-as-circumvention-tools","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/miner-disguised-as-circumvention-tools\/23880\/","title":{"rendered":"Miner inconvenience: how cybercriminals blackmail YouTubers into promoting malware"},"content":{"rendered":"<p>Over the past six months, Windows Packet Divert drivers for intercepting and modifying network traffic on Windows systems have become popular in Russia. From August to January 2024, we noted that detections of these drivers almost doubled. The main reason? These drivers are being used in tools designed to bypass restrictions for accessing foreign resources.<\/p>\n<p>This surge in popularity hasn\u2019t gone unnoticed by cybercriminals. They\u2019re actively distributing malware disguised as bypassing tools\u00a0\u2014 and they\u2019re doing it by blackmailing bloggers. So, every time you watch a video titled something like \u201cHow to bypass restrictions\u2026\u201d, be especially cautious\u00a0\u2014 even the most reputable content creators might unknowingly be spreading stealers, miners, and other malware.<\/p>\n<p>How cybercriminals exploit unsuspected users\u00a0\u2014 and where bloggers fit into the picture\u00a0\u2014 is what we\u2019ll explore in this article.<\/p>\n<h2>Hackers disguised as honest developers<\/h2>\n<p>There are plenty of software solutions designed to bypass restricted access to foreign platforms, but they all have one thing in common\u00a0\u2014 they\u2019re created by small-time developers. Such programs spread organically: an enthusiast writes some code, shares it with friends, makes a video about it, and <em>voil\u00e0<\/em>\u00a0\u2014 yesterday\u2019s unknown programmer becomes a \u201cpeople\u2019s hero\u201d. His GitHub repository is starred tens of thousands of times, and people thank him for restoring access to their favorite online resources. We recently wrote about <a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-code-in-github\/53085\/\" target=\"_blank\" rel=\"noopener nofollow\">one such case<\/a> where cybercriminals boosted GitHub repositories containing malware.<\/p>\n<p>There may be dozens or even hundreds of such enthusiasts \u2014 but who are they, and can they be trusted? These are key questions both current and potential users of these programs should be asking. A major red flag is when these developers recommend disabling antivirus protection. Disabling <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">protection<\/a>\u00a0to voluntarily give a potential hacker access to your device? That\u2019s a risky move.<\/p>\n<p>Of course, behind the mask of a people\u2019s hero might be a hacker looking for profit. An unprotected device is vulnerable to malware families like NJRat, XWorm, Phemedrone, and DCRat, which have been commonly spread alongside such bypassing software.<\/p>\n<h2>Where do bloggers fit in?<\/h2>\n<p>We\u2019ve identified an active miner distribution campaign that has claimed at least two thousand victims in Russia. One of the infection sources was a YouTube channel with 60,000 subscribers. The blogger uploaded several videos on bypassing restrictions, with a link to a malicious archive in the description. These videos accumulated over 400,000 views in total. Later, the channel owner deleted the link, leaving this note: <em>\u201cDownload the file here: (program does not work)\u201d.<\/em> Originally, the link led to the fraudulent site <em>gitrok[.]com<\/em>, where the infected archive was hosted. According to the site\u2019s counter, at the time of our study the bypassing tool had been downloaded at least 40,000 times.<\/p>\n<p>Don\u2019t rush to put all the blame on the bloggers\u00a0\u2014 in this case, they were simply following the orders of cybercriminals, unaware of what was really going on. Here\u2019s how it works. First, the criminals file a complaint against a video about such a restriction-bypassing tool, pretending to be the software\u2019s developers. Then they contact the video creator and persuade them to upload a new video, this time containing a link to their malicious website\u00a0\u2014 claiming that this is now the only official download page. Of course, the bloggers have no idea the site is distributing malware\u00a0\u2014 specifically, an archive containing a miner. And for those who\u2019ve already uploaded three or more videos on the topic, refusal is not an option. The hackers threaten to file multiple complaints, and if there are three or more, the channel would be deleted.<\/p>\n<p>In addition, the criminals spread their malware and installation guides through other Telegram and YouTube channels. Most of these have been deleted\u00a0\u2014 but there\u2019s nothing to stop them from creating new ones.<\/p>\n<h2>What about the miner?<\/h2>\n<p>The malware in question was a sample of SilentCryptoMiner, which we <a href=\"https:\/\/securelist.com\/miner-campaign-misuses-open-source-siem-agent\/114022\/\" target=\"_blank\" rel=\"noopener\">covered in October 2024<\/a>. It\u2019s a stealthy miner based on XMRig, another open-source mining tool. SilentCryptoMiner supports mining of multiple popular cryptocurrencies, including ETH, ETC, XMR, RTM, and others. The malware stops mining upon detecting certain processes, the list of which the criminals can provide remotely to evade detection. That makes it nearly impossible to detect without <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a>.<\/p>\n<p>For more about the malicious archive and how it persists in the system, check <a href=\"https:\/\/securelist.com\/silentcryptominer-spreads-through-blackmail-on-youtube\/115788\" target=\"_blank\" rel=\"noopener\">our post on Securelist<\/a>.<\/p>\n<h2>How to protect yourself from miners<\/h2>\n<ul>\n<li><strong>Ensure that all personal devices have <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">trusted protection<\/a><\/strong>\u00a0to safeguard against miners and other malware.<\/li>\n<li><strong>Avoid downloading programs from obscure or little-known sources.<\/strong> Stick to official platforms, but remember\u00a0\u2014 malware can creep into them too.<\/li>\n<li><strong>Keep in mind that even the most reputable bloggers can unknowingly spread malware<\/strong>, including miners and stealers.<\/li>\n<\/ul>\n<blockquote><p>Here are some relevant articles you can read to learn more about miners and their dangers:<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/mario-forever-malware-too\/48547\/\" target=\"_blank\" rel=\"noopener nofollow\">Mario Forever, malware too: a free game with a miner and Trojans inside<\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/miner-xmrig-delivered-via-torrents\/53061\/\" target=\"_blank\" rel=\"noopener nofollow\">XMRig Miner as a New Year\u2019s gift<\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-cryptominers-2022\/46186\/\" target=\"_blank\" rel=\"noopener nofollow\">Prices down, miners up<\/a><\/p><\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are blackmailing YouTube bloggers into posting malware links in their video descriptions.<\/p>\n","protected":false},"author":312,"featured_media":23881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1505,1429,521,1663],"class_list":{"0":"post-23880","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cryptocurrencies","9":"tag-miners","10":"tag-threats","11":"tag-youtube"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/miner-disguised-as-circumvention-tools\/23880\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/miner-disguised-as-circumvention-tools\/28639\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/miner-disguised-as-circumvention-tools\/28757\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/miner-disguised-as-circumvention-tools\/39155\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/miner-disguised-as-circumvention-tools\/53118\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/miner-disguised-as-circumvention-tools\/28892\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/miner-disguised-as-circumvention-tools\/34707\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/miner-disguised-as-circumvention-tools\/34336\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/miners\/","name":"miners"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/312"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23880"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23880\/revisions"}],"predecessor-version":[{"id":23882,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23880\/revisions\/23882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23881"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}