ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1954

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

Threat Score:
62
2 articles
90.0% similarity
1 day ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Article Timeline

2 articles
Click to navigate
Aug 14
Aug 14
Oldest
Latest

Key Insights

1
Cybercriminals are exploiting YouTube download sites to distribute proxyware malware, targeting users seeking free video conversion services, according to a report from AhnLab Security Intelligence Center.
2
The campaigns are particularly active in South Korea, with unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain being installed on victims' systems without consent.
3
This proxyjacking technique mirrors previous cryptojacking attacks, but focuses on monetizing victims' internet bandwidth instead of computational power, as detailed in the report by ASEC.
4
In a past incident in 2023, over 400,000 Windows systems were compromised via DigitalPulse, highlighting the scale of impact from such campaigns.
5
Recent infections are leveraging deceptive ads on freeware sites, increasing the sophistication of the attack methods used by cybercriminals.
6
Experts warn that this trend of proxyware distribution represents an evolution in bandwidth theft attacks, posing significant risks to unsuspecting users.

Threat Overview

Cybercriminals have intensified their proxyjacking operations by exploiting legitimate user behavior surrounding YouTube video downloads, as detailed in a recent analysis by the AhnLab Security Intelligence Center (ASEC). This sophisticated campaign leverages fake YouTube download sites to distribute proxyware malware, specifically targeting individuals seeking free video conversion services. According to ASEC's findings, this tactic is particularly prevalent in South Korea, where unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain are being installed on users' systems without their consent. 'This represents a significant evolution in bandwidth theft attacks,' the report states, calling attention to the alarming trend of cybercriminals monetizing victims' internet resources without their knowledge.

Background and Context: Prior reports, including the analysis titled 'DigitalPulse Proxyware Being Distributed Through Ad Pages,' have documented similar proxyware distribution efforts. Proxyjacking involves the illicit installation of software that allocates bandwidth to external entities in exchange for compensation, resulting in unauthorized use of victims' internet connections. ASEC has monitored sustained activity in Korea, with recent infections employing similar tactics as seen in earlier campaigns.

Technical Analysis: The attack works by masquerading malware as legitimate YouTube downloaders, capitalizing on users' desire for free services. Cybercriminals utilize deceptive advertising on freeware sites to lure victims into downloading proxyware, which then allows them to share their bandwidth with malicious actors. ASEC's report emphasizes that this approach mirrors the resource exploitation associated with cryptojacking but focuses on bandwidth instead. The previous campaign documented in 2023 compromised over 400,000 Windows systems using DigitalPulse, highlighting the scale of impact from these attacks. 'The recent infections are employing variants like Honeygain's proxyware, which further complicates detection,' noted a cybersecurity expert.

Industry Response: In response to the ongoing threat, security teams are urging users to be vigilant about the software they download and to utilize trusted sources for video conversion services. Cybersecurity firms are also ramping up efforts to educate users about the risks associated with proxyware and the importance of maintaining secure internet practices. 'Organizations need to implement robust security measures and educate their users to avoid becoming victims of these sophisticated attacks,' said a cybersecurity analyst.

Next Steps and Recommendations: Users are advised to avoid downloading software from unverified sources and to perform regular scans of their systems for unauthorized applications. Security organizations recommend implementing firewalls and monitoring network traffic to detect unusual bandwidth usage. 'Organizations should prioritize user education and awareness to mitigate the risks posed by proxyware and similar threats,' concluded the report.

Tactics, Techniques & Procedures (TTPs)

T1566
Spearphishing Link - Attackers use deceptive advertising on freeware sites to lure victims into downloading proxyware under the guise of YouTube downloaders [1][2]
T1190
Exploit Public-Facing Application - Exploitation occurs through crafted download links leading to the installation of unauthorized proxyware [1][2]
T1059.007
JavaScript/JScript - Proxyware installations utilize JavaScript to execute malicious scripts that enable bandwidth sharing [2]
T1557
Adversary-in-the-Middle - Malicious ads facilitate the transparent installation of proxyware on victims' systems [1][2]
T1053
Scheduled Task/Job - Proxyware may create tasks to ensure persistence and continuous bandwidth sharing [2]
T1105
Ingress Tool Transfer - Post-compromise downloading of additional malicious tools to enhance the attack [1]
T1003
OS Credential Dumping - Some proxyware variants may attempt to harvest credentials from compromised systems [2]

Timeline of Events

2025-08-10
AhnLab Security Intelligence Center identifies a surge in proxyware distribution via fake YouTube download sites [1]
2025-08-12
Initial reports of infections in South Korea emerge, with users reporting unauthorized bandwidth sharing tools [2]
2025-08-14
ASEC publishes detailed analysis of the ongoing proxyjacking campaign, including statistics on affected systems [1][2]
2025-08-15
Security researchers warn of increasing sophistication in proxyware distribution methods [1]
2025-08-16
Ongoing monitoring reveals sustained activity and new variants of proxyware being deployed [2]

Source Citations

expert_quotes: {'ASEC report': 'Article 1', 'Cybersecurity analyst': 'Article 2'}
primary_findings: {'Infection reports': 'Article 2', 'Proxyware distribution': 'Article 1'}
technical_details: {'Attack methods': 'Articles 1, 2'}
Powered by ThreatCluster AI
Generated 1 day ago
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

GB Hackers • 2 days ago

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services The AhnLab Security Intelligence Center (ASEC) has uncovered fresh instances of proxyware distribution by threat actors leveraging deceptive advertising on freeware sites. Building on prior reports, such as the “DigitalPulse Proxyware Being Distributed Through Ad Pages” analysis, this campaign continues to exploit unwitting users in South Korea, installing unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain

Score
52
97.0% similarity
Read more
2

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware

Cybersecurity News • 1 day ago

Cybercriminals have escalated their proxyjacking campaigns by exploiting legitimate user behavior around YouTube video downloads, according to a recent security analysis. The attack leverages fake YouTube download sites to distribute proxyware malware, specifically targeting users seeking free video conversion services. This sophisticated campaign represents a significant evolution in bandwidth theft attacks, where threat actors monetize […]

Score
48
97.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

MALWARE
DigitalPulse
Honeygain
MITRE ATT&CK
T1003
T1059
T1105
T1566
T1053
ATTACK TYPES
Proxyjacking
Bandwidth Theft
INDUSTRIES
Cybersecurity
COUNTRIES
South Korea
CLUSTER INFORMATION
Cluster #1954
Created 1 day ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration