YouTube BitCoin Videos Pushing Predator Info-Stealing Trojan

A new scam is underway on YouTube that uses videos to promote a tool that can allegedly generate the private key for a bitcoin address. The attackers then claim this key would then allow you to gain access to the bitcoins stored in the bitcoin address, when in reality the victims will be infected with a password and data stealing Trojan.

- Advertisement -

This campaign was discovered by security researcher Frost who routinely monitors YouTube videos for cryptocurrency scams that lead to malware, which in this particular case is the Predator the Thief information-stealing Trojan

In this scam, the attacker is uploading videos that promotes a fake bitcoin address private key generator that can be used to steal other people’s bitcoins.

Uploaded Videos

In the video’s description will also be links to download the trojanized program from Yandex, Google Drive, and Mega.

- Advertisement -
Video Promoting Trojan

The file being offered is called Crypto World.zip and when extracted contains a setup.exe file, which includes a password-protected ZIP file containing the Predator the Thief executable.  This setup.exe file currently has 1/71 detections on VirusTotal.

CryptoWorld.zip files

This setup.exe program is a Trojan that will unzip a file to the .languagetemplatestemp folder as license.exe.

Extracting Predator the Thief installer

The license.exe file will then be executed and the Predator the Thief information stealing Trojan will be installed and executed on the computer.

Once running, Predator the Thief will communicate with the malware’s command and control server to download further components, other malware, and to send information back to the attackers.

Predator Network Traffic

This Trojan can steal a variety of information and passwords from a computer, including copying the victim’s clipboard, recording over the webcam, and stealing files from the victim.

According to Kaspersky, Predator the Thief v3 has the following features and this version may be newer.

LocationData stolen
GamesOsu
Battle.net
FTPWinSCP
VPNNordVPN
2FAAuthy
MessengersPidgin
Skype
Operating SystemWebcam
HWID
Clipboard
Specific document files (Grabber)
Project filenames*
BrowsersIE/Edge

If you have been infected with this Trojan, you should immediately change all passwords for your financial accounts, web sites, chat services such as Discord, and gaming services such as Steam and Battle.net. 

As always, you should use a password manager in order to create unique and strong passwords for every account you visit and never download programs off of YouTube, especially ones that claim to generate free money or cryptocurrency.



Source

Previous Articles:

- Advertisement -

Latest News

OpenClaw Hype vs. Reality: AI Agent Rise Brings Serious Security Risks

The open-source AI agent framework OpenClaw amassed roughly 147,000 GitHub stars within weeks, sparking...

Bitcoin Tanks to $74.5K Amid $1.3B ETF Exodus

Bitcoin’s price fell to a year-to-date low of $74,555, marking a 40% drawdown from...

SpaceX Merges with xAI In $1.25 Trillion Vertical Integration Deal

SpaceX has officially acquired xAI, forming a single entity valued at $1.25 trillion.Elon Musk...

Hedera Developer Day Denver Feb 2026

The Hedera network will introduce a high-volume throttle system for entity creation (HIP-1313) alongside...

Bitcoin Dips Below MicroStrategy’s $76k Cost Basis

Strategy's massive Bitcoin holdings, purchased at a lifetime average of $76,052, are now worth...
- Advertisement -

Must Read

26 Best Investment Audiobooks on Audible

Looking to expand your financial knowledge? Me too..When I first started investing, I was completely lost. There were so many terms, strategies, and theories...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!