 
				 
					Security researchers have discovered a large-scale malware campaign that they call the YouTube Ghost Network. This operation uses the YouTube platform to infect personal computers while targeting unsuspecting users with fake tutorial videos. The operation is complex and continuously active.
The hackers create thousands of fake tutorial videos that promise that you will receive free, cracked versions of desirable programs. They mention programs such as Microsoft Office and other expensive software. The description of the video includes a link to download the program that leads to Google Drive or Dropbox. When you download the program, you download malware that is hidden in the file.
You click on the link in the description of the video. You are then prompted to download the compressed file. After downloading the compressed file, when you open it, it will install malware on the computer. The malware is running without your knowledge. It can steal sensitive information from your device. Hackers can steal passwords saved in the browser and browser cookies, as well as login credentials for various websites.
The scammers use a clever strategy to appear like legitimate users. They fill the comment section with fake, positive comments thanking the uploader for the working program, and even add fake commentary that has provided a password to open the file. All of this serves to give our scam a hint of legitimacy and trustworthiness, tricking new viewers into downloading the infected file.
This operation functions in a very organized manner. They take control of YouTube channels and make videos on them. If they lose a channel, they easily create a different one. This capability makes them strong, resistant and difficult to stop. This demonstrates forethought and resources invested in their operation.
Never click on links from untrusted sources . Refrain from downloading free cracked software. Download all material from official sources. Do not pay attention to overly positive comment sections. Utilize a trusted antivirus software on your home computer. Always remember that something free should have been compensated. Your personal information is worth more than getting a loaded pirated program.
Also Read: How Stay Invisible Online: Proven Steps to Protect Your Data from Hackers