
Image by NordWood Themes, from Unsplash
Hackers Blackmail YouTubers Into Spreading Malware
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Hackers are forcing YouTubers to unknowingly spread malware by blackmailing them into sharing malicious links in their video descriptions.
In a Rush? Here are the Quick Facts!
- Cybercriminals file false complaints to pressure creators into posting malicious links.
- Malware, SilentCryptoMiner, secretly mines cryptocurrency on infected devices.
- A YouTuber’s videos led to 40,000 malware downloads before removing the link.
The scheme, uncovered by Kaspersky , mainly targets content creators who post videos about bypassing internet restrictions, a popular topic in Russia.
The criminals begin by filing false complaints against these videos, pretending to be the original developers of the restriction-bypassing software. Once YouTube removes the video, the hackers contact the creator, claiming they have the “official” new download link.
They then pressure the YouTuber to include this link in a new video—without realizing that it leads to malware. If the YouTuber refuses, the hackers threaten to file multiple complaints, which can get the channel permanently deleted.
The malware being spread is a type of “miner” that secretly uses infected computers to mine cryptocurrency. Victims unknowingly install it, believing they are downloading legitimate software.
The malware, known as SilentCryptoMiner, is a stealthy program designed to evade detection. It is based on XMRig, a widely used open-source mining tool.
It can mine various cryptocurrencies, including Ethereum (ETH), Monero (XMR), and others. SilentCryptoMiner is programmed to stop its activity when it detects certain security processes running, making it difficult to spot without strong cybersecurity protections.
The hackers don’t stop at YouTube. They also spread their malware through Telegram and other video-sharing platforms. Many of these accounts are eventually deleted, but new ones quickly appear.
To avoid infection, cybersecurity experts advise users to be cautious when downloading software, especially from YouTube links or unknown sources. Kaspersky notes that even reputable content creators can unknowingly share dangerous links if they are being blackmailed.
If a program asks users to disable antivirus protection before installation, that’s a major red flag. Keeping security software active and updated is crucial to blocking such threats.
As cybercriminals find new ways to manipulate content creators and their audiences, internet users must stay vigilant. Always verify download links and avoid clicking on files from unknown sources, no matter how trustworthy the person sharing them seems.

Image by Eva Rinaldi, from Wikimedia Commons
1,000 Concert Tickets Stolen And Resold By Cybercrime Crew
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
A cybercrime group stole nearly 1,000 concert tickets, including those for Taylor Swift’s Eras Tour, and resold them on StubHub, raking in more than $600,000.
Rush? Here are the Quick Facts!
- Scheme involved contractors in Jamaica stealing ticket URLs and sending them to New York.
- Over $600,000 was made from reselling stolen tickets between June 2022 and July 2023.
- Arrested suspects Tyrone Rose and Shamara Simmons face grand larceny and conspiracy charges.
The scheme involved employees working for a third-party contractor in Jamaica who accessed and stole tickets from the online ticket platform. The tickets, primarily for Swift’s record-breaking tour, as well as for Adele, Ed Sheeran concerts, NBA games, and the U.S. Open, were resold at inflated prices, as reported by USA TODAY .
According to Queens District Attorney Melinda Katz, the contractors in Jamaica obtained the URLs for tickets and forwarded them to co-conspirators in Queens, New York.
These individuals then downloaded the stolen tickets and resold them on StubHub for significant profit. The fraud took place between June 2022 and July 2023. Katz stated that the total proceeds from the scheme amounted to $635,000, reported USA TODAY.
Two individuals, Tyrone Rose, 20, from Kingston, Jamaica, and Shamara Simmons, 31, from Jamaica, Queens, were arrested last Thursday and face charges of grand larceny, computer tampering, and conspiracy.
If convicted, they could each face three to 15 years in prison. Rose, who was apprehended in New York, allegedly worked with another accomplice in Jamaica to redirect the stolen URLs.
Rose was arrested during a visit to New York and was instructed to surrender his passport, according to Katz’s office on Tuesday. Both he and Simmons pleaded not guilty and were released until their next court appearance on Friday, as reported by AP .
The public defender’s office representing Rose declined to comment, and Simmons’ lawyers had no immediate response on Tuesday, noted AP. The theft targeted high-profile events, with the majority of stolen tickets linked to Swift’s Eras Tour, which grossed over $2.7 billion last year, says USA TODAY.
Other tickets affected included those for major concerts and sporting events. Investigators are still working to determine the full scope of the operation, including the identification of additional suspects, as reported by AP.
StubHub informed USA TODAY on Tuesday that it identified all affected orders and either replaced or refunded them. The company also ended its partnership with Sutherland Global Services.
“Upon discovering this criminal scheme, we immediately reported it to law enforcement and terminated the employees involved,” said Mark Streams, StubHub’s chief legal officer, as reported by USA TODAY.