Home Bitcoin NewsBitcoin Scam YouTube Cryptocurrency Videos Pushing Info-Stealing Trojan – BleepingComputer

YouTube Cryptocurrency Videos Pushing Info-Stealing Trojan – BleepingComputer

by admin

A scam and malware campaign is underway on YouTube that uses videos to promote a “bitcoin generator” tool that promises to generate free bitcoins for its users. In reality, this scam is pushing the Qulab information-stealing and clipboard hijacking Trojan.

This campaign was discovered by security researcher Frost who told BleepingComputer that they have been tracking it for the past 15 days. Each time Frost reports the user and their videos, YouTube takes them down, but the bad actors simply create a new user and upload more.

The way this campaign works is the bad actor will upload a series of videos that promote a so-called free “bitcoin generator” tool.

Uploaded Videos
Uploaded Videos

In the videos description will also be links to download this tool, which is actually a Trojan, and a link for the https://freebitco.in site as shown below.

Video Promoting Trojan
Video Promoting Trojan

When a user clicks on the download link in these videos, they will be brought to a page offering a Setup.exe file.

Setup.exe Link
Setup.exe Link

If the a victim downloads and runs the Setup.exe file, the Qulab Trojan will be installed onto the computer.

The Qulab payload

The payload being pushed by this YouTube scam is the Qulab information-stealing and clipboard hijacker Trojan.  When executed, the Trojan will copy itself to %AppData%amd64_microsoft-windows-netio-infrastructuremsaudite.module.exe and launch itself from that location.

According to this writeup on Qulab by Fumko, Qulab will attempt to steal the browser history, saved browser credentials, browser cookies, saved credentials in FileZilla, Discord credentials, and Steam credentials. The Trojan also contains code to steal .txt, .maFile, and .wallet files from a computer.

Finally, Qulab also acts as a clipboard hijacker, or clipper, which means it will monitor the Windows clipboard for certain data, and when detected, swaps it with different data that the attacker wants.  In this particular case, Qulab is looking for cryptocurrency addresses that have been copied into the Clipboard, in many cases because a user is about to send currency to the address, and swaps it out with a different address under the attacker’s control. 

As cryptocurrency addresses are long strings and hard to remember, many users would not even know that the address they copied to the clipboard has been changed to a different address when they paste it into an application of web site.  This allows the attackers to steal the cryptocurrency that is sent to their addresses.

Fumko’s analysis states that Qulab supports the following Cryptocurrency addresses for the clipper component:

Bitcoin Bitcoin Cash Bitcoin Gold Bytecoin
Cardano Lisk Dash Doge
Electronium Ethereum Graft Litecoin
Monero Neo QIWI Qtum
Steam Trade Link Stratis VIA WME
Waves Yandex Money ZCash  

When compiling the stolen data, the Trojan will send it to the the attacker using Telegram as shown below.

Qulab Telegram Traffic
Qulab Telegram Traffic

If you have been infected with this Trojan, you should immediately change all passwords for your financial accounts and web sites that you visit.  As always, you should use a password manager in order to create unique and strong passwords for every account you visit.

Let’s block ads! (Why?)

Source link

Related Articles

Leave a Comment

CAPTCHA ImageChange Image

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More