Home / Technology / YouTube's Dark Side: Hackers Leverage Fake Engagement to Distribute Malware
YouTube's Dark Side: Hackers Leverage Fake Engagement to Distribute Malware
3 Nov
Summary
- Hackers using compromised accounts and fake engagement to spread malware in over 3,000 software cracks and game hack videos
- Malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine stealing passwords, browser data and other sensitive information
- Attackers leveraging a modular, role-based structure to quickly replace banned accounts and maintain the operation

According to recent research, a malware distribution network known as the "YouTube Ghost Network" has been actively spreading information-stealing malware through the platform since 2021. The network has seen a threefold surge in activity in 2025, leveraging a sophisticated formula that blends social manipulation with technical stealth.
The primary targets are users searching for "Game Hacks/Cheats" and "Software Cracks/Piracy." Hackers use compromised accounts and fake engagement, such as positive comments, likes, and community posts, to give their malicious content an air of legitimacy. This psychological trick tricks viewers into believing the content is widely trusted, allowing the operation to persist even when individual videos or channels are removed.
The malware delivered through this network includes Lumma Stealer, Rhadamanthys, StealC, and RedLine, which harvest sensitive information like passwords, browser data, and other personal details. The network's modular structure and constant replacement of banned accounts make it difficult for YouTube and security vendors to effectively shut down the operation.
Cybercriminals have evolved beyond traditional scams, exploiting a platform built on trust and engagement to create a scalable, self-sustaining system for malware distribution. As the threat continues to evolve, it's crucial for users to be vigilant and adopt best practices to protect themselves from these sophisticated attacks.



