YouTuber Extorted to Spread Crypto Mining Malware, Thousands of Devices Infected!

Updated
March 13, 2025
Gambar YouTuber Extorted to Spread Crypto Mining Malware, Thousands of Devices Infected!

Jakarta, Pintu News – A shocking report from Kaspersky reveals that YouTubers are being blackmailed by hackers to spread crypto-mining malware in their videos. The perpetrators are using fake copyright threats to pressure creators into including malicious links in their video descriptions.

This strategy proved effective, with over 40,000 downloads of the malware recorded, infecting approximately 2,000 computers in Russia. The malware, known as SilentCryptoMiner, utilizes the victim’s computing power to mine various cryptocurrencies such as Ethereum , Ethereum Classic , Monero , and Ravencoin .

Check out the full news below!

Hackers are capitalizing on the popularity of the Windows Packet Divert driver, a piece of software often used to bypass geo-restrictions. In the last six months, Kaspersky recorded 2.4 million devices downloading this driver, with the number of downloads increasing since September 2024.

The perpetrators target YouTube content discussing these driver installation tutorials. They file false copyright claims and then contact the creators under the pretense that they are the original owners of the software being discussed. If YouTubers refuse to cooperate, they are threatened with losing their channels.

One of the victims was a YouTuber with 60,000 subscribers who included a malware link in a video that had over 400,000 views. However, instead of directing users to an official site like GitHub, the link led to an infected archive that had been downloaded tens of thousands of times.

Also read: How to Sell Pi Network (PI) Coin in 2025? Check out the Guide

SilentCryptoMiner: How Hackers Mine Crypto from Victims’ Computers

silent crypto miner
Source: Kapersky

The malware used in this attack is SilentCryptoMiner, which is based on XMRig, one of the popular open-source mining software. Once installed on a victim’s computer, the malware will utilize processing power to mine crypto without the user’s knowledge.

The malware uses a process hollowing technique, injecting itself into legitimate system processes, making it difficult for antiviruses to detect. What’s worse, attackers can remotely control the malware, allowing them to stop the mining process if the system detects suspicious activity.

Read also: Pi Network KYC Deadline Tomorrow, Will PI be Listing on Binance?

Widespread Attacks on Telegram and Open Source Platforms

According to Decrypt, hackers spread malware through Telegram channels and open-source platforms like GitHub in addition to YouTube. According to Kaspersky, many fake open code projects are uploaded on GitHub, tricking developers with legitimate-looking repositories.

Not only that, but a report from the Center for Internet Security revealed that by 2024, CoinMiner will be the second most discovered malware, only losing out to SocGholish, a drive-by downloader-based malware. This shows that crypto-mining attacks are increasing on a global scale.

That’s the latest information about crypto news today. Get more information about crypto academy from beginner to expert level only at Pintu Academy and enrich your knowledge about the world of crypto and blockchain.

Follow us on Google News for the latest updates on crypto and blockchain technology. Enjoy an easy and secure crypto trading experience by downloading Pintu crypto app via Google Play Store or App Store now.

Experience web trading with advanced trading tools such as pro charting, various order types, and portfolio tracker only at Pintu Pro. Click Register Pintu if you don’t have an account or click Login Pintu if you are already registered.

*Disclaimer

This content aims to enrich readers’ information. Pintu collects this information from various relevant sources and is not influenced by outside parties. Note that an asset’s past performance does not determine its projected future performance. Crypto trading activities have high risk and volatility, always do your own research and use cold cash before investing. All activities of buying and selling bitcoin and other crypto asset investments are the responsibility of the reader.

Reference

Share

Latest News

See All News ->